Jump to content

Can't run malwarebytes


Recommended Posts

I have been getting really invasive popups so I tried running malwarebytes and it gives me this error. Here is the FRST.txt:

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 22-04-2014
Ran by Jason (administrator) on PIXEL on 21-04-2014 19:17:49
Running from C:\Users\Jason\Downloads
Windows 8 Pro (X64) OS Language: English(US)
Internet Explorer Version 10
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(AMD) C:\Windows\system32\atiesrxx.exe
(AMD) C:\Windows\system32\atieclxx.exe
() C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe
() C:\Windows\SysWOW64\PnkBstrA.exe
(Quiknowledge) C:\Program Files (x86)\Quiknowledge\Service\qksvc.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MsMpEng.exe
(Microsoft Corporation) C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.0.1114.318_x64__8wekyb3d8bbwe\LiveComm.exe
(Spotify Ltd) C:\Users\Jason\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe
(Advanced Micro Devices Inc.) J:\amdcatalyst\ATI.ACE\Core-Static\MOM.exe
(ATI Technologies Inc.) J:\amdcatalyst\ATI.ACE\Core-Static\CCC.exe
(Microsoft Corporation) C:\Windows\system32\msiexec.exe
(Conduit) C:\Program Files (x86)\SearchProtect\Main\bin\CltMngSvc.exe
(Conduit) C:\Program Files (x86)\SearchProtect\SearchProtect\bin\cltmng.exe
(Conduit) C:\Program Files (x86)\SearchProtect\UI\bin\cltmngui.exe
(APN LLC.) C:\Program Files (x86)\AskPartnerNetwork\Toolbar\apnmcp.exe
(APN) C:\Program Files (x86)\AskPartnerNetwork\Toolbar\Updater\TBNotifier.exe
(Mozilla Corporation) J:\firefox.exe
(Mozilla Corporation) J:\plugin-container.exe
(Adobe Systems, Inc.) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
(Adobe Systems, Inc.) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MpCmdRun.exe


==================== Registry (Whitelisted) ==================

HKLM-x32\...\Run: [sunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
HKLM-x32\...\Run: [startCCC] => J:\amdcatalyst\ATI.ACE\Core-Static\amd64\CLIStart.exe [766208 2013-12-06] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [ApnTBMon] => C:\Program Files (x86)\AskPartnerNetwork\Toolbar\Updater\TBNotifier.exe [1801168 2014-03-26] (APN)
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\Run: [OutfoxTV] => C:\Program Files\OutfoxTV\OutfoxTV\DesktopContainer.exe
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\Run: [spotify Web Helper] => C:\Users\Jason\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe [1171000 2014-04-09] (Spotify Ltd)
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {1c6b7410-bb43-11e2-be66-806e6f6e6963} - "D:\AUTOPLAY.EXE" id=10000017000024000001 ver=1.0.0.0
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {785e386b-b3dc-11e3-be6c-902b34dee62d} - "E:\Autorun.exe"
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {969333d1-742c-11e3-bec3-902b34dee62d} - "E:\VZW_Software_upgrade_assistant.exe"
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {de4ac8bf-9398-11e3-becb-902b34dee62d} - "E:\Autorun.exe"
AppInit_DLLs: C:\PROGRA~2\SearchProtect\SearchProtect\bin\SPVC64Loader.dll => C:\Program Files (x86)\SearchProtect\SearchProtect\bin\SPVC64Loader.dll [1355552 2014-04-08] (Conduit)
AppInit_DLLs-x32: C:\PROGRA~2\SearchProtect\SearchProtect\bin\SPVC32Loader.dll => C:\Program Files (x86)\SearchProtect\SearchProtect\bin\SPVC32Loader.dll [1050912 2014-04-08] (Conduit)

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://search.conduit.com/?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=55&CUI=&UM=5&UP=SPCB16EAAC-8E5C-450E-A518-32C63E2152F2&SSPV=&ISID=M40113B10-233F-4558-A9A4-08BEAC06B6BF
HKCU\Software\Microsoft\Internet Explorer\Main,Secondary Start Pages = http://search.conduit.com/?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=55&CUI=&UM=5&UP=SPCB16EAAC-8E5C-450E-A518-32C63E2152F2&SSPV=&ISID=M40113B10-233F-4558-A9A4-08BEAC06B6BF
http://search.conduit.com/?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=55&CUI=&UM=5&UP=SPCB16EAAC-8E5C-450E-A518-32C63E2152F2&SSPV=&ISID=M40113B10-233F-4558-A9A4-08BEAC06B6BF
SearchScopes: HKLM - {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL =
SearchScopes: HKCU - DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = http://search.conduit.com/Results.aspx?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=58&CUI=&UM=5&UP=SPCB16EAAC-8E5C-450E-A518-32C63E2152F2&q={searchTerms}&SSPV=&ISID=M40113B10-233F-4558-A9A4-08BEAC06B6BF
SearchScopes: HKCU - {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = http://search.conduit.com/Results.aspx?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=58&CUI=&UM=5&UP=SPCB16EAAC-8E5C-450E-A518-32C63E2152F2&q={searchTerms}&SSPV=&ISID=M40113B10-233F-4558-A9A4-08BEAC06B6BF
BHO: Quiknowledge - {323C6E6D-1621-470F-8A52-4FDEC4E75E40} - C:\Program Files\Quiknowledge\IE\QuiknowledgeClientIE.dll (Quiknowledge)
BHO-x32: Quiknowledge - {323C6E6D-1621-470F-8A52-4FDEC4E75E40} - C:\Program Files (x86)\Quiknowledge\IE\QuiknowledgeClientIE.dll (Quiknowledge)
BHO-x32: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.254

FireFox:
========
FF ProfilePath: C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317
FF user.js: detected! => C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\user.js

FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_12_0_0_77.dll ()
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_12_0_0_77.dll ()
FF Plugin-x32: @esn.me/esnsonar,version=0.70.4 - C:\Program Files (x86)\Battlelog Web Plugins\Sonar\0.70.4\npesnsonar.dll (ESN Social Software AB)
FF Plugin-x32: @esn/npbattlelog,version=2.3.2 - C:\Program Files (x86)\Battlelog Web Plugins\2.3.2\npbattlelog.dll (EA Digital Illusions CE AB)
FF Plugin-x32: @java.com/DTPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @videolan.org/vlc,version=2.1.3 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF SearchPlugin: C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\searchplugins\ask-search.xml
FF Extension: Ask Toolbar - C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\Extensions\toolbar_ORJ-V7C@apn.ask.com.xpi [2014-03-26]
FF Extension: Adblock Plus - C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2014-04-17]

==================== Services (Whitelisted) =================

R2 APNMCP; C:\Program Files (x86)\AskPartnerNetwork\Toolbar\apnmcp.exe [166352 2014-03-26] (APN LLC.)
R2 CltMngSvc; C:\Program Files (x86)\SearchProtect\Main\bin\CltMngSvc.exe [2470688 2014-04-08] (Conduit)
R2 PassThru Service; C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe [167424 2012-12-07] ()
R2 PnkBstrA; C:\Windows\SysWOW64\PnkBstrA.exe [76888 2014-03-29] ()
R2 qksvc; C:\Program Files (x86)\Quiknowledge\Service\qksvc.exe [273000 2014-02-05] (Quiknowledge)
R2 WinDefend; C:\Program Files\Windows Defender\MsMpEng.exe [16048 2013-10-25] (Microsoft Corporation)
S2 OutfoxTvService; C:\Program Files\OutfoxTV\OutfoxTvService.exe [X]

==================== Drivers (Whitelisted) ====================

S0 amdkmafd; C:\Windows\System32\drivers\amdkmafd.sys [21160 2012-09-22] (Advanced Micro Devices, Inc.)
R3 AtiHDAudioService; C:\Windows\system32\drivers\AtihdW86.sys [215040 2013-09-24] (Advanced Micro Devices)
S3 pbfilter; J:\PeerBlock\pbfilter.sys [22600 2014-01-14] ()
R1 qknfd; C:\Windows\System32\drivers\qknfd.sys [58256 2014-02-05] (Quiknowledge)
S3 SWDUMon; C:\Windows\system32\DRIVERS\SWDUMon.sys [16152 2014-03-24] ()

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-21 19:17 - 2014-04-21 19:17 - 02061312 _____ (Farbar) C:\Users\Jason\Downloads\FRST64.exe
2014-04-21 19:17 - 2014-04-21 19:17 - 00009191 _____ () C:\Users\Jason\Downloads\FRST.txt
2014-04-21 19:17 - 2014-04-21 19:17 - 00000000 ____D () C:\FRST
2014-04-21 19:14 - 2014-04-21 19:14 - 00000000 ____D () C:\ProgramData\AskPartnerNetwork
2014-04-21 19:14 - 2014-04-21 19:14 - 00000000 ____D () C:\ProgramData\APN
2014-04-21 19:14 - 2014-04-21 19:14 - 00000000 ____D () C:\Program Files (x86)\AskPartnerNetwork
2014-04-21 19:13 - 2014-04-21 19:13 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-21 19:12 - 2014-04-21 19:12 - 00004204 _____ () C:\Windows\SysWOW64\jupdate-1.7.0_55-b14.log
2014-04-20 23:01 - 2014-04-20 23:01 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Malwarebytes
2014-04-20 23:01 - 2014-04-20 23:01 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-17 21:16 - 2014-04-17 21:16 - 00218224 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397794575377
2014-04-17 21:07 - 2014-04-17 21:07 - 00218224 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397794021780
2014-04-17 14:46 - 2014-04-17 14:46 - 00000000 ____D () C:\Users\Jason\AppData\Local\PunkBuster
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\ProgramData\ATI
2014-04-17 14:39 - 2014-04-17 14:39 - 00054723 _____ () C:\Windows\SysWOW64\CCCInstall_201404171439289379.log
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\ProgramData\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files (x86)\AMD AVT
2014-04-17 14:38 - 2014-04-17 14:38 - 00000000 ____D () C:\Program Files\ATI
2014-04-17 14:32 - 2014-04-17 14:32 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\library_dir
2014-04-17 14:31 - 2014-04-21 19:14 - 00000000 ____D () C:\Program Files (x86)\Raptr
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer.exe
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer(1).exe
2014-04-17 14:19 - 2014-04-17 14:19 - 00282880 _____ (Mozilla) C:\Users\Jason\Downloads\Firefox Setup Stub 28.0.exe
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\ProgramData\Mozilla
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-04-17 14:18 - 2014-04-17 14:18 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data-1
2014-04-17 14:04 - 2014-04-17 14:04 - 00134742 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397768688818
2014-04-17 00:02 - 2014-04-17 00:02 - 00000897 _____ () C:\Users\Public\Desktop\Dead Space.lnk
2014-04-16 21:24 - 2014-04-16 22:44 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Winamp
2014-04-16 18:55 - 2014-04-16 18:55 - 03822704 _____ () C:\Users\Jason\Downloads\battlelog-web-plugins_2.3.2_133.exe
2014-04-16 18:55 - 2014-04-16 18:55 - 00000000 ____D () C:\Users\Jason\AppData\Local\ESN
2014-04-12 04:20 - 2014-02-03 16:56 - 00332632 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\storport.sys
2014-04-12 04:20 - 2014-02-03 16:56 - 00278872 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\msiscsi.sys
2014-04-12 04:20 - 2014-01-31 23:55 - 00041984 _____ (Microsoft Corporation) C:\Windows\system32\fveskybackup.dll
2014-04-12 04:20 - 2014-01-30 20:55 - 00209712 _____ (Microsoft Corporation) C:\Windows\system32\NotificationUI.exe
2014-04-12 04:20 - 2014-01-30 17:48 - 00564736 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WSShared.dll
2014-04-12 04:20 - 2014-01-30 17:48 - 00485888 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WSDApi.dll
2014-04-12 04:20 - 2014-01-30 17:48 - 00143872 _____ (Microsoft Corporation) C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll
2014-04-12 04:20 - 2014-01-30 17:48 - 00124928 _____ (Microsoft Corporation) C:\Windows\SysWOW64\Windows.ApplicationModel.Store.TestingFramework.dll
2014-04-12 04:20 - 2014-01-30 17:06 - 00690688 _____ (Microsoft Corporation) C:\Windows\system32\WSShared.dll
2014-04-12 04:20 - 2014-01-30 17:06 - 00599040 _____ (Microsoft Corporation) C:\Windows\system32\WSDApi.dll
2014-04-12 04:20 - 2014-01-30 17:06 - 00163840 _____ (Microsoft Corporation) C:\Windows\system32\Windows.ApplicationModel.Store.TestingFramework.dll
2014-04-12 04:20 - 2014-01-26 20:42 - 02232664 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\tcpip.sys
2014-04-12 04:20 - 2014-01-26 20:39 - 01939288 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ntfs.sys
2014-04-12 04:20 - 2014-01-26 17:52 - 17561088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\shell32.dll
2014-04-12 04:20 - 2014-01-26 17:31 - 19752448 _____ (Microsoft Corporation) C:\Windows\system32\shell32.dll
2014-04-12 04:20 - 2014-01-26 16:17 - 00386722 _____ () C:\Windows\system32\ApnDatabase.xml
2014-04-12 04:20 - 2014-01-15 16:42 - 00118784 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dfsc.sys
2014-04-12 04:20 - 2014-01-10 23:48 - 05979648 _____ (Microsoft Corporation) C:\Windows\system32\mstscax.dll
2014-04-12 04:20 - 2014-01-10 22:06 - 05092352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mstscax.dll
2014-04-12 04:20 - 2014-01-02 16:35 - 00365568 _____ (Microsoft Corporation) C:\Windows\SysWOW64\XpsGdiConverter.dll
2014-04-12 04:20 - 2014-01-02 16:32 - 00523264 _____ (Microsoft Corporation) C:\Windows\system32\XpsGdiConverter.dll
2014-04-12 04:19 - 2014-03-06 17:48 - 01766400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-04-12 04:19 - 2014-03-06 17:48 - 01140736 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 14357504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 13760512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 02877952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 02049536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 00493056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 00163840 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 19273216 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 15404544 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 03959808 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 02648576 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 02240000 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 01365504 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00915968 _____ (Microsoft Corporation) C:\Windows\system32\uxtheme.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00855552 _____ (Microsoft Corporation) C:\Windows\system32\jscript.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00603136 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00051712 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-04-12 04:19 - 2013-05-15 15:37 - 00044032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\UXInit.dll
2014-04-12 04:19 - 2013-05-15 15:35 - 00053760 _____ (Microsoft Corporation) C:\Windows\system32\UXInit.dll
2014-04-12 04:19 - 2013-05-14 06:14 - 02706432 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-04-12 04:19 - 2013-05-14 02:23 - 02706432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-04-12 04:19 - 2013-02-21 03:29 - 00109056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesysprep.dll
2014-04-12 04:19 - 2013-02-21 03:29 - 00061440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-04-12 04:19 - 2013-02-21 03:29 - 00039424 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-04-12 04:19 - 2013-02-21 03:29 - 00033280 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-04-12 04:19 - 2013-02-21 03:14 - 00136704 _____ (Microsoft Corporation) C:\Windows\system32\iesysprep.dll
2014-04-12 04:19 - 2013-02-21 03:14 - 00053248 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-04-12 04:19 - 2013-02-19 02:53 - 00534528 _____ (Microsoft Corporation) C:\Windows\SysWOW64\uxtheme.dll
2014-04-12 04:19 - 2012-11-07 21:20 - 00067072 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-04-12 04:19 - 2012-11-07 21:20 - 00039936 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-04-12 04:19 - 2012-07-25 20:06 - 00197120 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-04-11 15:58 - 2014-04-11 15:58 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data
2014-04-11 09:37 - 2014-04-12 22:15 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\.minecraft
2014-04-09 19:54 - 2014-04-09 19:56 - 00000000 ____D () C:\Users\Jason\Desktop\Danicas Phone backup
2014-04-09 09:55 - 2014-04-14 20:13 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-09 09:55 - 2014-04-14 20:05 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-09 09:55 - 2014-04-14 20:05 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-09 09:55 - 2014-04-14 20:04 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-09 09:55 - 2014-04-09 09:55 - 00000000 ____D () C:\ProgramData\Sun
2014-04-09 09:54 - 2014-04-21 19:12 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-09 09:53 - 2014-04-09 09:53 - 00921000 _____ (Oracle Corporation) C:\Users\Jason\Downloads\jxpiinstall.exe
2014-04-08 23:39 - 2014-02-05 16:41 - 01257984 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2014-04-08 23:39 - 2014-02-05 16:41 - 00978432 _____ (Microsoft Corporation) C:\Windows\system32\KernelBase.dll
2014-04-08 23:39 - 2014-02-05 16:26 - 00666112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\KernelBase.dll
2014-04-08 23:39 - 2014-02-05 16:19 - 00974848 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2014-04-08 19:24 - 2014-04-08 19:24 - 00000000 __RHD () C:\Users\Jason\AppData\Roaming\SecuROM
2014-04-03 22:37 - 2014-04-03 22:59 - 836566156 _____ () C:\Users\Jason\Downloads\Rick and Morty S01E05 Meeseeks and Destroy (1920x1080) [Phr0stY].mkv
2014-04-02 09:16 - 2014-04-02 09:16 - 00000000 ____H () C:\Windows\system32\Drivers\Msft_User_WpdFs_01_11_00.Wdf
2014-03-30 00:34 - 2014-03-30 00:34 - 00000000 ____D () C:\ProgramData\EA Core
2014-03-29 17:36 - 2014-04-20 20:56 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.exe
2014-03-29 17:36 - 2014-04-20 20:56 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.ex0
2014-03-29 17:36 - 2014-04-17 14:38 - 00000000 ____D () C:\ProgramData\Package Cache
2014-03-29 17:36 - 2014-04-17 14:08 - 00000000 ____D () C:\Program Files (x86)\Battlelog Web Plugins
2014-03-29 17:36 - 2014-03-29 17:36 - 00076888 _____ () C:\Windows\SysWOW64\PnkBstrA.exe
2014-03-29 17:36 - 2014-03-29 17:36 - 00000890 _____ () C:\Users\Public\Desktop\Battlefield 4.lnk
2014-03-29 17:36 - 2014-03-29 17:36 - 00000874 _____ () C:\Users\Public\Desktop\Battlefield 4(64 bit).lnk
2014-03-29 15:39 - 2014-03-29 15:39 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-03-29 15:39 - 2014-03-29 15:38 - 00447752 _____ (On2.com) C:\Windows\SysWOW64\vp6vfw.dll
2014-03-29 14:16 - 2014-04-16 18:58 - 00000000 ____D () C:\Users\Jason\AppData\Local\Origin
2014-03-29 14:16 - 2014-03-29 14:24 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Origin
2014-03-29 14:15 - 2014-04-16 18:57 - 00000000 ____D () C:\ProgramData\Electronic Arts
2014-03-29 14:15 - 2014-03-29 14:15 - 00000531 _____ () C:\Users\Public\Desktop\Origin.lnk
2014-03-29 14:14 - 2014-03-29 14:14 - 17009704 _____ (Electronic Arts, Inc.) C:\Users\Jason\Downloads\OriginThinSetup.exe
2014-03-29 13:37 - 2014-04-17 21:17 - 00000000 ____D () C:\ProgramData\Origin
2014-03-26 23:30 - 2014-03-26 23:30 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\dvdcss
2014-03-26 23:29 - 2014-03-26 23:29 - 00014836 _____ () C:\Windows\DPINST.LOG
2014-03-26 23:29 - 2014-03-26 23:29 - 00000000 ____D () C:\Program Files (x86)\HTC
2014-03-25 18:02 - 2014-03-25 18:02 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-03-24 08:46 - 2013-07-19 15:13 - 00124112 _____ (Microsoft Corporation) C:\Windows\system32\PresentationCFFRasterizerNative_v0300.dll
2014-03-24 08:46 - 2013-07-19 15:13 - 00102608 _____ (Microsoft Corporation) C:\Windows\SysWOW64\PresentationCFFRasterizerNative_v0300.dll
2014-03-24 00:00 - 2014-03-24 00:00 - 00000000 ____D () C:\Users\Jason\Documents\Optimizer Pro
2014-03-23 23:59 - 2014-04-17 14:21 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\uTorrent
2014-03-23 23:59 - 2014-03-23 23:59 - 01614416 _____ (BitTorrent Inc.) C:\Users\Jason\Downloads\uTorrent.exe
2014-03-23 23:59 - 2014-03-23 23:59 - 00000813 _____ () C:\Users\Jason\Desktop\µTorrent.lnk
2014-03-23 23:59 - 2014-03-23 23:59 - 00000793 _____ () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\µTorrent.lnk
2014-03-23 23:57 - 2014-03-23 23:57 - 00000218 _____ () C:\Users\Jason\AppData\Local\recently-used.xbel
2014-03-23 23:57 - 2014-03-23 23:57 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Python-Eggs
2014-03-23 23:57 - 2014-03-23 23:57 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\BitLord
2014-03-23 23:55 - 2014-03-25 18:03 - 00000000 ____D () C:\Program Files (x86)\Optimizer Pro
2014-03-23 23:55 - 2014-03-23 23:55 - 00000000 ____D () C:\Users\Jason\Documents\BitLord
2014-03-23 23:55 - 2014-03-23 23:55 - 00000000 ____D () C:\Program Files\Quiknowledge
2014-03-23 23:55 - 2014-03-23 23:55 - 00000000 ____D () C:\Program Files (x86)\Quiknowledge
2014-03-23 23:54 - 2014-03-23 23:54 - 00722416 _____ ( ) C:\Users\Jason\Downloads\BitlordSetup.exe
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files\Reference Assemblies
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files\MSBuild
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files (x86)\Reference Assemblies
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files (x86)\MSBuild
2014-03-23 23:42 - 2012-07-05 19:02 - 01166440 _____ (Microsoft Corporation) C:\Windows\system32\PresentationNative_v0300.dll
2014-03-23 23:42 - 2012-07-05 19:02 - 00778856 _____ (Microsoft Corporation) C:\Windows\SysWOW64\PresentationNative_v0300.dll
2014-03-23 23:42 - 2012-07-05 19:02 - 00035400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TsWpfWrp.exe
2014-03-23 23:42 - 2012-07-05 19:02 - 00035400 _____ (Microsoft Corporation) C:\Windows\system32\TsWpfWrp.exe
2014-03-23 23:41 - 2014-04-21 19:10 - 00000000 ____D () C:\Program Files (x86)\Jotzey
2014-03-23 23:41 - 2014-04-15 14:36 - 00000000 ____D () C:\Program Files (x86)\SearchProtect
2014-03-23 23:41 - 2014-03-25 18:02 - 00000000 ____D () C:\Program Files (x86)\DriverUpdate
2014-03-23 23:41 - 2014-03-24 22:16 - 00016152 _____ () C:\Windows\system32\Drivers\SWDUMon.sys
2014-03-23 23:41 - 2014-03-23 23:41 - 00000655 _____ () C:\Users\Jason\Desktop\PeerBlock.lnk
2014-03-23 23:41 - 2014-03-23 23:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\SlimWare Utilities Inc
2014-03-23 23:41 - 2014-03-23 23:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\SearchProtect
2014-03-23 23:41 - 2014-03-23 23:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\Downloaded Installers
2014-03-23 23:40 - 2014-03-23 23:40 - 00930952 _____ (CNET Download.com) C:\Users\Jason\Downloads\cbsidlm-cbsi183-PeerBlock-SEO-75328692.exe

==================== One Month Modified Files and Folders =======

2014-04-21 19:17 - 2014-04-21 19:17 - 02061312 _____ (Farbar) C:\Users\Jason\Downloads\FRST64.exe
2014-04-21 19:17 - 2014-04-21 19:17 - 00009191 _____ () C:\Users\Jason\Downloads\FRST.txt
2014-04-21 19:17 - 2014-04-21 19:17 - 00000000 ____D () C:\FRST
2014-04-21 19:15 - 2012-07-26 00:28 - 00848230 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-21 19:14 - 2014-04-21 19:14 - 00000000 ____D () C:\ProgramData\AskPartnerNetwork
2014-04-21 19:14 - 2014-04-21 19:14 - 00000000 ____D () C:\ProgramData\APN
2014-04-21 19:14 - 2014-04-21 19:14 - 00000000 ____D () C:\Program Files (x86)\AskPartnerNetwork
2014-04-21 19:14 - 2014-04-17 14:31 - 00000000 ____D () C:\Program Files (x86)\Raptr
2014-04-21 19:13 - 2014-04-21 19:13 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-21 19:12 - 2014-04-21 19:12 - 00004204 _____ () C:\Windows\SysWOW64\jupdate-1.7.0_55-b14.log
2014-04-21 19:12 - 2014-04-09 09:54 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-21 19:10 - 2014-03-23 23:41 - 00000000 ____D () C:\Program Files (x86)\Jotzey
2014-04-21 19:10 - 2014-03-13 20:25 - 00005070 _____ () C:\Windows\PFRO.log
2014-04-21 19:10 - 2012-07-26 00:22 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-21 19:10 - 2012-07-25 22:26 - 00262144 ___SH () C:\Windows\system32\config\BBI
2014-04-21 19:08 - 2014-03-13 20:26 - 01894361 _____ () C:\Windows\WindowsUpdate.log
2014-04-21 18:00 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\system32\sru
2014-04-20 23:01 - 2014-04-20 23:01 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Malwarebytes
2014-04-20 23:01 - 2014-04-20 23:01 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-20 21:37 - 2014-03-13 20:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\Mozilla
2014-04-20 20:56 - 2014-03-29 17:36 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.exe
2014-04-20 20:56 - 2014-03-29 17:36 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.ex0
2014-04-20 20:28 - 2014-03-13 21:27 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Spotify
2014-04-20 19:51 - 2014-03-16 00:04 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\vlc
2014-04-17 21:46 - 2014-03-13 21:28 - 00000000 ____D () C:\Users\Jason\AppData\Local\Spotify
2014-04-17 21:17 - 2014-03-29 13:37 - 00000000 ____D () C:\ProgramData\Origin
2014-04-17 21:16 - 2014-04-17 21:16 - 00218224 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397794575377
2014-04-17 21:07 - 2014-04-17 21:07 - 00218224 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397794021780
2014-04-17 14:46 - 2014-04-17 14:46 - 00000000 ____D () C:\Users\Jason\AppData\Local\PunkBuster
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\ProgramData\ATI
2014-04-17 14:39 - 2014-04-17 14:39 - 00054723 _____ () C:\Windows\SysWOW64\CCCInstall_201404171439289379.log
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\ProgramData\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files (x86)\AMD AVT
2014-04-17 14:39 - 2012-07-26 00:21 - 00023320 _____ () C:\Windows\setupact.log
2014-04-17 14:38 - 2014-04-17 14:38 - 00000000 ____D () C:\Program Files\ATI
2014-04-17 14:38 - 2014-03-29 17:36 - 00000000 ____D () C:\ProgramData\Package Cache
2014-04-17 14:32 - 2014-04-17 14:32 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\library_dir
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer.exe
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer(1).exe
2014-04-17 14:21 - 2014-03-23 23:59 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\uTorrent
2014-04-17 14:19 - 2014-04-17 14:19 - 00282880 _____ (Mozilla) C:\Users\Jason\Downloads\Firefox Setup Stub 28.0.exe
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\ProgramData\Mozilla
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-04-17 14:19 - 2013-06-03 18:13 - 00001151 _____ () C:\Users\Public\Desktop\Mozilla Firefox.lnk
2014-04-17 14:18 - 2014-04-17 14:18 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data-1
2014-04-17 14:08 - 2014-03-29 17:36 - 00000000 ____D () C:\Program Files (x86)\Battlelog Web Plugins
2014-04-17 14:04 - 2014-04-17 14:04 - 00134742 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397768688818
2014-04-17 01:07 - 2012-07-25 22:26 - 00262144 ___SH () C:\Windows\system32\config\ELAM
2014-04-17 00:02 - 2014-04-17 00:02 - 00000897 _____ () C:\Users\Public\Desktop\Dead Space.lnk
2014-04-17 00:01 - 2014-03-13 21:14 - 00045035 _____ () C:\Windows\DirectX.log
2014-04-16 22:44 - 2014-04-16 21:24 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Winamp
2014-04-16 18:58 - 2014-03-29 14:16 - 00000000 ____D () C:\Users\Jason\AppData\Local\Origin
2014-04-16 18:57 - 2014-03-29 14:15 - 00000000 ____D () C:\ProgramData\Electronic Arts
2014-04-16 18:55 - 2014-04-16 18:55 - 03822704 _____ () C:\Users\Jason\Downloads\battlelog-web-plugins_2.3.2_133.exe
2014-04-16 18:55 - 2014-04-16 18:55 - 00000000 ____D () C:\Users\Jason\AppData\Local\ESN
2014-04-15 16:12 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\rescache
2014-04-15 14:36 - 2014-03-23 23:41 - 00000000 ____D () C:\Program Files (x86)\SearchProtect
2014-04-15 14:31 - 2014-03-13 20:39 - 00000000 ___RD () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
2014-04-15 14:31 - 2014-03-13 20:39 - 00000000 ___RD () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools
2014-04-15 14:30 - 2012-07-26 01:12 - 00000000 ___RD () C:\Windows\ToastData
2014-04-15 14:30 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\WinStore
2014-04-14 20:13 - 2014-04-09 09:55 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-14 20:05 - 2014-04-09 09:55 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-14 20:05 - 2014-04-09 09:55 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-14 20:04 - 2014-04-09 09:55 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-12 22:15 - 2014-04-11 09:37 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\.minecraft
2014-04-11 15:58 - 2014-04-11 15:58 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data
2014-04-09 19:56 - 2014-04-09 19:54 - 00000000 ____D () C:\Users\Jason\Desktop\Danicas Phone backup
2014-04-09 09:55 - 2014-04-09 09:55 - 00000000 ____D () C:\ProgramData\Sun
2014-04-09 09:53 - 2014-04-09 09:53 - 00921000 _____ (Oracle Corporation) C:\Users\Jason\Downloads\jxpiinstall.exe
2014-04-09 03:00 - 2014-03-17 20:41 - 90655440 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-04-09 03:00 - 2014-03-17 20:41 - 00000000 ____D () C:\Windows\system32\MRT
2014-04-08 19:24 - 2014-04-08 19:24 - 00000000 __RHD () C:\Users\Jason\AppData\Roaming\SecuROM
2014-04-05 11:16 - 2014-03-13 20:45 - 00003600 _____ () C:\Windows\System32\Tasks\Optimize Start Menu Cache Files-S-1-5-21-1076075667-1471386052-3169907094-1001
2014-04-03 22:59 - 2014-04-03 22:37 - 836566156 _____ () C:\Users\Jason\Downloads\Rick and Morty S01E05 Meeseeks and Destroy (1920x1080) [Phr0stY].mkv
2014-04-02 09:16 - 2014-04-02 09:16 - 00000000 ____H () C:\Windows\system32\Drivers\Msft_User_WpdFs_01_11_00.Wdf
2014-03-31 23:13 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\AUInstallAgent
2014-03-31 14:18 - 2012-07-26 01:14 - 00694232 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-03-31 14:18 - 2012-07-26 01:14 - 00078296 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-03-30 00:34 - 2014-03-30 00:34 - 00000000 ____D () C:\ProgramData\EA Core
2014-03-29 17:36 - 2014-03-29 17:36 - 00076888 _____ () C:\Windows\SysWOW64\PnkBstrA.exe
2014-03-29 17:36 - 2014-03-29 17:36 - 00000890 _____ () C:\Users\Public\Desktop\Battlefield 4.lnk
2014-03-29 17:36 - 2014-03-29 17:36 - 00000874 _____ () C:\Users\Public\Desktop\Battlefield 4(64 bit).lnk
2014-03-29 15:39 - 2014-03-29 15:39 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-03-29 15:39 - 2013-08-18 23:11 - 00001182 _____ () C:\Users\Public\Desktop\The Sims™ 3.lnk
2014-03-29 15:38 - 2014-03-29 15:39 - 00447752 _____ (On2.com) C:\Windows\SysWOW64\vp6vfw.dll
2014-03-29 14:24 - 2014-03-29 14:16 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Origin
2014-03-29 14:15 - 2014-03-29 14:15 - 00000531 _____ () C:\Users\Public\Desktop\Origin.lnk
2014-03-29 14:15 - 2012-07-26 01:12 - 00000000 ____D () C:\Program Files\Common Files\microsoft shared
2014-03-29 14:14 - 2014-03-29 14:14 - 17009704 _____ (Electronic Arts, Inc.) C:\Users\Jason\Downloads\OriginThinSetup.exe
2014-03-26 23:30 - 2014-03-26 23:30 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\dvdcss
2014-03-26 23:29 - 2014-03-26 23:29 - 00014836 _____ () C:\Windows\DPINST.LOG
2014-03-26 23:29 - 2014-03-26 23:29 - 00000000 ____D () C:\Program Files (x86)\HTC
2014-03-25 19:17 - 2013-05-19 23:27 - 00001399 _____ () C:\Users\Jason\Desktop\.minecraft - Shortcut.lnk
2014-03-25 18:03 - 2014-03-23 23:55 - 00000000 ____D () C:\Program Files (x86)\Optimizer Pro
2014-03-25 18:02 - 2014-03-25 18:02 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-03-25 18:02 - 2014-03-23 23:41 - 00000000 ____D () C:\Program Files (x86)\DriverUpdate
2014-03-24 22:16 - 2014-03-23 23:41 - 00016152 _____ () C:\Windows\system32\Drivers\SWDUMon.sys
2014-03-24 22:14 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\LiveKernelReports
2014-03-24 00:00 - 2014-03-24 00:00 - 00000000 ____D () C:\Users\Jason\Documents\Optimizer Pro
2014-03-23 23:59 - 2014-03-23 23:59 - 01614416 _____ (BitTorrent Inc.) C:\Users\Jason\Downloads\uTorrent.exe
2014-03-23 23:59 - 2014-03-23 23:59 - 00000813 _____ () C:\Users\Jason\Desktop\µTorrent.lnk
2014-03-23 23:59 - 2014-03-23 23:59 - 00000793 _____ () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\µTorrent.lnk
2014-03-23 23:57 - 2014-03-23 23:57 - 00000218 _____ () C:\Users\Jason\AppData\Local\recently-used.xbel
2014-03-23 23:57 - 2014-03-23 23:57 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Python-Eggs
2014-03-23 23:57 - 2014-03-23 23:57 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\BitLord
2014-03-23 23:55 - 2014-03-23 23:55 - 00000000 ____D () C:\Users\Jason\Documents\BitLord
2014-03-23 23:55 - 2014-03-23 23:55 - 00000000 ____D () C:\Program Files\Quiknowledge
2014-03-23 23:55 - 2014-03-23 23:55 - 00000000 ____D () C:\Program Files (x86)\Quiknowledge
2014-03-23 23:54 - 2014-03-23 23:54 - 00722416 _____ ( ) C:\Users\Jason\Downloads\BitlordSetup.exe
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files\Reference Assemblies
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files\MSBuild
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files (x86)\Reference Assemblies
2014-03-23 23:42 - 2014-03-23 23:42 - 00000000 ____D () C:\Program Files (x86)\MSBuild
2014-03-23 23:41 - 2014-03-23 23:41 - 00000655 _____ () C:\Users\Jason\Desktop\PeerBlock.lnk
2014-03-23 23:41 - 2014-03-23 23:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\SlimWare Utilities Inc
2014-03-23 23:41 - 2014-03-23 23:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\SearchProtect
2014-03-23 23:41 - 2014-03-23 23:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\Downloaded Installers
2014-03-23 23:40 - 2014-03-23 23:40 - 00930952 _____ (CNET Download.com) C:\Users\Jason\Downloads\cbsidlm-cbsi183-PeerBlock-SEO-75328692.exe

Files to move or delete:
====================
C:\Users\Jason\AccessibleMarshal.dll
C:\Users\Jason\breakpadinjector.dll
C:\Users\Jason\crashreporter.exe
C:\Users\Jason\D3DCompiler_43.dll
C:\Users\Jason\freebl3.dll
C:\Users\Jason\gkmedias.dll
C:\Users\Jason\libEGL.dll
C:\Users\Jason\libGLESv2.dll
C:\Users\Jason\maintenanceservice.exe
C:\Users\Jason\maintenanceservice_installer.exe
C:\Users\Jason\mozalloc.dll
C:\Users\Jason\mozglue.dll
C:\Users\Jason\mozjs.dll
C:\Users\Jason\mozsqlite3.dll
C:\Users\Jason\msvcp100.dll
C:\Users\Jason\msvcr100.dll
C:\Users\Jason\nspr4.dll
C:\Users\Jason\nss3.dll
C:\Users\Jason\nssckbi.dll
C:\Users\Jason\nssdbm3.dll
C:\Users\Jason\nssutil3.dll
C:\Users\Jason\plc4.dll
C:\Users\Jason\plds4.dll
C:\Users\Jason\plugin-container.exe
C:\Users\Jason\plugin-hang-ui.exe
C:\Users\Jason\smime3.dll
C:\Users\Jason\softokn3.dll
C:\Users\Jason\ssl3.dll
C:\Users\Jason\updater.exe
C:\Users\Jason\webapp-uninstaller.exe
C:\Users\Jason\webapprt-stub.exe
C:\Users\Jason\xpcom.dll
C:\Users\Jason\xul.dll


Some content of TEMP:
====================
C:\Users\Jason\AppData\Local\Temp\13-12_win7_win8_64_dd_ccc_whql.exe
C:\Users\Jason\AppData\Local\Temp\APNSetup.exe
C:\Users\Jason\AppData\Local\Temp\jre-7u55-windows-i586-iftw.exe
C:\Users\Jason\AppData\Local\Temp\nsxD549.exe
C:\Users\Jason\AppData\Local\Temp\nszBF8D.exe
C:\Users\Jason\AppData\Local\Temp\raptrpatch.exe
C:\Users\Jason\AppData\Local\Temp\sonarinst.exe
C:\Users\Jason\AppData\Local\Temp\SPSetup.exe
C:\Users\Jason\AppData\Local\Temp\vlc-2.1.3-win32.exe


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-04-17 03:00

==================== End Of Log ============================

HERE IS THE Addition.txt:

Additional scan result of Farbar Recovery Scan Tool (x64) Version: 22-04-2014
Ran by Jason at 2014-04-21 19:18:06
Running from C:\Users\Jason\Downloads
Boot Mode: Normal
==========================================================


==================== Security Center ========================

AV: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

==================== Installed Programs ======================

µTorrent (HKCU\...\uTorrent) (Version: 3.4.1.30740 - BitTorrent Inc.)
Adobe Flash Player 12 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 12.0.0.77 - Adobe Systems Incorporated)
AMD Accelerated Video Transcoding (Version: 13.20.100.31206 - Advanced Micro Devices, Inc.) Hidden
AMD Catalyst Control Center (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
AMD Catalyst Install Manager (HKLM\...\{308051DA-0048-7A07-FE8B-9B6EC119A9E8}) (Version: 8.0.915.0 - Advanced Micro Devices, Inc.)
AMD Wireless Display v3.0 (Version: 1.0.0.14 - Advanced Micro Devices, Inc.) Hidden
Ask Toolbar (HKLM-x32\...\{4F524A2D-5637-4300-76A7-A758B70C0A06}) (Version: 12.10.6.48 - APN, LLC) <==== ATTENTION
Battlefield 4™ (HKLM-x32\...\{ABADE36E-EC37-413B-8179-B432AD3FACE7}) (Version: 1.2.0.0 - Electronic Arts)
Battlelog Web Plugins (HKLM-x32\...\Battlelog Web Plugins) (Version: 2.3.2 - EA Digital Illusions CE AB)
Catalyst Control Center - Branding (x32 Version: 1.00.0000 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center Graphics Previews Common (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center InstallProxy (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center Localization All (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Chinese Standard (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Chinese Traditional (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Czech (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Danish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Dutch (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help English (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Finnish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help French (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help German (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Greek (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Hungarian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Italian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Japanese (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Korean (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Norwegian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Polish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Portuguese (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Russian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Spanish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Swedish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Thai (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Turkish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
ccc-utility64 (Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
Dead Space™ (HKLM-x32\...\{9789E33B-317A-44B2-AF9A-FF8708AD93E0}) (Version: 1.0.0.222 - Electronic Arts)
ESN Sonar (HKLM-x32\...\ESN Sonar-0.70.4) (Version: 0.70.4 - ESN Social Software AB)
IPTInstaller (HKLM-x32\...\{08208143-777D-4A06-BB54-71BF0AD1BB70}) (Version: 4.0.8 - HTC)
Java 7 Update 55 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217051FF}) (Version: 7.0.550 - Oracle)
Java Auto Updater (x32 Version: 2.1.9.8 - Sun Microsystems, Inc.) Hidden
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{7299052b-02a4-4627-81f2-1818da5d550d}) (Version: 8.0.56336 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (HKLM-x32\...\{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}) (Version: 9.0.21022 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319 (HKLM-x32\...\{196BB40D-1578-3D01-B289-BEFC77A11A1E}) (Version: 10.0.30319 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.50727 (HKLM-x32\...\{15134cb0-b767-4960-a911-f2d16ae54797}) (Version: 11.0.50727.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.60610 (HKLM-x32\...\{a1909659-0a08-4554-8af1-2175904903a1}) (Version: 11.0.60610.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.50727 (HKLM-x32\...\{22154f09-719a-4619-bb71-5b3356999fbf}) (Version: 11.0.50727.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 (HKLM-x32\...\{95716cce-fc71-413f-8ad5-56c2892d4b3a}) (Version: 11.0.60610.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden
Mozilla Firefox 28.0 (x86 en-US) (HKLM-x32\...\Mozilla Firefox 28.0 (x86 en-US)) (Version: 28.0 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 28.0 - Mozilla)
Origin (HKLM-x32\...\Origin) (Version: 9.4.6.2792 - Electronic Arts, Inc.)
PeerBlock 1.2 (r693) (HKLM\...\{015C5B35-B678-451C-9AEE-821E8D69621C}_is1) (Version: 1.2.0.693 - PeerBlock, LLC)
PunkBuster Services (HKLM-x32\...\PunkBusterSvc) (Version: 0.993 - Even Balance, Inc.)
Quiknowledge (HKLM-x32\...\Quiknowledge) (Version: 1.9.0.1 - Quiknowledge) <==== ATTENTION
Search Protect (HKLM-x32\...\SearchProtect) (Version: 2.12.20.154 - Conduit) <==== ATTENTION
Spotify (HKCU\...\Spotify) (Version: 0.9.8.296.g91f68827 - Spotify AB)
The Sims™ 3 (HKLM-x32\...\{C05D8CDB-417D-4335-A38C-A0659EDFD6B8}) (Version: 1.67.2 - Electronic Arts)
VLC media player 2.1.3 (HKLM-x32\...\VLC media player) (Version: 2.1.3 - VideoLAN)

==================== Restore Points  =========================

29-03-2014 22:39:02 Installed The Sims 3
09-04-2014 02:50:37 Installed The Sims 3
13-04-2014 10:00:01 Windows Update
17-04-2014 06:59:15 Installed DirectX
22-04-2014 02:12:20 Installed Java 7 Update 55

==================== Hosts content: ==========================

2012-07-25 22:26 - 2012-07-25 22:26 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {1AAFF332-5C62-4558-9991-DAA649C4C9C5} - System32\Tasks\Microsoft\Windows\Sysmain\WsSwapAssessmentTask => Rundll32.exe sysmain.dll,PfSvWsSwapAssessmentTask
Task: {23A5D8BE-9196-40EB-BD89-794398B2B073} - System32\Tasks\Microsoft\Windows\WS\WSRefreshBannedAppsListTask => Rundll32.exe WSClient.dll,RefreshBannedAppsList
Task: {511C99F1-1C87-4EBD-A716-9CD3DDBF465B} - System32\Tasks\Microsoft\Windows\Setup\Pre-staged GDR Notification => C:\Windows\system32\NotificationUI.exe [2014-01-30] (Microsoft Corporation)
Task: {9F8E7CDB-723D-4E37-AA81-2F4419DEB985} - System32\Tasks\Microsoft\Windows\Setup\Windows Upgrade Notification Task => C:\Windows\system32\NotificationUI.exe [2014-01-30] (Microsoft Corporation)
Task: {A72208BF-7A49-4FB8-B684-252375F3443A} - System32\Tasks\Microsoft\Windows\WS\License Validation => Rundll32.exe WSClient.dll,WSpTLR licensing
Task: {C6A88F2D-53D2-4805-9D69-443738A1847C} - System32\Tasks\Microsoft\Windows\ApplicationData\CleanupTemporaryState => Rundll32.exe Windows.Storage.ApplicationData.dll,CleanupTemporaryState
Task: {EBF06DEC-4228-4813-AC0C-62821AE4E330} - System32\Tasks\Microsoft\Windows\Application Experience\StartupAppTask => Rundll32.exe Startupscan.dll,SusRunTask

==================== Loaded Modules (whitelisted) =============

2012-12-07 18:27 - 2012-12-07 18:27 - 00167424 _____ () C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe
2014-03-29 17:36 - 2014-03-29 17:36 - 00076888 _____ () C:\Windows\SysWOW64\PnkBstrA.exe
2013-06-03 18:07 - 2013-05-11 15:26 - 03128728 _____ () J:\mozjs.dll

==================== Alternate Data Streams (whitelisted) =========


==================== Safe Mode (whitelisted) ===================


==================== Disabled items from MSCONFIG ==============


==================== Faulty Device Manager Devices =============


==================== Event log errors: =========================

Application errors:
==================
Error: (04/20/2014 10:52:33 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/17/2014 08:45:38 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/17/2014 00:07:06 PM) (Source: Application Hang) (User: )
Description: The program starbound.exe version 0.9.0.0 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 16d4

Start Time: 01cf59e0ae7afacf

Termination Time: 4294967295

Application Path: J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe

Report Id: 769826b7-c663-11e3-be70-902b34dee62d

Faulting package full name:

Faulting package-relative application ID:

Error: (04/16/2014 06:59:01 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/15/2014 02:32:34 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/11/2014 01:19:44 AM) (Source: Application Hang) (User: )
Description: The program Netflix.exe version 1.15.0.68 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: e5c

Start Time: 01cf55488629e935

Termination Time: 4294967295

Application Path: C:\Program Files\WindowsApps\4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8\Netflix.exe

Report Id: 0192ae7b-c152-11e3-be6e-902b34dee62d

Faulting package full name: 4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8

Faulting package-relative application ID: App

Error: (04/11/2014 01:19:31 AM) (Source: Microsoft-Windows-Immersive-Shell) (User: PIXEL)
Description: Package 4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8 was terminated because it took too long to suspend.

Error: (04/10/2014 07:13:40 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/09/2014 07:51:56 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/08/2014 07:31:34 PM) (Source: Application Hang) (User: )
Description: The program starbound.exe version 0.9.0.0 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 23ac

Start Time: 01cf5380b637c130

Termination Time: 4294967295

Application Path: J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe

Report Id: 10e1c39e-bf8f-11e3-be6c-902b34dee62d

Faulting package full name:

Faulting package-relative application ID:


System errors:
=============
Error: (04/21/2014 07:10:34 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/21/2014 07:08:50 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/17/2014 09:16:43 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/17/2014 09:16:21 PM) (Source: DCOM) (User: PIXEL)
Description: {9BA05972-F6A8-11CF-A442-00A0C90A8F39}

Error: (04/17/2014 09:16:21 PM) (Source: DCOM) (User: PIXEL)
Description: {9BA05972-F6A8-11CF-A442-00A0C90A8F39}

Error: (04/17/2014 02:40:07 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/17/2014 02:08:55 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/16/2014 01:34:41 AM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/15/2014 07:29:08 PM) (Source: DCOM) (User: PIXEL)
Description: machine-defaultLocalActivation{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}PixelJasonS-1-5-21-1076075667-1471386052-3169907094-1001LocalHost (Using LRPC)4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8S-1-15-2-444797119-353723001-3522112724-563070080-1809981734-922308773-1844997097

Error: (04/15/2014 02:30:50 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2


Microsoft Office Sessions:
=========================
Error: (04/20/2014 10:52:33 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/17/2014 08:45:38 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/17/2014 00:07:06 PM) (Source: Application Hang)(User: )
Description: starbound.exe0.9.0.016d401cf59e0ae7afacf4294967295J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe769826b7-c663-11e3-be70-902b34dee62d

Error: (04/16/2014 06:59:01 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/15/2014 02:32:34 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/11/2014 01:19:44 AM) (Source: Application Hang)(User: )
Description: Netflix.exe1.15.0.68e5c01cf55488629e9354294967295C:\Program Files\WindowsApps\4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8\Netflix.exe0192ae7b-c152-11e3-be6e-902b34dee62d4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8App

Error: (04/11/2014 01:19:31 AM) (Source: Microsoft-Windows-Immersive-Shell)(User: PIXEL)
Description: 4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8

Error: (04/10/2014 07:13:40 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/09/2014 07:51:56 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/08/2014 07:31:34 PM) (Source: Application Hang)(User: )
Description: starbound.exe0.9.0.023ac01cf5380b637c1304294967295J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe10e1c39e-bf8f-11e3-be6c-902b34dee62d


==================== Memory info ===========================

Percentage of memory in use: 18%
Total physical RAM: 8152.04 MB
Available physical RAM: 6614.21 MB
Total Pagefile: 9368.04 MB
Available Pagefile: 7686.09 MB
Total Virtual: 8192 MB
Available Virtual: 8191.77 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:111.45 GB) (Free:46.25 GB) NTFS
Drive d: (BLAIR_WITCH_PROJECT) (CDROM) (Total:7.66 GB) (Free:0 GB) UDF
Drive j: (EVERYTHING GO HERE) (Fixed) (Total:931.51 GB) (Free:543.48 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 112 GB) (Disk ID: E55A1B64)
Partition 1: (Active) - (Size=350 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=111 GB) - (Type=07 NTFS)

========================================================
Disk: 1 (MBR Code: Windows 7 or 8) (Size: 932 GB) (Disk ID: 8ECBA897)
Partition 1: (Not Active) - (Size=932 GB) - (Type=07 NTFS)

==================== End Of Log ============================

 

post-161620-0-92698300-1398133687_thumb.

Link to post
Share on other sites

  • Root Admin

Hello and :welcome:

Please read the following and post back the logs when ready.

General P2P/Piracy Warning:
 

 
If you're using
Peer 2 Peer
software such as
uTorrent, BitTorrent
or similar you must either fully uninstall them or completely disable them from running while being assisted here.

Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.

If you have
illegal/cracked software, cracks, keygens etc
. on the system, please remove or uninstall them now and read the policy on
Piracy
.




Before we proceed further, please read all of the following instructions carefully.
If there is anything that you do not understand kindly ask before proceeding.
If needed please print out these instructions.
  • Please do not post logs using CODE, QUOTE, or FONT tags. Just paste them as direct text.
  • If the log is too large then you can use attachments by clicking on the More Reply Options button.
  • Please enable your system to show hidden files: How to see hidden files in Windows
  • Make sure you're subscribed to this topic:
    • Click on the Follow This Topic Button (at the top right of this page), make sure that the Receive notification box is checked and that it is set to Instantly

    [*]Removing malware can be unpredictable...It is unlikely but things can go very wrong! Please make sure you Backup all files that cannot be replaced if something were to happen. You can copy them to a CD/DVD, external drive or a pen drive [*]Please don't run any other scans, download, install or uninstall any programs unless requested by me while I'm working with you. [*]The removal of malware is not instantaneous, please be patient. Often we are also on a different Time Zone. [*]Perform everything in the correct order. Sometimes one step requires the previous one. [*]If you have any problems while following my instructions, Stop there and tell me the exact nature of the issue. [*]You can check here if you're not sure if your computer is 32-bit or 64-bit [*]Please disable your antivirus while running any requested scanners so that they do not interfere with the scanners. [*]When we are done, I'll give you instructions on how to cleanup all the tools and logs [*]Please stick with me until I give you the "all clear" and Please don't waste my time by leaving before that. [*]Your topic will be closed if you haven't replied within 3 days [*](If I have not responded within 24 hours, please send me a Private Message as a reminder)


 
STEP 0
RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes
so that your normal security software can then run and clean your computer of infections.
When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies
that stop us from using certain tools. When finished it will display a log file that shows the processes that were
terminated while the program was running.

As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot
your computer as any malware processes that are configured to start automatically will just be started again.
Instead, after running RKill you should immediately scan your computer using the requested scans I've included.

Please download Rkill by Grinler from one of the links below and save it to your desktop.
 



Link 2

  • On Windows XP double-click on the Rkill desktop icon to run the tool.
  • On Windows Vista/Windows 7 or 8, right-click on the Rkill desktop icon and select Run As Administrator
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • If the tool does not run from any of the links provided, please let me know.
  • Do not reboot the computer, you will need to run the application again.

 
STEP 01
Backup the Registry:
Modifying the Registry can create unforeseen problems, so it always wise to create a backup before doing so.
  • Please download ERUNT from one of the following links: Link1 | Link2 | Link3
  • ERUNT (Emergency Recovery Utility NT) is a free program that allows you to keep a complete backup of your registry and restore it when needed.
  • Double click on erunt-setup.exe to Install ERUNT by following the prompts.
  • NOTE: Do not choose to allow ERUNT to add an Entry to the Startup folder. Click NO.
  • Start ERUNT either by double clicking on the desktop icon or choosing to start the program at the end of the setup process.
  • Choose a location for the backup.
    • Note: the default location is C:\Windows\ERDNT which is acceptable.

    [*]Make sure that at least the first two check boxes are selected. [*]Click on OK [*]Then click on YES to create the folder. [*]Note: if it is necessary to restore the registry, open the backup folder and start ERDNT.exe


 
STEP 02
Please open Malwarebytes Anti-Malware and from the Dashboard please Check for Updates by clicking the Update Now... link
Open up Malwarebytes > Settings > Detection and Protection > Under Non Malware Protection set both PUP and PUM to Treat detections as malware.
Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.
Once completed please click on the History > Application Logs and find your scan log and open it and then click on the "copy to clipboard" button and post back the results on your next reply.
 
 
STEP 03
Please download RogueKiller and save it to your desktop.

You can check here if you're not sure if your computer is 32-bit or 64-bit

  • RogueKiller 32-bit | RogueKiller 64-bit
  • Quit all running programs.
  • For Windows XP, double-click to start.
  • For Vista,Windows 7/8, Right-click on the program and select Run as Administrator to start and when prompted allow it to run.
  • Read and accept the EULA (End User Licene Agreement)
  • Click Scan to scan the system.
  • When the scan completes Close the program > Don't Fix anything!
  • Don't run any other options, they're not all bad!!
  • Post back the report which should be located on your desktop.


 
Thanks
 

Link to post
Share on other sites

Already not seeing the pop ups. Here's the report and thank you!

 

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 8 (6.2.9200 ) 64 bits version
Started in : Normal mode
User : Jason [Admin rights]
Mode : Scan -- Date : 04/23/2014 18:47:53
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤
[Address] EAT @explorer.exe (AssocCreate) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3B20)
[Address] EAT @explorer.exe (AssocGetPerceivedType) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC4940)
[Address] EAT @explorer.exe (AssocIsDangerous) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDCFBC)
[Address] EAT @explorer.exe (AssocQueryKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA870)
[Address] EAT @explorer.exe (AssocQueryKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3A20)
[Address] EAT @explorer.exe (AssocQueryStringA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDE60C)
[Address] EAT @explorer.exe (AssocQueryStringByKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDE440)
[Address] EAT @explorer.exe (AssocQueryStringByKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC41A0)
[Address] EAT @explorer.exe (AssocQueryStringW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC9CC0)
[Address] EAT @explorer.exe (ChrCmpIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA03C)
[Address] EAT @explorer.exe (ChrCmpIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA02C)
[Address] EAT @explorer.exe (ColorAdjustLuma) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDF7A8)
[Address] EAT @explorer.exe (ColorHLSToRGB) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCBFF0)
[Address] EAT @explorer.exe (ColorRGBToHLS) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCBF30)
[Address] EAT @explorer.exe (ConnectToConnectionPoint) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC42B0)
[Address] EAT @explorer.exe (DelayLoadFailureHook) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDF8F0)
[Address] EAT @explorer.exe (DllGetClassObject) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFED448)
[Address] EAT @explorer.exe (DllGetVersion) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD5AE0)
[Address] EAT @explorer.exe (GUIDFromStringW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCF786)
[Address] EAT @explorer.exe (GetAcceptLanguagesA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD97D0)
[Address] EAT @explorer.exe (GetAcceptLanguagesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5A40)
[Address] EAT @explorer.exe (GetMenuPosFromID) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5A60)
[Address] EAT @explorer.exe (HashData) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD97C0)
[Address] EAT @explorer.exe (IStream_Copy) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA1A0)
[Address] EAT @explorer.exe (IStream_Read) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2B80)
[Address] EAT @explorer.exe (IStream_ReadPidl) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC9980)
[Address] EAT @explorer.exe (IStream_ReadStr) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1120)
[Address] EAT @explorer.exe (IStream_Reset) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6340)
[Address] EAT @explorer.exe (IStream_Size) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA180)
[Address] EAT @explorer.exe (IStream_Write) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6320)
[Address] EAT @explorer.exe (IStream_WritePidl) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEF194)
[Address] EAT @explorer.exe (IStream_WriteStr) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6350)
[Address] EAT @explorer.exe (IUnknown_AtomicRelease) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA09C)
[Address] EAT @explorer.exe (IUnknown_Exec) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5B80)
[Address] EAT @explorer.exe (IUnknown_GetSite) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC60B0)
[Address] EAT @explorer.exe (IUnknown_GetWindow) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2D20)
[Address] EAT @explorer.exe (IUnknown_QueryService) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3300)
[Address] EAT @explorer.exe (IUnknown_QueryStatus) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEBBA8)
[Address] EAT @explorer.exe (IUnknown_Set) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1130)
[Address] EAT @explorer.exe (IUnknown_SetSite) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3310)
[Address] EAT @explorer.exe (IntlStrEqWorkerA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E3C)
[Address] EAT @explorer.exe (IntlStrEqWorkerW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E2C)
[Address] EAT @explorer.exe (IsCharSpaceA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A80)
[Address] EAT @explorer.exe (IsCharSpaceW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1140)
[Address] EAT @explorer.exe (IsInternetESCEnabled) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD97B0)
[Address] EAT @explorer.exe (IsOS) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2B60)
[Address] EAT @explorer.exe (MLFreeLibrary) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE9EF4)
[Address] EAT @explorer.exe (MLLoadLibraryA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE9F48)
[Address] EAT @explorer.exe (MLLoadLibraryW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE9FA8)
[Address] EAT @explorer.exe (ParseURLA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD97A0)
[Address] EAT @explorer.exe (ParseURLW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCC250)
[Address] EAT @explorer.exe (PathAddBackslashA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B2C)
[Address] EAT @explorer.exe (PathAddBackslashW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3C00)
[Address] EAT @explorer.exe (PathAddExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9CCC)
[Address] EAT @explorer.exe (PathAddExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9CBC)
[Address] EAT @explorer.exe (PathAppendA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9CAC)
[Address] EAT @explorer.exe (PathAppendW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5A10)
[Address] EAT @explorer.exe (PathBuildRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA05C)
[Address] EAT @explorer.exe (PathBuildRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA06C)
[Address] EAT @explorer.exe (PathCanonicalizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C9C)
[Address] EAT @explorer.exe (PathCanonicalizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2CF0)
[Address] EAT @explorer.exe (PathCombineA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B5C)
[Address] EAT @explorer.exe (PathCombineW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3C10)
[Address] EAT @explorer.exe (PathCommonPrefixA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9DAC)
[Address] EAT @explorer.exe (PathCommonPrefixW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D9C)
[Address] EAT @explorer.exe (PathCompactPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDAF90)
[Address] EAT @explorer.exe (PathCompactPathExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDAD80)
[Address] EAT @explorer.exe (PathCompactPathExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6530)
[Address] EAT @explorer.exe (PathCompactPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDEB08)
[Address] EAT @explorer.exe (PathCreateFromUrlA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9790)
[Address] EAT @explorer.exe (PathCreateFromUrlAlloc) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9780)
[Address] EAT @explorer.exe (PathCreateFromUrlW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC36E0)
[Address] EAT @explorer.exe (PathFileExistsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C0C)
[Address] EAT @explorer.exe (PathFileExistsAndAttributesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5930)
[Address] EAT @explorer.exe (PathFileExistsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3690)
[Address] EAT @explorer.exe (PathFindExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C3C)
[Address] EAT @explorer.exe (PathFindExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC10C0)
[Address] EAT @explorer.exe (PathFindFileNameA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9BFC)
[Address] EAT @explorer.exe (PathFindFileNameW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1090)
[Address] EAT @explorer.exe (PathFindNextComponentA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9AE0)
[Address] EAT @explorer.exe (PathFindNextComponentW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA210)
[Address] EAT @explorer.exe (PathFindOnPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDB610)
[Address] EAT @explorer.exe (PathFindOnPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC9170)
[Address] EAT @explorer.exe (PathFindSuffixArrayA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDB534)
[Address] EAT @explorer.exe (PathFindSuffixArrayW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC53D0)
[Address] EAT @explorer.exe (PathGetArgsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD962C)
[Address] EAT @explorer.exe (PathGetArgsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCC880)
[Address] EAT @explorer.exe (PathGetCharTypeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9648)
[Address] EAT @explorer.exe (PathGetCharTypeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6480)
[Address] EAT @explorer.exe (PathGetDriveNumberA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D5C)
[Address] EAT @explorer.exe (PathGetDriveNumberW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1050)
[Address] EAT @explorer.exe (PathIsContentTypeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDABAC)
[Address] EAT @explorer.exe (PathIsContentTypeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA2C0)
[Address] EAT @explorer.exe (PathIsDirectoryA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDB404)
[Address] EAT @explorer.exe (PathIsDirectoryEmptyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDB334)
[Address] EAT @explorer.exe (PathIsDirectoryEmptyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDEE78)
[Address] EAT @explorer.exe (PathIsDirectoryW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC54D0)
[Address] EAT @explorer.exe (PathIsFileSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D6C)
[Address] EAT @explorer.exe (PathIsFileSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6200)
[Address] EAT @explorer.exe (PathIsLFNFileSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9CFC)
[Address] EAT @explorer.exe (PathIsLFNFileSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9CEC)
[Address] EAT @explorer.exe (PathIsNetworkPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA07C)
[Address] EAT @explorer.exe (PathIsNetworkPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC29A0)
[Address] EAT @explorer.exe (PathIsPrefixA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D8C)
[Address] EAT @explorer.exe (PathIsPrefixW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D7C)
[Address] EAT @explorer.exe (PathIsRelativeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D4C)
[Address] EAT @explorer.exe (PathIsRelativeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3680)
[Address] EAT @explorer.exe (PathIsRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C8C)
[Address] EAT @explorer.exe (PathIsRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2CE0)
[Address] EAT @explorer.exe (PathIsSameRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D1C)
[Address] EAT @explorer.exe (PathIsSameRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D0C)
[Address] EAT @explorer.exe (PathIsSystemFolderA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA834)
[Address] EAT @explorer.exe (PathIsSystemFolderW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDE948)
[Address] EAT @explorer.exe (PathIsUNCA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B3C)
[Address] EAT @explorer.exe (PathIsUNCServerA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C1C)
[Address] EAT @explorer.exe (PathIsUNCServerShareA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C2C)
[Address] EAT @explorer.exe (PathIsUNCServerShareW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5E60)
[Address] EAT @explorer.exe (PathIsUNCServerW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5E70)
[Address] EAT @explorer.exe (PathIsUNCW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1040)
[Address] EAT @explorer.exe (PathIsURLA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9770)
[Address] EAT @explorer.exe (PathIsURLW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC36C0)
[Address] EAT @explorer.exe (PathMakePrettyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDBCB0)
[Address] EAT @explorer.exe (PathMakePrettyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC9FC0)
[Address] EAT @explorer.exe (PathMakeSystemFolderA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA8C0)
[Address] EAT @explorer.exe (PathMakeSystemFolderW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1270)
[Address] EAT @explorer.exe (PathMatchSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9BAC)
[Address] EAT @explorer.exe (PathMatchSpecExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B8C)
[Address] EAT @explorer.exe (PathMatchSpecExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B7C)
[Address] EAT @explorer.exe (PathMatchSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B9C)
[Address] EAT @explorer.exe (PathParseIconLocationA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9BEC)
[Address] EAT @explorer.exe (PathParseIconLocationW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5E20)
[Address] EAT @explorer.exe (PathQuoteSpacesA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9BCC)
[Address] EAT @explorer.exe (PathQuoteSpacesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2D00)
[Address] EAT @explorer.exe (PathRelativePathToA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B14)
[Address] EAT @explorer.exe (PathRelativePathToW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9AF4)
[Address] EAT @explorer.exe (PathRemoveArgsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDBC74)
[Address] EAT @explorer.exe (PathRemoveArgsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6450)
[Address] EAT @explorer.exe (PathRemoveBackslashA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9CDC)
[Address] EAT @explorer.exe (PathRemoveBackslashW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3730)
[Address] EAT @explorer.exe (PathRemoveBlanksA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9BBC)
[Address] EAT @explorer.exe (PathRemoveBlanksW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3BD0)
[Address] EAT @explorer.exe (PathRemoveExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C7C)
[Address] EAT @explorer.exe (PathRemoveExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5E30)
[Address] EAT @explorer.exe (PathRemoveFileSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B4C)
[Address] EAT @explorer.exe (PathRemoveFileSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC4040)
[Address] EAT @explorer.exe (PathRenameExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C6C)
[Address] EAT @explorer.exe (PathRenameExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C5C)
[Address] EAT @explorer.exe (PathSearchAndQualifyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD961C)
[Address] EAT @explorer.exe (PathSearchAndQualifyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2E00)
[Address] EAT @explorer.exe (PathSetDlgItemPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDAC50)
[Address] EAT @explorer.exe (PathSetDlgItemPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDE9D0)
[Address] EAT @explorer.exe (PathSkipRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D2C)
[Address] EAT @explorer.exe (PathSkipRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5A20)
[Address] EAT @explorer.exe (PathStripPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9D3C)
[Address] EAT @explorer.exe (PathStripPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6220)
[Address] EAT @explorer.exe (PathStripToRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9C4C)
[Address] EAT @explorer.exe (PathStripToRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5E50)
[Address] EAT @explorer.exe (PathUnExpandEnvStringsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9B6C)
[Address] EAT @explorer.exe (PathUnExpandEnvStringsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2DF0)
[Address] EAT @explorer.exe (PathUndecorateA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA75C)
[Address] EAT @explorer.exe (PathUndecorateW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC64D0)
[Address] EAT @explorer.exe (PathUnmakeSystemFolderA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA86C)
[Address] EAT @explorer.exe (PathUnmakeSystemFolderW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDE984)
[Address] EAT @explorer.exe (PathUnquoteSpacesA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9BDC)
[Address] EAT @explorer.exe (PathUnquoteSpacesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3BE0)
[Address] EAT @explorer.exe (QISearch) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1010)
[Address] EAT @explorer.exe (SHAllocShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC29D0)
[Address] EAT @explorer.exe (SHAnsiToAnsi) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA310)
[Address] EAT @explorer.exe (SHAnsiToUnicode) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA320)
[Address] EAT @explorer.exe (SHAutoComplete) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCBE10)
[Address] EAT @explorer.exe (SHCopyKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA2F0)
[Address] EAT @explorer.exe (SHCopyKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA070)
[Address] EAT @explorer.exe (SHCreateMemStream) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC32B0)
[Address] EAT @explorer.exe (SHCreateShellPalette) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2890)
[Address] EAT @explorer.exe (SHCreateStreamOnFileA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA0DC)
[Address] EAT @explorer.exe (SHCreateStreamOnFileEx) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6070)
[Address] EAT @explorer.exe (SHCreateStreamOnFileW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC64A0)
[Address] EAT @explorer.exe (SHCreateStreamWrapper) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCF792)
[Address] EAT @explorer.exe (SHCreateThread) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5E80)
[Address] EAT @explorer.exe (SHCreateThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5B30)
[Address] EAT @explorer.exe (SHCreateThreadWithHandle) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6400)
[Address] EAT @explorer.exe (SHDeleteEmptyKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA0FC)
[Address] EAT @explorer.exe (SHDeleteEmptyKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA0EC)
[Address] EAT @explorer.exe (SHDeleteKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA2E0)
[Address] EAT @explorer.exe (SHDeleteKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2C60)
[Address] EAT @explorer.exe (SHDeleteOrphanKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEEFB8)
[Address] EAT @explorer.exe (SHDeleteOrphanKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEEF48)
[Address] EAT @explorer.exe (SHDeleteValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA10C)
[Address] EAT @explorer.exe (SHDeleteValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2CA0)
[Address] EAT @explorer.exe (SHEnumKeyExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA290)
[Address] EAT @explorer.exe (SHEnumKeyExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA280)
[Address] EAT @explorer.exe (SHEnumValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA250)
[Address] EAT @explorer.exe (SHEnumValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA1D0)
[Address] EAT @explorer.exe (SHFormatDateTimeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDF004)
[Address] EAT @explorer.exe (SHFormatDateTimeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDF070)
[Address] EAT @explorer.exe (SHFreeShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC29E0)
[Address] EAT @explorer.exe (SHGetInverseCMAP) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE0830)
[Address] EAT @explorer.exe (SHGetThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC9140)
[Address] EAT @explorer.exe (SHGetValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC43C0)
[Address] EAT @explorer.exe (SHGetValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2B20)
[Address] EAT @explorer.exe (SHGetViewStatePropertyBag) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6FA0)
[Address] EAT @explorer.exe (SHIsChildOrSelf) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3510)
[Address] EAT @explorer.exe (SHIsLowMemoryMachine) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEBC3C)
[Address] EAT @explorer.exe (SHLoadIndirectString) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3340)
[Address] EAT @explorer.exe (SHLockShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEF838)
[Address] EAT @explorer.exe (SHMessageBoxCheckA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEADD4)
[Address] EAT @explorer.exe (SHMessageBoxCheckW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEAF00)
[Address] EAT @explorer.exe (SHOpenRegStream2A) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA0AC)
[Address] EAT @explorer.exe (SHOpenRegStream2W) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC43F0)
[Address] EAT @explorer.exe (SHOpenRegStreamA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA0CC)
[Address] EAT @explorer.exe (SHOpenRegStreamW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA0BC)
[Address] EAT @explorer.exe (SHPackDispParamsV) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC7DB0)
[Address] EAT @explorer.exe (SHPropertyBag_ReadStrAlloc) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFF1598)
[Address] EAT @explorer.exe (SHPropertyBag_WriteBSTR) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFF1498)
[Address] EAT @explorer.exe (SHQueryInfoKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA230)
[Address] EAT @explorer.exe (SHQueryInfoKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA210)
[Address] EAT @explorer.exe (SHQueryValueExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA120)
[Address] EAT @explorer.exe (SHQueryValueExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC63A0)
[Address] EAT @explorer.exe (SHRegCloseUSKey) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A70)
[Address] EAT @explorer.exe (SHRegCreateUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A58)
[Address] EAT @explorer.exe (SHRegCreateUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2640)
[Address] EAT @explorer.exe (SHRegDeleteEmptyUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A44)
[Address] EAT @explorer.exe (SHRegDeleteEmptyUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A34)
[Address] EAT @explorer.exe (SHRegDeleteUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A24)
[Address] EAT @explorer.exe (SHRegDeleteUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9A14)
[Address] EAT @explorer.exe (SHRegDuplicateHKey) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA1F0)
[Address] EAT @explorer.exe (SHRegEnumUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD99FC)
[Address] EAT @explorer.exe (SHRegEnumUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD99DC)
[Address] EAT @explorer.exe (SHRegEnumUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9998)
[Address] EAT @explorer.exe (SHRegEnumUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2590)
[Address] EAT @explorer.exe (SHRegGetBoolUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9984)
[Address] EAT @explorer.exe (SHRegGetBoolUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCC220)
[Address] EAT @explorer.exe (SHRegGetBoolValueFromHKCUHKLM) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6330)
[Address] EAT @explorer.exe (SHRegGetIntW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA1E0)
[Address] EAT @explorer.exe (SHRegGetPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA1C0)
[Address] EAT @explorer.exe (SHRegGetPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA240)
[Address] EAT @explorer.exe (SHRegGetUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9948)
[Address] EAT @explorer.exe (SHRegGetUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA280)
[Address] EAT @explorer.exe (SHRegGetValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA2A4)
[Address] EAT @explorer.exe (SHRegGetValueFromHKCUHKLM) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6EBC)
[Address] EAT @explorer.exe (SHRegGetValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC21B0)
[Address] EAT @explorer.exe (SHRegOpenUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9928)
[Address] EAT @explorer.exe (SHRegOpenUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9908)
[Address] EAT @explorer.exe (SHRegQueryInfoUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD98E0)
[Address] EAT @explorer.exe (SHRegQueryInfoUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2610)
[Address] EAT @explorer.exe (SHRegQueryUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD98A0)
[Address] EAT @explorer.exe (SHRegQueryUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9860)
[Address] EAT @explorer.exe (SHRegSetPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA1A0)
[Address] EAT @explorer.exe (SHRegSetPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA180)
[Address] EAT @explorer.exe (SHRegSetUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9838)
[Address] EAT @explorer.exe (SHRegSetUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9810)
[Address] EAT @explorer.exe (SHRegWriteUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD97E4)
[Address] EAT @explorer.exe (SHRegWriteUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC25E0)
[Address] EAT @explorer.exe (SHRegisterValidateTemplate) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFF58E0)
[Address] EAT @explorer.exe (SHReleaseThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA08C)
[Address] EAT @explorer.exe (SHRunIndirectRegClientCommand) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDC95C)
[Address] EAT @explorer.exe (SHSendMessageBroadcastA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEA27C)
[Address] EAT @explorer.exe (SHSendMessageBroadcastW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2CC0)
[Address] EAT @explorer.exe (SHSetThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5B10)
[Address] EAT @explorer.exe (SHSetValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA14C)
[Address] EAT @explorer.exe (SHSetValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC63D0)
[Address] EAT @explorer.exe (SHSkipJunction) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2E20)
[Address] EAT @explorer.exe (SHStrDupA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCA260)
[Address] EAT @explorer.exe (SHStrDupW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1070)
[Address] EAT @explorer.exe (SHStripMneumonicA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEA900)
[Address] EAT @explorer.exe (SHStripMneumonicW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2DB0)
[Address] EAT @explorer.exe (SHUnicodeToAnsi) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC32E0)
[Address] EAT @explorer.exe (SHUnicodeToAnsiCP) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFCF7B9)
[Address] EAT @explorer.exe (SHUnicodeToUnicode) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDA300)
[Address] EAT @explorer.exe (SHUnlockShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEF818)
[Address] EAT @explorer.exe (ShellMessageBoxA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDC604)
[Address] EAT @explorer.exe (ShellMessageBoxW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDF54C)
[Address] EAT @explorer.exe (StrCSpnA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9EEC)
[Address] EAT @explorer.exe (StrCSpnIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9EDC)
[Address] EAT @explorer.exe (StrCSpnIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9ECC)
[Address] EAT @explorer.exe (StrCSpnW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC5A30)
[Address] EAT @explorer.exe (StrCatBuffA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9FDC)
[Address] EAT @explorer.exe (StrCatBuffW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9FEC)
[Address] EAT @explorer.exe (StrCatChainW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9DCC)
[Address] EAT @explorer.exe (StrCatW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFCF8)
[Address] EAT @explorer.exe (StrChrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9FCC)
[Address] EAT @explorer.exe (StrChrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F9C)
[Address] EAT @explorer.exe (StrChrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC10E0)
[Address] EAT @explorer.exe (StrChrNIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F8C)
[Address] EAT @explorer.exe (StrChrNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9FBC)
[Address] EAT @explorer.exe (StrChrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1080)
[Address] EAT @explorer.exe (StrCmpCA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9DEC)
[Address] EAT @explorer.exe (StrCmpCW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2C90)
[Address] EAT @explorer.exe (StrCmpICA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1100)
[Address] EAT @explorer.exe (StrCmpICW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC10F0)
[Address] EAT @explorer.exe (StrCmpIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3650)
[Address] EAT @explorer.exe (StrCmpLogicalW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9DDC)
[Address] EAT @explorer.exe (StrCmpNA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9EBC)
[Address] EAT @explorer.exe (StrCmpNCA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E0C)
[Address] EAT @explorer.exe (StrCmpNCW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9DFC)
[Address] EAT @explorer.exe (StrCmpNIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9EAC)
[Address] EAT @explorer.exe (StrCmpNICA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC60A0)
[Address] EAT @explorer.exe (StrCmpNICW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2B70)
[Address] EAT @explorer.exe (StrCmpNIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3670)
[Address] EAT @explorer.exe (StrCmpNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3770)
[Address] EAT @explorer.exe (StrCmpW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC10B0)
[Address] EAT @explorer.exe (StrCpyNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9FFC)
[Address] EAT @explorer.exe (StrCpyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFD38)
[Address] EAT @explorer.exe (StrDupA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E4C)
[Address] EAT @explorer.exe (StrDupW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC2B50)
[Address] EAT @explorer.exe (StrFormatByteSize64A) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFC00)
[Address] EAT @explorer.exe (StrFormatByteSizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFBF4)
[Address] EAT @explorer.exe (StrFormatByteSizeEx) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC32D0)
[Address] EAT @explorer.exe (StrFormatByteSizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFC60)
[Address] EAT @explorer.exe (StrFormatKBSizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFB74)
[Address] EAT @explorer.exe (StrFormatKBSizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFBE0)
[Address] EAT @explorer.exe (StrFromTimeIntervalA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE8AC8)
[Address] EAT @explorer.exe (StrFromTimeIntervalW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE8A44)
[Address] EAT @explorer.exe (StrIsIntlEqualA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E3C)
[Address] EAT @explorer.exe (StrIsIntlEqualW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E2C)
[Address] EAT @explorer.exe (StrNCatA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFCB8)
[Address] EAT @explorer.exe (StrNCatW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFC74)
[Address] EAT @explorer.exe (StrPBrkA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F5C)
[Address] EAT @explorer.exe (StrPBrkW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC61E0)
[Address] EAT @explorer.exe (StrRChrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9FAC)
[Address] EAT @explorer.exe (StrRChrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F7C)
[Address] EAT @explorer.exe (StrRChrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F6C)
[Address] EAT @explorer.exe (StrRChrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6210)
[Address] EAT @explorer.exe (StrRStrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E9C)
[Address] EAT @explorer.exe (StrRStrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E8C)
[Address] EAT @explorer.exe (StrRetToBSTR) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC60D0)
[Address] EAT @explorer.exe (StrRetToBufA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDF9E8)
[Address] EAT @explorer.exe (StrRetToBufW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1110)
[Address] EAT @explorer.exe (StrRetToStrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFDFA98)
[Address] EAT @explorer.exe (StrRetToStrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3330)
[Address] EAT @explorer.exe (StrSpnA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F0C)
[Address] EAT @explorer.exe (StrSpnW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9EFC)
[Address] EAT @explorer.exe (StrStrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E7C)
[Address] EAT @explorer.exe (StrStrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC6490)
[Address] EAT @explorer.exe (StrStrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC10D0)
[Address] EAT @explorer.exe (StrStrNIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E5C)
[Address] EAT @explorer.exe (StrStrNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E6C)
[Address] EAT @explorer.exe (StrStrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3660)
[Address] EAT @explorer.exe (StrToInt64ExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F2C)
[Address] EAT @explorer.exe (StrToInt64ExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F3C)
[Address] EAT @explorer.exe (StrToIntA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F4C)
[Address] EAT @explorer.exe (StrToIntExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9F1C)
[Address] EAT @explorer.exe (StrToIntExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC61F0)
[Address] EAT @explorer.exe (StrToIntW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC10A0)
[Address] EAT @explorer.exe (StrTrimA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9E1C)
[Address] EAT @explorer.exe (StrTrimW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3320)
[Address] EAT @explorer.exe (UrlApplySchemeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9760)
[Address] EAT @explorer.exe (UrlApplySchemeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9750)
[Address] EAT @explorer.exe (UrlCanonicalizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9740)
[Address] EAT @explorer.exe (UrlCanonicalizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC36B0)
[Address] EAT @explorer.exe (UrlCombineA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9728)
[Address] EAT @explorer.exe (UrlCombineW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3750)
[Address] EAT @explorer.exe (UrlCompareA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9714)
[Address] EAT @explorer.exe (UrlCompareW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9704)
[Address] EAT @explorer.exe (UrlCreateFromPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD96F4)
[Address] EAT @explorer.exe (UrlCreateFromPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3BF0)
[Address] EAT @explorer.exe (UrlEscapeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD96E4)
[Address] EAT @explorer.exe (UrlEscapeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3720)
[Address] EAT @explorer.exe (UrlFixupW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD96D4)
[Address] EAT @explorer.exe (UrlGetLocationA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD96C4)
[Address] EAT @explorer.exe (UrlGetLocationW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD96B4)
[Address] EAT @explorer.exe (UrlGetPartA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD969C)
[Address] EAT @explorer.exe (UrlGetPartW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC3700)
[Address] EAT @explorer.exe (UrlHashA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9688)
[Address] EAT @explorer.exe (UrlHashW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9678)
[Address] EAT @explorer.exe (UrlIsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9668)
[Address] EAT @explorer.exe (UrlIsNoHistoryA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD95EC)
[Address] EAT @explorer.exe (UrlIsNoHistoryW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC1150)
[Address] EAT @explorer.exe (UrlIsOpaqueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD960C)
[Address] EAT @explorer.exe (UrlIsOpaqueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD95FC)
[Address] EAT @explorer.exe (UrlIsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC36A0)
[Address] EAT @explorer.exe (UrlUnescapeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFD9658)
[Address] EAT @explorer.exe (UrlUnescapeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFC36D0)
[Address] EAT @explorer.exe (WhichPlatform) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFEA6D0)
[Address] EAT @explorer.exe (wnsprintfA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE93AC)
[Address] EAT @explorer.exe (wnsprintfW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE9318)
[Address] EAT @explorer.exe (wvnsprintfA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE93F8)
[Address] EAT @explorer.exe (wvnsprintfW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x2CFE9368)
[Address] EAT @explorer.exe (BatMeterIconAnimationReset) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB4554)
[Address] EAT @explorer.exe (BatMeterIconThemeReset) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB46EC)
[Address] EAT @explorer.exe (BatMeterOnDeviceChange) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB4134)
[Address] EAT @explorer.exe (CleanupBatteryData) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB1884)
[Address] EAT @explorer.exe (CreateBatteryData) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB2B98)
[Address] EAT @explorer.exe (GetBatMeterIconAnimationState) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB41F0)
[Address] EAT @explorer.exe (GetBatMeterIconAnimationTimeDelay) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB4370)
[Address] EAT @explorer.exe (GetBatMeterIconAnimationUpdate) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB4494)
[Address] EAT @explorer.exe (GetBatteryCapacityInfo) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3F18)
[Address] EAT @explorer.exe (GetBatteryDetails) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB5AD0)
[Address] EAT @explorer.exe (GetBatteryImmersiveIcon) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB2060)
[Address] EAT @explorer.exe (GetBatteryInfo) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB5100)
[Address] EAT @explorer.exe (GetBatteryStatusText) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB5190)
[Address] EAT @explorer.exe (GetBatteryWorkingState) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB19C0)
[Address] EAT @explorer.exe (IsBatteryBad) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3F0C)
[Address] EAT @explorer.exe (IsBatteryHealthWarningEnabled) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3F00)
[Address] EAT @explorer.exe (IsBatteryLevelCritical) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3EC4)
[Address] EAT @explorer.exe (IsBatteryLevelLow) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3ED8)
[Address] EAT @explorer.exe (IsBatteryLevelReserve) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3EEC)
[Address] EAT @explorer.exe (PowerCapabilities) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB1560)
[Address] EAT @explorer.exe (QueryBatteryData) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB2C44)
[Address] EAT @explorer.exe (SetBatteryHealthWarningState) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB3F00)
[Address] EAT @explorer.exe (SetBatteryLevel) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB27A0)
[Address] EAT @explorer.exe (SetBatteryWorkingState) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB1048)
[Address] EAT @explorer.exe (SubscribeBatteryUpdateNotification) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB1FB8)
[Address] EAT @explorer.exe (UnsubscribeBatteryUpdateNotification) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB1980)
[Address] EAT @explorer.exe (UpdateBatteryData) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB50C4)
[Address] EAT @explorer.exe (UpdateBatteryDataAsync) : CSCDLL.dll -> HOOKED (C:\Windows\system32\BatMeter.dll @ 0x26AB1B60)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts




¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Samsung SSD 840 Series +++++
--- User ---
[MBR] c7410399645b09c1eb15e758d8d7ece9
[bSP] eb89568445583f3d5a66e78b7cbf90cb : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 718848 | Size: 114121 MB
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) ST1000DM003-1CH162 +++++
--- User ---
[MBR] bb912057204e6eb7b910a75101ab6919
[bSP] 9f6f42f15cf14d40b0ac3c0b9d7205de : Windows 7/8 MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 953867 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_S_04232014_184753.txt >>



 

Link to post
Share on other sites

  • Root Admin

Please go ahead and run through the following steps and post back the logs when ready.

STEP 03
Please download Malwarebytes Anti-Rootkit from here

  • Unzip the contents to a folder in a convenient location.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder... mbar-log.txt and system-log.txt

STEP 04
Please download Junkware Removal Tool to your desktop.

  • Shutdown your antivirus to avoid any conflicts.
  • Right click over JRT.exe and select Run as administrator on Windows Vista or Windows 7, double-click on XP.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next reply message
  • When completed make sure to re-enable your antivirus

STEP 05
Lets clean out any adware now: (this will require a reboot so save all your work)

Please download AdwCleaner by Xplode and save to your Desktop.

  • Double click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
  • Now click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • Look over the log especially under Files/Folders for any program you want to save.
  • If there's a program you may want to save, just uncheck it from AdwCleaner.
  • If you're not sure, post the log for review. (all items found are adware/spyware/foistware)
  • If you're ready to clean it all up.....click the Clean button.
  • After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
  • Items that are deleted are moved to the Quarantine Folder: C:\AdwCleaner\Quarantine
  • To restore an item that has been deleted:
  • Go to Tools > Quarantine Manager > check what you want restored > now click on Restore.

STEP 06
Please open Malwarebytes Anti-Malware and from the Dashboard please Check for Updates by clicking the Update Now... link
Open up Malwarebytes > Settings > Detection and Protection > Under Non Malware Protection set both PUP and PUM to Treat detections as malware.
Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.
Once completed please click on the History > Application Logs and find your scan log and open it and then click on the "copy to clipboard" button and post back the results on your next reply.


STEP 07
button_eos.gif

Please go here to run the online antivirus scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings and ensure these options are ticked:
    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Click Scan
  • Wait for the scan to finish
  • If any threats were found, click the 'List of found threats' , then click Export to text file....
  • Save it to your desktop, then please copy and paste that log as a reply to this topic.

STEP 08
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). Please attach it to your reply as well.
Link to post
Share on other sites

STEP 3: Malwarebytes Anti-Rootkit BETA 1.07.0.1009
www.malwarebytes.org

Database version: v2014.04.24.09

Windows 8 x64 NTFS
Internet Explorer 10.0.9200.16863
Jason :: PIXEL [administrator]

4/24/2014 5:20:25 PM
mbar-log-2014-04-24 (17-20-25).txt

Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled:
Objects scanned: 239206
Time elapsed: 5 minute(s), 15 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

Physical Sectors Detected: 0
(No malicious items detected)

(end)

STEP 5:

# AdwCleaner v3.202 - Report created 24/04/2014 at 17:39:50
# Updated 23/04/2014 by Xplode
# Operating System : Windows 8 Pro  (64 bits)
# Username : Jason - PIXEL
# Running from : C:\Users\Jason\Downloads\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Deleted : C:\Program Files\Quiknowledge
Folder Deleted : C:\Users\Jason\AppData\Local\SearchProtect
Folder Deleted : C:\Users\Jason\AppData\Local\Temp\apn
Folder Deleted : C:\Users\Jason\AppData\Roaming\BitLord
Folder Deleted : C:\Users\Jason\Documents\BitLord
File Deleted : C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\searchplugins\ask-search.xml

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}
Key Deleted : HKCU\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\Software\{6791A2F3-FC80-475C-A002-C014AF797E9C}

***** [ Browsers ] *****

-\\ Internet Explorer v10.0.9200.16537

Setting Restored : HKCU\Software\Microsoft\Internet Explorer\Main [secondary Start Pages]

-\\ Mozilla Firefox v28.0 (en-US)

[ File : C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\prefs.js ]


*************************

AdwCleaner[R0].txt - [1988 octets] - [24/04/2014 17:38:44]
AdwCleaner[s0].txt - [1574 octets] - [24/04/2014 17:39:50]

########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [1634 octets] ##########



STEP 6:

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 4/24/2014
Scan Time: 5:47:37 PM
Logfile:
Administrator: Yes

Version: 2.00.1.1004
Malware Database: v2014.04.24.09
Rootkit Database: v2014.03.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Disabled

OS: Windows 8
CPU: x64
File System: NTFS
User: Jason

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 241211
Time Elapsed: 3 min, 51 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

STEP 7:

C:\Users\Jason\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W4NZ2D39\SPSetup[1].exe    a variant of Win32/Conduit.SearchProtect.H potentially unwanted application
C:\Users\Jason\AppData\Local\Temp\APNSetup.exe    a variant of Win32/Bundled.Toolbar.Ask.E potentially unsafe application
C:\Users\Jason\AppData\Local\Temp\is1832903999\403343768_stp.EXE    Win32/Toolbar.Conduit potentially unwanted application
C:\Users\Jason\AppData\Local\Temp\is1832903999\403343832_stp\wajam_validate.exe    Win32/Wajam.F potentially unwanted application
C:\Users\Jason\AppData\Local\Temp\is1832903999\403344337_stp\OptimizerPro.exe    Win32/SpeedingUpMyPC.I application
C:\Users\Jason\Downloads\cbsidlm-cbsi183-PeerBlock-SEO-75328692.exe    a variant of Win32/CNETInstaller.B potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Google\Chrome\User Data\Default\Extensions\cflheckfmhopnialghigdlggahiomebp\10.23.0.822_0\TBHostSupport\TBHostSupport.dll    a variant of Win32/Toolbar.Conduit.AA potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0CQFDQB9\spstub[1].exe    Win32/Conduit.SearchProtect.L potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\79E90MJW\SPSetup[1].exe    a variant of Win32/Conduit.SearchProtect.H potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Temp\APNSetup.exe    a variant of Win32/Bundled.Toolbar.Ask.E potentially unsafe application
C:\Windows.old\Users\Jason\AppData\Local\Temp\DM1393465380.exe    a variant of Win32/OutBrowse.D potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Temp\SearchProtectINT.exe    Win32/Toolbar.Conduit.R potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Temp\tbuTor.dll    a variant of Win32/Toolbar.Conduit.X potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Temp\utt65AD.tmp.exe    a variant of Win32/Toolbar.Conduit potentially unwanted application
C:\Windows.old\Users\Jason\AppData\Local\Temp\nsfDD6\SpSetup.exe    a variant of Win32/Conduit.SearchProtect.H potentially unwanted application
J:\everythingfolder\AppData\Local\Temp\AskSLib.dll    a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application
J:\everythingfolder\AppData\Local\Temp\PromoEngineInstaller\chutil.dll    Win32/TopMedia.A potentially unwanted application
J:\everythingfolder\random stuff left in the downloads folder\avira_free_antivirus_en.exe    a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application
J:\Music\Demos\Magix\Music_Maker_2013_DLV_en-II_121023_14-46_19_0_3_47.exe    a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application
J:\Music\Demos\Magix\Music_Maker_MX_Download_Version_en-II_120926_16-54_18_0_3_0.exe    a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application


STEP 8(FRST.txt):

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 24-04-2014
Ran by Jason (administrator) on PIXEL on 24-04-2014 19:08:03
Running from C:\Users\Jason\Downloads
Windows 8 Pro (X64) OS Language: English(US)
Internet Explorer Version 10
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(AMD) C:\Windows\system32\atiesrxx.exe
(AMD) C:\Windows\system32\atieclxx.exe
(Malwarebytes Corporation) J:\Malwarebytes Anti-Malware\mbamscheduler.exe
(Malwarebytes Corporation) J:\Malwarebytes Anti-Malware\mbamservice.exe
() C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe
() C:\Windows\SysWOW64\PnkBstrA.exe
(Malwarebytes Corporation) J:\Malwarebytes Anti-Malware\mbam.exe
(Microsoft Corporation) C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.0.1114.318_x64__8wekyb3d8bbwe\LiveComm.exe
(Mozilla Corporation) J:\firefox.exe
(Spotify Ltd) C:\Users\Jason\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe
(Oracle Corporation) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(ESET) C:\Program Files (x86)\ESET\ESET Online Scanner\OnlineScannerApp.exe


==================== Registry (Whitelisted) ==================

HKLM-x32\...\Run: [sunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
HKLM-x32\...\Run: [startCCC] => J:\amdcatalyst\ATI.ACE\Core-Static\amd64\CLIStart.exe [766208 2013-12-06] (Advanced Micro Devices, Inc.)
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\Run: [OutfoxTV] => C:\Program Files\OutfoxTV\OutfoxTV\DesktopContainer.exe
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\Run: [spotify Web Helper] => C:\Users\Jason\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe [1171000 2014-04-09] (Spotify Ltd)
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {1c6b7410-bb43-11e2-be66-806e6f6e6963} - "D:\AUTOPLAY.EXE" id=10000017000024000001 ver=1.0.0.0
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {785e386b-b3dc-11e3-be6c-902b34dee62d} - "E:\Autorun.exe"
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {969333d1-742c-11e3-bec3-902b34dee62d} - "E:\VZW_Software_upgrade_assistant.exe"
HKU\S-1-5-21-1076075667-1471386052-3169907094-1001\...\MountPoints2: {de4ac8bf-9398-11e3-becb-902b34dee62d} - "E:\Autorun.exe"
Startup: C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ERUNT AutoBackup.lnk
ShortcutTarget: ERUNT AutoBackup.lnk -> J:\ERUNT\AUTOBACK.EXE ()

==================== Internet (Whitelisted) ====================

BHO-x32: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.254

FireFox:
========
FF ProfilePath: C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317
FF Homepage: about:home
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_12_0_0_77.dll ()
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_12_0_0_77.dll ()
FF Plugin-x32: @esn.me/esnsonar,version=0.70.4 - C:\Program Files (x86)\Battlelog Web Plugins\Sonar\0.70.4\npesnsonar.dll (ESN Social Software AB)
FF Plugin-x32: @esn/npbattlelog,version=2.3.2 - C:\Program Files (x86)\Battlelog Web Plugins\2.3.2\npbattlelog.dll (EA Digital Illusions CE AB)
FF Plugin-x32: @java.com/DTPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @videolan.org/vlc,version=2.1.3 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Extension: Adblock Plus - C:\Users\Jason\AppData\Roaming\Mozilla\Firefox\Profiles\9h1obqd7.default-1397769514317\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2014-04-17]

==================== Services (Whitelisted) =================

R2 MBAMScheduler; J:\Malwarebytes Anti-Malware\mbamscheduler.exe [1809720 2014-04-03] (Malwarebytes Corporation)
R2 MBAMService; J:\Malwarebytes Anti-Malware\mbamservice.exe [857912 2014-04-03] (Malwarebytes Corporation)
R2 PassThru Service; C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe [167424 2012-12-07] ()
R2 PnkBstrA; C:\Windows\SysWOW64\PnkBstrA.exe [76888 2014-03-29] ()
S3 WinDefend; C:\Program Files\Windows Defender\MsMpEng.exe [16048 2013-10-25] (Microsoft Corporation)
S2 OutfoxTvService; C:\Program Files\OutfoxTV\OutfoxTvService.exe [X]

==================== Drivers (Whitelisted) ====================

S0 amdkmafd; C:\Windows\System32\drivers\amdkmafd.sys [21160 2012-09-22] (Advanced Micro Devices, Inc.)
R3 AtiHDAudioService; C:\Windows\system32\drivers\AtihdW86.sys [215040 2013-09-24] (Advanced Micro Devices)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [25816 2014-04-03] (Malwarebytes Corporation)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [119512 2014-04-24] (Malwarebytes Corporation)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [63192 2014-04-03] (Malwarebytes Corporation)
S3 pbfilter; J:\PeerBlock\pbfilter.sys [22600 2014-01-14] ()
S3 SWDUMon; C:\Windows\system32\DRIVERS\SWDUMon.sys [16152 2014-03-24] ()

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-24 19:08 - 2014-04-24 19:08 - 00000000 ____D () C:\Users\Jason\Downloads\FRST-OlderVersion
2014-04-24 17:51 - 2014-04-24 17:51 - 00000000 ____D () C:\Program Files (x86)\ESET
2014-04-24 17:50 - 2014-04-24 17:50 - 02347384 _____ (ESET) C:\Users\Jason\Downloads\esetsmartinstaller_enu.exe
2014-04-24 17:38 - 2014-04-24 17:39 - 00000000 ____D () C:\AdwCleaner
2014-04-24 17:37 - 2014-04-24 17:37 - 01365865 _____ () C:\Users\Jason\Downloads\AdwCleaner.exe
2014-04-24 17:33 - 2014-04-24 17:33 - 00001858 _____ () C:\Users\Jason\Desktop\JRT.txt
2014-04-24 17:29 - 2014-04-24 17:29 - 00000000 ____D () C:\Windows\ERUNT
2014-04-24 17:27 - 2014-04-24 17:27 - 01016261 _____ (Thisisu) C:\Users\Jason\Downloads\JRT.exe
2014-04-24 17:20 - 2014-04-24 17:27 - 00000000 ____D () C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2014-04-24 17:19 - 2014-04-24 17:19 - 00000000 ____D () C:\Users\Jason\New folder
2014-04-24 17:17 - 2014-04-24 17:18 - 12589848 _____ (Malwarebytes Corp.) C:\Users\Jason\Downloads\mbar-1.07.0.1009.exe
2014-04-23 21:04 - 2014-04-23 21:04 - 00282880 _____ (Mozilla) C:\Users\Jason\Downloads\Firefox Setup Stub 28.0(1).exe
2014-04-23 20:40 - 2014-04-23 20:40 - 00000000 ____D () C:\Users\Jason\AppData\Local\My Games
2014-04-23 18:48 - 2014-04-23 18:48 - 00049587 _____ () C:\Users\Jason\Desktop\RKreport[0]_D_04232014_184830.txt
2014-04-23 18:47 - 2014-04-23 18:47 - 00049538 _____ () C:\Users\Jason\Desktop\RKreport[0]_S_04232014_184753.txt
2014-04-23 18:46 - 2014-04-23 18:48 - 00000000 ____D () C:\Users\Jason\Desktop\RK_Quarantine
2014-04-23 18:45 - 2014-04-23 18:46 - 04527616 _____ () C:\Users\Jason\Downloads\RogueKillerX64.exe
2014-04-23 18:40 - 2014-04-23 18:40 - 00282880 _____ (Mozilla) C:\Users\Jason\Downloads\Firefox Setup Stub 28.0.exe
2014-04-23 18:26 - 2014-04-24 17:41 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-23 18:26 - 2014-04-24 17:19 - 00091352 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-23 18:26 - 2014-04-23 18:26 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Jason\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-23 18:26 - 2014-04-23 18:26 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-04-23 18:26 - 2014-04-03 09:51 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-23 18:26 - 2014-04-03 09:50 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-23 18:23 - 2014-04-23 18:23 - 00000000 ____D () C:\Windows\ERDNT
2014-04-23 18:22 - 2014-04-23 18:22 - 00000525 _____ () C:\Users\Jason\Desktop\NTREGOPT.lnk
2014-04-23 18:22 - 2014-04-23 18:22 - 00000512 _____ () C:\Users\Jason\Desktop\ERUNT.lnk
2014-04-23 18:22 - 2014-04-23 18:22 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ERUNT
2014-04-23 18:21 - 2014-04-23 18:21 - 00791393 _____ (Lars Hederer ) C:\Users\Jason\Downloads\erunt-setup.exe
2014-04-23 17:58 - 2014-04-23 17:58 - 00224160 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1398301103316
2014-04-23 17:21 - 2014-04-23 17:21 - 00224160 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1398298864997
2014-04-23 10:10 - 2014-04-23 10:11 - 00002170 _____ () C:\Users\Jason\Desktop\Rkill.txt
2014-04-23 10:10 - 2014-04-23 10:10 - 01933048 _____ (Bleeping Computer, LLC) C:\Users\Jason\Downloads\rkill.exe
2014-04-21 19:28 - 2014-04-21 19:28 - 00000817 _____ () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware.lnk
2014-04-21 19:18 - 2014-04-21 19:18 - 00018107 _____ () C:\Users\Jason\Downloads\Addition.txt
2014-04-21 19:17 - 2014-04-24 19:08 - 02061824 _____ (Farbar) C:\Users\Jason\Downloads\FRST64.exe
2014-04-21 19:17 - 2014-04-24 19:08 - 00006133 _____ () C:\Users\Jason\Downloads\FRST.txt
2014-04-21 19:17 - 2014-04-24 19:08 - 00000000 ____D () C:\FRST
2014-04-21 19:13 - 2014-04-21 19:13 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-21 19:12 - 2014-04-21 19:12 - 00004204 _____ () C:\Windows\SysWOW64\jupdate-1.7.0_55-b14.log
2014-04-21 19:12 - 2014-04-21 19:12 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java
2014-04-20 23:01 - 2014-04-23 18:26 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-20 23:01 - 2014-04-20 23:01 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Malwarebytes
2014-04-17 21:16 - 2014-04-17 21:16 - 00218224 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397794575377
2014-04-17 14:46 - 2014-04-17 14:46 - 00000000 ____D () C:\Users\Jason\AppData\Local\PunkBuster
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\ProgramData\ATI
2014-04-17 14:39 - 2014-04-17 14:39 - 00054723 _____ () C:\Windows\SysWOW64\CCCInstall_201404171439289379.log
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AMD Catalyst Control Center
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\ProgramData\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files (x86)\AMD AVT
2014-04-17 14:38 - 2014-04-17 14:38 - 00000000 ____D () C:\Program Files\ATI
2014-04-17 14:32 - 2014-04-17 14:32 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\library_dir
2014-04-17 14:31 - 2014-04-21 19:14 - 00000000 ____D () C:\Program Files (x86)\Raptr
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer.exe
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer(1).exe
2014-04-17 14:19 - 2014-04-24 17:36 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-04-17 14:19 - 2014-04-23 18:43 - 00001180 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Firefox.lnk
2014-04-17 14:19 - 2014-04-23 18:43 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\ProgramData\Mozilla
2014-04-17 14:18 - 2014-04-17 14:18 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data-1
2014-04-17 00:02 - 2014-04-17 00:02 - 00000897 _____ () C:\Users\Public\Desktop\Dead Space.lnk
2014-04-17 00:02 - 2014-04-17 00:02 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Dead Space
2014-04-16 21:24 - 2014-04-16 22:44 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Winamp
2014-04-16 18:55 - 2014-04-16 18:55 - 03822704 _____ () C:\Users\Jason\Downloads\battlelog-web-plugins_2.3.2_133.exe
2014-04-16 18:55 - 2014-04-16 18:55 - 00000000 ____D () C:\Users\Jason\AppData\Local\ESN
2014-04-12 04:20 - 2014-02-03 16:56 - 00332632 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\storport.sys
2014-04-12 04:20 - 2014-02-03 16:56 - 00278872 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\msiscsi.sys
2014-04-12 04:20 - 2014-01-31 23:55 - 00041984 _____ (Microsoft Corporation) C:\Windows\system32\fveskybackup.dll
2014-04-12 04:20 - 2014-01-30 20:55 - 00209712 _____ (Microsoft Corporation) C:\Windows\system32\NotificationUI.exe
2014-04-12 04:20 - 2014-01-30 17:48 - 00564736 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WSShared.dll
2014-04-12 04:20 - 2014-01-30 17:48 - 00485888 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WSDApi.dll
2014-04-12 04:20 - 2014-01-30 17:48 - 00143872 _____ (Microsoft Corporation) C:\Windows\SysWOW64\Windows.ApplicationModel.Store.dll
2014-04-12 04:20 - 2014-01-30 17:48 - 00124928 _____ (Microsoft Corporation) C:\Windows\SysWOW64\Windows.ApplicationModel.Store.TestingFramework.dll
2014-04-12 04:20 - 2014-01-30 17:06 - 00690688 _____ (Microsoft Corporation) C:\Windows\system32\WSShared.dll
2014-04-12 04:20 - 2014-01-30 17:06 - 00599040 _____ (Microsoft Corporation) C:\Windows\system32\WSDApi.dll
2014-04-12 04:20 - 2014-01-30 17:06 - 00163840 _____ (Microsoft Corporation) C:\Windows\system32\Windows.ApplicationModel.Store.TestingFramework.dll
2014-04-12 04:20 - 2014-01-26 20:42 - 02232664 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\tcpip.sys
2014-04-12 04:20 - 2014-01-26 20:39 - 01939288 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ntfs.sys
2014-04-12 04:20 - 2014-01-26 17:52 - 17561088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\shell32.dll
2014-04-12 04:20 - 2014-01-26 17:31 - 19752448 _____ (Microsoft Corporation) C:\Windows\system32\shell32.dll
2014-04-12 04:20 - 2014-01-26 16:17 - 00386722 _____ () C:\Windows\system32\ApnDatabase.xml
2014-04-12 04:20 - 2014-01-15 16:42 - 00118784 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dfsc.sys
2014-04-12 04:20 - 2014-01-10 23:48 - 05979648 _____ (Microsoft Corporation) C:\Windows\system32\mstscax.dll
2014-04-12 04:20 - 2014-01-10 22:06 - 05092352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mstscax.dll
2014-04-12 04:20 - 2014-01-02 16:35 - 00365568 _____ (Microsoft Corporation) C:\Windows\SysWOW64\XpsGdiConverter.dll
2014-04-12 04:20 - 2014-01-02 16:32 - 00523264 _____ (Microsoft Corporation) C:\Windows\system32\XpsGdiConverter.dll
2014-04-12 04:19 - 2014-03-06 17:48 - 01766400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-04-12 04:19 - 2014-03-06 17:48 - 01140736 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 14357504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 13760512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 02877952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 02049536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 00493056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-04-12 04:19 - 2014-03-06 17:47 - 00163840 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 19273216 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 15404544 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 03959808 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 02648576 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 02240000 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 01365504 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00915968 _____ (Microsoft Corporation) C:\Windows\system32\uxtheme.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00855552 _____ (Microsoft Corporation) C:\Windows\system32\jscript.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00603136 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-04-12 04:19 - 2014-03-06 17:08 - 00051712 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-04-12 04:19 - 2013-05-15 15:37 - 00044032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\UXInit.dll
2014-04-12 04:19 - 2013-05-15 15:35 - 00053760 _____ (Microsoft Corporation) C:\Windows\system32\UXInit.dll
2014-04-12 04:19 - 2013-05-14 06:14 - 02706432 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-04-12 04:19 - 2013-05-14 02:23 - 02706432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-04-12 04:19 - 2013-02-21 03:29 - 00109056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesysprep.dll
2014-04-12 04:19 - 2013-02-21 03:29 - 00061440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-04-12 04:19 - 2013-02-21 03:29 - 00039424 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-04-12 04:19 - 2013-02-21 03:29 - 00033280 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-04-12 04:19 - 2013-02-21 03:14 - 00136704 _____ (Microsoft Corporation) C:\Windows\system32\iesysprep.dll
2014-04-12 04:19 - 2013-02-21 03:14 - 00053248 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-04-12 04:19 - 2013-02-19 02:53 - 00534528 _____ (Microsoft Corporation) C:\Windows\SysWOW64\uxtheme.dll
2014-04-12 04:19 - 2012-11-07 21:20 - 00067072 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-04-12 04:19 - 2012-11-07 21:20 - 00039936 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-04-12 04:19 - 2012-07-25 20:06 - 00197120 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-04-11 15:58 - 2014-04-11 15:58 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data
2014-04-11 09:37 - 2014-04-24 18:01 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\.minecraft
2014-04-09 19:54 - 2014-04-09 19:56 - 00000000 ____D () C:\Users\Jason\Desktop\Danicas Phone backup
2014-04-09 09:55 - 2014-04-14 20:13 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-09 09:55 - 2014-04-14 20:05 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-09 09:55 - 2014-04-14 20:05 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-09 09:55 - 2014-04-14 20:04 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-09 09:55 - 2014-04-09 09:55 - 00000000 ____D () C:\ProgramData\Sun
2014-04-09 09:54 - 2014-04-21 19:12 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-09 09:53 - 2014-04-09 09:53 - 00921000 _____ (Oracle Corporation) C:\Users\Jason\Downloads\jxpiinstall.exe
2014-04-08 23:39 - 2014-02-05 16:41 - 01257984 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2014-04-08 23:39 - 2014-02-05 16:41 - 00978432 _____ (Microsoft Corporation) C:\Windows\system32\KernelBase.dll
2014-04-08 23:39 - 2014-02-05 16:26 - 00666112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\KernelBase.dll
2014-04-08 23:39 - 2014-02-05 16:19 - 00974848 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2014-04-08 19:24 - 2014-04-08 19:24 - 00000000 __RHD () C:\Users\Jason\AppData\Roaming\SecuROM
2014-04-03 22:37 - 2014-04-03 22:59 - 836566156 _____ () C:\Users\Jason\Downloads\Rick and Morty S01E05 Meeseeks and Destroy (1920x1080) [Phr0stY].mkv
2014-04-02 09:16 - 2014-04-02 09:16 - 00000000 ____H () C:\Windows\system32\Drivers\Msft_User_WpdFs_01_11_00.Wdf
2014-03-30 00:34 - 2014-03-30 00:34 - 00000000 ____D () C:\ProgramData\EA Core
2014-03-29 17:36 - 2014-04-23 18:55 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.exe
2014-03-29 17:36 - 2014-04-23 10:15 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.ex0
2014-03-29 17:36 - 2014-04-17 14:38 - 00000000 ____D () C:\ProgramData\Package Cache
2014-03-29 17:36 - 2014-04-17 14:08 - 00000000 ____D () C:\Program Files (x86)\Battlelog Web Plugins
2014-03-29 17:36 - 2014-03-29 17:36 - 00076888 _____ () C:\Windows\SysWOW64\PnkBstrA.exe
2014-03-29 17:36 - 2014-03-29 17:36 - 00000890 _____ () C:\Users\Public\Desktop\Battlefield 4.lnk
2014-03-29 17:36 - 2014-03-29 17:36 - 00000874 _____ () C:\Users\Public\Desktop\Battlefield 4(64 bit).lnk
2014-03-29 17:36 - 2014-03-29 17:36 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Battlefield 4
2014-03-29 15:39 - 2014-03-29 15:39 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-03-29 15:39 - 2014-03-29 15:38 - 00447752 _____ (On2.com) C:\Windows\SysWOW64\vp6vfw.dll
2014-03-29 14:16 - 2014-04-16 18:58 - 00000000 ____D () C:\Users\Jason\AppData\Local\Origin
2014-03-29 14:16 - 2014-03-29 14:24 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Origin
2014-03-29 14:15 - 2014-04-16 18:57 - 00000000 ____D () C:\ProgramData\Electronic Arts
2014-03-29 14:15 - 2014-03-29 14:15 - 00000531 _____ () C:\Users\Public\Desktop\Origin.lnk
2014-03-29 14:15 - 2014-03-29 14:15 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Origin
2014-03-29 14:14 - 2014-03-29 14:14 - 17009704 _____ (Electronic Arts, Inc.) C:\Users\Jason\Downloads\OriginThinSetup.exe
2014-03-29 13:37 - 2014-04-21 21:26 - 00000000 ____D () C:\ProgramData\Origin
2014-03-26 23:30 - 2014-03-26 23:30 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\dvdcss
2014-03-26 23:29 - 2014-03-26 23:29 - 00014836 _____ () C:\Windows\DPINST.LOG
2014-03-26 23:29 - 2014-03-26 23:29 - 00000000 ____D () C:\Program Files (x86)\HTC
2014-03-25 18:02 - 2014-03-25 18:02 - 00000000 ____D () C:\Windows\system32\appmgmt

==================== One Month Modified Files and Folders =======

2014-04-24 19:08 - 2014-04-24 19:08 - 00000000 ____D () C:\Users\Jason\Downloads\FRST-OlderVersion
2014-04-24 19:08 - 2014-04-21 19:17 - 02061824 _____ (Farbar) C:\Users\Jason\Downloads\FRST64.exe
2014-04-24 19:08 - 2014-04-21 19:17 - 00006133 _____ () C:\Users\Jason\Downloads\FRST.txt
2014-04-24 19:08 - 2014-04-21 19:17 - 00000000 ____D () C:\FRST
2014-04-24 18:18 - 2014-03-13 20:26 - 01913701 _____ () C:\Windows\WindowsUpdate.log
2014-04-24 18:01 - 2014-04-11 09:37 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\.minecraft
2014-04-24 18:00 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\system32\sru
2014-04-24 17:51 - 2014-04-24 17:51 - 00000000 ____D () C:\Program Files (x86)\ESET
2014-04-24 17:50 - 2014-04-24 17:50 - 02347384 _____ (ESET) C:\Users\Jason\Downloads\esetsmartinstaller_enu.exe
2014-04-24 17:46 - 2012-07-26 00:28 - 00848230 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-24 17:41 - 2014-04-23 18:26 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-24 17:40 - 2012-07-26 00:22 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-24 17:40 - 2012-07-25 22:26 - 00262144 ___SH () C:\Windows\system32\config\BBI
2014-04-24 17:39 - 2014-04-24 17:38 - 00000000 ____D () C:\AdwCleaner
2014-04-24 17:37 - 2014-04-24 17:37 - 01365865 _____ () C:\Users\Jason\Downloads\AdwCleaner.exe
2014-04-24 17:36 - 2014-04-17 14:19 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-04-24 17:36 - 2014-03-13 20:25 - 00037464 _____ () C:\Windows\PFRO.log
2014-04-24 17:33 - 2014-04-24 17:33 - 00001858 _____ () C:\Users\Jason\Desktop\JRT.txt
2014-04-24 17:29 - 2014-04-24 17:29 - 00000000 ____D () C:\Windows\ERUNT
2014-04-24 17:27 - 2014-04-24 17:27 - 01016261 _____ (Thisisu) C:\Users\Jason\Downloads\JRT.exe
2014-04-24 17:27 - 2014-04-24 17:20 - 00000000 ____D () C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2014-04-24 17:19 - 2014-04-24 17:19 - 00000000 ____D () C:\Users\Jason\New folder
2014-04-24 17:19 - 2014-04-23 18:26 - 00091352 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-24 17:19 - 2014-03-13 20:26 - 00000000 ____D () C:\Users\Jason
2014-04-24 17:18 - 2014-04-24 17:17 - 12589848 _____ (Malwarebytes Corp.) C:\Users\Jason\Downloads\mbar-1.07.0.1009.exe
2014-04-23 22:45 - 2014-03-23 23:59 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\uTorrent
2014-04-23 21:04 - 2014-04-23 21:04 - 00282880 _____ (Mozilla) C:\Users\Jason\Downloads\Firefox Setup Stub 28.0(1).exe
2014-04-23 20:40 - 2014-04-23 20:40 - 00000000 ____D () C:\Users\Jason\AppData\Local\My Games
2014-04-23 20:35 - 2014-03-13 21:14 - 00062548 _____ () C:\Windows\DirectX.log
2014-04-23 18:55 - 2014-03-29 17:36 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.exe
2014-04-23 18:48 - 2014-04-23 18:48 - 00049587 _____ () C:\Users\Jason\Desktop\RKreport[0]_D_04232014_184830.txt
2014-04-23 18:48 - 2014-04-23 18:46 - 00000000 ____D () C:\Users\Jason\Desktop\RK_Quarantine
2014-04-23 18:47 - 2014-04-23 18:47 - 00049538 _____ () C:\Users\Jason\Desktop\RKreport[0]_S_04232014_184753.txt
2014-04-23 18:46 - 2014-04-23 18:45 - 04527616 _____ () C:\Users\Jason\Downloads\RogueKillerX64.exe
2014-04-23 18:43 - 2014-04-17 14:19 - 00001180 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Firefox.lnk
2014-04-23 18:43 - 2014-04-17 14:19 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-04-23 18:43 - 2013-06-03 18:13 - 00001168 _____ () C:\Users\Public\Desktop\Mozilla Firefox.lnk
2014-04-23 18:40 - 2014-04-23 18:40 - 00282880 _____ (Mozilla) C:\Users\Jason\Downloads\Firefox Setup Stub 28.0.exe
2014-04-23 18:38 - 2014-03-13 20:39 - 00000000 ____D () C:\Users\Jason\AppData\Local\VirtualStore
2014-04-23 18:37 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\schemas
2014-04-23 18:26 - 2014-04-23 18:26 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Jason\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-23 18:26 - 2014-04-23 18:26 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-04-23 18:26 - 2014-04-20 23:01 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-23 18:23 - 2014-04-23 18:23 - 00000000 ____D () C:\Windows\ERDNT
2014-04-23 18:22 - 2014-04-23 18:22 - 00000525 _____ () C:\Users\Jason\Desktop\NTREGOPT.lnk
2014-04-23 18:22 - 2014-04-23 18:22 - 00000512 _____ () C:\Users\Jason\Desktop\ERUNT.lnk
2014-04-23 18:22 - 2014-04-23 18:22 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ERUNT
2014-04-23 18:22 - 2014-03-13 20:39 - 00000000 ___RD () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
2014-04-23 18:21 - 2014-04-23 18:21 - 00791393 _____ (Lars Hederer ) C:\Users\Jason\Downloads\erunt-setup.exe
2014-04-23 17:58 - 2014-04-23 17:58 - 00224160 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1398301103316
2014-04-23 17:21 - 2014-04-23 17:21 - 00224160 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1398298864997
2014-04-23 10:15 - 2014-03-29 17:36 - 00214392 _____ () C:\Windows\SysWOW64\PnkBstrB.ex0
2014-04-23 10:11 - 2014-04-23 10:10 - 00002170 _____ () C:\Users\Jason\Desktop\Rkill.txt
2014-04-23 10:10 - 2014-04-23 10:10 - 01933048 _____ (Bleeping Computer, LLC) C:\Users\Jason\Downloads\rkill.exe
2014-04-21 21:26 - 2014-03-29 13:37 - 00000000 ____D () C:\ProgramData\Origin
2014-04-21 19:41 - 2014-03-13 20:45 - 00003600 _____ () C:\Windows\System32\Tasks\Optimize Start Menu Cache Files-S-1-5-21-1076075667-1471386052-3169907094-1001
2014-04-21 19:28 - 2014-04-21 19:28 - 00000817 _____ () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware.lnk
2014-04-21 19:18 - 2014-04-21 19:18 - 00018107 _____ () C:\Users\Jason\Downloads\Addition.txt
2014-04-21 19:14 - 2014-04-17 14:31 - 00000000 ____D () C:\Program Files (x86)\Raptr
2014-04-21 19:13 - 2014-04-21 19:13 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-21 19:12 - 2014-04-21 19:12 - 00004204 _____ () C:\Windows\SysWOW64\jupdate-1.7.0_55-b14.log
2014-04-21 19:12 - 2014-04-21 19:12 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java
2014-04-21 19:12 - 2014-04-09 09:54 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-21 19:10 - 2014-03-23 23:41 - 00000000 ____D () C:\Program Files (x86)\Jotzey
2014-04-20 23:01 - 2014-04-20 23:01 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Malwarebytes
2014-04-20 21:37 - 2014-03-13 20:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\Mozilla
2014-04-20 20:28 - 2014-03-13 21:27 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Spotify
2014-04-20 19:51 - 2014-03-16 00:04 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\vlc
2014-04-17 21:46 - 2014-03-13 21:28 - 00000000 ____D () C:\Users\Jason\AppData\Local\Spotify
2014-04-17 21:16 - 2014-04-17 21:16 - 00218224 _____ () C:\Users\Jason\AppData\Local\soulseek-client.dat.1397794575377
2014-04-17 14:46 - 2014-04-17 14:46 - 00000000 ____D () C:\Users\Jason\AppData\Local\PunkBuster
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\Users\Jason\AppData\Local\ATI
2014-04-17 14:41 - 2014-04-17 14:41 - 00000000 ____D () C:\ProgramData\ATI
2014-04-17 14:39 - 2014-04-17 14:39 - 00054723 _____ () C:\Windows\SysWOW64\CCCInstall_201404171439289379.log
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AMD Catalyst Control Center
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\ProgramData\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files\AMD
2014-04-17 14:39 - 2014-04-17 14:39 - 00000000 ____D () C:\Program Files (x86)\AMD AVT
2014-04-17 14:39 - 2012-07-26 00:21 - 00023320 _____ () C:\Windows\setupact.log
2014-04-17 14:38 - 2014-04-17 14:38 - 00000000 ____D () C:\Program Files\ATI
2014-04-17 14:38 - 2014-03-29 17:36 - 00000000 ____D () C:\ProgramData\Package Cache
2014-04-17 14:32 - 2014-04-17 14:32 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\library_dir
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer.exe
2014-04-17 14:31 - 2014-04-17 14:31 - 01007930 _____ () C:\Users\Jason\Downloads\amddriverdownload_installer(1).exe
2014-04-17 14:19 - 2014-04-17 14:19 - 00000000 ____D () C:\ProgramData\Mozilla
2014-04-17 14:18 - 2014-04-17 14:18 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data-1
2014-04-17 14:08 - 2014-03-29 17:36 - 00000000 ____D () C:\Program Files (x86)\Battlelog Web Plugins
2014-04-17 01:07 - 2012-07-25 22:26 - 00262144 ___SH () C:\Windows\system32\config\ELAM
2014-04-17 00:02 - 2014-04-17 00:02 - 00000897 _____ () C:\Users\Public\Desktop\Dead Space.lnk
2014-04-17 00:02 - 2014-04-17 00:02 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Dead Space
2014-04-16 22:44 - 2014-04-16 21:24 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Winamp
2014-04-16 18:58 - 2014-03-29 14:16 - 00000000 ____D () C:\Users\Jason\AppData\Local\Origin
2014-04-16 18:57 - 2014-03-29 14:15 - 00000000 ____D () C:\ProgramData\Electronic Arts
2014-04-16 18:55 - 2014-04-16 18:55 - 03822704 _____ () C:\Users\Jason\Downloads\battlelog-web-plugins_2.3.2_133.exe
2014-04-16 18:55 - 2014-04-16 18:55 - 00000000 ____D () C:\Users\Jason\AppData\Local\ESN
2014-04-15 16:12 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\rescache
2014-04-15 14:31 - 2014-03-13 20:39 - 00000000 ___RD () C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools
2014-04-15 14:30 - 2012-07-26 01:12 - 00000000 ___RD () C:\Windows\ToastData
2014-04-15 14:30 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\WinStore
2014-04-14 20:13 - 2014-04-09 09:55 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-14 20:05 - 2014-04-09 09:55 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-14 20:05 - 2014-04-09 09:55 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-14 20:04 - 2014-04-09 09:55 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-11 15:58 - 2014-04-11 15:58 - 00000000 ____D () C:\Users\Jason\Desktop\Old Firefox Data
2014-04-09 19:56 - 2014-04-09 19:54 - 00000000 ____D () C:\Users\Jason\Desktop\Danicas Phone backup
2014-04-09 09:55 - 2014-04-09 09:55 - 00000000 ____D () C:\ProgramData\Sun
2014-04-09 09:53 - 2014-04-09 09:53 - 00921000 _____ (Oracle Corporation) C:\Users\Jason\Downloads\jxpiinstall.exe
2014-04-09 03:00 - 2014-03-17 20:41 - 90655440 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-04-09 03:00 - 2014-03-17 20:41 - 00000000 ____D () C:\Windows\system32\MRT
2014-04-08 19:24 - 2014-04-08 19:24 - 00000000 __RHD () C:\Users\Jason\AppData\Roaming\SecuROM
2014-04-03 22:59 - 2014-04-03 22:37 - 836566156 _____ () C:\Users\Jason\Downloads\Rick and Morty S01E05 Meeseeks and Destroy (1920x1080) [Phr0stY].mkv
2014-04-03 09:51 - 2014-04-23 18:26 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-03 09:50 - 2014-04-23 18:26 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-02 09:16 - 2014-04-02 09:16 - 00000000 ____H () C:\Windows\system32\Drivers\Msft_User_WpdFs_01_11_00.Wdf
2014-03-31 23:13 - 2012-07-26 01:12 - 00000000 ____D () C:\Windows\AUInstallAgent
2014-03-31 14:18 - 2012-07-26 01:14 - 00694232 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-03-31 14:18 - 2012-07-26 01:14 - 00078296 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-03-30 00:34 - 2014-03-30 00:34 - 00000000 ____D () C:\ProgramData\EA Core
2014-03-29 17:36 - 2014-03-29 17:36 - 00076888 _____ () C:\Windows\SysWOW64\PnkBstrA.exe
2014-03-29 17:36 - 2014-03-29 17:36 - 00000890 _____ () C:\Users\Public\Desktop\Battlefield 4.lnk
2014-03-29 17:36 - 2014-03-29 17:36 - 00000874 _____ () C:\Users\Public\Desktop\Battlefield 4(64 bit).lnk
2014-03-29 17:36 - 2014-03-29 17:36 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Battlefield 4
2014-03-29 15:39 - 2014-03-29 15:39 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-03-29 15:39 - 2013-08-18 23:11 - 00001182 _____ () C:\Users\Public\Desktop\The Sims™ 3.lnk
2014-03-29 15:38 - 2014-03-29 15:39 - 00447752 _____ (On2.com) C:\Windows\SysWOW64\vp6vfw.dll
2014-03-29 14:24 - 2014-03-29 14:16 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\Origin
2014-03-29 14:15 - 2014-03-29 14:15 - 00000531 _____ () C:\Users\Public\Desktop\Origin.lnk
2014-03-29 14:15 - 2014-03-29 14:15 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Origin
2014-03-29 14:15 - 2012-07-26 01:12 - 00000000 ____D () C:\Program Files\Common Files\microsoft shared
2014-03-29 14:14 - 2014-03-29 14:14 - 17009704 _____ (Electronic Arts, Inc.) C:\Users\Jason\Downloads\OriginThinSetup.exe
2014-03-26 23:30 - 2014-03-26 23:30 - 00000000 ____D () C:\Users\Jason\AppData\Roaming\dvdcss
2014-03-26 23:29 - 2014-03-26 23:29 - 00014836 _____ () C:\Windows\DPINST.LOG
2014-03-26 23:29 - 2014-03-26 23:29 - 00000000 ____D () C:\Program Files (x86)\HTC
2014-03-25 19:17 - 2013-05-19 23:27 - 00001399 _____ () C:\Users\Jason\Desktop\.minecraft - Shortcut.lnk
2014-03-25 18:02 - 2014-03-25 18:02 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-03-25 18:02 - 2014-03-23 23:41 - 00000000 ____D () C:\Program Files (x86)\DriverUpdate

Files to move or delete:
====================
C:\Users\Jason\AccessibleMarshal.dll
C:\Users\Jason\breakpadinjector.dll
C:\Users\Jason\crashreporter.exe
C:\Users\Jason\D3DCompiler_43.dll
C:\Users\Jason\freebl3.dll
C:\Users\Jason\gkmedias.dll
C:\Users\Jason\libEGL.dll
C:\Users\Jason\libGLESv2.dll
C:\Users\Jason\maintenanceservice.exe
C:\Users\Jason\maintenanceservice_installer.exe
C:\Users\Jason\mozalloc.dll
C:\Users\Jason\mozglue.dll
C:\Users\Jason\mozjs.dll
C:\Users\Jason\mozsqlite3.dll
C:\Users\Jason\msvcp100.dll
C:\Users\Jason\msvcr100.dll
C:\Users\Jason\nspr4.dll
C:\Users\Jason\nss3.dll
C:\Users\Jason\nssckbi.dll
C:\Users\Jason\nssdbm3.dll
C:\Users\Jason\nssutil3.dll
C:\Users\Jason\plc4.dll
C:\Users\Jason\plds4.dll
C:\Users\Jason\plugin-container.exe
C:\Users\Jason\plugin-hang-ui.exe
C:\Users\Jason\smime3.dll
C:\Users\Jason\softokn3.dll
C:\Users\Jason\ssl3.dll
C:\Users\Jason\updater.exe
C:\Users\Jason\webapp-uninstaller.exe
C:\Users\Jason\webapprt-stub.exe
C:\Users\Jason\xpcom.dll
C:\Users\Jason\xul.dll


Some content of TEMP:
====================
C:\Users\Jason\AppData\Local\Temp\13-12_win7_win8_64_dd_ccc_whql.exe
C:\Users\Jason\AppData\Local\Temp\APNSetup.exe
C:\Users\Jason\AppData\Local\Temp\jre-7u55-windows-i586-iftw.exe
C:\Users\Jason\AppData\Local\Temp\ntdll_dump.dll
C:\Users\Jason\AppData\Local\Temp\Quarantine.exe
C:\Users\Jason\AppData\Local\Temp\raptrpatch.exe
C:\Users\Jason\AppData\Local\Temp\sonarinst.exe
C:\Users\Jason\AppData\Local\Temp\vlc-2.1.3-win32.exe


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-04-17 03:00

==================== End Of Log ============================

STEP 8(Addition.txt):

Additional scan result of Farbar Recovery Scan Tool (x64) Version: 22-04-2014
Ran by Jason at 2014-04-21 19:18:06
Running from C:\Users\Jason\Downloads
Boot Mode: Normal
==========================================================


==================== Security Center ========================

AV: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

==================== Installed Programs ======================

µTorrent (HKCU\...\uTorrent) (Version: 3.4.1.30740 - BitTorrent Inc.)
Adobe Flash Player 12 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 12.0.0.77 - Adobe Systems Incorporated)
AMD Accelerated Video Transcoding (Version: 13.20.100.31206 - Advanced Micro Devices, Inc.) Hidden
AMD Catalyst Control Center (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
AMD Catalyst Install Manager (HKLM\...\{308051DA-0048-7A07-FE8B-9B6EC119A9E8}) (Version: 8.0.915.0 - Advanced Micro Devices, Inc.)
AMD Wireless Display v3.0 (Version: 1.0.0.14 - Advanced Micro Devices, Inc.) Hidden
Ask Toolbar (HKLM-x32\...\{4F524A2D-5637-4300-76A7-A758B70C0A06}) (Version: 12.10.6.48 - APN, LLC) <==== ATTENTION
Battlefield 4™ (HKLM-x32\...\{ABADE36E-EC37-413B-8179-B432AD3FACE7}) (Version: 1.2.0.0 - Electronic Arts)
Battlelog Web Plugins (HKLM-x32\...\Battlelog Web Plugins) (Version: 2.3.2 - EA Digital Illusions CE AB)
Catalyst Control Center - Branding (x32 Version: 1.00.0000 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center Graphics Previews Common (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center InstallProxy (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center Localization All (x32 Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Chinese Standard (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Chinese Traditional (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Czech (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Danish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Dutch (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help English (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Finnish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help French (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help German (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Greek (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Hungarian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Italian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Japanese (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Korean (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Norwegian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Polish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Portuguese (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Russian (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Spanish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Swedish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Thai (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
CCC Help Turkish (x32 Version: 2013.1206.1602.28764 - Advanced Micro Devices, Inc.) Hidden
ccc-utility64 (Version: 2013.1206.1603.28764 - Advanced Micro Devices, Inc.) Hidden
Dead Space™ (HKLM-x32\...\{9789E33B-317A-44B2-AF9A-FF8708AD93E0}) (Version: 1.0.0.222 - Electronic Arts)
ESN Sonar (HKLM-x32\...\ESN Sonar-0.70.4) (Version: 0.70.4 - ESN Social Software AB)
IPTInstaller (HKLM-x32\...\{08208143-777D-4A06-BB54-71BF0AD1BB70}) (Version: 4.0.8 - HTC)
Java 7 Update 55 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217051FF}) (Version: 7.0.550 - Oracle)
Java Auto Updater (x32 Version: 2.1.9.8 - Sun Microsystems, Inc.) Hidden
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{7299052b-02a4-4627-81f2-1818da5d550d}) (Version: 8.0.56336 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (HKLM-x32\...\{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}) (Version: 9.0.21022 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319 (HKLM-x32\...\{196BB40D-1578-3D01-B289-BEFC77A11A1E}) (Version: 10.0.30319 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.50727 (HKLM-x32\...\{15134cb0-b767-4960-a911-f2d16ae54797}) (Version: 11.0.50727.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.60610 (HKLM-x32\...\{a1909659-0a08-4554-8af1-2175904903a1}) (Version: 11.0.60610.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.50727 (HKLM-x32\...\{22154f09-719a-4619-bb71-5b3356999fbf}) (Version: 11.0.50727.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 (HKLM-x32\...\{95716cce-fc71-413f-8ad5-56c2892d4b3a}) (Version: 11.0.60610.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden
Mozilla Firefox 28.0 (x86 en-US) (HKLM-x32\...\Mozilla Firefox 28.0 (x86 en-US)) (Version: 28.0 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 28.0 - Mozilla)
Origin (HKLM-x32\...\Origin) (Version: 9.4.6.2792 - Electronic Arts, Inc.)
PeerBlock 1.2 (r693) (HKLM\...\{015C5B35-B678-451C-9AEE-821E8D69621C}_is1) (Version: 1.2.0.693 - PeerBlock, LLC)
PunkBuster Services (HKLM-x32\...\PunkBusterSvc) (Version: 0.993 - Even Balance, Inc.)
Quiknowledge (HKLM-x32\...\Quiknowledge) (Version: 1.9.0.1 - Quiknowledge) <==== ATTENTION
Search Protect (HKLM-x32\...\SearchProtect) (Version: 2.12.20.154 - Conduit) <==== ATTENTION
Spotify (HKCU\...\Spotify) (Version: 0.9.8.296.g91f68827 - Spotify AB)
The Sims™ 3 (HKLM-x32\...\{C05D8CDB-417D-4335-A38C-A0659EDFD6B8}) (Version: 1.67.2 - Electronic Arts)
VLC media player 2.1.3 (HKLM-x32\...\VLC media player) (Version: 2.1.3 - VideoLAN)

==================== Restore Points  =========================

29-03-2014 22:39:02 Installed The Sims 3
09-04-2014 02:50:37 Installed The Sims 3
13-04-2014 10:00:01 Windows Update
17-04-2014 06:59:15 Installed DirectX
22-04-2014 02:12:20 Installed Java 7 Update 55

==================== Hosts content: ==========================

2012-07-25 22:26 - 2012-07-25 22:26 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {1AAFF332-5C62-4558-9991-DAA649C4C9C5} - System32\Tasks\Microsoft\Windows\Sysmain\WsSwapAssessmentTask => Rundll32.exe sysmain.dll,PfSvWsSwapAssessmentTask
Task: {23A5D8BE-9196-40EB-BD89-794398B2B073} - System32\Tasks\Microsoft\Windows\WS\WSRefreshBannedAppsListTask => Rundll32.exe WSClient.dll,RefreshBannedAppsList
Task: {511C99F1-1C87-4EBD-A716-9CD3DDBF465B} - System32\Tasks\Microsoft\Windows\Setup\Pre-staged GDR Notification => C:\Windows\system32\NotificationUI.exe [2014-01-30] (Microsoft Corporation)
Task: {9F8E7CDB-723D-4E37-AA81-2F4419DEB985} - System32\Tasks\Microsoft\Windows\Setup\Windows Upgrade Notification Task => C:\Windows\system32\NotificationUI.exe [2014-01-30] (Microsoft Corporation)
Task: {A72208BF-7A49-4FB8-B684-252375F3443A} - System32\Tasks\Microsoft\Windows\WS\License Validation => Rundll32.exe WSClient.dll,WSpTLR licensing
Task: {C6A88F2D-53D2-4805-9D69-443738A1847C} - System32\Tasks\Microsoft\Windows\ApplicationData\CleanupTemporaryState => Rundll32.exe Windows.Storage.ApplicationData.dll,CleanupTemporaryState
Task: {EBF06DEC-4228-4813-AC0C-62821AE4E330} - System32\Tasks\Microsoft\Windows\Application Experience\StartupAppTask => Rundll32.exe Startupscan.dll,SusRunTask

==================== Loaded Modules (whitelisted) =============

2012-12-07 18:27 - 2012-12-07 18:27 - 00167424 _____ () C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe
2014-03-29 17:36 - 2014-03-29 17:36 - 00076888 _____ () C:\Windows\SysWOW64\PnkBstrA.exe
2013-06-03 18:07 - 2013-05-11 15:26 - 03128728 _____ () J:\mozjs.dll

==================== Alternate Data Streams (whitelisted) =========


==================== Safe Mode (whitelisted) ===================


==================== Disabled items from MSCONFIG ==============


==================== Faulty Device Manager Devices =============


==================== Event log errors: =========================

Application errors:
==================
Error: (04/20/2014 10:52:33 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/17/2014 08:45:38 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/17/2014 00:07:06 PM) (Source: Application Hang) (User: )
Description: The program starbound.exe version 0.9.0.0 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 16d4

Start Time: 01cf59e0ae7afacf

Termination Time: 4294967295

Application Path: J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe

Report Id: 769826b7-c663-11e3-be70-902b34dee62d

Faulting package full name:

Faulting package-relative application ID:

Error: (04/16/2014 06:59:01 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/15/2014 02:32:34 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/11/2014 01:19:44 AM) (Source: Application Hang) (User: )
Description: The program Netflix.exe version 1.15.0.68 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: e5c

Start Time: 01cf55488629e935

Termination Time: 4294967295

Application Path: C:\Program Files\WindowsApps\4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8\Netflix.exe

Report Id: 0192ae7b-c152-11e3-be6e-902b34dee62d

Faulting package full name: 4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8

Faulting package-relative application ID: App

Error: (04/11/2014 01:19:31 AM) (Source: Microsoft-Windows-Immersive-Shell) (User: PIXEL)
Description: Package 4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8 was terminated because it took too long to suspend.

Error: (04/10/2014 07:13:40 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/09/2014 07:51:56 PM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (04/08/2014 07:31:34 PM) (Source: Application Hang) (User: )
Description: The program starbound.exe version 0.9.0.0 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 23ac

Start Time: 01cf5380b637c130

Termination Time: 4294967295

Application Path: J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe

Report Id: 10e1c39e-bf8f-11e3-be6c-902b34dee62d

Faulting package full name:

Faulting package-relative application ID:


System errors:
=============
Error: (04/21/2014 07:10:34 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/21/2014 07:08:50 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/17/2014 09:16:43 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/17/2014 09:16:21 PM) (Source: DCOM) (User: PIXEL)
Description: {9BA05972-F6A8-11CF-A442-00A0C90A8F39}

Error: (04/17/2014 09:16:21 PM) (Source: DCOM) (User: PIXEL)
Description: {9BA05972-F6A8-11CF-A442-00A0C90A8F39}

Error: (04/17/2014 02:40:07 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/17/2014 02:08:55 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/16/2014 01:34:41 AM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2

Error: (04/15/2014 07:29:08 PM) (Source: DCOM) (User: PIXEL)
Description: machine-defaultLocalActivation{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}PixelJasonS-1-5-21-1076075667-1471386052-3169907094-1001LocalHost (Using LRPC)4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8S-1-15-2-444797119-353723001-3522112724-563070080-1809981734-922308773-1844997097

Error: (04/15/2014 02:30:50 PM) (Source: Service Control Manager) (User: )
Description: The OutfoxTvService service failed to start due to the following error:
%%2


Microsoft Office Sessions:
=========================
Error: (04/20/2014 10:52:33 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/17/2014 08:45:38 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/17/2014 00:07:06 PM) (Source: Application Hang)(User: )
Description: starbound.exe0.9.0.016d401cf59e0ae7afacf4294967295J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe769826b7-c663-11e3-be70-902b34dee62d

Error: (04/16/2014 06:59:01 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/15/2014 02:32:34 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/11/2014 01:19:44 AM) (Source: Application Hang)(User: )
Description: Netflix.exe1.15.0.68e5c01cf55488629e9354294967295C:\Program Files\WindowsApps\4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8\Netflix.exe0192ae7b-c152-11e3-be6e-902b34dee62d4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8App

Error: (04/11/2014 01:19:31 AM) (Source: Microsoft-Windows-Immersive-Shell)(User: PIXEL)
Description: 4DF9E0F8.Netflix_1.15.0.68_x64__mcm4njqhnhss8

Error: (04/10/2014 07:13:40 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/09/2014 07:51:56 PM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (04/08/2014 07:31:34 PM) (Source: Application Hang)(User: )
Description: starbound.exe0.9.0.023ac01cf5380b637c1304294967295J:\Games\Steam\ilovesteam\steamapps\common\Starbound\win32\starbound.exe10e1c39e-bf8f-11e3-be6c-902b34dee62d


==================== Memory info ===========================

Percentage of memory in use: 18%
Total physical RAM: 8152.04 MB
Available physical RAM: 6614.21 MB
Total Pagefile: 9368.04 MB
Available Pagefile: 7686.09 MB
Total Virtual: 8192 MB
Available Virtual: 8191.77 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:111.45 GB) (Free:46.25 GB) NTFS
Drive d: (BLAIR_WITCH_PROJECT) (CDROM) (Total:7.66 GB) (Free:0 GB) UDF
Drive j: (EVERYTHING GO HERE) (Fixed) (Total:931.51 GB) (Free:543.48 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 112 GB) (Disk ID: E55A1B64)
Partition 1: (Active) - (Size=350 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=111 GB) - (Type=07 NTFS)

========================================================
Disk: 1 (MBR Code: Windows 7 or 8) (Size: 932 GB) (Disk ID: 8ECBA897)
Partition 1: (Not Active) - (Size=932 GB) - (Type=07 NTFS)

==================== End Of Log ============================




 

Link to post
Share on other sites

  • Root Admin

Please uninstall all versions of Java from the Control Panel, Add/Remove then run the following
 
Please download JavaRa-1.16 and save it to your computer.

  • Double click to open the zip file and then select all and choose Copy.
  • Create a new folder on your Desktop named RemoveJava and paste the files into this new folder.
  • Quit all browsers and other running applications.
  • Right-click on JavaRa.exe in RemoveJava folder and choose Run as administrator to start the program.
  • From the drop-down menu, choose English and click on Select.
  • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
  • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
  • A logfile will pop up. Please save it to a convenient location and post it in your next reply.

 

 

Next, Please Run TFC by OldTimer to clear temporary files:

  • Download TFC from here and save it to your desktop.
  • http://oldtimer.geekstogo.com/TFC.exe
  • Close any open programs and Internet browsers.
  • Double click TFC.exe to run it on XP (for Vista and Windows 7 right click and choose "Run as administrator") and once it opens click on the Start button on the lower left of the program to allow it to begin cleaning.
  • Please be patient as clearing out temp files may take a while.
  • Once it completes you may be prompted to restart your computer, please do so.
  • Once it's finished you may delete TFC.exe from your desktop or save it for later use for the cleaning of temporary files.

 

 

Then run a new MBAM scan and post that back.

Link to post
Share on other sites

  • 2 weeks later...
  • Root Admin

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.