Jump to content

"Bad Image" errors after running Malwarebytes to clean up infections


Recommended Posts

This computer was infected with some sort of malware after clicking on an attachment in an email. I tried running SEP full scans and then Malwarebytes scans to clean it up, which usually work fine. Many infections were found and removed. However, now every time the computer is rebooted or a program is run, Windows is throwing a "Bad Image" error. Clicking OK closes the error, and the programs work, but the errors are very annoying. Is there some way to correct this problem?

 

Error example:

 

iexplore.exe - Bad Image

 

C:\PROGRA~2\Wincert\WIN32C~1.DLL is either not designed to run on Windows or it contains an error. Try installing the program again using the original installation media or contact your system administrator or the software vendor for support.

 

Regards,
Eric

 

Logs attached:

 

 

attach.txt

dds.txt

Link to post
Share on other sites

Hello! Welcome to Malwarebytes Forums! welcome.gif
My name is Georgi and and I will be helping you with your computer problems.

Before we begin, please note the following:

  • I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
  • The logs can take some time to research, so please be patient with me.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
  • Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
  • Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.

 

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

 

Regards,

Georgi

Link to post
Share on other sites

Georgi, thanks for your help. Please see below for the FRST and Addition logs.

 

Regards,
Eric

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 13-03-2014  01
Ran by dfiore (administrator) on LT-DFIORE on 01-04-2014 15:48:07
Running from C:\Users\dfiore\Desktop
Microsoft Windows 7 Professional  Service Pack 1 (X86) OS Language: English(US)
Internet Explorer Version 11
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(Cisco Systems, Inc.) C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe
(Microsoft Corporation) C:\Windows\system32\WLANExt.exe
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\WLTRYSVC.EXE
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\bcmwltry.exe
(Intel® Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\Smc.exe
(Microsoft Corporation) C:\Windows\system32\wbem\unsecapp.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\UNS\UNS.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe
(Intel Corporation) C:\Program Files\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Renesas Electronics Corporation) C:\Program Files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\WLTRAY.EXE
(Cisco Systems, Inc.) C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe
(Dropbox, Inc.) C:\Users\dfiore\AppData\Roaming\Dropbox\bin\Dropbox.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Adobe Systems Incorporated) C:\Windows\system32\Macromed\Flash\FlashUtil32_12_0_0_77_ActiveX.exe
(Microsoft Corporation) C:\Windows\System32\MsSpellCheckingFacility.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Windows\system32\AUDIODG.EXE


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [uSB3MON] - C:\Program Files\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-02-27] (Intel Corporation)
HKLM\...\Run: [NUSB3MON] - C:\Program Files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe [113288 2010-11-17] (Renesas Electronics Corporation)
HKLM\...\Run: [broadcom Wireless Manager UI] - C:\Program Files\Dell\DW WLAN Card\WLTRAY.exe [6803968 2012-06-14] (Dell Inc.)
HKLM\...\Run: [Adobe ARM] - C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM\...\Run: [Cisco AnyConnect Secure Mobility Agent for Windows] - C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe [523216 2011-08-03] (Cisco Systems, Inc.)
HKLM\...\Run: [Logitech Download Assistant] - C:\Windows\System32\LogiLDA.dll [1425208 2012-09-20] (Logitech, Inc.)
HKLM\...\Run: [RadioRage EPM Support] - C:\Program Files\RadioRage_4j\bar\1.bin\4jmedint.exe [12872 2013-12-20] (Mindspark Interactive Network, Inc.)
Winlogon\Notify\SEP: C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\WinLogoutNotifier.dll [X]
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL => C:\ProgramData\Wincert\win32cert.dll [7168 2013-11-04] ()
IFEO\bitguard.exe: [Debugger] tasklist.exe
IFEO\bprotect.exe: [Debugger] tasklist.exe
IFEO\bpsvc.exe: [Debugger] tasklist.exe
IFEO\browsemngr.exe: [Debugger] tasklist.exe
IFEO\browserdefender.exe: [Debugger] tasklist.exe
IFEO\browsermngr.exe: [Debugger] tasklist.exe
IFEO\browserprotect.exe: [Debugger] tasklist.exe
IFEO\browsersafeguard.exe: [Debugger] tasklist.exe
IFEO\bundlesweetimsetup.exe: [Debugger] tasklist.exe
IFEO\cltmngsvc.exe: [Debugger] tasklist.exe
IFEO\delta babylon.exe: [Debugger] tasklist.exe
IFEO\delta tb.exe: [Debugger] tasklist.exe
IFEO\delta2.exe: [Debugger] tasklist.exe
IFEO\deltainstaller.exe: [Debugger] tasklist.exe
IFEO\deltasetup.exe: [Debugger] tasklist.exe
IFEO\deltatb.exe: [Debugger] tasklist.exe
IFEO\deltatb_2501-c733154b.exe: [Debugger] tasklist.exe
IFEO\dprotectsvc.exe: [Debugger] tasklist.exe
IFEO\iminentsetup.exe: [Debugger] tasklist.exe
IFEO\protectedsearch.exe: [Debugger] tasklist.exe
IFEO\rjatydimofu.exe: [Debugger] tasklist.exe
IFEO\searchprotection.exe: [Debugger] tasklist.exe
IFEO\searchprotector.exe: [Debugger] tasklist.exe
IFEO\snapdo.exe: [Debugger] tasklist.exe
IFEO\stinst32.exe: [Debugger] tasklist.exe
IFEO\stinst64.exe: [Debugger] tasklist.exe
IFEO\sweetimsetup.exe: [Debugger] tasklist.exe
IFEO\tbdelta.exetoolbar783881609.exe: [Debugger] tasklist.exe
IFEO\utiljumpflip.exe: [Debugger] tasklist.exe
Startup: C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk
ShortcutTarget: Dropbox.lnk -> C:\Users\dfiore\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.)
Startup: C:\Users\ksobczyk\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Logitech . Product Registration.lnk
ShortcutTarget: Logitech . Product Registration.lnk -> C:\Program Files\Common Files\Logishrd\eReg\SetPoint\eReg.exe (Leader Technologies/Logitech)
HKLM\...\AppCertDlls: [x64] -> c:\program files\music toolbar\datamngr\x64\apcrtldr.dll <===== ATTENTION
HKLM\...\AppCertDlls: [x86] -> C:\Program Files\Music Toolbar\Datamngr\apcrtldr.dll <===== ATTENTION

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.com/
HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
URLSearchHook: HKCU - (No Name) - {3c35ad63-af1d-4e21-b484-b6651a8efcf9} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
SearchScopes: HKLM - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask.com/search/GGmain.jhtml?p2=^ZX^xdm039^YYA^us&si=radiopi&ptb=D20A7F93-E7EA-4874-B5A0-D1A3E32CF55B&ind=2013122010&n=77fdcdda&psa=&st=sb&searchfor={searchTerms}
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.ask.com/sr?src=ieb&gct=ds&appid=1239&systemid=2&v=a11465-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
SearchScopes: HKCU - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask.com/search/GGmain.jhtml?p2=^ZX^xdm039^YYA^us&si=radiopi&ptb=D20A7F93-E7EA-4874-B5A0-D1A3E32CF55B&ind=2013122010&n=77fdcdda&psa=&st=sb&searchfor={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.ask.com/sr?src=ieb&gct=ds&appid=1239&systemid=2&v=a11465-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
BHO: Toolbar BHO - {48909954-14fb-4971-a7b3-47e7af10b38a} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
BHO: Search Assistant BHO - {5848763c-2668-44ca-adbe-2999a6ee2858} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\bin\IPS\IPSBHO.DLL (Symantec Corporation)
BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO: DialIEBHO Class - {E14EB96C-AC90-45BE-9FDE-37C5652F1A65} - C:\Program Files\Mitel\Unified Communicator Advanced 4.1\DialIE.dll (Mitel Networks Corporation)
Toolbar: HKLM - RadioRage - {78ba36c9-6036-482b-b48d-ecca6f964b84} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} https://secure.logmein.com//activex/ractrl.cab?lmi=1007
Tcpip\Parameters: [DhcpNameServer] 10.16.64.59

Chrome:
=======

CHR DefaultSearchKeyword: ask.com
CHR DefaultSearchProvider: Ask.com
CHR DefaultSearchURL: http://dts.search.ask.com/sr?src=crb&gct=ds&appid=1239&systemid=2&v=u10666-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
CHR DefaultNewTabURL:
CHR Plugin: (Shockwave Flash) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\PepperFlash\pepflashplayer.dll ()
CHR Plugin: (Chrome Remote Desktop Viewer) - internal-remoting-viewer
CHR Plugin: (Native Client) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\ppGoogleNaClPluginChrome.dll ()
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\pdf.dll ()
CHR Plugin: (Adobe Acrobat) - C:\Program Files\Adobe\Reader 11.0\Reader\Browser\nppdf32.dll (Adobe Systems Inc.)
CHR Plugin: (Google Update) - C:\Program Files\Google\Update\1.3.21.153\npGoogleUpdate3.dll No File
CHR Plugin: (Intel® Identity Protection Technology) - C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation)
CHR Plugin: (Intel® Identity Protection Technology) - C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation)
CHR Extension: (Music Box Toolbar) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd [2013-12-23]
CHR Extension: (YouTube) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2013-08-14]
CHR Extension: (Google Search) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2013-08-14]
CHR Extension: (Google Wallet) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-08-22]
CHR Extension: (Gmail) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2013-08-14]
CHR HKLM\...\Chrome\Extension: [aaaaiihjniipljfegaknmbkneamnoajd] - C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx [2013-08-20]

========================== Services (Whitelisted) =================

S3 cphs; C:\Windows\system32\IntelCpHeciSvc.exe [276248 2012-02-08] (Intel Corporation)
R2 Intel® Capability Licensing Service Interface; C:\Program Files\Intel\iCLS Client\HeciServer.exe [458464 2012-02-02] (Intel® Corporation)
R2 jhi_service; C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [161560 2012-02-28] (Intel Corporation)
S2 RadioRage_4jService; C:\Program Files\RadioRage_4j\bar\1.bin\4jbarsvc.exe [88648 2013-12-20] ()
R2 SepMasterService; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe [137224 2011-06-17] (Symantec Corporation)
R3 SmcService; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\Smc.exe [1664744 2011-06-17] (Symantec Corporation)
S3 SNAC; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\snac.exe [280496 2011-06-17] (Symantec Corporation)
R2 vpnagent; C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe [468432 2011-08-03] (Cisco Systems, Inc.)
R2 wltrysvc; C:\Program Files\Dell\DW WLAN Card\bcmwltry.exe [5512192 2012-06-14] (Dell Inc.)

==================== Drivers (Whitelisted) ====================

S3 acsock; C:\Windows\System32\DRIVERS\acsock.sys [77968 2011-08-03] (Cisco Systems, Inc.)
R3 BCM42RLY; C:\Windows\System32\drivers\BCM42RLY.sys [18536 2012-06-14] (Broadcom Corporation)
R1 BHDrvx86; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\BASHDefs\20140319.011\BHDrvx86.sys [1098968 2014-04-01] (Symantec Corporation)
R3 e1cexpress; C:\Windows\System32\DRIVERS\e1c6232.sys [280744 2011-11-30] (Intel Corporation)
R1 eeCtrl; C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys [376920 2013-11-21] (Symantec Corporation)
R3 EraserUtilRebootDrv; C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [108120 2013-11-21] (Symantec Corporation)
R1 IDSVix86; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\IPSDefs\20140331.001\IDSvix86.sys [395992 2014-03-25] (Symantec Corporation)
R0 iusb3hcs; C:\Windows\System32\DRIVERS\iusb3hcs.sys [13592 2012-02-27] (Intel Corporation)
R3 iusb3hub; C:\Windows\System32\DRIVERS\iusb3hub.sys [348440 2012-02-27] (Intel Corporation)
R3 iusb3xhc; C:\Windows\System32\DRIVERS\iusb3xhc.sys [792856 2012-02-27] (Intel Corporation)
S3 LEqdUsb; C:\Windows\System32\Drivers\LEqdUsb.Sys [43704 2012-09-18] (Logitech, Inc.)
S3 LHidEqd; C:\Windows\System32\Drivers\LHidEqd.Sys [12216 2012-09-18] (Logitech, Inc.)
R3 MEI; C:\Windows\System32\DRIVERS\HECI.sys [46080 2011-11-10] (Intel Corporation)
R3 NAVENG; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\VirusDefs\20140401.002\NAVENG.SYS [93272 2014-03-08] (Symantec Corporation)
R3 NAVEX15; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\VirusDefs\20140401.002\NAVEX15.SYS [1612376 2014-03-08] (Symantec Corporation)
R1 SRTSP; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SRTSP.SYS [516216 2011-06-17] (Symantec Corporation)
R1 SRTSPX; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SRTSPX.SYS [50168 2011-06-17] (Symantec Corporation)
R0 stdcfltn; C:\Windows\System32\DRIVERS\stdcfltn.sys [17904 2011-07-15] (ST Microelectronics)
R3 ST_ACCEL; C:\Windows\System32\DRIVERS\ST_ACCEL.sys [59888 2011-11-04] (STMicroelectronics)
S3 SyDvCtrl; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\SyDvCtrl32.sys [23984 2011-06-17] (Symantec Corporation)
R0 SymDS; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMDS.SYS [340088 2011-06-17] (Symantec Corporation)
R0 SymEFA; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMEFA.SYS [756856 2011-06-17] (Symantec Corporation)
R3 SymEvent; C:\Windows\system32\Drivers\SYMEVENT.SYS [127096 2012-12-05] (Symantec Corporation)
R1 SymIRON; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\Ironx86.SYS [136312 2011-06-17] (Symantec Corporation)
R1 SYMNETS; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMNETS.SYS [299640 2011-06-17] (Symantec Corporation)
R1 SysPlant; C:\Windows\System32\Drivers\SysPlant.sys [92080 2012-12-05] (Symantec Corporation)
R1 Teefer2; C:\Windows\System32\DRIVERS\Teefer.sys [50096 2011-06-17] (Symantec Corporation)
U3 mbr; \??\C:\Users\dfiore\AppData\Local\Temp\mbr.sys [X]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-01 15:48 - 2014-04-01 15:48 - 00015763 _____ () C:\Users\dfiore\Desktop\FRST.txt
2014-04-01 15:47 - 2014-04-01 15:48 - 00000000 ____D () C:\FRST
2014-04-01 15:46 - 2014-04-01 15:46 - 01145856 _____ (Farbar) C:\Users\dfiore\Desktop\FRST.exe
2014-04-01 14:07 - 2014-04-01 14:07 - 00688992 ____R (Swearware) C:\Users\dfiore\Downloads\dds.scr
2014-04-01 14:07 - 2014-04-01 14:07 - 00013275 _____ () C:\Users\dfiore\Desktop\dds.txt
2014-04-01 14:07 - 2014-04-01 14:07 - 00009927 _____ () C:\Users\dfiore\Desktop\attach.txt
2014-03-31 16:13 - 2014-03-31 17:11 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 16:12 - 2014-03-31 17:47 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-03-31 16:12 - 2014-03-31 16:12 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 16:12 - 2014-03-05 09:26 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-31 16:12 - 2014-03-05 09:26 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-31 16:12 - 2014-03-05 09:26 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 16:08 - 2014-03-31 16:08 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Malwarebytes
2014-03-31 16:07 - 2014-03-31 16:12 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-12 01:30 - 2014-03-01 00:30 - 17074688 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-12 01:30 - 2014-03-01 00:11 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-12 01:30 - 2014-03-01 00:10 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-03-12 01:30 - 2014-02-28 23:52 - 00061952 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-03-12 01:30 - 2014-02-28 23:51 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-03-12 01:30 - 2014-02-28 23:47 - 02168320 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-03-12 01:30 - 2014-02-28 23:43 - 00043008 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-03-12 01:30 - 2014-02-28 23:43 - 00032768 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-03-12 01:30 - 2014-02-28 23:40 - 00440832 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-03-12 01:30 - 2014-02-28 23:38 - 00112128 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-03-12 01:30 - 2014-02-28 23:38 - 00108032 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-03-12 01:30 - 2014-02-28 23:37 - 00553472 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-03-12 01:30 - 2014-02-28 23:31 - 00646144 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-03-12 01:30 - 2014-02-28 23:25 - 00208896 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-03-12 01:30 - 2014-02-28 23:16 - 00164864 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-03-12 01:30 - 2014-02-28 23:14 - 04244480 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-03-12 01:30 - 2014-02-28 23:03 - 00524288 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-03-12 01:30 - 2014-02-28 23:00 - 01964032 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-03-12 01:30 - 2014-02-28 22:57 - 11266048 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-03-12 01:30 - 2014-02-28 22:32 - 01820160 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-03-12 01:30 - 2014-02-28 22:27 - 01156096 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-03-12 01:30 - 2014-02-28 22:25 - 00703488 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-03-12 01:30 - 2014-02-06 21:07 - 02349056 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-03-12 01:30 - 2014-02-03 22:04 - 01230336 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll
2014-03-12 01:30 - 2014-02-03 22:04 - 00509440 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll
2014-03-12 01:30 - 2014-01-28 22:06 - 00381440 _____ (Microsoft Corporation) C:\Windows\system32\wer.dll
2014-03-12 01:30 - 2014-01-27 22:07 - 00185344 _____ (Microsoft Corporation) C:\Windows\system32\wwansvc.dll

==================== One Month Modified Files and Folders =======

2014-04-01 15:48 - 2014-04-01 15:48 - 00015763 _____ () C:\Users\dfiore\Desktop\FRST.txt
2014-04-01 15:48 - 2014-04-01 15:47 - 00000000 ____D () C:\FRST
2014-04-01 15:46 - 2014-04-01 15:46 - 01145856 _____ (Farbar) C:\Users\dfiore\Desktop\FRST.exe
2014-04-01 15:30 - 2013-01-02 16:58 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-04-01 15:15 - 2012-12-04 16:05 - 01626720 _____ () C:\Windows\WindowsUpdate.log
2014-04-01 15:02 - 2013-08-14 08:25 - 00000886 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-04-01 14:07 - 2014-04-01 14:07 - 00688992 ____R (Swearware) C:\Users\dfiore\Downloads\dds.scr
2014-04-01 14:07 - 2014-04-01 14:07 - 00013275 _____ () C:\Users\dfiore\Desktop\dds.txt
2014-04-01 14:07 - 2014-04-01 14:07 - 00009927 _____ () C:\Users\dfiore\Desktop\attach.txt
2014-04-01 14:05 - 2013-11-18 16:46 - 00000000 ___RD () C:\Users\dfiore\Dropbox
2014-04-01 14:05 - 2013-11-18 16:43 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Dropbox
2014-04-01 14:04 - 2012-12-05 14:56 - 00000104 _____ () C:\Windows\system32\config\netlogon.ftl
2014-04-01 13:35 - 2009-07-14 00:34 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-01 13:35 - 2009-07-14 00:34 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-01 13:34 - 2013-08-14 08:25 - 00000882 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-04-01 13:33 - 2010-11-20 17:01 - 00782470 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-01 13:28 - 2009-07-14 00:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-01 13:28 - 2009-07-14 00:39 - 00029943 _____ () C:\Windows\setupact.log
2014-03-31 17:48 - 2013-08-05 10:32 - 00000000 ____D () C:\Users\dfiore
2014-03-31 17:47 - 2014-03-31 16:12 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-03-31 17:47 - 2013-08-05 10:01 - 00000000 ____D () C:\Users\Administrator
2014-03-31 17:47 - 2012-12-05 16:56 - 00000000 ____D () C:\Users\ksobczyk
2014-03-31 17:47 - 2012-12-05 15:04 - 00000000 ____D () C:\Users\ejack-a
2014-03-31 17:47 - 2012-12-04 16:06 - 00000000 ____D () C:\Users\IT Dept
2014-03-31 17:47 - 2010-11-20 20:47 - 00000000 ___RD () C:\Users\Public\Recorded TV
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\system32\wfp
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\registration
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\AppCompat
2014-03-31 17:22 - 2010-11-20 17:48 - 00452442 _____ () C:\Windows\PFRO.log
2014-03-31 17:11 - 2014-03-31 16:13 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 17:01 - 2013-12-20 12:24 - 00000000 ____D () C:\Program Files\Music Toolbar
2014-03-31 16:12 - 2014-03-31 16:12 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 16:12 - 2014-03-31 16:07 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-31 16:08 - 2014-03-31 16:08 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Malwarebytes
2014-03-19 03:01 - 2013-08-05 10:36 - 00000000 ____D () C:\Windows\system32\MRT
2014-03-19 03:00 - 2012-12-05 13:13 - 87350280 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-03-15 06:58 - 2013-08-14 08:25 - 00002129 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-03-12 03:17 - 2009-07-14 00:33 - 00303528 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-03-12 03:01 - 2012-12-06 11:17 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-03-12 01:30 - 2013-01-02 16:58 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-03-12 01:30 - 2013-01-02 16:58 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-03-05 09:26 - 2014-03-31 16:12 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-05 09:26 - 2014-03-31 16:12 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-05 09:26 - 2014-03-31 16:12 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys

Some content of TEMP:
====================
C:\Users\dfiore\AppData\Local\Temp\BundleSweetIMSetup.exe
C:\Users\dfiore\AppData\Local\Temp\Delta.exe
C:\Users\dfiore\AppData\Local\Temp\DeltaTB.exe
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.dll
C:\Users\dfiore\AppData\Local\Temp\MybabylonTB.exe
C:\Users\dfiore\AppData\Local\Temp\smses.exe
C:\Users\dfiore\AppData\Local\Temp\WSSetup.exe
C:\Users\ksobczyk\AppData\Local\Temp\LMkRstPt.exe
C:\Users\ksobczyk\AppData\Local\Temp\SearchWithGoogleUpdate.exe


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-03-30 00:23

==================== End Of Log ============================

 

 

Additional scan result of Farbar Recovery Scan Tool (x86) Version: 13-03-2014  01
Ran by dfiore at 2014-04-01 15:48:26
Running from C:\Users\dfiore\Desktop
Boot Mode: Normal
==========================================================


==================== Security Center ========================

AV: Symantec Endpoint Protection (Enabled - Up to date) {63DF5164-9100-186D-2187-8DC619EFD8BF}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Symantec Endpoint Protection (Enabled - Up to date) {D8BEB080-B73A-17E3-1B37-B6B462689202}
FW: Symantec Endpoint Protection (Enabled) {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}

==================== Installed Programs ======================

2007 Microsoft Office Suite Service Pack 3 (SP3) (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{6E107EB7-8B55-48BF-ACCB-199F86A2CD93}) (Version:  - Microsoft)
2007 Microsoft Office Suite Service Pack 3 (SP3) (Version:  - Microsoft) Hidden
Adobe Digital Editions 2.0 (HKLM\...\Adobe Digital Editions 2.0) (Version: 2.0 - Adobe Systems Incorporated)
Adobe Flash Player 12 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 12.0.0.77 - Adobe Systems Incorporated)
Adobe Reader XI (11.0.06) (HKLM\...\{AC76BA86-7AD7-1033-7B44-AB0000000001}) (Version: 11.0.06 - Adobe Systems Incorporated)
Cisco AnyConnect Secure Mobility Client  (HKLM\...\Cisco AnyConnect Secure Mobility Client) (Version: 3.0.3054 - Cisco Systems, Inc.)
Cisco AnyConnect Secure Mobility Client (Version: 3.0.3054 - Cisco Systems, Inc.) Hidden
Citrix Online Launcher (HKLM\...\{AC7E7905-8C59-4806-A96D-30936A2B1FC5}) (Version: 1.0.168 - Citrix)
Dropbox (HKCU\...\Dropbox) (Version: 2.4.11 - Dropbox, Inc.)
DW WLAN Card Utility (HKLM\...\DW WLAN Card Utility) (Version: 5.100.82.142 - Dell Inc.)
eReg (Version: 1.20.138.34 - Logitech, Inc.) Hidden
Google Chrome (HKLM\...\Google Chrome) (Version: 33.0.1750.154 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
Google Toolbar for Internet Explorer (Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (Version: 1.3.23.9 - Google Inc.) Hidden
GoToMeeting 6.0.0.1259 (HKCU\...\GoToMeeting) (Version: 6.0.0.1259 - CitrixOnline)
Intel® Management Engine Components (HKLM\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 8.0.3.1427 - Intel Corporation)
Intel® Network Connections Drivers (HKLM\...\PROSet) (Version: 16.8 - Intel)
Intel® OpenCL CPU Runtime (HKLM\...\{FCB3772C-B7D0-4933-B1A9-3707EBACC573}) (Version:  - Intel Corporation)
Intel® Processor Graphics (HKLM\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 8.15.10.2639 - Intel Corporation)
Intel® USB 3.0 eXtensible Host Controller Driver (HKLM\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.4.220 - Intel Corporation)
Intel® Trusted Connect Service Client (HKLM\...\{51A66ED3-200E-4147-8D1E-E8D30936FD26}) (Version: 1.23.605.1 - Intel Corporation)
Malwarebytes Anti-Malware version 2.00.0.1000 (HKLM\...\Malwarebytes Anti-Malware_is1) (Version: 2.00.0.1000 - Malwarebytes Corporation)
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (Version: 4.5.50938 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office File Validation Add-In (HKLM\...\{90140000-2005-0000-0000-0000000FF1CE}) (Version: 14.0.5130.5003 - Microsoft Corporation)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (French) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Standard 2007 (HKLM\...\STANDARD) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office Standard 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Save as PDF or XPS Add-in for 2007 Microsoft Office programs (HKLM\...\{90120000-00B2-0409-0000-0000000FF1CE}) (Version: 12.0.4518.1014 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mitel Unified Communicator Advanced 4.1 (HKLM\...\{6F497C65-FC83-4E30-B1B9-9527A6CB3B0B}) (Version: 4.1.18.1 - Mitel Networks)
MSXML 4.0 SP2 (KB954430) (HKLM\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
RadioRage Internet Explorer Toolbar (HKLM\...\RadioRage_4jbar Uninstall Internet Explorer) (Version:  - Mindspark Interactive Network)
Renesas Electronics USB 3.0 Host Controller Driver (HKLM\...\InstallShield_{5442DAB8-7177-49E1-8B22-09A049EA5996}) (Version: 2.0.30.0 - Renesas Electronics Corporation)
Renesas Electronics USB 3.0 Host Controller Driver (Version: 2.0.30.0 - Renesas Electronics Corporation) Hidden
ST Microelectronics 3 Axis Digital Accelerometer Solution (HKLM\...\{9C24F411-9CA7-4A8A-91F3-F08A4A38EB31}) (Version: 4.10.0016 - ST Microelectronics)
Symantec Endpoint Protection (HKLM\...\{A3AEEA68-AC93-4F6F-8D2D-78BBF7E422B8}) (Version: 12.1.671.4971 - Symantec Corporation)
Update for 2007 Microsoft Office System (KB967642) (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{C444285D-5E4F-48A4-91DD-47AAAA68E92D}) (Version:  - Microsoft)
Update for Microsoft Office 2007 Help for Common Features (KB963673) (HKLM\...\{90120000-006E-0409-0000-0000000FF1CE}_STANDARD_{AB365889-0395-4FAD-B702-CA5985D53D42}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{A024FC7B-77DE-45DE-A058-1C049A17BFB3}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2687493) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{6FAA03BD-2B51-4029-9AD9-64A3B8E3C84C}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767849) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{CB68A5B0-3508-4193-AEB9-AF636DAECE0F}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{E9A82945-BA29-4EE8-8F2A-2F49545E9CF2}) (Version:  - Microsoft)
Update for Microsoft Office Excel 2007 Help (KB963678) (HKLM\...\{90120000-0016-0409-0000-0000000FF1CE}_STANDARD_{199DF7B6-169C-448C-B511-1054101BE9C9}) (Version:  - Microsoft)
Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit Edition (HKLM\...\{90120000-001A-0409-0000-0000000FF1CE}_STANDARD_{ED38F8A3-4F61-494E-8BCA-E3AC7760C924}) (Version:  - Microsoft)
Update for Microsoft Office Outlook 2007 Help (KB963677) (HKLM\...\{90120000-001A-0409-0000-0000000FF1CE}_STANDARD_{0451F231-E3E3-4943-AB9F-58EB96171784}) (Version:  - Microsoft)
Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2878234) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{EC1934B0-AE0F-4BBD-8955-54BB3247ED9E}) (Version:  - Microsoft)
Update for Microsoft Office Powerpoint 2007 Help (KB963669) (HKLM\...\{90120000-0018-0409-0000-0000000FF1CE}_STANDARD_{397B1D4F-ED7B-4ACA-A637-43B670843876}) (Version:  - Microsoft)
Update for Microsoft Office Script Editor Help (KB963671) (HKLM\...\{90120000-006E-0409-0000-0000000FF1CE}_STANDARD_{CD11C6A2-FFC6-4271-8EAB-79C3582F505C}) (Version:  - Microsoft)
Update for Microsoft Office Word 2007 Help (KB963665) (HKLM\...\{90120000-001B-0409-0000-0000000FF1CE}_STANDARD_{80E762AA-C921-4839-9D7D-DB62A72C0726}) (Version:  - Microsoft)

==================== Restore Points  =========================

01-03-2014 08:00:12 Windows Update
09-03-2014 05:00:01 Scheduled Checkpoint
12-03-2014 07:00:20 Windows Update
19-03-2014 07:00:11 Windows Update
27-03-2014 04:00:01 Scheduled Checkpoint
31-03-2014 21:41:00 Restore Operation

==================== Hosts content: ==========================

2009-07-13 22:04 - 2009-06-10 17:39 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {42D16469-643F-4000-86F0-3906FC658CDD} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-08-14] (Google Inc.)
Task: {6A915F87-DB77-4349-8EEA-42857C132454} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-08-14] (Google Inc.)
Task: {FF8A942A-FEA3-4856-888E-607A00AC87DD} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2014-03-12] (Adobe Systems Incorporated)
Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files\Google\Update\GoogleUpdate.exe

==================== Loaded Modules (whitelisted) =============

2012-12-04 18:06 - 2012-02-21 15:09 - 01198872 _____ () C:\Program Files\Intel\Intel® Management Engine Components\UNS\ACE.dll
2012-12-04 17:45 - 2012-02-01 12:34 - 00094208 _____ () C:\Windows\System32\IccLibDll.dll
2013-10-18 19:55 - 2013-10-18 19:55 - 25100288 _____ () C:\Users\dfiore\AppData\Roaming\Dropbox\bin\libcef.dll

==================== Alternate Data Streams (whitelisted) =========


==================== Safe Mode (whitelisted) ===================

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\SepMasterService => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\SmcService => ""="Service"

==================== Disabled items from MSCONFIG ==============


==================== Faulty Device Manager Devices =============

Name: Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows
Description: Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows
Class Guid: {4d36e972-e325-11ce-bfc1-08002be10318}
Manufacturer: Cisco Systems
Service: vpnva
Problem: : This device is disabled. (Code 22)
Resolution: In Device Manager, click "Action", and then click "Enable Device". This starts the Enable Device wizard. Follow the instructions.


==================== Event log errors: =========================

Application errors:
==================
Error: (04/01/2014 01:28:56 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (04/01/2014 00:30:05 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "1".Error in manifest or policy file "2" on line 3.
The manifest file root element must be assembly.

Error: (03/31/2014 05:48:12 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:45:12 PM) (Source: System Restore) (User: )
Description: An unspecified error occurred during System Restore: (Scheduled Checkpoint). Additional information: 0x80070002.

Error: (03/31/2014 05:44:42 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:22:22 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:16:56 PM) (Source: Symantec AntiVirus) (User: )
Description: Security Risk Found!Bloodhound.MalPE in File: C:\Windows\Temp\40532e42\SetupDataMngr_BearShare.exe by: Auto-Protect scan.  Action: Quarantine succeeded : Access denied.  Action Description: The file was quarantined successfully.

Error: (03/31/2014 05:09:44 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:08:51 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: The Cryptographic Services service failed to initialize the VSS backup "System Writer" object.


Details:
Could not query the status of the EventSystem service.

System Error:
A system shutdown is in progress.
.

Error: (03/31/2014 04:56:38 PM) (Source: Symantec AntiVirus) (User: )
Description: SONAR has generated an error: code 1: description: Heuristic Scan or Load Failure


System errors:
=============
Error: (04/01/2014 01:34:13 PM) (Source: Microsoft-Windows-GroupPolicy) (User: TX)
Description: The processing of Group Policy failed because of lack of network connectivity to a domain controller. This may be a transient condition. A success message would be generated once the machine gets connected to the domain controller and Group Policy has succesfully processed. If you do not see a success message for several hours, then contact your administrator.

Error: (04/01/2014 01:28:52 PM) (Source: Microsoft-Windows-GroupPolicy) (User: NT AUTHORITY)
Description: The processing of Group Policy failed because of lack of network connectivity to a domain controller. This may be a transient condition. A success message would be generated once the machine gets connected to the domain controller and Group Policy has succesfully processed. If you do not see a success message for several hours, then contact your administrator.

Error: (04/01/2014 01:28:48 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (04/01/2014 01:28:48 PM) (Source: NETLOGON) (User: )
Description: This computer was not able to set up a secure session with a domain
controller in domain TX due to the following:
%%1311

This may lead to authentication problems. Make sure that this
computer is connected to the network. If the problem persists,
please contact your domain administrator.



ADDITIONAL INFO

If this computer is a domain controller for the specified domain, it
sets up the secure session to the primary domain controller emulator in the specified
domain. Otherwise, this computer sets up the secure session to any domain controller
in the specified domain.

Error: (03/31/2014 05:48:07 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 05:48:07 PM) (Source: Service Control Manager) (User: )
Description: The Windows Firewall service terminated with service-specific error %%5.

Error: (03/31/2014 05:44:36 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 05:22:18 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 05:09:40 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 04:52:03 PM) (Source: DCOM) (User: )
Description: 1084WSearch{9E175B6D-F52A-11D8-B9A5-505054503030}


Microsoft Office Sessions:
=========================
Error: (02/13/2014 04:23:05 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6683.5002, Microsoft Office Version: 12.0.6612.1000. This session lasted 499822 seconds with 60 seconds of active time.  This session ended with a crash.

Error: (12/17/2013 04:18:40 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6683.5002, Microsoft Office Version: 12.0.6612.1000. This session lasted 43143 seconds with 60 seconds of active time.  This session ended with a crash.

Error: (12/07/2012 10:01:12 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 6, Application Name: Microsoft Office Outlook, Application Version: 12.0.6665.5003, Microsoft Office Version: 12.0.6612.1000. This session lasted 1158 seconds with 840 seconds of active time.  This session ended with a crash.


CodeIntegrity Errors:
===================================
  Date: 2014-04-01 15:45:47.482
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 15:38:36.979
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 15:20:54.354
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 15:01:22.868
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 14:18:48.846
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 14:03:11.548
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:34:14.688
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:28:46.934
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:20:07.985
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:04:13.145
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.


==================== Memory info ===========================

Percentage of memory in use: 40%
Total physical RAM: 3483.94 MB
Available physical RAM: 2073.56 MB
Total Pagefile: 6966.16 MB
Available Pagefile: 5560.01 MB
Total Virtual: 2047.88 MB
Available Virtual: 1902.99 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:297.76 GB) (Free:251.3 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 298 GB) (Disk ID: 5A8CC490)
Partition 1: (Not Active) - (Size=39 MB) - (Type=DE)
Partition 2: (Active) - (Size=300 MB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=298 GB) - (Type=07 NTFS)

==================== End Of Log ============================

Link to post
Share on other sites

Hi,

 
Please download the following file => fixlist.txt and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.
 
 

Regards,
Georgi

Link to post
Share on other sites

Georgi,

 

So far, so good. The error pop-ups have stopped after FRST rebooted the PC. The fixlog is below. There is one odd additional problem, but I don't know if it's related. I can copy/paste the logs into this reply using Chrome, but not IE.

 

Regards,
Eric

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 13-03-2014  01
Ran by dfiore at 2014-04-02 08:40:55 Run:1
Running from C:\Users\dfiore\Desktop
Boot Mode: Normal
 
==============================================
 
Content of fixlist:
*****************
start
HKLM\...\Run: [RadioRage EPM Support] - C:\Program Files\RadioRage_4j\bar\1.bin\4jmedint.exe [12872 2013-12-20] (Mindspark Interactive Network, Inc.)
C:\Program Files\RadioRage_4j
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL => C:\ProgramData\Wincert\win32cert.dll [7168 2013-11-04] ()
C:\ProgramData\Wincert
IFEO\bitguard.exe: [Debugger] tasklist.exe
IFEO\bprotect.exe: [Debugger] tasklist.exe
IFEO\bpsvc.exe: [Debugger] tasklist.exe
IFEO\browsemngr.exe: [Debugger] tasklist.exe
IFEO\browserdefender.exe: [Debugger] tasklist.exe
IFEO\browsermngr.exe: [Debugger] tasklist.exe
IFEO\browserprotect.exe: [Debugger] tasklist.exe
IFEO\browsersafeguard.exe: [Debugger] tasklist.exe
IFEO\bundlesweetimsetup.exe: [Debugger] tasklist.exe
IFEO\cltmngsvc.exe: [Debugger] tasklist.exe
IFEO\delta babylon.exe: [Debugger] tasklist.exe
IFEO\delta tb.exe: [Debugger] tasklist.exe
IFEO\delta2.exe: [Debugger] tasklist.exe
IFEO\deltainstaller.exe: [Debugger] tasklist.exe
IFEO\deltasetup.exe: [Debugger] tasklist.exe
IFEO\deltatb.exe: [Debugger] tasklist.exe
IFEO\deltatb_2501-c733154b.exe: [Debugger] tasklist.exe
IFEO\dprotectsvc.exe: [Debugger] tasklist.exe
IFEO\iminentsetup.exe: [Debugger] tasklist.exe
IFEO\protectedsearch.exe: [Debugger] tasklist.exe
IFEO\rjatydimofu.exe: [Debugger] tasklist.exe
IFEO\searchprotection.exe: [Debugger] tasklist.exe
IFEO\searchprotector.exe: [Debugger] tasklist.exe
IFEO\snapdo.exe: [Debugger] tasklist.exe
IFEO\stinst32.exe: [Debugger] tasklist.exe
IFEO\stinst64.exe: [Debugger] tasklist.exe
IFEO\sweetimsetup.exe: [Debugger] tasklist.exe
IFEO\tbdelta.exetoolbar783881609.exe: [Debugger] tasklist.exe
IFEO\utiljumpflip.exe: [Debugger] tasklist.exe
HKLM\...\AppCertDlls: [x64] -> c:\program files\music toolbar\datamngr\x64\apcrtldr.dll <===== ATTENTION
HKLM\...\AppCertDlls: [x86] -> C:\Program Files\Music Toolbar\Datamngr\apcrtldr.dll <===== ATTENTION
c:\program files\music toolbar
URLSearchHook: HKCU - (No Name) - {3c35ad63-af1d-4e21-b484-b6651a8efcf9} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
SearchScopes: HKLM - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask...t=sb&searchfor={searchTerms}
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
SearchScopes: HKCU - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask...t=sb&searchfor={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
BHO: Toolbar BHO - {48909954-14fb-4971-a7b3-47e7af10b38a} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
BHO: Search Assistant BHO - {5848763c-2668-44ca-adbe-2999a6ee2858} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
Toolbar: HKLM - RadioRage - {78ba36c9-6036-482b-b48d-ecca6f964b84} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
CHR DefaultSearchKeyword: ask.com
CHR DefaultSearchProvider: Ask.com
CHR DefaultNewTabURL:
CHR Extension: (Music Box Toolbar) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd [2013-12-23]
CHR HKLM\...\Chrome\Extension: [aaaaiihjniipljfegaknmbkneamnoajd] - C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx [2013-08-20]
S2 RadioRage_4jService; C:\Program Files\RadioRage_4j\bar\1.bin\4jbarsvc.exe [88648 2013-12-20] ()
U3 mbr; \??\C:\Users\dfiore\AppData\Local\Temp\mbr.sys [X]
cmd: netsh winsock reset
cmd: ipconfig /flushdns
C:\Users\dfiore\AppData\Local\Temp
end
*****************
 
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\RadioRage EPM Support => Value deleted successfully.
C:\Program Files\RadioRage_4j => Moved successfully.
"C:\\PROGRA~2\\Wincert\\WIN32C~1.DLL" => Value Data removed successfully.
C:\ProgramData\Wincert => Moved successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bitguard.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bprotect.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bpsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsemngr.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browserdefender.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsermngr.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browserprotect.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsersafeguard.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bundlesweetimsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\cltmngsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta babylon.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta tb.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta2.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltainstaller.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltasetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltatb.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltatb_2501-c733154b.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\dprotectsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\iminentsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\protectedsearch.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\rjatydimofu.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\searchprotection.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\searchprotector.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\snapdo.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\stinst32.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\stinst64.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\sweetimsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\tbdelta.exetoolbar783881609.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\utiljumpflip.exe => Key deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls\\x64 => Value deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls\\x86 => Value deleted successfully.
C:\Program Files\Music Toolbar => Moved successfully.
HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks\\{3c35ad63-af1d-4e21-b484-b6651a8efcf9} => Value deleted successfully.
HKCR\CLSID\{3c35ad63-af1d-4e21-b484-b6651a8efcf9} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key not found.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key not found.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key not found.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{48909954-14fb-4971-a7b3-47e7af10b38a} => Key deleted successfully.
HKCR\CLSID\{48909954-14fb-4971-a7b3-47e7af10b38a} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5848763c-2668-44ca-adbe-2999a6ee2858} => Key deleted successfully.
HKCR\CLSID\{5848763c-2668-44ca-adbe-2999a6ee2858} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\\{78ba36c9-6036-482b-b48d-ecca6f964b84} => Value deleted successfully.
HKCR\CLSID\{78ba36c9-6036-482b-b48d-ecca6f964b84} => Key deleted successfully.
CHR DefaultSearchKeyword: ask.com ==> The Chrome "Settings" can be used to fix the entry.
CHR DefaultSearchProvider: Ask.com ==> The Chrome "Settings" can be used to fix the entry.
CHR DefaultSearchURL: http://dts.search.as...pn_ptnrs=AG2&q={searchTerms} ==> The Chrome "Settings" can be used to fix the entry.
C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd => Moved successfully.
HKLM\SOFTWARE\Google\Chrome\Extensions\aaaaiihjniipljfegaknmbkneamnoajd => Key deleted successfully.
C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx => Moved successfully.
RadioRage_4jService => Service deleted successfully.
mbr => Service deleted successfully.
 
=========  netsh winsock reset =========
 
 
Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.
 
 
========= End of CMD: =========
 
 
=========  ipconfig /flushdns =========
 
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========= End of CMD: =========
 
 
"C:\Users\dfiore\AppData\Local\Temp" directory move:
 
C:\Users\dfiore\AppData\Local\Temp\-1875523080.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\0F830070-0CD2-43A9-8B10-8EE7D13C9C4C.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1063393295.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\106714465.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\107593.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\108810.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\113119538.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\113319.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1140969456.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\115454935.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\120916.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\124194002.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\124194455.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\12620995.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\128810.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\129200.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\129714.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1304802455.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1305183456.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13109325.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1319954988.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\132179.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13228323.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13276901.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\132881.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\133046653.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13FE8336-264E-489A-AAF0-FF51AA3563ED.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1404951868.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1419222246.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\142132.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1425040663.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1475744482.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\147998.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1488554707.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1498066181.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1499160684.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\15369234.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\154338169.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1559838.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\157042072.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1570817435.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1584867914.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\15987902.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\162241.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\165158.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\168122.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\174284.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1753479146.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\176632615.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\177647698.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\177763856.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18078238.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18282131.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18307653.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1859466631.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190118.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190149337.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190273795.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1919625655.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2049619.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2094197123.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2180481651.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\22945188.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\22965250.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\230553.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\23093405.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\233705.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2341918.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2363731095.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2363841591.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2364190362.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2370450.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\23753273.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2376018545.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2419444247.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2445421674.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2447905.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\257498401.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\259304.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\261308351.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\264562.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2667975.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\268727.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\271816.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2755398.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\278846233.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2798651212.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\281505270.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2846300.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2875909.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2986685348.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\300278742.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\319256.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\334325789.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\336302353.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\349015717.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\355704244.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\357590109.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\359051.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\362371087.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\365003698.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\365425914.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\378068.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\402420.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\41522645.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\41528402.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4437588.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\447212028.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\448682135.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\449559984.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\455156239.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\472081739.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\483852.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\497892.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4FAD6123-4E8E-4F34-B5B4-AC5B70598B41.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5039799.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\535535.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\545199657.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\556113814.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\556614266.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\56371944.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\56371975.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5717249.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\580448.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5829835.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5865684.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\6221663.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\6468238.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\65068.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\653784.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\66882605.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\673284.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\70686533.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\714000.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\73477921.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\739257.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\76287452.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\769498534.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\77270696.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\775371.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\779562393.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\782573290.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\795411174.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\82649.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\84646.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\872763.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\876804212.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\881492962.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\92043819.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\948733980.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\95117850.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\960888.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\982483532.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\984567768.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\986330720.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\995130.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\AdobeARM.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\AdobeARM_NotLocked.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\apnPixel.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\apnuserid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\appid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Attach.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\bearsharemusicboxtoolbarha-manifest.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\BundleSweetIMSetup.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\chrome_installer.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1132.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR12E2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1629.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR17FF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR19B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1D21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1D95.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1EEA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR217D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR220F.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR23F4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR25B8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR29B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2A4A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2A71.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2B15.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2B92.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2BEF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2C6A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2D89.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2E6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2F21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2F2A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3327.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR33A4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3587.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3660.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR379.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3D01.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3F12.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3FAF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR421E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR427A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR444.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4598.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4604.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4653.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR47B9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4AA6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4FD8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR513B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5561.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR57D1.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5887.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5903.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5A21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5A45.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5C37.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR606C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR608D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR620C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR621A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR645D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6517.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR654B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR681D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6C02.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6DF6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6E5C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR711.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7239.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR72D9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR74C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7610.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR79C1.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A2B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A7C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A7D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR80D4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR824C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8273.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR83B2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR83E2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8412.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8499.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR84D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR84E0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8516.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR881C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8AD3.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8C2D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8EA5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR90AA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR90D9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9111.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR94C3.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR95D5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR96E5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR972.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9745.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR98E4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9CE6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9DA6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9DB4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9F96.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA43A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA8CC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA8FB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA978.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAC52.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAC97.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAD05.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAE9A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB052.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB28E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB3C8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB46.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB497.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB5B8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB654.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBAA7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBC1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBDB0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRC4D4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRC59B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCD1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCD2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCFF0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD4CB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD854.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD923.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDA1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDB19.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDB60.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDD3C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDDC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDF18.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE205.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE3D6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE510.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE6A6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE6B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE97.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE98.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE983.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE9FC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVREA2C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVREF5F.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4BE.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4CB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4E8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4FA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF693.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF72A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF7EA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF874.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF8B0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF9D8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRFAB2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRFE2C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\D1D4E1E8-362C-46FF-927B-D3020A51E1C5.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DDS.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Delta.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DeltaTB.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1479.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1A27.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1B57.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1D67.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH236A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH282D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH29F1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH2BEC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH352C.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH37F7.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3A18.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3B5E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3FBB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4505.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH481.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH482D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4B19.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4F2D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH53D8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH58E3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH5C89.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH5F06.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH607E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH67F5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH6CC2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7142.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7380.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7611.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH788.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7BD6.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7BF3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH80CF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH82EF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH8388.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH85CB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH93A0.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH93E9.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH949E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH95B4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH998.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA0DC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA2F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA7B8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA973.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHAD0A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHB4AB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHB791.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHBCE3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHBD61.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHC484.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHC7A9.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCCCB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCCD.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCD69.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHD853.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHD87B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHDCA4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHDD52.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHEC8F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF08E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF093.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF58A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF5F3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHFCC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHFCE5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\ExchangePerflog_8484fa31aac168fdcfcccd43.dat => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp\FXSAPIDebugLogFile.txt" => Scheduled to move on reboot.
C:\Users\dfiore\AppData\Local\Temp\GoogleToolbarInstaller1.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\GoogleToolbarInstaller2.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst18A8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst22FC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst2338.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst2A35.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3330.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3772.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3955.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3C6D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3ECD.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst46FE.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4DD1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E3E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E4E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E5D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E6D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4F67.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst514A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst51B5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5408.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5485.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst54F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst559E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5FE4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6AD1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6CB5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6E2B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7187.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst726B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst785A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst790F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst796D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7A85.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7AA5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7B41.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7B6F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7DE0.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst88B8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9057.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9877.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9F4A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstA707.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstABD2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC781.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC8C4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC936.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstCA7D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstE1D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstE92B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstED50.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstF659.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Kno6009.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoC01.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoCEE2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoDF17.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\log3 => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\MSB1CACH.LEX => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\MybabylonTB.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsb54D2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsb5DF4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsc3995.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsc3996.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsg44CA.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh1485.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh2634.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh8E31.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm1E18.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm5E35.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm5E36.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsmC719.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsn3B10.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsr5E05.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsw221C.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsw221D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nswC7A7.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx1496.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx3AFF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx8F2D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\StructuredQuery.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\sysid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\trackid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\TX+dfiore.bmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wbxtra_08222013_130624.wbt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog00.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog01.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog02.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog03.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog04.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog05.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog06.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog07.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog08.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog09.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog10.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog11.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog12.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog13.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog14.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog15.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog16.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog17.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmsetup.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\WSSetup.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF017DF219D4F8F14A.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF01BC172CFC8745CF.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF03AAAB6D88B8640B.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF049C287DED3C1D8F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF08EA7C18A1899A84.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF0AC5AD194E512590.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF13C4B7CC02CDE39C.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF14AE218EB553DAF1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF179C6350D9DBDA95.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF1B92A4483CE9A3EF.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF1E1D592422700CA0.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF24DC6E487CFDD274.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF24EE199B10F01CA9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF30C842F71A961DD4.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF336C899F4D3CC4FD.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF33A80F8EC18A57D6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF3B62A4036C7BC07D.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF3BBF4FB6BCF17652.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF400F3EBD04466C52.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF477DA2A47113B142.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF48145D69A1897085.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF60EC0E060C785EF9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF63876EF923B8998F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF645C13E363DBE8B8.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF6BA7DFA2EDCF47B6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF6FCD494B88C1CADA.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7029C0CC9E5B78E6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7052B44998638C2F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7A4E822AD33EFEC1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF83F1A9606478F74B.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF84D99F23B2DC85C0.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF881270AF5FE6DA67.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF9225C5366F221EAD.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF9BB58FDFBBBEA2B9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFA871417E28F2EB24.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFB0D9A3CE5C36D5D4.TMP => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp\~DFB4D467AFD5FA79AE.TMP" => Scheduled to move on reboot.
C:\Users\dfiore\AppData\Local\Temp\~DFBC9E4F4F23AB0E0D.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFBCB025A51E66F6C8.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFBE4661E0783A6221.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC216825882621D40.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC3336FC454394735.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC7D1CAE63E2457E7.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC7EA6E49C09368E2.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC8F1DB709A893D01.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFCD4E8C35384A3DAB.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFCED2B6BEA9E83AB2.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFD8886EEDEF570C20.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE08BA69C196E21C4.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE7174C362297A25A.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE9334242E42D87B9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE979D6DF64325225.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFEAF706B4FC230799.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFEE9A6EAC679E27C1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFF324F3FFF29048C9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFF5FBC5FF1D2EAF90.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~nsu.tmp\Au_.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\{d4be399f-cfdf-462f-b234-2e3a62cff5a8}\geodata.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Temp1_fwdhealthtraineeenrollmentandtraining.zip\JuliaFioreVHA Training Certificate.pdf => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\outlook logging\firstrun.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\DropboxNSISTools.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\nsExec.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\UAC.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsiC64E.tmp\DropboxNSISTools.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsiC64E.tmp\UAC.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\msohtmlclip1\01\clip_colorschememapping.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\msohtmlclip1\01\clip_themedata.thmx => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\5SZG8K10.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\7LJU14B1.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\9X9YDR7M.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D5D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D6E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D6F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\G2M35114.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\J0QSONNQ.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\L1BRWOM0.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\LROC1CLD.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\MCGJIO0D.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\OODJ89ZP.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\QQZCE09X.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\QVD8COQ1.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\U4MAVGLT.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DTX\Reporting\ReportingHelper.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\DownloaderApp.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\G2MInst.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\G2MInstX.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\queue.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\WebDeploymentPluginInst.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\G2MOutlookAddin_util.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\G2M_G2MInstaller.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\log137D.tmp\G2MStart.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\log137D.tmp\GoToMeeting_00.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\DownloaderAppMsi\CB16A7AB-2AC6-4814-A5CB-7A92592B3037.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\TPRKRIPE\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\NC7QE085\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\EWM00HCX\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\7QE72PK5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\History\History.IE5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\History\History.IE5\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Cookies\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\manifest.json => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp" directory. => Scheduled to move on reboot.
 
 
=> Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-04-02 08:43:39)<=
 
C:\Users\dfiore\AppData\Local\Temp\FXSAPIDebugLogFile.txt => Is moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFB4D467AFD5FA79AE.TMP => Is moved successfully.
C:\Users\dfiore\AppData\Local\Temp => Moved successfully.
 
==== End of Fixlog ====
Link to post
Share on other sites

Hello,

 

I have encountered similar problems with Internet Explorer version 11 before and I believe that there is a bug with the IPBoard forum software not with the browser himself.

 

http://community.invisionpower.com/resources/bugs.html/_/ip-board/internet-explorer-11-copy-paste-issue-r42941

 

The fix is already implemented (but I don't know if the version of Ipboard used here is the latest one).

 

A colleague of mine told me for a temporary solution before and it worked for another user. You can give it a try:
 
You should be able to copy/paste if you use that little switch in the upper left hand corner of the reply and by switching it off that should disable the RTE editor and IE11 will probably allow you to copy/paste again.

 

If no luck then go ahaid and reset IE settings to default:

 

How to reset Internet Explorer settings

 

 

Let me know about the results.

 

 

 

Regards,

Georgi

Link to post
Share on other sites

The copy/paste issue with IE and the forum isn't really an issue, and I won't bother trying to fix it. I just wasn't sure if it was indicative of malware or a virus, which it does not seem to be.

 

That said, things seem to be working fine now. Is there anything else you need me to do, or logs to show you?

 

Thank you,

Eric

Link to post
Share on other sites

Hi Eric,

 

I understand but you can still try the solutions above because they will not cause any harm. :)

 

Also if you don't mind, I want to make sure there is nothing lurking on the system so just in case I want you to go through these steps:

 

The most of them should take no more than 5 minutes each (but the time they take to complete can vary depending on the size of your hard and the speed of your computer).

 

 

STEP 1

 

 

  • Please download RKill by Grinler from the link below and save it to your desktop.

    Rkill
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply.
  • A log pops up at the end of the run. This log file is located at C:\rkill.log.
  • Please post the log in your next reply.

 

 

STEP 2

 

 

  • Please download RogueKillerX64.exe and save to the desktop.
  • Close all windows and browsers
  • Right-click the program and select 'Run as Administrator'
  • Press the scan button.
  • A report opens on the desktop named - RKreport.txt
  • Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 3
 

 

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
     
  • Put a checkmark beside loaded modules.
    Sbf88.png
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
     
  • Click the Start Scan button.
     
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    67776163.jpg
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    62117367.jpg
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 4

 

 

Please download Malwarebytes Anti-Malware to your desktop.
 

  • Double-click mbam-setup-2.0.0.1000.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.
  • On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • With some infections, you may see this message box.
    • 'Could not load DDA driver'
  • Click 'Yes' to this message, to allow the driver to load after a restart.
  • Allow the computer to restart. Continue with the rest of these instructions.
  • When the scan is complete, click Apply Actions.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

 

STEP 5

 

 

1.Please download HitmanPro.

  • For 32-bit Operating System - dEMD6.gif.
  • This is the mirror - dEMD6.gif
  • For 64-bit Operating System - dEMD6.gif
  • This is the mirror - dEMD6.gif

2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).

Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.

3.Click on the next button. You must agree with the terms of EULA. (if asked)

4.Check the box beside "No, I only want to perform a one-time scan to check this computer".

5.Click on the next button.

6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.

7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!
 
8.Click on the next button.

9.Click on the "Save Log" button.

10.Save that file to your desktop and post the content of that file in your next reply.
 
Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro

Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.

 

 

 

STEP 6

 

 

Please download AdwCleaner by Xplode and save to your Desktop.

  • Double click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin to scan your computer like it did before.
  • After the scan has finished click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.

 

 

STEP 7

 

 

thisisujrt.gif  Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

 

 

STEP 8

 

 

Download Security Check by screen317 from here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

 

and then if there aren't any issues left I'll give you my final recommendations. smile.png

 

 

Regards,

Georgi

Link to post
Share on other sites

Rkill's log. More to come as I run them...

 

Rkill 2.6.5 by Lawrence Abrams (Grinler)
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 
Program started at: 04/02/2014 04:33:21 PM in x86 mode.
Windows Version: Windows 7 Professional Service Pack 1
 
Checking for Windows services to stop:
 
 * No malware services found to stop.
 
Checking for processes to terminate:
 
 * No malware processes found to kill.
 
Checking Registry for malware related settings:
 
 * No issues found in the Registry.
 
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
 
Performing miscellaneous checks:
 
 * Windows Defender Disabled
 
   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001
 
Checking Windows Service Integrity: 
 
 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Manual
 
Searching for Missing Digital Signatures: 
 
 * No issues found.
 
Checking HOSTS File: 
 
 * No issues found.
 
Program finished at: 04/02/2014 04:33:50 PM
Execution time: 0 hours(s), 0 minute(s), and 28 seconds(s)
Link to post
Share on other sites

MBAM scan came up clean:

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 4/2/2014
Scan Time: 5:17:02 PM
Logfile: 
Administrator: Yes
 
Version: 2.00.0.1000
Malware Database: v2014.04.02.08
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x86
File System: NTFS
User: dfiore
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 336546
Time Elapsed: 10 min, 34 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
Link to post
Share on other sites

Whoops! I did AdwCleaner before HitmanPro. Here's Adw's results:

 

# AdwCleaner v3.023 - Report created 02/04/2014 at 17:22:08
# Updated 01/04/2014 by Xplode
# Operating System : Windows 7 Professional Service Pack 1 (32 bits)
# Username : dfiore - LT-DFIORE
# Running from : C:\Users\dfiore\Desktop\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
[#] Folder Deleted : C:\ProgramData\BitGuard
[#] Folder Deleted : C:\ProgramData\Browser Manager
[#] Folder Deleted : C:\ProgramData\BrowserProtect
Folder Deleted : C:\Program Files\BearShare Applications
Folder Deleted : C:\Users\dfiore\AppData\Local\RadioRage_4j
Folder Deleted : C:\Users\dfiore\AppData\LocalLow\iac
Folder Deleted : C:\Users\dfiore\AppData\LocalLow\RadioRage_4j
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.FeedManager
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.FeedManager.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLMenu
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLMenu.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLPanel
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLPanel.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.MultipleButton
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.MultipleButton.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.PseudoTransparentPlugin
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.PseudoTransparentPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.Radio
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.Radio.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.RadioSettings
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.RadioSettings.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ScriptButton
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ScriptButton.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.SettingsPlugin
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.SettingsPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ThirdPartyInstaller
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ThirdPartyInstaller.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ToolbarProtector
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ToolbarProtector.1
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@RadioRage_4j.com/Plugin
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{00A2B7C6-7487-4B99-9F6C-1FDF57FE130B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{10273591-D084-4328-A7D0-49E051FCDE7B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{11D4B723-18CA-48C6-BA13-965488F19A70}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BF72F68-72D8-461D-A884-329D936C5581}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{53855564-CF81-410C-9C1C-321C7E067816}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{581C7D7D-F809-4E03-A631-74C069D5F04A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{60B34F47-3FDD-46F8-AB6C-AAABEA55C3D6}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6562E272-88E1-4DFF-8FF8-FE1A05323D36}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{68122F44-3A4A-4EDB-B28F-0C0E07F89BD0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{78E9D883-93CD-4072-BEF3-38EE581E2839}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{83AC1413-FCE4-4A46-9DD5-4F31F306E71F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D740AD89-BAF4-47D5-9B5E-343D30F07A7A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DFEB941C-8B58-4899-97C3-88FE394E1285}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E23760BE-23A3-4CEF-9304-66AF079F53DB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E6AD866F-EA06-476A-8432-ED943683FAB1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{ECEF0D95-32FA-48D3-8A2D-D6453B5B7361}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F69FE1BE-09C3-460C-AC89-8CCD9D3DF1CC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F706E19B-6C14-4272-BA98-2F16636A898D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A25AA6E2-1CDE-4D0F-A5D4-4898D7FB3C86}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A5C9CB1C-1C0A-45A2-81CC-1DD342D0A478}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{0978C5FA-83C0-4118-A54F-99DACCEECB8C}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{1ED65BE2-AE84-46CB-8EA6-1C2B86ADF768}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{1FDAD7F1-B87C-4E79-9150-DE235FF80B3A}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{395C94B1-59E6-4C65-8AF2-0F6763BC70A6}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4A50E810-71EB-43A8-A665-19ED8CCD1630}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4DD9EB5D-8657-4856-A804-535841B09D73}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{569A9014-22E3-4F11-A243-CA4E3D95ADED}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{597494DA-C59F-4EDF-B2D1-CE137E2DB9E4}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{5E5E0B49-1A81-4ACC-BD6B-FF5F4EFEF01A}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{B872D222-3F52-4CD9-A4BE-9D69EE4F293D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C4C4F1F4-3074-4CB6-9FB8-0A64273166F0}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D0E90465-CF35-480D-B520-E1E3BDE802F5}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{581C7D7D-F809-4E03-A631-74C069D5F04A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{60B34F47-3FDD-46F8-AB6C-AAABEA55C3D6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{68122F44-3A4A-4EDB-B28F-0C0E07F89BD0}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7C3B01BC-53A5-48A0-A43B-0C67731134B9}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F706E19B-6C14-4272-BA98-2F16636A898D}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0ABE0FED-50E7-4E42-A125-57C0A11DBCDE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44DB423D-A0DB-4664-9477-CCDCEB7CD666}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{53855564-CF81-410C-9C1C-321C7E067816}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A25AA6E2-1CDE-4D0F-A5D4-4898D7FB3C86}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5C9CB1C-1C0A-45A2-81CC-1DD342D0A478}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B5731AB1-8566-4441-AEFB-9AFB2EEA63D9}
Key Deleted : HKCU\Software\APN DTX
Key Deleted : HKCU\Software\RadioRage_4j
Key Deleted : HKCU\Software\AppDataLow\Software\RadioRage_4j
Key Deleted : HKLM\Software\RadioRage_4j
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RadioRage_4jbar Uninstall Firefox
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RadioRage_4jbar Uninstall Internet Explorer
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.16521
 
 
-\\ Google Chrome v33.0.1750.154
 
[ File : C:\Users\ksobczyk\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
 
[ File : C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
Deleted : homepage
Deleted : search_url
Deleted : keyword
 
*************************
 
AdwCleaner[R0].txt - [7434 octets] - [02/04/2014 17:20:52]
AdwCleaner[s0].txt - [7555 octets] - [02/04/2014 17:22:08]
 
########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [7615 octets] ##########
Link to post
Share on other sites

HitmanPro log:

 

HitmanPro 3.7.9.216www.hitmanpro.com    Computer name . . . . : LT-DFIORE   Windows . . . . . . . : 6.1.1.7601.X86/4   User name . . . . . . : TX\dfiore   UAC . . . . . . . . . : Enabled   License . . . . . . . : Free    Scan date . . . . . . : 2014-04-02 17:27:34   Scan mode . . . . . . : Normal   Scan duration . . . . : 4m 33s   Disk access mode  . . : Direct disk access (SRB)   Cloud . . . . . . . . : Internet   Reboot  . . . . . . . : No    Threats . . . . . . . : 0   Traces  . . . . . . . : 53    Objects scanned . . . : 1,008,007   Files scanned . . . . : 34,061   Remnants scanned  . . : 241,726 files / 732,220 keys Potential Unwanted Programs _________________________________________________    session/startup_urls[0]   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Preferences    ask.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Web Data    C:\Users\dfiore\AppData\LocalLow\DataMngr\ (iLivid)   C:\Users\dfiore\AppData\LocalLow\DataMngr\{7CA1F051-A4FB-4143-B263-02B41E571EED}64 (iLivid) Cookies _____________________________________________________________________    C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:247realmedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.360yield.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.mlnadvertising.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.yieldmanager.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.creative-serving.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.p161.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pointroll.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pubmatic.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.undertone.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.yahoo.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtech.de   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtechus.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:advertising.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:apmebf.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:at.atwola.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:atdmt.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:atlanticmedia.122.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:bs.serving-sys.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:burstnet.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:casalemedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:collective-media.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:dmtracker.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:fanatics.112.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:fastclick.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:gntbcstglobal.112.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:interclick.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:invitemedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:journalregistercompany.122.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:media6degrees.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:mediaplex.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:patrickhillery.112.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:pointroll.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:questionmarket.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:realmedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:revsci.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ru4.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:serving-sys.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:smartadserver.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:specificclick.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:statcounter.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:stats.adotube.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:statse.webtrendslive.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:tacoda.at.atwola.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:tribalfusion.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.burstnet.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:zedo.com   C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Cookies\PK34828E.txt   C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Cookies\Y82V154E.txt  
Link to post
Share on other sites

JRT's log:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.3 (03.23.2014:1)
OS: Windows 7 Professional x86
Ran by dfiore on Wed 04/02/2014 at 17:36:49.66
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] "C:\Users\dfiore\appdata\locallow\datamngr"
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 04/02/2014 at 17:40:03.68
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Link to post
Share on other sites

Hi Eric,

 

 

Please restart the computer and run SecurityCheck one more time. It should produce a log this time. :)

 

Also to ged rid of this entry:

 

 session/startup_urls[0]
   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Preferences
 
   ask
.com
   C
:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Web Data

 

go ahead and reset Google Chrome settings to default => https://support.google.com/chrome/answer/3296214?hl=en

 

 

Regards,

Georgi

Link to post
Share on other sites

Here's the results from SecurityCheck:

 

 Results of screen317's Security Check version 0.99.81  
 Windows 7 Service Pack 1 x86 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Security Center service is not running! This report may not be accurate! 
 Windows Firewall Enabled!  
Symantec Endpoint Protection   
 WMI entry may not exist for antivirus; attempting automatic update. 
`````````Anti-malware/Other Utilities Check:````````` 
 Adobe Reader XI  
 Google Chrome 33.0.1750.152  
 Google Chrome 33.0.1750.154  
````````Process Check: objlist.exe by Laurent````````  
 Norton ccSvcHst.exe 
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  
````````````````````End of Log`````````````````````` 
 
 
Also, I reset the Chrome browser settings as suggested.
 
Any further steps you recommend?
 
Thanks,
Eric
Link to post
Share on other sites

Hi Eric,

 

Before I let you go I want to check something...from the SecurityCheck log it seems that your SecurityCenter service isn't running at the moment:

 

``````````````Antivirus/Firewall Check:``````````````
 Windows Security Center service is not running! This report may not be accurate!

 

Please download Farbar Service Scanner and run it on the computer with the issue.

  • Make sure that all options are checked.
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

 

 

Regards,

Georgi

Link to post
Share on other sites

Here's the results for the FSS:

 

Farbar Service Scanner Version: 25-02-2014
Ran by dfiore (administrator) on 03-04-2014 at 17:01:31
Running from "C:\Users\dfiore\Desktop"
Microsoft Windows 7 Professional  Service Pack 1 (X86)
Boot Mode: Normal
****************************************************************
 
Internet Services:
============
 
Connection Status:
==============
Localhost is accessible.
LAN connected.
Attempt to access Google IP returned error. Google IP is unreachable
Attempt to access Google.com returned error: Google.com is unreachable
Attempt to access Yahoo.com returned error: Yahoo.com is unreachable
 
 
Windows Firewall:
=============
 
Firewall Disabled Policy: 
==================
 
 
System Restore:
============
 
System Restore Disabled Policy: 
========================
 
 
Action Center:
============
 
 
Windows Update:
============
 
Windows Autoupdate Disabled Policy: 
============================
 
 
Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is set to Demand. The default start type is Auto.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.
 
 
Windows Defender Disabled Policy: 
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1
 
 
Other Services:
==============
 
 
File Check:
========
C:\Windows\system32\nsisvc.dll => MD5 is legit
C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit
C:\Windows\system32\dhcpcore.dll => MD5 is legit
C:\Windows\system32\Drivers\afd.sys
[2013-10-09 06:16] - [2013-09-13 20:48] - 0338944 ____A (Microsoft Corporation) F81BB7E487EDCEAB630A7EE66CF23913
 
C:\Windows\system32\Drivers\tdx.sys => MD5 is legit
C:\Windows\system32\Drivers\tcpip.sys
[2013-10-09 06:16] - [2013-09-07 22:07] - 1294272 ____A (Microsoft Corporation) CA59F7C570AF70BC174F477CFE2D9EE3
 
C:\Windows\system32\dnsrslvr.dll => MD5 is legit
C:\Windows\system32\mpssvc.dll => MD5 is legit
C:\Windows\system32\bfe.dll => MD5 is legit
C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit
C:\Windows\system32\SDRSVC.dll => MD5 is legit
C:\Windows\system32\vssvc.exe => MD5 is legit
C:\Windows\system32\wscsvc.dll => MD5 is legit
C:\Windows\system32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\system32\wuaueng.dll => MD5 is legit
C:\Windows\system32\qmgr.dll => MD5 is legit
C:\Windows\system32\es.dll => MD5 is legit
C:\Windows\system32\cryptsvc.dll
[2013-08-13 16:37] - [2013-07-09 00:46] - 0140288 ____A (Microsoft Corporation) 7CA1BECEA5DE2643ADDAD32670E7A4C9
 
C:\Program Files\Windows Defender\MpSvc.dll
[2013-08-05 10:05] - [2013-05-27 00:57] - 0680960 ____A (Microsoft Corporation) 082CF481F659FAE0DE51AD060881EB47
 
C:\Windows\system32\ipnathlp.dll => MD5 is legit
C:\Windows\system32\iphlpsvc.dll => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
 
 
**** End of log ****
Link to post
Share on other sites

Hello,

 

 

It seems that the Security Center service is running so no additional actions are needed anymore. smile.png

 

And here are my final recommendations to you:

 

Nicely done ! icon_bananas.gif This is the end of our journey if you don't have any more questions.

Thank you for following my instructions perfectly. :)
I have some final words for you.
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.

 

 

 

STEP 1 CLEANUP

 

 

 

To remove all of the tools we used and the files and folders they created, please do the following:

 

 

Download the following file => fixlist.txt and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST/FRST64 and press the Fix button just once and wait.
It's no needed to post the log this time.

 

 

Please download OTC.exe by OldTimer and save it to your desktop.
 

  • Right-click the OTC.exe and choose Run as Administrator.
  • Click on CleanUp! button.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.

 

  • Next please download Delfix.exe by Xplode and save it to your desktop.
  • Please start it and check the box next to "Remove disinfection tools" and click on the run button.
  • The tool will delete itself once it finishes.

 

Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

 

 

 

STEP 2 SECURITY ADVICES
 

 

Change all your passwords !


Since your computer was infected for peace of mind, I would however advise you that all your passwords be changed immediately including those for bank accounts, credit cards and home loans, PIN codes etc)!! (just in case).

If you're storing password in the browser to access websites than they are non encrypted well (only if you use Firefox with master password protection activated provide better security). So I strongly recommend to change as much password as possible. Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.

Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use PC Tools Password Generator to create random passwords and then install an application like KeePass Password Safe to store them for easy access.If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft

 

 

Keep your antivirus software turned on and up-to-date

 

  • Make sure your antivirus software is turned on and up-to-date.
  • New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
    Note:
  • You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
  • You should scan your computer with an AntiSpyware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
  • Be sure to check for and download any definition updates prior to performing a scan.
  • Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.

 

 

Install HIPS based software if needed (or use Limited Account with UAC enabled)

 

I usually recommend to users to install HIPS based software but this type software is only effective in the right hands since it require from the users to take the right decisions.

 

HIPS based software controls what an application is allowed to do and not allowed to do.
It monitors what each application tries to do, how it use the internet and give you the ability to block any suspicious activity occurring on your computer.
In my opinion the best way to prevent an unknown malware from gaining access is to use some HIPS programs (like COMODO Firewall, PrivateFirewall, Online Armor etc.) to control the access rights of legitimate applications, although this would only be advisable for experienced users. (so if you don't feel comfortable using such software then you can skip this advice)

 

However, you should be aware though that (if you install Comodo Firewall and not the whole package Comodo Internet Security) this is not an replacement for a standard antivirus application. It's a great tool to add another layer of protection to your existent antivirus application. Also note that if you have an antivirus installed then you should install Comodo Firewall (and not Comodo Internet Security to avoid conflicts).

 

It takes some time and knowledge to configure it for individual purposes but once done, you should not have a problems with it.
There are so many reviews on YouTube and blogs about all these programs.
Keep in mind to choose carefully in order to avoid conflicts or instability caused by incompatible security programs.
Also having more than one "real-time" program can be a drain on your PC's efficiency so please refrain doing so.

More information about HIPS can be found here: What is Host Intrusion Prevention System (HIPS) and how does it work?

 

If you like Comodo you should choose for yourself which version of Comodo you will use 5 or 7. Personally I stick to version 5 at least for now.

 

If these kind of programs are difficult for you to use then you can use limited user account (LUA) with UAC enabled. If you need administrative privileges to perform some tasks, then you can use Run As or log on as the administrator account for that specific task.

 

 

Be prepared for CryptoLocker:

 

 

CryptoLocker Ransomware Information Guide and FAQ

Cryptolocker Ransomware: What You Need To Know

New CryptoLocker Ransomware Variant Spread Through Yahoo Messenger

CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ

 

 

Since the prevention is better than cure you can use gpedit built-in Windows or CryptoPrevent (described in the first link) to secure the PC against this locker.

Another way is to use Comodo Firewall and to add all local disks to Protected Files and Folders

You may want to check HitmanPro.Alert.CryptoGuard and add install it to be safe when surfing the net.

 

 

Practice Safe Internet


One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.  Below are a list of simple precautions to take to keep your computer clean and running securely:
 

  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that.  Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • .exe, .com, .bat, .pif, .scr or .cmd do not open the attachment unless you know for a fact that it is clean.  For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is.  The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
    Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams.  For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message  or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.  We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window.  If there is a menu that comes up saying Add to Favorites... you know it's a fake.
  • Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
  • Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.

 

 

Tweak your browsers
 
 
MOZILLA FIREFOX


To prevent further infections be sure to install the following add-ons NoScript and AdBlock Plus

 

Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.

 

Adblock Plus can be found here.

 

NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.

 

NoScript can be found here
 

 

Google Chrome

 
If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.

However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access

 

 

For Internet Explorer 9/10 read the articles below:
 

Security and privacy features in Internet Explorer 9

Enhanced Protected Mode
Use Tracking Protection in Internet Explorer

Security in Internet Explorer 10

 

Immunize your browsers with SpywareBlaster 5 and Spybot Search and Destroy 1.6

Also MBAM acquired the following software Malwarebytes Anti-Exploit and it should work with the most popular browsers. Beware the product is in beta stage.

Changelog can be seen here and known issues here.

 

 
Make the extensions for known file types visible:
 

Be wary of files with a double extension such as jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.

 

 

Create an image of your system (you can use the built-in Windows software as well if you prefere)

 

  • Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
  • Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
  • The download link is here.
  • The tutorial on how to create an system image can be found here.
  • The tutorial on how to restore an system image can be found here.
  • Be sure to read the tutorial first.

 

 

Follow this list and your potential for being infected again will reduce dramatically.

Safe Surfing! smile.png

 

 

Regards,

Georgi

Link to post
Share on other sites

  • Root Admin

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.