Jump to content

Recommended Posts

I’ve had my mate’s laptop dumped on me (!), the log is below:

 

Malwarebytes Anti-Malware 1.75.0.1300

www.malwarebytes.org

 

Database version: v2013.04.04.07

 

Windows Vista Service Pack 2 x86 NTFS

Internet Explorer 9.0.8112.16421

Andy :: ANDY-PC [administrator]

 

18/01/2014 09:19:41

mbam-log-2014-01-18 (09-19-41).txt

 

Scan type: Quick scan

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 234884

Time elapsed: 12 minute(s), 8 second(s)

 

Memory Processes Detected: 1

c:\windows\installer\{a31bd149-2620-ffd0-2875-c11d0838dc98}\syshost.exe (Trojan.Agent) -> 2396 -> Delete on reboot.

 

Memory Modules Detected: 0

(No malicious items detected)

 

Registry Keys Detected: 1

HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SYSHOST32 (Trojan.Agent) -> Quarantined and deleted successfully.

 

Registry Values Detected: 1

HKLM\SYSTEM\CurrentControlSet\Services\syshost32|ImagePath (Trojan.Agent) -> Data: "C:\Windows\Installer\{A31BD149-2620-FFD0-2875-C11D0838DC98}\syshost.exe" /service -> Quarantined and deleted successfully.

 

Registry Data Items Detected: 0

(No malicious items detected)

 

Folders Detected: 0

(No malicious items detected)

 

Files Detected: 19

C:\Users\Andy\AppData\Local\Temp\1831092.Uninstall\Uninstall.exe (Adware.Agent) -> Quarantined and deleted successfully.

c:\users\andy\appdata\local\temp\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\users\julietwise\appdata\local\temp\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\serviceprofiles\localservice\appdata\local\temp\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\serviceprofiles\networkservice\appdata\local\temp\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\temp\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\users\andy\appdata\local\syshost.exe (Exploit.Drop.GSLAD) -> Delete on reboot.

c:\users\julietwise\appdata\local\syshost.exe (Exploit.Drop.GSLAD) -> Delete on reboot.

c:\windows\serviceprofiles\localservice\appdata\local\syshost.exe (Exploit.Drop.GSLAD) -> Delete on reboot.

c:\windows\serviceprofiles\networkservice\appdata\local\syshost.exe (Exploit.Drop.GSLAD) -> Delete on reboot.

c:\windows\system32\config\systemprofile\appdata\local\syshost.exe (Exploit.Drop.GSLAD) -> Delete on reboot.

c:\users\andy\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\users\julietwise\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\users\public\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\serviceprofiles\localservice\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\serviceprofiles\networkservice\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\system32\config\systemprofile\syshost.exe (Exploit.Drop.GS) -> Delete on reboot.

c:\windows\syshost.exe (Trojan.Downloader) -> Delete on reboot.

c:\windows\installer\{a31bd149-2620-ffd0-2875-c11d0838dc98}\syshost.exe (Trojan.Agent) -> Delete on reboot.

 

(end)

 

The laptop is still getting alert messages so I (we) would be most grateful for some help with this.

 

Thanks in anticipation,

 

Chris

Link to post
Share on other sites

I’ve re-run MB, and also Windows Defender, which report no threats – though the MB database is ‘288 days’ old (because I don’t want to attach his infected laptop to our network). Paranoid?

 

I’ve run ATF-Cleaner and DDS:

 

DDS (Ver_2012-11-20.01) - NTFS_x86

Internet Explorer: 9.0.8112.16457

Run by Andy at 11:56:00 on 2014-01-18

Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.44.1033.18.2037.815 [GMT 0:00]

.

AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {ADA629C7-7F48-5689-624A-3B76997E0892}

SP: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {16C7C823-5972-5907-58FA-0004E2F9422F}

SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

FW: McAfee Firewall *Disabled* {959DA8E2-3527-57D1-4915-924367AD4FE9}

.

============== Running Processes ================

.

C:\Windows\system32\wininit.exe

C:\Windows\system32\lsm.exe

C:\Windows\system32\SLsvc.exe

C:\Program Files\Dell\DellDock\DockLogin.exe

C:\Windows\System32\WLTRYSVC.EXE

C:\Windows\System32\bcmwltry.exe

C:\Windows\system32\WLANExt.exe

C:\Windows\System32\spoolsv.exe

C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe

C:\Windows\system32\aestsrv.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

C:\Windows\System32\bgsvcgen.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\BT Broadband Desktop Help\btbb\MA\8.3.1.7.bt.1.3\ma\bin\MAHostService.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe

C:\Program Files\BT Broadband Desktop Help\btbb\MA\8.3.1.7.bt.1.3\ma\bin\node.exe

C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

C:\Program Files\Common Files\Motive\pcCMService.exe

C:\Windows\system32\STacSV.exe

C:\Windows\system32\rundll32.exe

C:\Windows\system32\SearchIndexer.exe

C:\Windows\system32\DRIVERS\xaudio.exe

C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe

C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\Windows\system32\taskeng.exe

C:\Program Files\Windows Defender\MSASCui.exe

C:\Program Files\DellTPad\Apoint.exe

C:\Windows\System32\igfxtray.exe

C:\Windows\System32\hkcmd.exe

C:\Windows\System32\igfxpers.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe

C:\Windows\System32\WLTRAY.EXE

C:\Program Files\Dell\MediaDirect\PCMService.exe

C:\Program Files\Sigmatel\C-Major Audio\WDM\sttray.exe

C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

C:\Program Files\Hauppauge\DeviceCentral\HcwDCTrayTool.exe

C:\Windows\system32\igfxsrvc.exe

C:\Program Files\Common Files\McAfee\Platform\mcuicnt.exe

C:\Program Files\DellTPad\ApMsgFwd.exe

C:\PROGRA~1\HAUPPA~1\DEVICE~1\HCWDEV~1.EXE

C:\Program Files\DellTPad\HidFind.exe

C:\Program Files\DellTPad\Apntex.exe

C:\Windows\system32\Dwm.exe

C:\Windows\system32\taskeng.exe

C:\Windows\system32\SearchProtocolHost.exe

C:\Windows\system32\SearchFilterHost.exe

C:\Windows\system32\SearchProtocolHost.exe

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\svchost.exe -k DcomLaunch

C:\Windows\system32\svchost.exe -k rpcss

C:\Windows\System32\svchost.exe -k secsvcs

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted

C:\Windows\system32\svchost.exe -k netsvcs

C:\Windows\system32\svchost.exe -k GPSvcGroup

C:\Windows\system32\svchost.exe -k LocalService

C:\Windows\system32\svchost.exe -k NetworkService

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork

C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted

C:\Windows\system32\svchost.exe -k imgsvc

C:\Windows\System32\svchost.exe -k WerSvcGroup

C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation

.

============== Pseudo HJT Report ===============

.

uWindow Title = Internet Explorer, optimized for Bing and MSN

uURLSearchHooks: McAfee SiteAdvisor Toolbar: {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\program files\mcafee\siteadvisor\McIEPlg.dll

BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll

BHO: Spybot-S&D IE Protection: {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll

BHO: DealPly: {A6174F27-1FFF-E1D6-A93F-BA48AD5DD448} - c:\program files\dealply\DealPlyIE.dll

BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll

BHO: McAfee SiteAdvisor BHO: {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\program files\mcafee\siteadvisor\McIEPlg.dll

BHO: Java Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre6\bin\jp2ssv.dll

TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll

TB: McAfee SiteAdvisor Toolbar: {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\program files\mcafee\siteadvisor\McIEPlg.dll

TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll

uRun: [DellSupportCenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P DellSupportCenter

uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"

uRun: [Facebook Update] "c:\users\andy\appdata\local\facebook\update\FacebookUpdate.exe" /c /nocrashserver

uRun: [spybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe

mRun: [Windows Defender] c:\program files\windows defender\MSASCui.exe -hide

mRun: [ECenter] c:\dell\e-center\EULALauncher.exe

mRun: [Apoint] c:\program files\delltpad\Apoint.exe

mRun: [igfxTray] c:\windows\system32\igfxtray.exe

mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe

mRun: [Persistence] c:\windows\system32\igfxpers.exe

mRun: [iAAnotif] "c:\program files\intel\intel matrix storage manager\Iaanotif.exe"

mRun: [broadcom Wireless Manager UI] c:\windows\system32\WLTRAY.exe

mRun: [PCMService] "c:\program files\dell\mediadirect\PCMService.exe"

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime

mRun: [DellSupportCenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P DellSupportCenter

mRun: [sigmatelSysTrayApp] c:\program files\sigmatel\c-major audio\wdm\sttray.exe

mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"

mRun: [btbb_McciTrayApp] "c:\program files\bt broadband desktop help\btbb\BTHelpNotifier.exe"

mRun: [mcui_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey

mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"

mRun: [ArcSoft Connection Service] c:\program files\common files\arcsoft\connection service\bin\ACDaemon.exe

mRun: [mcpltui_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey

StartupFolder: c:\users\andy\appdata\roaming\micros~1\windows\startm~1\programs\startup\hauppa~1.lnk - c:\program files\hauppauge\devicecentral\HcwDCTrayTool.exe

StartupFolder: c:\users\andy\appdata\roaming\micros~1\windows\startm~1\programs\startup\hauppa~2.lnk - c:\program files\hauppauge\devicecentral\HcwDCTrayTool.exe

StartupFolder: c:\users\andy\appdata\roaming\microsoft\windows\start menu\programs\startup\HpM3Util.exe

StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\e_spsu01.lnk - c:\windows\system32\spool\drivers\w32x86\3\E_SPSU01.EXE

mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0

mPolicies-System: EnableUIADesktopToggle = dword:0

IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200

IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}

IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll

TCP: NameServer = 192.168.1.254 192.168.1.254

TCP: Interfaces\{9F5D8FD6-AF32-489B-A1BE-8220C9C14B1C} : DHCPNameServer = 192.168.1.254 192.168.1.254

Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\program files\mcafee\msc\McSnIePl.dll

Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\program files\mcafee\siteadvisor\McIEPlg.dll

Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\program files\mcafee\siteadvisor\McIEPlg.dll

Notify: GoToAssist - c:\program files\citrix\gotoassist\599\G2AWinLogon.dll

Notify: igfxcui - igfxdev.dll

LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg

mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\32.0.1700.76\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome

.

============= SERVICES / DRIVERS ===============

.

R2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\AEstSrv.exe [2008-8-8 73728]

R2 BT Help Wizard;BT Help Wizard;c:\program files\bt broadband desktop help\btbb\ma\8.3.1.7.bt.1.3\ma\bin\MAHostService.exe [2013-10-2 321024]

R2 DockLoginService;Dock Login Service;c:\program files\dell\delldock\DockLogin.exe [2008-4-28 161048]

R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-21 21504]

R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-11-28 167784]

R2 McNaiAnn;McAfee VirusScan Announcer;c:\program files\common files\mcafee\platform\mcsvchost\McSvHost.exe [2013-12-13 281560]

R2 mcpltsvc;McAfee Platform Services;c:\program files\common files\mcafee\platform\mcsvchost\McSvHost.exe [2013-12-13 281560]

R2 pcCMService;pcCMService;c:\program files\common files\motive\pcCMService.exe [2013-5-16 376144]

R2 SBSDWSCService;SBSD Security Center Service;c:\program files\spybot - search & destroy\SDWinSec.exe [2014-1-16 1153368]

R3 HcwDevCentralService;HcwDevCentralService;c:\progra~1\hauppa~1\device~1\HCWDEV~1.EXE [2013-1-19 391504]

R3 IntcHdmiAddService;Intel® High Definition Audio HDMI Service;c:\windows\system32\drivers\IntcHdmi.sys [2008-8-8 111616]

S1 mfewfpk;McAfee Inc. mfewfpk;c:\windows\system32\drivers\mfewfpk.sys [2011-11-28 213392]

S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]

S2 HomeNetSvc;McAfee Home Network;c:\program files\common files\mcafee\platform\mcsvchost\McSvHost.exe [2013-12-13 281560]

S2 McAPExe;McAfee AP Service;c:\program files\mcafee\msc\McAPExe.exe [2013-12-13 145088]

S2 McMPFSvc;McAfee Personal Firewall Service;c:\program files\common files\mcafee\platform\mcsvchost\McSvHost.exe [2013-12-13 281560]

S2 McProxy;McAfee Proxy Service;c:\program files\common files\mcafee\platform\mcsvchost\McSvHost.exe [2013-12-13 281560]

S2 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2011-11-28 236000]

S2 mfecore;McAfee Anti-Malware Core;c:\program files\common files\mcafee\amcore\mcshield.exe [2013-12-13 643608]

S2 mfefire;McAfee Firewall Core Service;c:\program files\common files\mcafee\systemcore\mfefire.exe [2011-11-28 169320]

S2 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2011-3-13 572528]

S2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2011-11-28 172416]

S3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [2011-11-28 60920]

S3 hcwE5bda;Hauppauge Siena Video Capture;c:\windows\system32\drivers\hcwE5bda.sys [2013-12-13 798704]

S3 HipShieldK;McAfee Inc. HipShieldK;c:\windows\system32\drivers\HipShieldK.sys [2013-12-13 147912]

S3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2011-11-28 65928]

S3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [2011-11-28 365416]

S3 mfencbdc;McAfee Inc. mfencbdc;c:\windows\system32\drivers\mfencbdc.sys [2013-11-26 319808]

S3 mfencrk;McAfee Inc. mfencrk;c:\windows\system32\drivers\mfencrk.sys [2013-11-26 80752]

S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]

.

=============== Created Last 30 ================

.

2014-01-18 09:19:18        --------         d-----w-          c:\users\andy\appdata\roaming\Malwarebytes

2014-01-18 09:19:07        --------         d-----w-        c:\programdata\Malwarebytes

2014-01-18 09:19:06        22856 ----a-w-          c:\windows\system32\drivers\mbam.sys

2014-01-18 09:19:06        --------         d-----w-        c:\program files\Malwarebytes' Anti-Malware

2014-01-16 19:51:01        --------         d-----w-        c:\programdata\Spybot - Search & Destroy

2014-01-16 19:51:01        --------         d-----w-        c:\program files\Spybot - Search & Destroy

2014-01-06 19:23:36        4558848       ----a-w-          c:\windows\system32\GPhotos.scr

2014-01-04 20:26:13        303104         ----a-w-          c:\users\andy\appdata\roaming\microsoft\windows\start menu\programs\startup\HpM3Util.exe

.

==================== Find3M  ====================

.

2013-11-26 22:06:42        10152 ----a-w-          c:\windows\system32\drivers\mfeclnrk.sys

2013-11-26 22:06:22        80752 ----a-w-          c:\windows\system32\drivers\mfencrk.sys

2013-11-26 22:06:00        319808         ----a-w-          c:\windows\system32\drivers\mfencbdc.sys

2013-11-04 17:22:36        60920 ----a-w-          c:\windows\system32\drivers\cfwids.sys

2013-11-04 17:17:14        213392         ----a-w-          c:\windows\system32\drivers\mfewfpk.sys

2013-11-04 17:16:54        172416         ----a-w-          c:\windows\system32\mfevtps.exe

2013-11-04 17:12:26        572528         ----a-w-          c:\windows\system32\drivers\mfehidk.sys

2013-11-04 17:10:42        365416         ----a-w-          c:\windows\system32\drivers\mfefirek.sys

2013-11-04 17:10:02        65928 ----a-w-          c:\windows\system32\drivers\mfebopk.sys

2013-11-04 17:09:20        236000         ----a-w-          c:\windows\system32\drivers\mfeavfk.sys

2013-11-04 17:08:22        133992         ----a-w-          c:\windows\system32\drivers\mfeapfk.sys

.

============= FINISH: 11:56:28.38 ===============

 

.

UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.

IF REQUESTED, ZIP IT UP & ATTACH IT

.

DDS (Ver_2012-11-20.01)

.

Microsoft® Windows Vista™ Home Basic

Boot Device: \Device\HarddiskVolume3

Install Date: 08/08/2008 04:04:09

System Uptime: 18/01/2014 09:38:51 (2 hours ago)

.

Motherboard: Dell Inc. |  | 0U990C

Processor: Intel® Pentium® Dual  CPU  T2390  @ 1.86GHz | Microprocessor | 1867/133mhz

.

==== Disk Partitions =========================

.

C: is FIXED (NTFS) - 99 GiB total, 35.752 GiB free.

D: is FIXED (NTFS) - 10 GiB total, 6.299 GiB free.

E: is CDROM (UDF)

.

==== Disabled Device Manager Items =============

.

==== System Restore Points ===================

.

RP309: 08/01/2014 12:06:27 - Scheduled Checkpoint

RP310: 09/01/2014 14:48:33 - Scheduled Checkpoint

RP311: 11/01/2014 17:22:25 - Scheduled Checkpoint

RP312: 18/01/2014 10:18:26 - Scheduled Checkpoint

.

==== Installed Programs ======================

.

Adobe AIR

Adobe Flash Player 11 ActiveX

Adobe Reader X (10.1.1)

Adobe Shockwave Player 11.5

Apple Application Support

Apple Mobile Device Support

Apple Software Update

ArcSoft ShowBiz

Bonjour

BT Desktop Help

BT NetProtect Plus

BTHomeHub

Cisco EAP-FAST Module

Cisco LEAP Module

Cisco PEAP Module

Compatibility Pack for the 2007 Office system

Conexant HDA D330 MDC V.92 Modem

DealPly

Dell-eBay

Dell Dock

Dell Getting Started Guide

Dell Resource CD

Dell Touchpad

Dell Wireless WLAN Card

Digital Line Detect

EDocs

EPSON PhotoQuicker3.2

EPSON Printer Software

Facebook Video Calling 2.0.0.447

Google Chrome

Google Toolbar for Internet Explorer

Google Update Helper

GoToAssist Corporate

Hauppauge Capture

Hauppauge Device Central

Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)

Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)

Intel® Matrix Storage Manager

Java Auto Updater

Java 6 Update 24

Java 6 Update 5

Malwarebytes Anti-Malware version 1.75.0.1300

MediaDirect

Microsoft .NET Framework 3.5 SP1

Microsoft .NET Framework 4 Client Profile

Microsoft Office File Validation Add-In

Microsoft Office PowerPoint Viewer 2007 (English)

Microsoft Office Professional Edition 2003

Microsoft Silverlight

Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053

Microsoft Visual C++ 2005 Redistributable

Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17

Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.51106

Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.51106

Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.51106

Modem Diagnostic Tool

My Dell

OutlookAddinSetup

Picasa 3

QuickSet

QuickTime

Security Update for Microsoft .NET Framework 3.5 SP1 (KB2657424)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2478663)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2539636)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)

Shared C Run-time for x86

Spybot - Search & Destroy

Update for Microsoft .NET Framework 3.5 SP1 (KB963707)

Update for Microsoft .NET Framework 4 Client Profile (KB2468871)

Update for Microsoft .NET Framework 4 Client Profile (KB2533523)

VideoCam Suite 2.0

XSplit

.

==== Event Viewer Messages From Past Week ========

.

18/01/2014 10:25:05, Error: Service Control Manager [7000]  - The MBAMSwissArmy service failed to start due to the following error:  A device attached to the system is not functioning.

18/01/2014 09:44:26, Error: Service Control Manager [7000]  - The BCM42RLY service failed to start due to the following error:  The system cannot find the file specified.

18/01/2014 09:41:27, Error: Service Control Manager [7000]  - The McAfee Inc. mfehidk service failed to start due to the following error:  A device attached to the system is not functioning.

18/01/2014 09:41:25, Error: Service Control Manager [7001]  - The McAfee Validation Trust Protection Service service depends on the McAfee Inc. mfehidk service which failed to start because of the following error:  A device attached to the system is not functioning.

18/01/2014 09:41:25, Error: Service Control Manager [7001]  - The McAfee AP Service service depends on the McAfee Validation Trust Protection Service service which failed to start because of the following error:  The dependency service or group failed to start.

18/01/2014 09:41:22, Error: Service Control Manager [7001]  - The McAfee Home Network service depends on the McAfee Firewall Core Service service which failed to start because of the following error:  The dependency service or group failed to start.

18/01/2014 09:41:22, Error: Service Control Manager [7001]  - The McAfee Firewall Core Service service depends on the McAfee Validation Trust Protection Service service which failed to start because of the following error:  The dependency service or group failed to start.

18/01/2014 09:39:20, Error: Service Control Manager [7026]  - The following boot-start or system-start driver(s) failed to load:  mfewfpk

18/01/2014 09:39:20, Error: Service Control Manager [7001]  - The McAfee Proxy Service service depends on the McAfee Firewall Core Service service which failed to start because of the following error:  The dependency service or group failed to start.

18/01/2014 09:39:20, Error: Service Control Manager [7001]  - The McAfee Personal Firewall Service service depends on the McAfee Firewall Core Service service which failed to start because of the following error:  The dependency service or group failed to start.

18/01/2014 09:39:20, Error: Service Control Manager [7001]  - The McAfee Anti-Malware Core service depends on the McAfee Validation Trust Protection Service service which failed to start because of the following error:  The dependency service or group failed to start.

18/01/2014 09:39:20, Error: Service Control Manager [7000]  - The SupportSoft Sprocket Service (dellsupportcenter) service failed to start due to the following error:  The system cannot find the file specified.

18/01/2014 09:39:20, Error: Service Control Manager [7000]  - The Parallel port driver service failed to start due to the following error:  The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.

18/01/2014 09:39:20, Error: Service Control Manager [7000]  - The McAfee Inc. mfeavfk service failed to start due to the following error:  A device attached to the system is not functioning.

18/01/2014 09:39:20, Error: Service Control Manager [7000]  - The McAfee Inc. mfeapfk service failed to start due to the following error:  Indicates two revision levels are incompatible.

17/01/2014 19:03:36, Error: Service Control Manager [7009]  - A timeout was reached (30000 milliseconds) while waiting for the McAfee Platform Services service to connect.

17/01/2014 19:03:36, Error: Service Control Manager [7000]  - The McAfee Platform Services service failed to start due to the following error:  The service did not respond to the start or control request in a timely fashion.

17/01/2014 19:03:36, Error: Microsoft-Windows-DistributedCOM [10005]  - DCOM got error "1053" attempting to start the service mcpltsvc with arguments "" in order to run the server: {20966775-18A4-4299-B8E3-772C336B52A7}

17/01/2014 19:03:35, Error: Microsoft-Windows-DistributedCOM [10005]  - DCOM got error "1053" attempting to start the service mcpltsvc with arguments "" in order to run the server: {26608B46-476A-4BF1-9CC6-AFEA28EBBC17}

16/01/2014 20:50:08, Error: EventLog [6008]  - The previous system shutdown at 20:30:57 on 16/01/2014 was unexpected.

15/01/2014 17:31:20, Error: Service Control Manager [7034]  - The syshost32 service terminated unexpectedly.  It has done this 1 time(s).

11/01/2014 23:48:00, Error: EventLog [6008]  - The previous system shutdown at 23:46:10 on 11/01/2014 was unexpected.

11/01/2014 22:45:13, Error: EventLog [6008]  - The previous system shutdown at 22:43:37 on 11/01/2014 was unexpected.

11/01/2014 21:42:25, Error: EventLog [6008]  - The previous system shutdown at 21:40:48 on 11/01/2014 was unexpected.

11/01/2014 20:27:06, Error: EventLog [6008]  - The previous system shutdown at 20:25:28 on 11/01/2014 was unexpected.

.

==== End Of File ===========================

 

As DDS seems to show, the firewall & anti-virus will not turn on – McAfee seems to be ‘over-riding’ the Windows firewall, but I’ve no idea if that’s how it’s supposed to be. Either way, firewall & anti-virus are still being stopped by something.

 

Many thanks again,

 

Chris

Link to post
Share on other sites

  • Staff

Hello ChrisOfTheOT

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo

Link to post
Share on other sites

Many thanks Gringo! Logs pasted below. Things are running better - the protection software now runs okay - but the system cannot update Windows Defender (or anything Windows/Microsoft). It reports an error that the service is not running but 'Automatic Updates' is set in Control Panel, it is just prevented from turning itself on by something. (Rebooting did not help.)

 

Many thanks again for your help Gringo.

 

# AdwCleaner v3.017 - Report created 27/01/2014 at 09:34:11
# Updated 12/01/2014 by Xplode
# Operating System : Windows Vista Home Basic Service Pack 2 (32 bits)
# Username : Andy - ANDY-PC
# Running from : C:\Users\Andy\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DealPly
Folder Deleted : C:\Program Files\DealPly
Folder Deleted : C:\Users\Andy\AppData\Roaming\DealPly
Folder Deleted : C:\Users\Andy\AppData\Local\Google\Chrome\User Data\Default\Extensions\gaiilaahiahdejapggenmdmafpmbipje
Folder Deleted : C:\Users\julietwise\AppData\Local\Google\Chrome\User Data\Default\Extensions\gaiilaahiahdejapggenmdmafpmbipje
File Deleted : C:\Windows\System32\Tasks\Dealply
File Deleted : C:\Windows\System32\Tasks\DealPlyUpdate

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Deleted : HKCU\Software\Google\Chrome\Extensions\gaiilaahiahdejapggenmdmafpmbipje
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\gaiilaahiahdejapggenmdmafpmbipje
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{9EFB9C21-40D3-4476-B1FD-127B15FAD48F}
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{3DC4221F-CD3E-4438-AD96-3354618AE110}
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{9EFB9C21-40D3-4476-B1FD-127B15FAD48F}
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{3DC4221F-CD3E-4438-AD96-3354618AE110}
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CNXT_MODEM_HDAUDIO_VEN_14F1&DEV_2C06&SUBSYS_14F1000F
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A6174F27-1FFF-E1D6-A93F-BA48AD5DD448}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A6174F27-1FFF-E1D6-A93F-BA48AD5DD448}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00000000-6E41-4FD3-8538-502F5495E5FC}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A6174F27-1FFF-E1D6-A93F-BA48AD5DD448}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKLM\Software\DealPly
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DealPly
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\DealPly
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16457

-\\ Google Chrome v32.0.1700.76

[ File : C:\Users\Andy\AppData\Local\Google\Chrome\User Data\Default\preferences ]

[ File : C:\Users\julietwise\AppData\Local\Google\Chrome\User Data\Default\preferences ]

*************************

AdwCleaner[R0].txt - [3471 octets] - [27/01/2014 09:29:19]
AdwCleaner[s0].txt - [3399 octets] - [27/01/2014 09:34:11]

########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [3459 octets] ##########

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.0 (01.07.2014:1)
OS: Windows Vista Home Basic x86
Ran by Andy on 27/01/2014 at  9:56:09.48
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{E4F9D4DA-C190-4ADD-84D8-6979B6411465}

 

~~~ Files

 

~~~ Folders

 

~~~ Chrome

Successfully deleted: [Folder] C:\Users\Andy\appdata\local\Google\Chrome\User Data\Default\Extensions\gaiilaahiahdejapggenmdmafpmbipje

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 27/01/2014 at  9:59:13.18
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Link to post
Share on other sites

  • Staff

Hello Chris

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
Link to post
Share on other sites

Hi Gringo - log below:

 

ComboFix 14-01-27.02 - Andy 28/01/2014   9:22.1.2 - x86
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.44.1033.18.2037.1079 [GMT 0:00]
Running from: c:\users\Andy\Desktop\Malware Logs & Programs\ComboFix.exe
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {ADA629C7-7F48-5689-624A-3B76997E0892}
FW: McAfee Firewall *Enabled* {959DA8E2-3527-57D1-4915-924367AD4FE9}
SP: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {16C7C823-5972-5907-58FA-0004E2F9422F}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1029.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1096.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc10E4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc10E5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1113.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc120C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc120D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc121C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc12B8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1392.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc13B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc143E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc170B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc174A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1805.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc189.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1892.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc18DF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc196C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc19F8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1A46.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1A8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1B21.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1B40.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1C59.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1CD8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1D43.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1D71.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1D81.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1E2D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1E8B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1E9A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc20CD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2139.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc21B5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc21D5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2290.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc22E1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc234.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc234B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc234C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc23A9.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc23B8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2454.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc25CB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc263.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2647.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2686.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc26C4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc26C5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2751.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc28B7.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc28B8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc28E6.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2992.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc29F0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2ACA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2B76.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2B8D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2D1B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2D3A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2DC8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2EC5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc2FBA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3027.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3056.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc31E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3278.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3279.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc33F0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc344D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc345B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3555.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc35D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3600.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc366E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc366F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc36C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc37B5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3870.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3AF0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3B1F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3B20.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3CD4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3DCD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3DDD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3DDE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3DFC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3E4A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3EE6.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc40AA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc41A4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc41F2.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc42BD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc44D1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc456.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc45AA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4665.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4674.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4952.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4AE8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4C00.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4C1F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4D49.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4E3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4F89.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4FC7.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc4FE6.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc51.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc511.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc51BA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5582.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5591.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5592.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc55EF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc592A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5B2D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5FB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6020.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc60B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc624E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc62AB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc63E3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6866.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6B43.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6B44.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6B81.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6B91.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc6FE4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc705.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc70AF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc712D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc72D1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc72E1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc73CB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc73CC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc74A5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7512.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7689.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc772.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc77A2.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc77F0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc789C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc78AB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7A12.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7A7F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7AFC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7B0B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7CD0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7D5C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7EF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7F11.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc7FCC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8039.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc81EE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8393.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8558.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8567.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8603.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8613.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc870C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc874B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc876A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8799.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc87C8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8854.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8864.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8892.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8893.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc89F9.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8AA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8B60.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8B9E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8C0C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8D53.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8D72.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8DE0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8EAA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8F76.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9285.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc93DA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc93E8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9456.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc94F1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc955E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc95DB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9677.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc975.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc97EE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc98FB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9983.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9993.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9BD7.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9C42.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9CCE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9D4A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9DF6.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9EFF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA028.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA076.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA0A4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA0E3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA131.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA1D1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA259.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA362.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA43D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA43E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA4C9.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA536.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA5B3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA5F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA620.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA68E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA6EB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA787.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA797.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA833.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA8CF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA93C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAA07.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAAD2.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAB10.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAB2F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAB9C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAB9D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAC0A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAC38.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccACE4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAE7A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAE89.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAE8A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAEA8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAEDA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAEE7.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAF44.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAF73.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB000.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB0EA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB118.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB157.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB260.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB34A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB379.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB453.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB482.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB4E0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB4EF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB4F0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB57C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB57D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB60A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB6B4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB7BD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB7FB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB859.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB85A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB879.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB972.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB9DF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBA1D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBB07.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBB17.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBB29.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBB46.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBC5F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBC6F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBC9D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBCCC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBCCD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBCFB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBCFC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBD49.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBD97.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBE33.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBEAF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBF0D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBF2C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBF99.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC11F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC13.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC1AD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC277.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC332.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC370.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC3AF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC42.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC46A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC563.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC5A2.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC71.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC7D3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC81.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC92B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC94A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCA53.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCA54.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCA91.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCAA1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCB54.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCB7B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCC75.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCD40.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCD5F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCE78.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCE97.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCF52.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCFD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccCFFE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD02E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD0D8.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD174.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD1F1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD201.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD202.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD339.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD451.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD461.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD471.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD490.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD4CE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD589.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD599.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD5F7.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD606.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD645.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD673.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD684.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD6D1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD72F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD7CB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD809.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD903.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD951.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD98F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD990.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDA89.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDA8A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDA98.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDB53.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDB63.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDC2E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDCF9.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDD27.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDD48.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDDA4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDE31.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccDE40.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE062.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE0EF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE1C9.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE255.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE275.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE2A3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE2B3.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE320.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE321.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE342.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE3AD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE3BC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE3CC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE3EB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE497.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE4C5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE4D5.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE63C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE699.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE6B9.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE795.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE84E.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE909.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE967.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccE9D4.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEA03.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEB3B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEB5A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEB6B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEBF6.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEC35.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEC37.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccECB1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccECE0.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccED1F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccED6D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEDAE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEDBB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEE1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEE95.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEE96.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEF1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEFBD.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccEFFE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF01B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF02B.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF02C.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF1EF.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF22D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF411.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF681.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF6FE.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF867.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF8C2.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF8F1.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF920.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF98D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF99D.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF9BC.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFB03.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFBB.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFC99.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFD06.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFD54.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFE0F.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFEDA.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFF19.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFF1A.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFF95.tmp
c:\users\Andy\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFFA.tmp
c:\users\Andy\AppData\Roaming\verison.dll
c:\users\Andy\GoToAssistDownloadHelper.exe
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc11FD.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc1B40.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc322A.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc36DB.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc370A.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3B6D.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3C09.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc3C66.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc406C.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc48C5.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5310.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5A04.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc5CA3.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc76F6.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8087.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc81A0.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc820D.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8C89.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc8F18.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mcc9964.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA44D.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA621.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccA823.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccAA26.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccB55D.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccBF99.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC19C.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC2E4.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccC709.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD1C2.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD348.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccD5B.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF578.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccF9CB.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFC4C.tmp
c:\users\julietwise\AppData\Local\Microsoft\Windows\Temporary Internet Files\mccFF57.tmp
c:\windows\system32\drivers\2cef70e987504526.sys
c:\windows\system32\drivers\e1e6032.sys
.
.
(((((((((((((((((((((((((((((((((((((((   Drivers/Services   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_pcCMService
-------\Legacy_2cef70e987504526
-------\Service_2cef70e987504526
-------\Service_e1express
.
.
(((((((((((((((((((((((((   Files Created from 2013-12-28 to 2014-01-28  )))))))))))))))))))))))))))))))
.
.
2014-01-28 09:31 . 2014-01-28 09:35 -------- d-----w- c:\users\Andy\AppData\Local\temp
2014-01-28 09:31 . 2014-01-28 09:31 -------- d-----w- c:\users\julietwise\AppData\Local\temp
2014-01-27 12:01 . 2013-09-23 13:48 147912 ----a-w- c:\windows\system32\drivers\HipShieldK.sys
2014-01-27 11:59 . 2014-01-27 11:59 -------- d-----w- c:\users\Andy\AppData\Roaming\CyberLink
2014-01-27 09:55 . 2014-01-27 09:55 -------- d-----w- c:\windows\ERUNT
2014-01-27 09:29 . 2014-01-27 09:34 -------- d-----w- C:\AdwCleaner
2014-01-18 09:19 . 2014-01-18 09:19 -------- d-----w- c:\users\Andy\AppData\Roaming\Malwarebytes
2014-01-18 09:19 . 2014-01-18 09:19 -------- d-----w- c:\programdata\Malwarebytes
2014-01-18 09:19 . 2014-01-18 09:19 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2014-01-18 09:19 . 2013-04-04 14:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-01-16 19:51 . 2014-01-28 09:06 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2014-01-16 19:51 . 2014-01-28 09:06 -------- d-----w- c:\program files\Spybot - Search & Destroy
2014-01-06 19:23 . 2014-01-06 19:23 4558848 ----a-w- c:\windows\system32\GPhotos.scr
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-12-05 17:29 . 2013-12-05 17:29 60920 ----a-w- c:\windows\system32\drivers\cfwids.sys
2013-12-05 17:22 . 2011-11-28 14:17 213392 ----a-w- c:\windows\system32\drivers\mfewfpk.sys
2013-12-05 17:21 . 2011-11-28 14:09 174488 ----a-w- c:\windows\system32\mfevtps.exe
2013-12-05 17:16 . 2011-03-13 11:20 572688 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2013-12-05 17:14 . 2013-12-05 17:14 365416 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2013-12-05 17:14 . 2013-12-05 17:14 65928 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2013-12-05 17:13 . 2011-11-28 14:17 236000 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2013-12-05 17:12 . 2013-12-05 17:12 133992 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2013-11-26 22:06 . 2013-11-26 22:06 10152 ----a-w- c:\windows\system32\drivers\mfeclnrk.sys
2013-11-26 22:06 . 2013-11-26 22:06 80752 ----a-w- c:\windows\system32\drivers\mfencrk.sys
2013-11-26 22:06 . 2013-11-26 22:06 319808 ----a-w- c:\windows\system32\drivers\mfencbdc.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-03-15 39408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ECenter"="c:\dell\E-Center\EULALauncher.exe" [2008-02-29 17920]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2008-05-04 167936]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-03-06 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-03-06 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-03-06 133656]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-03-21 174872]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2008-05-16 3444736]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-12-21 184320]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-10-29 249064]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\sttray.exe" [2007-11-12 405504]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-11-21 959904]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2013-03-24 2011824]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2013-09-24 516912]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-11-01 59240]
"mcpltui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2013-09-24 516912]
.
c:\users\julietwise\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Dell Dock.lnk - c:\program files\Dell\DellDock\DellDock.exe [2008-5-13 1058088]
.
c:\users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Dell Dock First Run.lnk - c:\program files\Dell\DellDock\DellDock.exe /firstrun [2008-5-13 1058088]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2011-11-28 13:45 13672 ----a-w- c:\program files\Citrix\GoToAssist\599\g2awinlogon.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux1"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcpltsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ    PLA DPS BFE mpssvc
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-01-16 20:00 1211672 ----a-w- c:\program files\Google\Chrome\Application\32.0.1700.76\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-01-28 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-03-15 15:34]
.
2014-01-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-03-15 15:34]
.
.
------- Supplementary Scan -------
.


uInternet Settings,ProxyOverride = *.local


IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.254
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-DellSupportCenter - c:\program files\Dell Support Center\bin\sprtcmd.exe
HKLM-Run-DellSupportCenter - c:\program files\Dell Support Center\bin\sprtcmd.exe
HKLM-Run-ArcSoft Connection Service - c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-01-28 09:35
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(6036)
c:\program files\Dell\MediaDirect\Kernel\Video\CLM2Splter.ax
c:\program files\Dell\MediaDirect\Kernel\Movie\CLVSD.ax
c:\windows\system32\igfxexps.dll
c:\program files\Dell\MediaDirect\Kernel\Video\CLImageVSD.ax
c:\program files\Dell\MediaDirect\Kernel\Video\CLM1Splter.ax
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Dell\DellDock\DockLogin.exe
c:\windows\System32\WLTRYSVC.EXE
c:\windows\System32\bcmwltry.exe
c:\windows\system32\WLANExt.exe
c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\windows\system32\aestsrv.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\windows\System32\bgsvcgen.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\BT Broadband Desktop Help\btbb\MA\8.3.1.7.bt.1.3\ma\bin\MAHostService.exe
c:\program files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
c:\program files\BT Broadband Desktop Help\btbb\MA\8.3.1.7.bt.1.3\ma\bin\node.exe
c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\system32\mfevtps.exe
c:\windows\system32\rundll32.exe
c:\windows\system32\STacSV.exe
c:\windows\system32\DRIVERS\xaudio.exe
c:\program files\McAfee\MSC\McAPExe.exe
c:\program files\Common Files\McAfee\AMCore\mcshield.exe
c:\program files\Common Files\McAfee\SystemCore\mfefire.exe
c:\program files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Common Files\McAfee\Platform\mcuicnt.exe
c:\program files\DellTPad\ApMsgFwd.exe
c:\program files\DellTPad\Apntex.exe
c:\program files\DellTPad\HidFind.exe
c:\windows\servicing\TrustedInstaller.exe
.
**************************************************************************
.
Completion time: 2014-01-28  09:49:12 - machine was rebooted
ComboFix-quarantined-files.txt  2014-01-28 09:48
.
Pre-Run: 37,158,084,608 bytes free
Post-Run: 36,851,712,000 bytes free
.
- - End Of File - - 2F36D2F9D0FA3EF6AF0BB7499DB29C3D
5C616939100B85E558DA92B899A0FC36
---------------------------------------------------------------------------------------------------------------------------------

 

Before scanning, I couldn't persuade the (dreadful!) BT NetProtect software to close, though I could disable the real-time scanning. The firewall said it was active but when I checked the settings it was not on. (I tried to turn it on but it turned off again instantly, and said it was on bu was not.) BT uses a non-standard McAfee version which does not have de-activation options like normal.

 

Also, it was easier to uninstall Spybot than to disable everything.

 

I had to see if Windows Update would work which meant running it. (It's got nearly half a gig to download & install!) So far it looks fine, but I think Windows security features and McAfee are tripping over each other. I would like to uninstall the McAfee/BT stuff but its not my PC (and he's paid for the McAfee subscription).

 

Anyway, Windows has been updating for nearly an hour and is going well so far. Again, I can't thank you enough Gringo - you've been such a great help. I'll let you know this afternoon how it's progressing.

 

Thank you so much & God bless,

 

Chris

Link to post
Share on other sites

I've got all the MS updates installed now, everything worked as it should and auto-update is operating fine too. (Hurrah!)

 

The only slight glitch is that McAfee SiteAdvisor indicator tab stays greyed-out, it does not turn green (or whatever). I've clicked the site report button which correctly identifies & rates sites, just the tab on the top-left of screen remains grey when it should be green. (It's still doing it's job & the computer connects to the McAfee server, but it just does not change colour.)

 

At the moment, I've disabled real time scanning in Windows Defender just because it's simpler. McAfee has the anti-virus, firewall & real time scanning running fine now. Is it good practice to run both of these at the same time?

 

Anyway, we're really cooking with gas now (as they say around here) - and it wouldn't be happening without your generous expertise so a big thank you once again Gringo.

 

See you tomorrow,

 

Cheers,

 

Chris

Link to post
Share on other sites

  • Staff

Hello Chris

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe

CFScriptB-4.gif

This will let ComboFix run again.

Restart if you have to.

Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
Link to post
Share on other sites

Thanks Gringo, the ComboFix log is below.

 

When I dragged the script onto ComboFix it did not work as mentioned, I got a dialogue offering 'Run with...' or cancel (nothing else). I ran with... It didn't offer a progress bar or anything, it just launched ComboxFix. Also, I hadn't noticed that Windows Update had downloaded stuff and was ready to go (on reboot, I think). Anyway, I hope that doesn't mess anything up.

 

I note your script related to Java - when I re-enabled the firewall I was asked if I wanted to let 'Evented I/O for V8 JavaScript' through. I chose 'no' from force of habit. Was that correct?

 

Many, many thanks again Gringo,

 

Cheers,

 

Chris

 

ComboFix 14-01-27.02 - Andy 29/01/2014   8:57.2.2 - x86
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.44.1033.18.2037.824 [GMT 0:00]
Running from: c:\users\Andy\Desktop\Malware Logs & Programs\ComboFix.exe
Command switches used :: c:\users\Andy\Desktop\Malware Logs & Programs\CFScript.txt
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {ADA629C7-7F48-5689-624A-3B76997E0892}
FW: McAfee Firewall *Disabled* {959DA8E2-3527-57D1-4915-924367AD4FE9}
SP: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {16C7C823-5972-5907-58FA-0004E2F9422F}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\Installer\{A31BD149-2620-FFD0-2875-C11D0838DC98}\syshost.exe
.
.
(((((((((((((((((((((((((   Files Created from 2013-12-28 to 2014-01-29  )))))))))))))))))))))))))))))))
.
.
2014-01-29 09:09 . 2014-01-29 09:09 -------- d-----w- c:\users\Andy\AppData\Local\temp
2014-01-29 09:09 . 2014-01-29 09:09 -------- d-----w- c:\users\julietwise\AppData\Local\temp
2014-01-29 09:09 . 2014-01-29 09:09 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-01-28 14:06 . 2014-01-28 14:15 -------- d-----w- c:\program files\Spybot - Search & Destroy 2
2014-01-28 13:23 . 2014-01-28 13:23 -------- d-----w- c:\windows\Migration
2014-01-28 12:46 . 2013-12-16 01:54 7760024 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{81B5D3C0-11F3-41B5-8AD9-856FBF907E37}\mpengine.dll
2014-01-28 11:21 . 2014-01-28 11:24 -------- d-----w- c:\windows\system32\MRT
2014-01-28 11:00 . 2012-07-26 02:46 9728 ----a-w- c:\windows\system32\Wdfres.dll
2014-01-28 11:00 . 2012-07-26 02:32 155136 ----a-w- c:\windows\system32\drivers\WUDFRd.sys
2014-01-28 11:00 . 2012-07-26 02:33 66560 ----a-w- c:\windows\system32\drivers\WUDFPf.sys
2014-01-28 11:00 . 2009-07-14 12:12 16896 ----a-w- c:\windows\system32\winusb.dll
2014-01-28 11:00 . 2012-07-26 03:20 73216 ----a-w- c:\windows\system32\WUDFSvc.dll
2014-01-28 11:00 . 2012-07-26 03:20 172032 ----a-w- c:\windows\system32\WUDFPlatform.dll
2014-01-28 10:59 . 2012-07-26 03:39 47720 ----a-w- c:\windows\system32\drivers\WdfLdr.sys
2014-01-28 10:59 . 2012-07-26 03:20 38912 ----a-w- c:\windows\system32\WUDFCoinstaller.dll
2014-01-28 10:59 . 2012-07-26 03:21 196608 ----a-w- c:\windows\system32\WUDFHost.exe
2014-01-28 10:59 . 2012-07-26 03:20 613888 ----a-w- c:\windows\system32\WUDFx.dll
2014-01-28 10:45 . 2013-08-27 01:52 1172480 ----a-w- c:\windows\system32\d3d10warp.dll
2014-01-28 10:45 . 2013-08-27 01:50 486400 ----a-w- c:\windows\system32\d3d10level9.dll
2014-01-28 10:45 . 2013-08-27 02:47 219648 ----a-w- c:\windows\system32\d3d10_1core.dll
2014-01-28 10:45 . 2013-08-27 02:47 189952 ----a-w- c:\windows\system32\d3d10core.dll
2014-01-28 10:45 . 2013-08-27 02:47 160768 ----a-w- c:\windows\system32\d3d10_1.dll
2014-01-28 10:45 . 2013-08-27 02:47 1029120 ----a-w- c:\windows\system32\d3d10.dll
2014-01-28 10:45 . 2013-08-27 01:32 683008 ----a-w- c:\windows\system32\d2d1.dll
2014-01-28 10:45 . 2013-08-27 01:28 1069056 ----a-w- c:\windows\system32\DWrite.dll
2014-01-28 10:45 . 2013-08-27 01:28 798208 ----a-w- c:\windows\system32\FntCache.dll
2014-01-28 10:45 . 2012-05-11 15:57 623616 ----a-w- c:\windows\system32\localspl.dll
2014-01-28 10:44 . 2012-03-01 11:01 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2014-01-28 10:41 . 2012-11-08 03:48 1314816 ----a-w- c:\windows\system32\quartz.dll
2014-01-28 10:39 . 2013-07-10 09:47 783360 ----a-w- c:\windows\system32\rpcrt4.dll
2014-01-28 10:39 . 2013-10-03 12:45 993792 ----a-w- c:\windows\system32\crypt32.dll
2014-01-28 10:39 . 2013-07-05 03:20 914880 ----a-w- c:\windows\system32\drivers\tcpip.sys
2014-01-28 10:39 . 2013-07-05 01:43 31232 ----a-w- c:\windows\system32\drivers\tcpipreg.sys
2014-01-28 10:39 . 2013-06-26 23:01 527064 ----a-w- c:\windows\system32\drivers\Wdf01000.sys
2014-01-28 10:39 . 2013-07-17 19:41 2048 ----a-w- c:\windows\system32\tzres.dll
2014-01-28 10:39 . 2013-10-11 02:08 444928 ----a-w- c:\windows\system32\IKEEXT.DLL
2014-01-28 10:39 . 2013-10-11 02:07 596480 ----a-w- c:\windows\system32\FWPUCLNT.DLL
2014-01-28 10:37 . 2013-07-20 10:44 102608 ----a-w- c:\windows\system32\PresentationCFFRasterizerNative_v0300.dll
2014-01-28 10:35 . 2013-07-08 04:20 172544 ----a-w- c:\windows\system32\wintrust.dll
2014-01-28 10:35 . 2013-07-08 04:16 98304 ----a-w- c:\windows\system32\cryptnet.dll
2014-01-28 10:35 . 2013-07-08 04:16 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2014-01-27 12:01 . 2013-09-23 13:48 147912 ----a-w- c:\windows\system32\drivers\HipShieldK.sys
2014-01-27 11:59 . 2014-01-27 11:59 -------- d-----w- c:\users\Andy\AppData\Roaming\CyberLink
2014-01-27 09:55 . 2014-01-27 09:55 -------- d-----w- c:\windows\ERUNT
2014-01-27 09:29 . 2014-01-27 09:34 -------- d-----w- C:\AdwCleaner
2014-01-18 09:19 . 2014-01-18 09:19 -------- d-----w- c:\users\Andy\AppData\Roaming\Malwarebytes
2014-01-18 09:19 . 2014-01-18 09:19 -------- d-----w- c:\programdata\Malwarebytes
2014-01-18 09:19 . 2014-01-18 09:19 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2014-01-18 09:19 . 2013-04-04 14:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-01-16 19:51 . 2014-01-28 14:10 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2014-01-16 19:51 . 2014-01-28 09:06 -------- d-----w- c:\program files\Spybot - Search & Destroy
2014-01-06 19:23 . 2014-01-06 19:23 4558848 ----a-w- c:\windows\system32\GPhotos.scr
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-01-16 09:59 . 2011-03-15 12:51 231584 ------w- c:\windows\system32\MpSigStub.exe
2013-12-05 17:29 . 2013-12-05 17:29 60920 ----a-w- c:\windows\system32\drivers\cfwids.sys
2013-12-05 17:22 . 2011-11-28 14:17 213392 ----a-w- c:\windows\system32\drivers\mfewfpk.sys
2013-12-05 17:21 . 2011-11-28 14:09 174488 ----a-w- c:\windows\system32\mfevtps.exe
2013-12-05 17:16 . 2011-03-13 11:20 572688 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2013-12-05 17:14 . 2013-12-05 17:14 365416 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2013-12-05 17:14 . 2013-12-05 17:14 65928 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2013-12-05 17:13 . 2011-11-28 14:17 236000 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2013-12-05 17:12 . 2013-12-05 17:12 133992 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2013-11-26 22:06 . 2013-11-26 22:06 10152 ----a-w- c:\windows\system32\drivers\mfeclnrk.sys
2013-11-26 22:06 . 2013-11-26 22:06 80752 ----a-w- c:\windows\system32\drivers\mfencrk.sys
2013-11-26 22:06 . 2013-11-26 22:06 319808 ----a-w- c:\windows\system32\drivers\mfencbdc.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-03-15 39408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ECenter"="c:\dell\E-Center\EULALauncher.exe" [2008-02-29 17920]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2008-05-04 167936]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-03-06 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-03-06 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-03-06 133656]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-03-21 174872]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2008-05-16 3444736]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-12-21 184320]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-10-29 249064]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-11-21 959904]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2013-03-24 2011824]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2013-09-24 516912]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-11-01 59240]
"mcpltui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2013-09-24 516912]
"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\sttray.exe" [2007-11-12 405504]
.
c:\users\julietwise\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Dell Dock.lnk - c:\program files\Dell\DellDock\DellDock.exe [2008-5-13 1058088]
.
c:\users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Dell Dock First Run.lnk - c:\program files\Dell\DellDock\DellDock.exe /firstrun [2008-5-13 1058088]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2011-11-28 13:45 13672 ----a-w- c:\program files\Citrix\GoToAssist\599\g2awinlogon.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ    autocheck autochk *\0\0sdnclean.exe
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcpltsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
S2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\aestsrv.exe [2007-11-12 73728]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ    PLA DPS BFE mpssvc
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-01-16 20:00 1211672 ----a-w- c:\program files\Google\Chrome\Application\32.0.1700.76\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-01-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-03-15 15:34]
.
2014-01-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-03-15 15:34]
.
.
------- Supplementary Scan -------
.


uInternet Settings,ProxyOverride = *.local


IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.254
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-WudfPf
SafeBoot-WudfRd
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-01-29 09:09
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-01-29  09:12:50
ComboFix-quarantined-files.txt  2014-01-29 09:12
ComboFix2.txt  2014-01-28 09:49
.
Pre-Run: 32,183,156,736 bytes free
Post-Run: 32,078,049,280 bytes free
.
- - End Of File - - 25281A7B186FC3DBDE9A7B9B489BE7EF
5C616939100B85E558DA92B899A0FC36

Link to post
Share on other sites

  • Staff

Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)

  • Programs to remove
    • Adobe Reader X (10.1.1)

      DealPly

      Java™ 6 Update 24

      Java™ 6 Update 5

  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
.

Update Adobe reader

  • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html

    After installing the latest Adobe Reader, uninstall all previous versions.

    If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

    • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

      Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

Install Java:

Please go here to install Java

  • click on the Free Java Download Button
  • click on Agree and start Free download
  • click on Run
  • click on run again
  • click on install
  • when install is complete click on close
Clean Out Temp Files
  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here CCleaner

    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
    • Click Run Cleaner.
    • Close CCleaner.
: Malwarebytes' Anti-Malware :

I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now

  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Download HijackThis

  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic
"information and logs"
  • In your next post I need the following
    • Log From MBAM
    • report from Hijackthis
    • let me know of any problems you may have had
    • How is the computer doing now?
Gringo
Link to post
Share on other sites

Morning Gringo - many thanks again, and sorry for the slight delay. I had wild time with this lot! Logs below.

 

Adobe Reader unintstall & reinstall went fine (was actually v10.1.9 and is updated to this again). DealPly did not show. Java update 24 was okay, update 6 was bonkers! I had to manually select 500+ files (reg keys, from memory) - took ages. Revo seems like a good program though - I've never heard of it before.

 

CCleaner deleted a huge amount from temp files - I could hardly believe it. Malwarebytes found four (4!) instances of 'PUP.Optional.DealPly.A'. How on earth is that possible? Anyway, it says it's all deleted, so that's good. All in all, this is turning into a right marathon. I'd never get near the finish line without your help Gringo - so many thanks once again.

 

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2014.01.30.07

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Andy :: ANDY-PC [administrator]

30/01/2014 20:58:23
mbam-log-2014-01-30 (20-58-23).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 229960
Time elapsed: 13 minute(s), 39 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 2
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly (PUP.Optional.DealPly.A) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly\UpdateProc (PUP.Optional.DealPly.A) -> Quarantined and deleted successfully.

Files Detected: 2
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly\UpdateProc\config.dat (PUP.Optional.DealPly.A) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly\UpdateProc\UpdateTask.exe (PUP.Optional.DealPly.A) -> Quarantined and deleted successfully.

(end)

 

----------------------------------------------------------------------------------------------------------------------------------------------------

 

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 09:34:07, on 31/01/2014
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16526)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\DellTPad\Apoint.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
C:\Windows\System32\WLTRAY.EXE
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Dell\MediaDirect\PCMService.exe
C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe
C:\Program Files\Sigmatel\C-Major Audio\WDM\sttray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\Common Files\McAfee\Platform\mcuicnt.exe
C:\Program Files\DellTPad\Apntex.exe
C:\Users\Andy\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O2 - BHO: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: McAfee SiteAdvisor BHO - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll
O3 - Toolbar: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [ECenter] C:\Dell\E-Center\EULALauncher.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\DellTPad\Apoint.exe
O4 - HKLM\..\Run: [igfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [iAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe"
O4 - HKLM\..\Run: [broadcom Wireless Manager UI] C:\Windows\system32\WLTRAY.exe
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\MediaDirect\PCMService.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [btbb_McciTrayApp] "C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe"
O4 - HKLM\..\Run: [mcui_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
O4 - HKLM\..\Run: [mcpltui_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
O4 - HKLM\..\Run: [sigmatelSysTrayApp] %ProgramFiles%\SigmaTel\C-Major Audio\WDM\sttray.exe
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - .DEFAULT User Startup: Dell Dock First Run.lnk = C:\Program Files\Dell\DellDock\DellDock.exe (User 'Default user')


O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre7\bin\jp2iexp.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre7\bin\jp2iexp.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O18 - Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\PROGRA~1\mcafee\msc\mcsniepl.dll
O20 - Winlogon Notify: GoToAssist - C:\Program Files\Citrix\GoToAssist\599\G2AWinLogon.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - Unknown owner - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe (file missing)
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Andrea ST Filters Service (AESTFilters) - Andrea Electronics Corporation - C:\Windows\system32\aestsrv.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: B's Recorder GOLD Library General Service (bgsvcgen) - B.H.A Corporation - C:\Windows\System32\bgsvcgen.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: BT Help Wizard - Alcatel-Lucent - C:\Program Files\BT Broadband Desktop Help\btbb\MA\8.3.1.7.bt.1.3\ma\bin\MAHostService.exe
O23 - Service: Dock Login Service (DockLoginService) - Stardock Corporation - C:\Program Files\Dell\DellDock\DockLogin.exe
O23 - Service: GoToAssist - Citrix Online, a division of Citrix Systems, Inc. - C:\Program Files\Citrix\GoToAssist\599\g2aservice.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: HcwDevCentralService - Hauppauge Computer Works, Inc. - C:\PROGRA~1\HAUPPA~1\DEVICE~1\HCWDEV~1.EXE
O23 - Service: McAfee Home Network (HomeNetSvc) - McAfee, Inc. - C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe
O23 - Service: Intel® Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
O23 - Service: McAfee SiteAdvisor Service - McAfee, Inc. - C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
O23 - Service: McAfee AP Service (McAPExe) - McAfee, Inc. - C:\Program Files\McAfee\MSC\McAPExe.exe
O23 - Service: McAfee Personal Firewall Service (McMPFSvc) - McAfee, Inc. - C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee VirusScan Announcer (McNaiAnn) - McAfee, Inc. - C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan\mcods.exe
O23 - Service: McAfee Platform Services (mcpltsvc) - McAfee, Inc. - C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee Anti-Malware Core (mfecore) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\AMCore\mcshield.exe
O23 - Service: McAfee Firewall Core Service (mfefire) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe
O23 - Service: McAfee Validation Trust Protection Service (mfevtp) - McAfee, Inc. - C:\Windows\system32\mfevtps.exe
O23 - Service: SupportSoft Sprocket Service (dellsupportcenter) (sprtsvc_dellsupportcenter) - Unknown owner - C:\Program Files\Dell Support Center\bin\sprtsvc.exe (file missing)
O23 - Service: SigmaTel Audio Service (STacSV) - IDT, Inc. - C:\Windows\system32\STacSV.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\Windows\System32\WLTRYSVC.EXE
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 9254 bytes

 

------------------------------------------------------------------------------------------------------------------------------------------------------

 

Thanks again for looking at this Gringo,

 

Cheers,

 

Chris

Link to post
Share on other sites

I forgot to say that the laptop seems to be running fine now. I uninstalled Google Chrome, if only because on scan showed a problem file. The McAfee SiteAdvisor function in IE is doing its thing properly too. (Windows Defender will not run - it shows an error - but it's not missed as McAfee is working. Unless you say, I was just going to leave it.)

 

Cheers,

 

Chris

Link to post
Share on other sites

  • Staff

Greetings

McAfee turns off defender so that is OK

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional

These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis (rightclick and run as admin)
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):
    • O4 - HKLM\..\Run: [ECenter] C:\Dell\E-Center\EULALauncher.exe

      O4 - HKLM\..\Run: [igfxTray] C:\Windows\system32\igfxtray.exe

      O4 - HKLM\..\Run: [iAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe"

      O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\MediaDirect\PCMService.exe"

      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

      O4 - HKLM\..\Run: [btbb_McciTrayApp] "C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe"

      O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"

      O4 - HKLM\..\Run: [sigmatelSysTrayApp] %ProgramFiles%\SigmaTel\C-Major Audio\WDM\sttray.exe

      O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"

      O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"

      O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"

      O4 - .DEFAULT User Startup: Dell Dock First Run.lnk = C:\Program Files\Dell\DellDock\DellDock.exe (User 'Default user')

  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    • NOTE**You can research each of those lines >here< and see if you want to keep them or not

      just copy the name between the brackets and paste into the search space

      O4 - HKLM\..\Run: [IntelliPoint]

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the add/on to be installed
    • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings, ensure the options
    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • wait for the virus definitions to be downloaded
  • Wait for the scan to finish
When the scan is complete
  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found
  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here
Gringo
Link to post
Share on other sites

Unbelievable! 10 infections, four more DealPly plus trojans & worms. (No idea what the difference is.) I note all these are in 'quarantine' folders except the DealPly/Bagle which is connected with Spybot (no longer installed). I'm hoping these files are safely stored, but I dont' understand why they haven't been deleted. Also, what is Qoobox? I did not install that.

 

This is so insane I'm forced to wonder if this laptop will ever be safe. I'm thinking of these options:

 

Factory re-install

Throw the laptop away

Beat my mate with a stick

 

I may do all of these...

 

Just in case, the log is below:

 

C:\AdwCleaner\Quarantine\C\Program Files\DealPly\DealPlyIE.dll.vir a variant of Win32/DealPly.A application
C:\AdwCleaner\Quarantine\C\Program Files\DealPly\DealPlyUpdate.exe.vir Win32/DealPly.D application
C:\AdwCleaner\Quarantine\C\Program Files\DealPly\DealPlyUpdateRun.exe.vir Win32/DealPly.C application
C:\AdwCleaner\Quarantine\C\Program Files\DealPly\uninst.exe.vir Win32/DealPly.D application
C:\AdwCleaner\Quarantine\C\Users\Andy\AppData\Roaming\DealPly\UpdateProc\UpdateTask.exe.vir Win32/DealPly.B application
C:\ProgramData\Spybot - Search & Destroy\Recovery\DealPly13.zip Win32/Bagle.gen.zip worm
C:\Qoobox\Quarantine\C\Users\Andy\AppData\Roaming\verison.dll.vir Win32/Redyms.AF trojan
C:\Qoobox\Quarantine\C\Windows\Installer\{A31BD149-2620-FFD0-2875-C11D0838DC98}\syshost.exe.vir a variant of Win32/Kryptik.BTAO trojan
C:\Qoobox\Quarantine\C\Windows\System32\drivers\2cef70e987504526.sys.vir a variant of Win32/Rootkit.Kryptik.XX trojan
C:\Users\All Users\Spybot - Search & Destroy\Recovery\DealPly13.zip Win32/Bagle.gen.zip worm

 

Many thanks again Gringo - I honestly don't know what I'd do without you. Whether he knows it or not, my best friend should be sooooooo grateful to you!

 

I'll be back on Monday morning,

 

Thank you once again Gringo,

 

Chris

Link to post
Share on other sites

  • Staff

Hello Chris

No you should not just delete it but I will remove it now

There are some minor things in your online scan that should be removed.

delete files

  • Copy all text in the code box (below)...to Notepad.

    @echo offrd /s /q "C:\AdwCleaner\"rd /s /q "C:\ProgramData\Spybot - Search & Destroy\Recovery\"rd /s /q "C:\Users\All Users\Spybot - Search & Destroy\Recovery\"del %0
  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"

    It should look like this: batfileicon.gif<--XPvista_bat_icon.png<--vista

  • Double click on delfile.bat to execute it.

    A black CMD window will flash, then disappear...this is normal.

  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.
The rest of the Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.

Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.

:Why we need to remove some of our tools:

  • Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wronge time can make the computer an expensive paper weight.

    They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.

    The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
    • The application window will appear
    • Click the Re-enable button to re-enable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger will now ask to reboot the machine - click OK.
    Your Emulation drivers are now re-enabled.
:Uninstall ComboFix:
  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • CF-Uninstall.png
:Remove the rest of our tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.

  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.

  • Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls

    CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner

    Malwarebytes' Anti-Malware The Gold standerd today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.

  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is

    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)

    Note** If you decide to install MSE you will need to uninstall your present Antivirus

:Security awareness:

It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article

Strong passwords: How to create and use them Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

As Java seems to get exploited on a daily basis I advise to disable java in your web browsers - How to disable java in your web browsers - Disable Java

The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internet

Here is some more reading for you from some of my collegesquoted from Tech Support Forum

Conclusion

There is no such thing as 'perfect security'. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Gringo

Link to post
Share on other sites

Thanks Gringo - the laptop is running fine now.

 

Having followed your instructions above, I note that AdwCleaner/Quarantine & Qoobox/BackEnv are still on the C drive. (The ComboFix removal reported that it could not find ComboFix - I must have deleted it manually, but I don't remember - I'm very sorry!)

 

Also, Spybot still has a few folders in Program Files & Program Data, including a log folder, TeaTimer, .dll & config. files. These do not show up in Revo so I can't uninstal them.

 

Unless you specify otherwise, I'll manually delete these later in the week. You've been a huge help here Gringo - your generosity is greatly appreciated.

 

A top result! Thank you so much for your time Gringo (William).

 

Cheers,

 

Chris

Link to post
Share on other sites

Okay Gringo, thank you so much once again. I've returned the laptop to its home and it's now performing its duties perfectly. I've learned a lot and will put into practice some of your preventative anti-malware suggestions on our own laptops.

 

You've been a huge and most generous help so (we) thank you so very much.

 

God bless,

 

Chris

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.