Jump to content

backdoor.agent.wd keeps comming back HELP


Recommended Posts

Hello and welcome to Malwarebytes,

Anyone other than the original starter of this thread please DO NOT follow the instructions and advice posted as replies here, my help and advice is NOT related to your system and will probably cause more harm than good...

My screen name is kevinf80, i`m here to help clean up your system, continue as follows please:

Change the download folder setting in the default Browser so all tools we may use are saved to the Desktop:

user posted imageGoogle Chrome - Click the "Customize and control Google Chrome" button in the upper right-corner of the browser. user posted image
Choose Settings. at the bottom of the screen click the
"Show advanced settings..." link. Scroll down to find the Downloads section and click the Change... button. Select your desktop and click OK.

user posted imageMozilla Firefox - Click the "Open Menu" button in the upper right-corner of the browser. user posted image Choose Options. In the downloads section, click the Browse button, click on the Desktop folder and the click the "Select Folder" button. Click OK to get out of the Options menu.

user posted imageInternet Explorer - Click the Tools menu in the upper right-corner of the browser. user posted image Select View downloads. Select the Options link in the lower left of the window. Click Browse and select the Desktop and then choose the Select Folder button. Click OK to get out of the download options screen and then click Close to get out of the View Downloads screen.
NOTE: IE8 Does not support changing download locations in this manner. You will need to download the tool(s) to the default folder, usually Downloads, then copy them to the desktop.

user posted imageChange default download folder location in Edge -Boot to a user account with admin status, select start > file explorer > right click on "Downloads" folder and select "Properties"

In the new window select "Location" tab > clear the text field box and type in or copy/paste %userprofile%\Desktop > select "Apply" then "OK"

Be aware you are not changing the Browser download folder location, you are changing the user’s download directory location.....

Next,

Follow the instructions in the following link to show hidden files:

http://www.howtogeek.com/howto/windows-vista/show-hidden-files-and-folders-in-windows-vista/

Next,

Download RKill from here: http://www.bleepingcomputer.com/download/rkill/

There are three buttons to choose from with different names on, select the first one and save it to your desktop.
 
  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7/8/10, right-click on it and Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • A log pops up at the end of the run. This log file is located at C:\rkill.log. Please post this in your next reply.
  • If you do not see the black box flash on the screen delete the icon from the desktop and go back to the link for the download, select the next button and try to run the tool again, continue to repeat this process using the remaining buttons until the tool runs. You will find further links if you scroll down the page with other names, try them one at a time.
  • If the tool does not run from any of the links provided, please let me know.


Next,

Please open Malwarebytes Anti-Malware.
 
  • On the Settings tab > Detection and Protection sub tab, Detection Options, tick the box "Scan for rootkits".
  • Under Non-Malware Protection sub tab Change PUP and PUM entries to Treat detections as Malware
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete Apply Actions to any found entries.
  • Wait for the prompt to restart the computer to appear (if applicable), then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.


To get the log from Malwarebytes do the following:
 
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have three options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
    XML file (*.xml) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
     
  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…



If Malwarebytes is not installed follow these instructions first:

Download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
  • Launch Malwarebytes Anti-Malware
  • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish. Follow the instructions above....


Next,

Download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...
 
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach those logs to your reply.


Let me see those logs in your reply...

Thank you,

Kevin...
Link to post
Share on other sites

Hello Kevin, I wanted to let you know that I deleted the task in task scheduler for Fenix menager.exe I also deleted it from where its loaded from  c:\users\xxx \appdata\roaming\ fenix.menager.exe\fenix.menager. I did this before you responded hope I didn't do something wrong!

 I also believe I have an hijacked google browser there is an extension that keeps coming back it says it improves browsing experience and it has permission to read and change all my data on the websites I visit.. And it does just that every link I click on redirects me and malwarebytes stops things from leaving my pc. I learned that if I place google in developer mode I can disable this extension and delete it but once I close the browser it comes back. I also learned that if I follow the link to the location of the file on my pc (C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75) I can delete the two files associated with the extension ( content.js  & manifest.json) but I get an error message when start up chrome  saying it can’t find these files. 

Rkill.txt

Rkill 2.8.4 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2016 BleepingComputer.com
More Information about Rkill can be found at this link:
http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 06/07/2016 10:44:31 PM in x64 mode.
Windows Version: Windows 7 Ultimate Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity: 

 * No issues found.

Searching for Missing Digital Signatures: 

 * No issues found.

Checking HOSTS File: 

 * Cannot edit the HOSTS file.
 * Permissions Fixed. Administrators can now edit the HOSTS file.

 * HOSTS file entries found: 

  127.0.0.1    www.007guard.com
  127.0.0.1    007guard.com
  127.0.0.1    008i.com
  127.0.0.1    www.008k.com
  127.0.0.1    008k.com
  127.0.0.1    www.00hq.com
  127.0.0.1    00hq.com
  127.0.0.1    010402.com
  127.0.0.1    www.032439.com
  127.0.0.1    032439.com
  127.0.0.1    www.0scan.com
  127.0.0.1    0scan.com
  127.0.0.1    1000gratisproben.com
  127.0.0.1    www.1000gratisproben.com
  127.0.0.1    1001namen.com
  127.0.0.1    www.1001namen.com
  127.0.0.1    100888290cs.com
  127.0.0.1    www.100888290cs.com
  127.0.0.1    www.100sexlinks.com
  127.0.0.1    100sexlinks.com

  20 out of 15561 HOSTS entries shown.
  Please review HOSTS file for further entries.

Program finished at: 06/07/2016 10:44:42 PM
Execution time: 0 hours(s), 0 minute(s), and 11 seconds(s)
 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 6/7/2016
Scan Time: 10:06 PM
Logfile: 
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.06.08.01
Rootkit Database: v2016.05.27.01
License: Premium
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Tamara

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 303195
Time Elapsed: 6 min, 27 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 2
PUP.Optional.CrossRider, C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage, Quarantined, [4f324eace0b90b2b1e609f39bb48df21], 
PUP.Optional.CrossRider, C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal, Quarantined, [423f6e8c3f5a1d1980fe8058ab587a86], 

Physical Sectors: 0
(No malicious items detected)


(end)

 

 

********This file below is from when it found fenix.menager but it seems to be gone for now******

Malwarebytes Anti-Malware
www.malwarebytes.org


Detection, 6/7/2016 12:54 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 61456, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 12:54 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 61456, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 12:54 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 61457, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 12:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 61554, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 12:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 61555, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Update, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.1, 2016.6.7.2, 
Protection, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 1:07 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Detection, 6/7/2016 3:58 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, File, PUP.Optional.TechSnab, C:\Users\Tamara\AppData\Roaming\Fenix Menager\Fenix Menager.exe, Quarantine, [7da11bdf4a4f2a0c0a49f06fb44eb44c]
Scan, 6/7/2016 4:06 AM, SYSTEM, TAMARA-PC, Context, Start:6/7/2016 4:03 AM, Duration:3 min 30 sec, Threat Scan, Completed, 0 Malware Detections, 0 Non-Malware Detections, 
Protection, 6/7/2016 4:13 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Starting, 
Protection, 6/7/2016 4:13 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Started, 
Protection, 6/7/2016 4:13 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 4:13 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Scan, 6/7/2016 4:22 AM, SYSTEM, TAMARA-PC, Manual, Start:6/7/2016 4:15 AM, Duration:6 min 20 sec, Threat Scan, Completed, 0 Malware Detections, 0 Non-Malware Detections, 
Update, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.2, 2016.6.7.3, 
Protection, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 4:49 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Protection, 6/7/2016 4:52 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Starting, 
Protection, 6/7/2016 4:52 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Started, 
Protection, 6/7/2016 4:52 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 4:52 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Protection, 6/7/2016 4:55 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Starting, 
Protection, 6/7/2016 4:55 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Started, 
Protection, 6/7/2016 4:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 4:56 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Scheduler, IP Database, 2016.6.6.1, 2016.6.7.1, 
Update, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Scheduler, Domain Database, 2016.6.6.7, 2016.6.7.1, 
Update, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.3, 2016.6.7.4, 
Protection, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 7:55 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 11:06 AM, SYSTEM, TAMARA-PC, Scheduler, Failed, No Internet connection detected, 
Update, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.4, 2016.6.7.5, 
Protection, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 11:09 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 12:01 PM, SYSTEM, TAMARA-PC, Scheduler, Domain Database, 2016.6.7.1, 2016.6.7.2, 
Protection, 6/7/2016 12:01 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 12:01 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 12:02 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 12:02 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 12:02 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 12:02 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 1:05 PM, SYSTEM, TAMARA-PC, Scheduler, Failed, No Internet connection detected, 
Update, 6/7/2016 1:50 PM, SYSTEM, TAMARA-PC, Scheduler, IP Database, 2016.6.7.1, 2016.6.7.2, 
Protection, 6/7/2016 1:50 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 1:50 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 1:51 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 1:51 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 1:51 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 1:51 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.5, 2016.6.7.6, 
Protection, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 4:06 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 4:45 PM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.6, 2016.6.7.7, 
Protection, 6/7/2016 4:45 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 4:45 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 4:45 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 4:45 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 4:45 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 4:46 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Scheduler, Malware Database, 2016.6.7.7, 2016.6.8.1, 
Protection, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 9:08 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Detection, 6/7/2016 9:42 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62118, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:42 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62118, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:42 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62121, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:42 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62122, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Scan, 6/7/2016 9:46 PM, SYSTEM, TAMARA-PC, Manual, Start:6/7/2016 9:39 PM, Duration:6 min 25 sec, Threat Scan, Completed, 0 Malware Detections, 0 Non-Malware Detections, 
Detection, 6/7/2016 9:49 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62374, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:49 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62374, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:49 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 146.148.46.20, www.liveadexchanger.com, 62383, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:49 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 54.86.84.196, ze1.november-lax.com, 62474, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:49 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 54.86.84.196, ze1.november-lax.com, 62475, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/7/2016 9:49 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 54.86.84.196, ze1.november-lax.com, 62474, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Scan, 6/7/2016 10:14 PM, SYSTEM, TAMARA-PC, Manual, Start:6/7/2016 10:06 PM, Duration:6 min 27 sec, Threat Scan, Completed, 0 Malware Detections, 2 Non-Malware Detections, 
Protection, 6/7/2016 10:16 PM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Starting, 
Protection, 6/7/2016 10:16 PM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Started, 
Protection, 6/7/2016 10:16 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 10:16 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Protection, 6/7/2016 10:46 PM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Starting, 
Protection, 6/7/2016 10:46 PM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Started, 
Protection, 6/7/2016 10:46 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/7/2016 10:46 PM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Scan, 6/7/2016 10:54 PM, SYSTEM, TAMARA-PC, Manual, Start:6/7/2016 10:47 PM, Duration:6 min 22 sec, Threat Scan, Completed, 0 Malware Detections, 0 Non-Malware Detections, 

(end)

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:07-06-2016
Ran by Tamara (administrator) on TAMARA-PC (07-06-2016 23:11:39)
Running from C:\Users\Tamara\Desktop
Loaded Profiles: Tamara (Available Profiles: Tamara)
Platform: Windows 7 Ultimate Service Pack 1 (X64) Language: English (United States)
Internet Explorer Version 11 (Default browser: Chrome)
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Microsoft Corporation) C:\Program Files\Microsoft Security Client\MsMpEng.exe
(Intel Corporation) C:\Windows\System32\igfxCUIService.exe
(Apple Inc.) C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Malwarebytes) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe
(Malwarebytes) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
(Nero AG) C:\Program Files (x86)\Common Files\Nero\Nero BackItUp 4\NBService.exe
(Qualcomm Atheros) C:\Program Files\Qualcomm Atheros\Network Manager\KillerService.exe
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdSvc.exe
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDWSCSvc.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\NisSrv.exe
(Malwarebytes) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Apple Inc.) C:\Program Files\iTunes\iTunesHelper.exe
(Intel Corporation) C:\Windows\System32\igfxEM.exe
(Intel Corporation) C:\Windows\System32\igfxHK.exe
(RedFox) C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Internet Services\iCloudServices.exe
() C:\Program Files (x86)\SlySoft\AnyDVD\ADvdDiscHlp64.exe
(Piriform Ltd) C:\Program Files\CCleaner\CCleaner64.exe
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Google Inc.) C:\Program Files (x86)\Google\Update\1.3.30.3\GoogleCrashHandler.exe
(Google Inc.) C:\Program Files (x86)\Google\Update\1.3.30.3\GoogleCrashHandler64.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe


==================== Registry (Whitelisted) ===========================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [RTHDVCPL] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [13636824 2013-07-26] (Realtek Semiconductor)
HKLM\...\Run: [MSC] => C:\Program Files\Microsoft Security Client\msseces.exe [1340192 2016-01-29] (Microsoft Corporation)
HKLM\...\Run: [iTunesHelper] => C:\Program Files\iTunes\iTunesHelper.exe [176952 2016-06-01] (Apple Inc.)
HKLM-x32\...\Run: [GrooveMonitor] => C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe [30040 2009-02-26] (Microsoft Corporation)
HKLM-x32\...\Run: [SDTray] => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe [4101576 2014-06-24] (Safer-Networking Ltd.)
HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\Run: [AnyDVD] => C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD.exe [109480 2016-03-28] (RedFox)
HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\Run: [SpybotPostWindows10UpgradeReInstall] => C:\Program Files\Common Files\AV\Spybot - Search and Destroy\Test.exe [1011200 2015-07-28] (Safer-Networking Ltd.)
HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\Run: [CCleaner Monitoring] => C:\Program Files\CCleaner\CCleaner64.exe [8722136 2016-06-01] (Piriform Ltd)
HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\Run: [iCloudServices] => C:\Program Files (x86)\Common Files\Apple\Internet Services\iCloudServices.exe [67384 2016-04-22] (Apple Inc.)
HKU\S-1-5-21-502223781-2076990840-1381161923-1000\Control Panel\Desktop\\SCRNSAVE.EXE -> C:\Windows\system32\Ribbons.scr [241664 2010-11-20] (Microsoft Corporation)
HKU\S-1-5-18\...\RunOnce: [SPReview] => C:\Windows\System32\SPReview\SPReview.exe [301568 2014-10-18] (Microsoft Corporation)
HKU\S-1-5-18\...\RunOnce: [iCloud] => C:\Program Files (x86)\Common Files\Apple\Internet Services\iCloud.exe [67384 2016-04-22] (Apple Inc.)

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

Hosts: There are more than one entry in Hosts. See Hosts section of Addition.txt
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
Tcpip\..\Interfaces\{38218418-CF6D-4E29-881A-5E0F473E7745}: [DhcpNameServer] 192.168.1.1

Internet Explorer:
==================
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = about:blank
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = 
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = 
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = 
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = 
SearchScopes: HKLM-x32 -> DefaultScope {20B9D1AE-AD1A-38B4-87FE-AF278DA9861D} URL = 
BHO-x32: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files (x86)\Microsoft Office\Office12\GrooveShellExtensions.dll [2009-02-26] (Microsoft Corporation)

FireFox:
========
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF64_21_0_0_242.dll [2016-05-13] ()
FF Plugin: @microsoft.com/GENUINE -> disabled [No File]
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\5.1.41212.0\npctrl.dll [2015-12-12] ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_21_0_0_242.dll [2016-05-13] ()
FF Plugin-x32: @Apple.com/iTunes,version=1.0 -> C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll [2015-12-18] ()
FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI ipt;version=4.0.5 -> C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIIPT.dll [2014-03-20] (Intel Corporation)
FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI updater -> C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIUpdater.dll [2014-03-20] (Intel Corporation)
FF Plugin-x32: @microsoft.com/GENUINE -> disabled [No File]
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\5.1.41212.0\npctrl.dll [2015-12-12] ( Microsoft Corporation)
FF Plugin-x32: @tools.google.com/Google Update;version=3 -> C:\Program Files (x86)\Google\Update\1.3.30.3\npGoogleUpdate3.dll [2016-06-06] (Google Inc.)
FF Plugin-x32: @tools.google.com/Google Update;version=9 -> C:\Program Files (x86)\Google\Update\1.3.30.3\npGoogleUpdate3.dll [2016-06-06] (Google Inc.)
FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\nppdf32.dll [2016-05-27] (Adobe Systems Inc.)

Chrome: 
=======
CHR HomePage: Default -> hxxp://www.wunderground.com/
CHR Profile: C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Google Slides) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek [2016-06-06]
CHR Extension: (Google Docs) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2016-06-06]
CHR Extension: (Google Drive) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2016-06-06]
CHR Extension: (YouTube) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2016-06-06]
CHR Extension: (Facebook Customizer (by Adblock Plus)) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\deoeenbkoccjaefmmhpmlegngdjohdcm [2016-06-06]
CHR Extension: (Google Sheets) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap [2016-06-06]
CHR Extension: (Google Docs Offline) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi [2016-06-06]
CHR Extension: (Chrome Web Store Payments) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-06-06]
CHR Extension: (Gmail) - C:\Users\Tamara\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2016-06-06]
CHR Extension: (33d37415b657f8c93a441dba992f6e75) - C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75 [2016-06-07]

==================== Services (Whitelisted) ========================

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

R2 Apple Mobile Device Service; C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe [83768 2016-03-02] (Apple Inc.)
R2 igfxCUIService1.0.0.0; C:\Windows\system32\igfxCUIService.exe [329104 2014-10-03] (Intel Corporation)
S3 Intel(R) Capability Licensing Service TCP IP Interface; C:\Program Files\Intel\iCLS Client\SocketHeciServer.exe [887232 2014-01-31] (Intel(R) Corporation)
R2 Intel(R) ME Service; C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe [131544 2014-03-20] (Intel Corporation)
S3 iumsvc; C:\Program Files (x86)\Intel\Intel(R) Update Manager\bin\iumsvc.exe [178312 2015-09-25] (Intel Corporation)
R2 jhi_service; C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [154584 2014-03-20] (Intel Corporation)
R2 MBAMScheduler; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe [1514464 2016-03-10] (Malwarebytes)
R2 MBAMService; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe [1136608 2016-03-10] (Malwarebytes)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [23808 2016-01-29] (Microsoft Corporation)
R2 Net Driver HPZ12; C:\Windows\system32\HPZinw12.dll [50688 2014-04-28] (Hewlett-Packard) [File not signed]
R3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [374344 2016-01-29] (Microsoft Corporation)
R2 Pml Driver HPZ12; C:\Windows\system32\HPZipm12.dll [66048 2014-04-28] (Hewlett-Packard) [File not signed]
R2 Qualcomm Atheros Killer Service V2; C:\Program Files\Qualcomm Atheros\Network Manager\KillerService.exe [344576 2014-04-17] (Qualcomm Atheros) [File not signed]
R2 SDScannerService; C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe [1738168 2014-06-24] (Safer-Networking Ltd.)
R2 SDUpdateService; C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdSvc.exe [2088408 2014-06-27] (Safer-Networking Ltd.)
R2 SDWSCService; C:\Program Files (x86)\Spybot - Search & Destroy 2\SDWSCSvc.exe [171928 2014-04-25] (Safer-Networking Ltd.)
S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2013-05-27] (Microsoft Corporation)

===================== Drivers (Whitelisted) ==========================

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

R3 AnyDVD; C:\Windows\System32\Drivers\AnyDVD.sys [150440 2015-12-28] (SlySoft, Inc.)
R3 AnyDVD; C:\Windows\SysWOW64\Drivers\AnyDVD.sys [150440 2015-12-28] (SlySoft, Inc.)
R1 BfLwf; C:\Windows\System32\DRIVERS\bflwfx64.sys [82096 2014-04-10] (Qualcomm Atheros, Inc.)
S3 ebdrv; C:\Windows\system32\DRIVERS\evbda.sys [3286016 2009-06-10] (Broadcom Corporation)
R3 ISCT; C:\Windows\System32\DRIVERS\ISCTD.sys [44744 2014-02-03] ()
R3 Ke2200; C:\Windows\System32\DRIVERS\e22w7x64.sys [129200 2014-03-12] (Qualcomm Atheros, Inc.)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [27008 2016-03-10] (Malwarebytes)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [192216 2016-06-07] (Malwarebytes)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [64896 2016-03-10] (Malwarebytes Corporation)
R3 MEIx64; C:\Windows\System32\DRIVERS\TeeDriverx64.sys [118272 2014-03-20] (Intel Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [289120 2015-11-13] (Microsoft Corporation)
R3 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [133816 2015-11-13] (Microsoft Corporation)
S3 Synth3dVsc; System32\drivers\synth3dvsc.sys [X]
S3 tsusbhub; system32\drivers\tsusbhub.sys [X]
S3 VGPU; System32\drivers\rdvgkmd.sys [X]

==================== NetSvcs (Whitelisted) ===================

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)


==================== One Month Created files and folders ========

(If an entry is included in the fixlist, the file/folder will be moved.)

2016-06-07 23:11 - 2016-06-07 23:11 - 00014195 _____ C:\Users\Tamara\Desktop\FRST.txt
2016-06-07 23:10 - 2016-06-07 23:11 - 00000000 ____D C:\FRST
2016-06-07 23:09 - 2016-06-07 23:09 - 02385408 _____ (Farbar) C:\Users\Tamara\Desktop\FRST64.exe
2016-06-07 21:58 - 2016-06-07 22:44 - 00003548 _____ C:\Users\Tamara\Desktop\Rkill.txt
2016-06-07 21:52 - 2016-06-07 21:52 - 02030536 _____ (Bleeping Computer, LLC) C:\Users\Tamara\Desktop\rkill.exe
2016-06-06 21:57 - 2016-06-07 23:08 - 00000898 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2016-06-06 21:57 - 2016-06-07 22:46 - 00000894 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2016-06-06 21:57 - 2016-06-07 14:15 - 00002481 _____ C:\Users\Public\Desktop\Google Chrome.lnk
2016-06-06 21:57 - 2016-06-06 22:03 - 00003894 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineUA
2016-06-06 21:57 - 2016-06-06 22:03 - 00003642 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCore
2016-06-06 21:57 - 2016-06-06 21:57 - 00002267 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome.lnk
2016-06-05 04:58 - 2016-06-05 04:58 - 00001753 _____ C:\Users\Public\Desktop\iTunes.lnk
2016-06-05 04:58 - 2016-06-05 04:58 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iTunes
2016-06-05 04:58 - 2016-06-05 04:58 - 00000000 ____D C:\Program Files\iTunes
2016-06-05 04:58 - 2016-06-05 04:58 - 00000000 ____D C:\Program Files\iPod
2016-06-05 04:58 - 2016-06-05 04:58 - 00000000 ____D C:\Program Files (x86)\iTunes
2016-06-04 06:30 - 2016-06-04 06:39 - 00063082 _____ C:\Windows\ntbtlog.txt
2016-06-03 05:57 - 2016-06-03 05:57 - 06893008 _____ (Piriform Ltd) C:\Users\Tamara\Downloads\ccsetup518 (1).exe
2016-05-31 21:37 - 2016-05-31 21:37 - 03677248 _____ C:\Users\Tamara\Desktop\AdwCleaner.exe
2016-05-28 05:39 - 2016-05-28 05:39 - 06893688 _____ (Piriform Ltd) C:\Users\Tamara\Downloads\ccsetup518.exe
2016-05-27 06:06 - 2016-05-27 06:05 - 00452676 ____R C:\Windows\system32\Drivers\etc\hosts.20160527-060632.backup
2016-05-26 05:51 - 2016-05-26 05:51 - 00987728 _____ (Google Inc.) C:\Users\Tamara\Downloads\ChromeSetup.exe
2016-05-26 05:37 - 2016-05-26 05:33 - 00452676 ____R C:\Windows\system32\Drivers\etc\hosts.20160526-053749.backup
2016-05-25 02:14 - 2016-05-25 02:14 - 00000000 ____D C:\Users\Tamara\AppData\Local\Macromedia
2016-05-25 02:13 - 2016-05-25 02:19 - 00000000 ____D C:\Users\Tamara\AppData\Local\Mozilla
2016-05-25 02:11 - 2016-05-25 02:11 - 44584344 _____ C:\Users\Tamara\Downloads\Firefox Setup 46.0.1.exe
2016-05-25 01:36 - 2016-05-27 06:20 - 00000000 ____D C:\Windows\pss
2016-05-20 04:38 - 2016-05-20 04:38 - 13015920 _____ C:\Users\Tamara\Downloads\SetupAnyDVD7695.exe
2016-05-20 04:13 - 2016-05-20 04:13 - 13267240 _____ C:\Users\Tamara\Downloads\SetupAnyDVD8010.exe
2016-05-20 04:13 - 2016-05-20 04:13 - 00000000 ____D C:\ProgramData\RedFox
2016-05-20 04:13 - 2016-05-20 04:13 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RedFox
2016-05-11 04:55 - 2016-04-23 13:08 - 00394960 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll
2016-05-11 04:55 - 2016-04-23 12:24 - 00346312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iedkcs32.dll
2016-05-11 04:55 - 2016-04-23 01:25 - 25816064 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2016-05-11 04:55 - 2016-04-23 01:16 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2016-05-11 04:55 - 2016-04-23 01:16 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2016-05-11 04:55 - 2016-04-23 01:01 - 00066560 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2016-05-11 04:55 - 2016-04-23 01:00 - 02893312 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2016-05-11 04:55 - 2016-04-23 01:00 - 00571904 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2016-05-11 04:55 - 2016-04-23 01:00 - 00417792 _____ (Microsoft Corporation) C:\Windows\system32\html.iec
2016-05-11 04:55 - 2016-04-23 01:00 - 00088064 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll
2016-05-11 04:55 - 2016-04-23 01:00 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2016-05-11 04:55 - 2016-04-23 00:52 - 00054784 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2016-05-11 04:55 - 2016-04-23 00:51 - 00034304 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2016-05-11 04:55 - 2016-04-23 00:48 - 00615936 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2016-05-11 04:55 - 2016-04-23 00:47 - 00817664 _____ (Microsoft Corporation) C:\Windows\system32\jscript.dll
2016-05-11 04:55 - 2016-04-23 00:47 - 00814080 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2016-05-11 04:55 - 2016-04-23 00:47 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2016-05-11 04:55 - 2016-04-23 00:47 - 00114688 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2016-05-11 04:55 - 2016-04-23 00:46 - 06052352 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2016-05-11 04:55 - 2016-04-23 00:40 - 00968704 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2016-05-11 04:55 - 2016-04-23 00:36 - 00489984 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2016-05-11 04:55 - 2016-04-23 00:29 - 00077824 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2016-05-11 04:55 - 2016-04-23 00:27 - 00107520 _____ (Microsoft Corporation) C:\Windows\system32\inseng.dll
2016-05-11 04:55 - 2016-04-23 00:25 - 00199680 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2016-05-11 04:55 - 2016-04-23 00:24 - 00092160 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2016-05-11 04:55 - 2016-04-23 00:21 - 00315392 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2016-05-11 04:55 - 2016-04-23 00:20 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2016-05-11 04:55 - 2016-04-23 00:20 - 00152064 _____ (Microsoft Corporation) C:\Windows\system32\occache.dll
2016-05-11 04:55 - 2016-04-23 00:11 - 20350464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2016-05-11 04:55 - 2016-04-23 00:09 - 00262144 _____ (Microsoft Corporation) C:\Windows\system32\webcheck.dll
2016-05-11 04:55 - 2016-04-23 00:08 - 00497152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2016-05-11 04:55 - 2016-04-23 00:08 - 00062464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2016-05-11 04:55 - 2016-04-23 00:08 - 00047616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2016-05-11 04:55 - 2016-04-23 00:07 - 00725504 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2016-05-11 04:55 - 2016-04-23 00:07 - 00341504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\html.iec
2016-05-11 04:55 - 2016-04-23 00:07 - 00064000 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MshtmlDac.dll
2016-05-11 04:55 - 2016-04-23 00:06 - 01359360 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2016-05-11 04:55 - 2016-04-23 00:06 - 00806400 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2016-05-11 04:55 - 2016-04-23 00:05 - 02131968 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2016-05-11 04:55 - 2016-04-23 00:04 - 02285568 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2016-05-11 04:55 - 2016-04-23 00:02 - 00047104 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2016-05-11 04:55 - 2016-04-23 00:01 - 00030720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2016-05-11 04:55 - 2016-04-23 00:00 - 15415808 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2016-05-11 04:55 - 2016-04-22 23:59 - 00476160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2016-05-11 04:55 - 2016-04-22 23:58 - 00663552 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2016-05-11 04:55 - 2016-04-22 23:58 - 00620032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2016-05-11 04:55 - 2016-04-22 23:58 - 00115712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2016-05-11 04:55 - 2016-04-22 23:51 - 02596864 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2016-05-11 04:55 - 2016-04-22 23:50 - 00416256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2016-05-11 04:55 - 2016-04-22 23:45 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll
2016-05-11 04:55 - 2016-04-22 23:44 - 00091136 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inseng.dll
2016-05-11 04:55 - 2016-04-22 23:43 - 00168960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2016-05-11 04:55 - 2016-04-22 23:41 - 00076288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2016-05-11 04:55 - 2016-04-22 23:40 - 00279040 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2016-05-11 04:55 - 2016-04-22 23:39 - 01547776 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2016-05-11 04:55 - 2016-04-22 23:39 - 00130048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\occache.dll
2016-05-11 04:55 - 2016-04-22 23:36 - 04611072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2016-05-11 04:55 - 2016-04-22 23:33 - 00230400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\webcheck.dll
2016-05-11 04:55 - 2016-04-22 23:31 - 00693248 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2016-05-11 04:55 - 2016-04-22 23:30 - 02056192 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2016-05-11 04:55 - 2016-04-22 23:30 - 01155072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll
2016-05-11 04:55 - 2016-04-22 23:28 - 00800768 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2016-05-11 04:55 - 2016-04-22 23:26 - 13811200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2016-05-11 04:55 - 2016-04-22 23:12 - 02121216 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2016-05-11 04:55 - 2016-04-22 23:09 - 01312256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2016-05-11 04:55 - 2016-04-22 23:07 - 00710144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2016-05-11 04:55 - 2016-04-14 09:49 - 00603648 _____ (Microsoft Corporation) C:\Windows\SysWOW64\d3d10level9.dll
2016-05-11 04:55 - 2016-04-14 09:21 - 00647680 _____ (Microsoft Corporation) C:\Windows\system32\d3d10level9.dll
2016-05-11 04:55 - 2016-04-09 03:01 - 00986344 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dxgkrnl.sys
2016-05-11 04:55 - 2016-04-09 03:01 - 00264936 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dxgmms1.sys
2016-05-11 04:55 - 2016-04-09 02:58 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\tzres.dll
2016-05-11 04:55 - 2016-04-09 02:57 - 00405504 _____ (Microsoft Corporation) C:\Windows\system32\gdi32.dll
2016-05-11 04:55 - 2016-04-09 02:57 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\cdd.dll
2016-05-11 04:55 - 2016-04-09 02:54 - 00312832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\gdi32.dll
2016-05-11 04:55 - 2016-04-09 02:54 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\tzres.dll
2016-05-11 04:55 - 2016-04-09 01:49 - 03217408 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2016-05-11 04:55 - 2016-04-06 11:27 - 00024576 _____ (Microsoft Corporation) C:\Windows\system32\jnwmon.dll
2016-05-11 04:54 - 2016-04-09 03:02 - 00631176 _____ (Microsoft Corporation) C:\Windows\system32\winresume.efi
2016-05-11 04:54 - 2016-04-09 03:01 - 05546216 _____ (Microsoft Corporation) C:\Windows\system32\ntoskrnl.exe
2016-05-11 04:54 - 2016-04-09 03:01 - 00706280 _____ (Microsoft Corporation) C:\Windows\system32\winload.efi
2016-05-11 04:54 - 2016-04-09 03:01 - 00154344 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecpkg.sys
2016-05-11 04:54 - 2016-04-09 03:01 - 00095464 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecdd.sys
2016-05-11 04:54 - 2016-04-09 02:59 - 03998952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntkrnlpa.exe
2016-05-11 04:54 - 2016-04-09 02:59 - 03943144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntoskrnl.exe
2016-05-11 04:54 - 2016-04-09 02:59 - 01732864 _____ (Microsoft Corporation) C:\Windows\system32\ntdll.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 01212928 _____ (Microsoft Corporation) C:\Windows\system32\rpcrt4.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00503808 _____ (Microsoft Corporation) C:\Windows\system32\srcore.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00362496 _____ (Microsoft Corporation) C:\Windows\system32\wow64win.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00344064 _____ (Microsoft Corporation) C:\Windows\system32\schannel.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00243712 _____ (Microsoft Corporation) C:\Windows\system32\wow64.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00215552 _____ (Microsoft Corporation) C:\Windows\system32\winsrv.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00210432 _____ (Microsoft Corporation) C:\Windows\system32\wdigest.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00190464 _____ (Microsoft Corporation) C:\Windows\system32\rpchttp.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00135680 _____ (Microsoft Corporation) C:\Windows\system32\sspicli.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00086528 _____ (Microsoft Corporation) C:\Windows\system32\TSpkg.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00063488 _____ (Microsoft Corporation) C:\Windows\system32\setbcdlocale.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00050176 _____ (Microsoft Corporation) C:\Windows\system32\srclient.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00028672 _____ (Microsoft Corporation) C:\Windows\system32\sspisrv.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00028160 _____ (Microsoft Corporation) C:\Windows\system32\secur32.dll
2016-05-11 04:54 - 2016-04-09 02:58 - 00013312 _____ (Microsoft Corporation) C:\Windows\system32\wow64cpu.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 01464320 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 01314112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntdll.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 01163264 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00880640 _____ (Microsoft Corporation) C:\Windows\system32\advapi32.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00730624 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00690688 _____ (Microsoft Corporation) C:\Windows\system32\adtschema.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00463872 _____ (Microsoft Corporation) C:\Windows\system32\certcli.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00419840 _____ (Microsoft Corporation) C:\Windows\system32\KernelBase.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00316416 _____ (Microsoft Corporation) C:\Windows\system32\msv1_0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00312320 _____ (Microsoft Corporation) C:\Windows\system32\ncrypt.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00146432 _____ (Microsoft Corporation) C:\Windows\system32\msaudite.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00060416 _____ (Microsoft Corporation) C:\Windows\system32\msobjs.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00059904 _____ (Microsoft Corporation) C:\Windows\system32\appidapi.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00043520 _____ (Microsoft Corporation) C:\Windows\system32\csrsrv.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00043520 _____ (Microsoft Corporation) C:\Windows\system32\cryptbase.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00034816 _____ (Microsoft Corporation) C:\Windows\system32\appidsvc.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00022016 _____ (Microsoft Corporation) C:\Windows\system32\credssp.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\ntvdm64.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00006656 _____ (Microsoft Corporation) C:\Windows\system32\apisetschema.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00006144 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-security-base-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00005120 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00004608 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-threadpool-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00004608 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processthreads-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-sysinfo-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-synch-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localregistry-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localization-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-rtlsupport-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processenvironment-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-namedpipe-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-misc-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-memory-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-libraryloader-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-heap-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-xstate-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-util-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-string-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-profile-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-io-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-interlocked-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-handle-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-fibers-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-errorhandling-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-delayload-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-debug-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-datetime-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:57 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-console-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 01114112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\adtschema.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00666112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rpcrt4.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00644096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\advapi32.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00553472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kerberos.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00342528 _____ (Microsoft Corporation) C:\Windows\SysWOW64\certcli.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00275456 _____ (Microsoft Corporation) C:\Windows\SysWOW64\KernelBase.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00260608 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msv1_0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00251392 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00223232 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ncrypt.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00171520 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wdigest.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00146432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msaudite.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00141312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rpchttp.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00065536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TSpkg.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msobjs.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00050688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\appidapi.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\srclient.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00017408 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credssp.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00006656 _____ (Microsoft Corporation) C:\Windows\SysWOW64\apisetschema.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00005120 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00005120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wow32.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00004608 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processthreads-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-sysinfo-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-synch-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-misc-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localregistry-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localization-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processenvironment-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-namedpipe-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-memory-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-libraryloader-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-interlocked-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-heap-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-rtlsupport-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-io-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-handle-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-fibers-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-errorhandling-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-datetime-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 02:54 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 01:52 - 00148480 _____ (Microsoft Corporation) C:\Windows\system32\appidpolicyconverter.exe
2016-05-11 04:54 - 2016-04-09 01:52 - 00062464 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\appid.sys
2016-05-11 04:54 - 2016-04-09 01:52 - 00017920 _____ (Microsoft Corporation) C:\Windows\system32\appidcertstorecheck.exe
2016-05-11 04:54 - 2016-04-09 01:51 - 00064000 _____ (Microsoft Corporation) C:\Windows\system32\auditpol.exe
2016-05-11 04:54 - 2016-04-09 01:48 - 00338432 _____ (Microsoft Corporation) C:\Windows\system32\conhost.exe
2016-05-11 04:54 - 2016-04-09 01:47 - 00296960 _____ (Microsoft Corporation) C:\Windows\system32\rstrui.exe
2016-05-11 04:54 - 2016-04-09 01:44 - 00291328 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb10.sys
2016-05-11 04:54 - 2016-04-09 01:44 - 00159744 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb.sys
2016-05-11 04:54 - 2016-04-09 01:44 - 00129536 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb20.sys
2016-05-11 04:54 - 2016-04-09 01:43 - 00112640 _____ (Microsoft Corporation) C:\Windows\system32\smss.exe
2016-05-11 04:54 - 2016-04-09 01:43 - 00030720 _____ (Microsoft Corporation) C:\Windows\system32\lsass.exe
2016-05-11 04:54 - 2016-04-09 01:42 - 00050176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\auditpol.exe
2016-05-11 04:54 - 2016-04-09 01:38 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\setup16.exe
2016-05-11 04:54 - 2016-04-09 01:38 - 00014336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntvdm64.dll
2016-05-11 04:54 - 2016-04-09 01:38 - 00007680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\instnm.exe
2016-05-11 04:54 - 2016-04-09 01:38 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\user.exe
2016-05-11 04:54 - 2016-04-09 01:37 - 00036352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\cryptbase.dll
2016-05-11 04:54 - 2016-04-09 01:37 - 00006144 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-security-base-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 01:37 - 00004608 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-threadpool-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 01:37 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-xstate-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 01:37 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-util-l1-1-0.dll
2016-05-11 04:54 - 2016-04-09 00:20 - 01230848 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WindowsCodecs.dll
2016-05-11 04:54 - 2016-04-08 23:52 - 01424896 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll

==================== One Month Modified files and folders ========

(If an entry is included in the fixlist, the file/folder will be moved.)

2016-06-07 22:54 - 2009-07-14 00:45 - 00017168 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2016-06-07 22:54 - 2009-07-14 00:45 - 00017168 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2016-06-07 22:53 - 2009-07-14 01:13 - 00781954 _____ C:\Windows\system32\PerfStringBackup.INI
2016-06-07 22:53 - 2009-07-13 23:20 - 00000000 ____D C:\Windows\inf
2016-06-07 22:46 - 2016-01-03 23:13 - 00192216 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2016-06-07 22:46 - 2009-07-14 01:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2016-06-07 14:15 - 2016-02-18 11:15 - 00003272 _____ C:\Windows\System32\Tasks\System Computer Viewer
2016-06-07 04:55 - 2016-04-08 18:34 - 00000000 ____D C:\AdwCleaner
2016-06-06 21:57 - 2014-10-18 17:25 - 00000000 ____D C:\Users\Tamara\AppData\Local\Google
2016-06-06 21:57 - 2014-10-18 17:25 - 00000000 ____D C:\Program Files (x86)\Google
2016-06-06 21:56 - 2016-04-19 04:30 - 00000000 ____D C:\Users\Tamara\AppData\Local\Deployment
2016-06-05 06:02 - 2014-11-16 05:34 - 00000000 ____D C:\Users\Tamara\AppData\Local\ElevatedDiagnostics
2016-06-05 04:58 - 2014-10-18 18:05 - 00000000 ____D C:\Program Files\Common Files\Apple
2016-06-04 17:33 - 2015-10-30 04:37 - 00002441 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Acrobat Reader DC.lnk
2016-06-04 07:07 - 2014-10-18 17:30 - 00797376 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2016-06-04 07:07 - 2014-10-18 17:30 - 00142528 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2016-06-04 07:07 - 2014-10-18 17:30 - 00000000 ____D C:\Users\Tamara\AppData\Local\Adobe
2016-06-03 04:59 - 2009-07-13 23:20 - 00000000 ____D C:\Windows\ModemLogs
2016-06-01 10:15 - 2016-02-18 11:15 - 00000000 ____D C:\Program Files (x86)\System Computer
2016-05-31 22:19 - 2015-12-22 00:18 - 00217088 ___SH C:\Users\Tamara\Downloads\Thumbs.db
2016-05-27 06:06 - 2009-07-13 22:34 - 00452676 ____R C:\Windows\system32\Drivers\etc\hosts.20160528-060839.backup
2016-05-26 05:37 - 2009-07-13 22:34 - 00452676 ____R C:\Windows\system32\Drivers\etc\hosts.20160527-060543.backup
2016-05-24 03:32 - 2009-07-14 01:08 - 00032578 _____ C:\Windows\Tasks\SCHEDLGU.TXT
2016-05-23 23:31 - 2009-07-13 22:34 - 00452676 ____R C:\Windows\system32\Drivers\etc\hosts.20160526-053350.backup
2016-05-23 23:26 - 2014-11-13 07:40 - 00000000 ____D C:\Windows\Minidump
2016-05-23 23:20 - 2009-07-14 01:32 - 00000000 ____D C:\Windows\Offline Web Pages
2016-05-19 04:34 - 2014-11-01 06:03 - 00000000 ____D C:\Users\Tamara\Desktop\T I PP
2016-05-13 06:46 - 2009-07-13 22:34 - 00452616 ____R C:\Windows\system32\Drivers\etc\hosts.20160523-233116.backup
2016-05-13 05:10 - 2016-01-28 06:57 - 00000000 ____D C:\Program Files (x86)\Spybot - Search & Destroy 2
2016-05-12 03:45 - 2009-07-13 23:20 - 00000000 ____D C:\Windows\rescache
2016-05-12 03:20 - 2009-07-14 03:46 - 00000000 ____D C:\Program Files\Windows Journal
2016-05-12 03:20 - 2009-07-14 00:45 - 00418128 _____ C:\Windows\system32\FNTCACHE.DAT
2016-05-12 03:03 - 2014-10-18 17:44 - 00000000 ____D C:\Windows\system32\MRT
2016-05-12 03:00 - 2014-10-18 17:44 - 139319312 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2016-05-11 02:12 - 2014-12-24 06:43 - 00003886 _____ C:\Windows\System32\Tasks\Adobe Acrobat Update Task

==================== Files in the root of some directories =======

2014-10-18 17:18 - 2014-10-18 17:18 - 0000000 _____ () C:\Users\Tamara\AppData\Local\Driver_LOM_8161Present.flag
2014-10-22 17:22 - 2014-11-13 07:40 - 0000040 ___SH () C:\ProgramData\.zreglib
2014-10-18 17:25 - 2014-10-18 17:25 - 0000000 ____H () C:\ProgramData\DP45977C.lfl

Some files in TEMP:
====================
C:\Users\Tamara\AppData\Local\Temp\libeay32.dll
C:\Users\Tamara\AppData\Local\Temp\msvcr120.dll
C:\Users\Tamara\AppData\Local\Temp\sqlite3.dll


==================== Bamital & volsnap =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\dnsapi.dll => File is digitally signed
C:\Windows\SysWOW64\dnsapi.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed


LastRegBack: 2016-06-07 07:03

==================== End of FRST.txt ============================

Additional scan result of Farbar Recovery Scan Tool (x64) Version:07-06-2016
Ran by Tamara (2016-06-07 23:11:53)
Running from C:\Users\Tamara\Desktop
Windows 7 Ultimate Service Pack 1 (X64) (2014-10-18 21:14:24)
Boot Mode: Normal
==========================================================


==================== Accounts: =============================

Administrator (S-1-5-21-502223781-2076990840-1381161923-500 - Administrator - Disabled)
Guest (S-1-5-21-502223781-2076990840-1381161923-501 - Limited - Disabled)
HomeGroupUser$ (S-1-5-21-502223781-2076990840-1381161923-1003 - Limited - Enabled)
Tamara (S-1-5-21-502223781-2076990840-1381161923-1000 - Administrator - Enabled) => C:\Users\Tamara

==================== Security Center ========================

(If an entry is included in the fixlist, it will be removed.)

AV: Microsoft Security Essentials (Enabled - Up to date) {768124D7-F5F7-6D2F-DDC2-94DFA4017C95}
AS: Microsoft Security Essentials (Enabled - Up to date) {CDE0C533-D3CD-62A1-E772-AFADDF863628}
AS: Windows Defender (Disabled - Out of date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Spybot - Search and Destroy (Enabled - Up to date) {9BC38DF1-3CCA-732D-A930-C1CA5F20A4B0}

==================== Installed Programs ======================

(Only the adware programs with "Hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)

2007 Microsoft Office Suite Service Pack 3 (SP3) (HKLM-x32\...\{90120000-0030-0000-0000-0000000FF1CE}_ENTERPRISE_{6E107EB7-8B55-48BF-ACCB-199F86A2CD93}) (Version:  - Microsoft)
2007 Microsoft Office Suite Service Pack 3 (SP3) (x32 Version:  - Microsoft) Hidden
64 Bit HP CIO Components Installer (Version: 17.2.1 - Hewlett-Packard) Hidden
7-Zip 9.20 (x64 edition) (HKLM\...\{23170F69-40C1-2702-0920-000001000000}) (Version: 9.20.00.0 - Igor Pavlov)
Adobe Acrobat Reader DC (HKLM-x32\...\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}) (Version: 15.016.20045 - Adobe Systems Incorporated)
Adobe Flash Player 21 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 21.0.0.242 - Adobe Systems Incorporated)
Adobe Flash Player 21 NPAPI (HKLM-x32\...\Adobe Flash Player NPAPI) (Version: 21.0.0.242 - Adobe Systems Incorporated)
Advertising Center (x32 Version: 0.0.0.1 - Nero AG) Hidden
AnyDVD (HKLM-x32\...\AnyDVD) (Version: 7.6.9.5 - RedFox)
Apple Application Support (32-bit) (HKLM-x32\...\{26356515-5821-40FA-9C3D-9785052A1062}) (Version: 4.3.1 - Apple Inc.)
Apple Application Support (64-bit) (HKLM\...\{C2651553-6CA3-4822-B2E6-BC4ACA6E0EA2}) (Version: 4.3.1 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{2E4AF2A6-50EA-4260-9BA4-5E582D11879A}) (Version: 9.3.0.15 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{56EC47AA-5813-4FF6-8E75-544026FBEA83}) (Version: 2.2.0.150 - Apple Inc.)
Bonjour (HKLM\...\{56DDDFB8-7F79-4480-89D5-25E1F52AB28F}) (Version: 3.1.0.1 - Apple Inc.)
CCleaner (HKLM\...\CCleaner) (Version: 5.18 - Piriform)
EPSON XP-600 Series Printer Uninstall (HKLM\...\EPSON XP-600 Series) (Version:  - SEIKO EPSON Corporation)
Google Chrome (HKLM-x32\...\Google Chrome) (Version: 51.0.2704.84 - Google Inc.)
Google Update Helper (x32 Version: 1.3.25.11 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.30.3 - Google Inc.) Hidden
H&R Block Deluxe + Efile + State 2014 (HKLM-x32\...\{BDA77C08-60A6-4AAB-B5A9-849ECF399A49}) (Version: 14.05.7401 - HRB Technology, LLC.)
H&R Block Michigan 2014 (HKLM-x32\...\{DCB4E829-E4BD-411C-8B41-C95BB2ABD073}) (Version: 1.14.5001 - HRB Technology, LLC.)
H&R Block Michigan 2015 (HKLM-x32\...\{C34A4378-B23F-4155-AC8B-95E40F7370FC}) (Version: 1.15.4001 - HRB Technology, LLC.)
H&R Block Premium + Efile + State 2015 (HKLM-x32\...\{388CC13F-FAC4-4D3E-83BF-C849E5D4552A}) (Version: 15.07.7401 - HRB Technology, LLC.)
iCloud (HKLM\...\{ADFDB647-35C0-4254-9EE6-2D9C3B7104BD}) (Version: 5.2.1.69 - Apple Inc.)
Intel(R) Chipset Device Software (x32 Version: 10.0.13 - Intel(R) Corporation) Hidden
Intel(R) Management Engine Components (HKLM\...\{1CEAC85D-2590-4760-800F-8DE5E91F3700}) (Version: 10.0.0.1204 - Intel Corporation)
Intel(R) Processor Graphics (HKLM-x32\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 10.18.10.3960 - Intel Corporation)
Intel(R) Update Manager (HKLM-x32\...\{B991A1BC-DE0F-41B3-9037-B2F948F706EC}) (Version: 3.1.1228 - Intel Corporation)
Internet Explorer (Enable DEP) (HKLM\...\{a9264802-8a7a-40fe-a135-5c6d204aed7a}.sdb) (Version:  - )
iTunes (HKLM\...\{9F4BF859-C3A4-4AB6-BDD1-9C5D58188598}) (Version: 12.4.1.6 - Apple Inc.)
Malwarebytes Anti-Malware version 2.2.1.1043 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.2.1.1043 - Malwarebytes)
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft Office Enterprise 2007 (HKLM-x32\...\ENTERPRISE) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office File Validation Add-In (HKLM-x32\...\{90140000-2005-0000-0000-0000000FF1CE}) (Version: 14.0.5130.5003 - Microsoft Corporation)
Microsoft Security Essentials (HKLM\...\Microsoft Security Client) (Version: 4.9.218.0 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.41212.0 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
MSXML 4.0 SP2 (KB954430) (HKLM-x32\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM-x32\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
Nero 9 Essentials (HKLM-x32\...\{61dae3c1-2e73-4571-ad4b-53b078dd9c9e}) (Version:  - Nero AG)
Pdf995 (installed by H&R Block) (HKLM-x32\...\Pdf995) (Version:  - )
PdfEdit995 (installed by H&R Block) (HKLM-x32\...\PdfEdit995) (Version:  - )
Qualcomm Atheros Bandwidth Control Filter Driver (Version: 1.1.42.1291 - Qualcomm Atheros) Hidden
Qualcomm Atheros Killer E220x Drivers (Version: 1.1.42.1291 - Qualcomm Atheros) Hidden
Qualcomm Atheros Killer Network Manager Suite (HKLM-x32\...\{00D4DA5D-EA32-4A7C-A855-A7FDC372049B}) (Version: 1.1.42.1291 - Qualcomm Atheros)
Qualcomm Atheros Network Manager (Version: 1.1.42.1291 - Qualcomm Atheros) Hidden
QuickTime 7 (HKLM-x32\...\{FF59BD75-466A-4D5A-AD23-AAD87C5FD44C}) (Version: 7.79.80.95 - Apple Inc.)
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.7004 - Realtek Semiconductor Corp.)
Spybot - Search & Destroy (HKLM-x32\...\{B4092C6D-E886-4CB2-BA68-FE5A99D31DE7}_is1) (Version: 2.4.40 - Safer-Networking Ltd.)
Update for 2007 Microsoft Office System (KB967642) (HKLM-x32\...\{90120000-0030-0000-0000-0000000FF1CE}_ENTERPRISE_{C444285D-5E4F-48A4-91DD-47AAAA68E92D}) (Version:  - Microsoft)

==================== Custom CLSID (Whitelisted): ==========================

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

CustomCLSID: HKU\S-1-5-21-502223781-2076990840-1381161923-1000_Classes\CLSID\{820D63D5-8CFF-46DE-86AF-4997DEDD6DB5}\localserver32 -> C:\Windows\system32\igfxEM.exe (Intel Corporation)

==================== Scheduled Tasks (Whitelisted) =============

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

Task: {0E9C034C-45B6-4B7D-9D04-5A047267FDBE} - System32\Tasks\Maintenance Installer Schedualer => C:\Program Files (x86)\Maintenance Installer\MaintenanceInstaller.exe [2016-01-07] (Backup Updater) <==== ATTENTION
Task: {185F1C9F-8A2D-4D8E-9514-EE354B47A32B} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2016-06-06] (Google Inc.)
Task: {273C16B8-2100-40AB-AD6B-F8AC7A5BF50B} - System32\Tasks\{23016E86-A429-4D2A-B880-63F530450FBD} => pcalua.exe -a D:\HRBlock2015\Program\HRBlock2015.exe -d D:\HRBlock2015\Program
Task: {340361BB-5765-4871-824D-847265E08FE0} - System32\Tasks\Adobe Acrobat Update Task => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [2016-04-22] (Adobe Systems Incorporated)
Task: {5B0FA6A1-5F12-4D4B-9634-96C688959C41} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files (x86)\Apple Software Update\SoftwareUpdate.exe [2016-02-23] (Apple Inc.)
Task: {5E9F743E-C171-40FA-B453-5971C5899B85} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2016-06-06] (Google Inc.)
Task: {60A01654-A202-41C9-977E-C627D84EA3F9} - System32\Tasks\IUM-F1E24CA0-B63E-4F13-A9E3-4ADE3BFF3473 => C:\Program Files (x86)\Intel\Intel(R) Update Manager\bin\iumsvc.exe [2015-09-25] (Intel Corporation)
Task: {700070EA-A226-4B4D-B1F6-051863094FAC} - System32\Tasks\Safer-Networking\Spybot - Search and Destroy\Scan the system => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDScan.exe [2016-03-21] (Safer-Networking Ltd.)
Task: {86D44707-A8CA-46DB-8DF9-30667C6C3898} - System32\Tasks\{298EC667-C02C-4CB5-99D1-D258581441FA} => pcalua.exe -a E:\autorun.exe -d E:\
Task: {B9D388DF-537A-4F18-88E1-8292B2A3EEA9} - System32\Tasks\CCleanerSkipUAC => C:\Program Files\CCleaner\CCleaner.exe [2016-06-01] (Piriform Ltd)
Task: {D350128D-DE47-45B5-A7D9-D219BA526A9A} - System32\Tasks\Safer-Networking\Spybot - Search and Destroy\Check for updates => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdate.exe [2014-06-27] (Safer-Networking Ltd.)
Task: {E35B6ABD-5279-42B4-9CC5-3CADFA4C3E27} - System32\Tasks\Safer-Networking\Spybot - Search and Destroy\Refresh immunization => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDImmunize.exe [2016-03-21] (Safer-Networking Ltd.)
Task: {F3A4617E-3E39-4F9E-9708-01BA544EE8A3} - System32\Tasks\IUM-F1E24CA0-B63E-4F13-A9E3-4ADE3BFF3473-Logon => C:\Program Files (x86)\Intel\Intel(R) Update Manager\bin\iumsvc.exe [2015-09-25] (Intel Corporation)
Task: {FF98E252-519C-4765-B622-5C2ABC70A04D} - System32\Tasks\System Computer Viewer => C:\Program Files (x86)\System Computer\amjob.exe [2016-05-15] () <==== ATTENTION

(If an entry is included in the fixlist, the task (.job) file will be moved. The file which is running by the task will not be moved.)

Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

==================== Shortcuts =============================

(The entries could be listed to be restored or removed.)

ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\69639df789022856\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --profile-directory="Profile 1"
ShortcutWithArgument: C:\Users\Public\Desktop\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"

==================== Loaded Modules (Whitelisted) ==============

2015-04-15 06:56 - 2012-04-26 15:51 - 00040448 _____ () C:\Windows\System32\pdf995mon64.dll
2016-03-18 22:56 - 2016-03-18 22:56 - 00092472 _____ () C:\Program Files\Common Files\Apple\Apple Application Support\zlib1.dll
2016-04-22 01:07 - 2016-04-22 01:07 - 01337144 _____ () C:\Program Files\Common Files\Apple\Apple Application Support\libxml2.dll
2014-09-29 20:51 - 2014-09-29 20:51 - 00074664 _____ () C:\Program Files (x86)\SlySoft\AnyDVD\ADvdDiscHlp64.exe
2016-06-06 21:57 - 2016-06-03 21:01 - 02334360 _____ () C:\Program Files (x86)\Google\Chrome\Application\51.0.2704.84\libglesv2.dll
2016-06-06 21:57 - 2016-06-03 21:01 - 00105112 _____ () C:\Program Files (x86)\Google\Chrome\Application\51.0.2704.84\libegl.dll
2016-06-06 21:57 - 2016-06-03 21:01 - 31491736 _____ () C:\Program Files (x86)\Google\Chrome\Application\51.0.2704.84\PepperFlash\pepflashplayer.dll
2016-01-28 06:58 - 2014-05-13 13:04 - 00109400 _____ () C:\Program Files (x86)\Spybot - Search & Destroy 2\snlThirdParty150.bpl
2016-01-28 06:58 - 2014-05-13 13:04 - 00416600 _____ () C:\Program Files (x86)\Spybot - Search & Destroy 2\DEC150.bpl
2016-01-28 06:58 - 2014-05-13 13:04 - 00167768 _____ () C:\Program Files (x86)\Spybot - Search & Destroy 2\snlFileFormats150.bpl
2016-01-28 06:58 - 2012-08-23 11:38 - 00574840 _____ () C:\Program Files (x86)\Spybot - Search & Destroy 2\sqlite3.dll
2016-01-28 06:58 - 2012-04-03 18:06 - 00565640 _____ () C:\Program Files (x86)\Spybot - Search & Destroy 2\av\BDSmartDB.dll
2016-04-22 01:08 - 2016-04-22 01:08 - 01047864 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxml2.dll
2016-03-18 22:56 - 2016-03-18 22:56 - 00080184 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\zlib1.dll
2016-04-22 01:07 - 2016-04-22 01:07 - 00244024 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxslt.dll
2014-03-20 11:43 - 2014-03-20 11:43 - 01241560 _____ () C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\ACE.dll
2009-02-26 13:46 - 2009-02-26 13:46 - 00064344 _____ () C:\Program Files (x86)\Microsoft Office\Office12\ADDINS\ColleagueImport.dll
2011-06-22 11:46 - 2011-06-22 11:46 - 00434016 _____ () C:\Program Files (x86)\Microsoft Office\Office12\ADDINS\UmOutlookAddin.dll
2015-11-11 04:41 - 2015-11-11 04:41 - 00756376 _____ () C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE12\MSPTLS.DLL

==================== Alternate Data Streams (Whitelisted) =========

(If an entry is included in the fixlist, only the ADS will be removed.)


==================== Safe Mode (Whitelisted) ===================

(If an entry is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)


==================== Association (Whitelisted) ===============

(If an entry is included in the fixlist, the registry item will be restored to default or removed.)


==================== Internet Explorer trusted/restricted ===============

(If an entry is included in the fixlist, it will be removed from the registry.)

IE trusted site: HKU\.DEFAULT\...\localhost -> localhost
IE trusted site: HKU\.DEFAULT\...\webcompanion.com -> hxxp://webcompanion.com
IE restricted site: HKU\.DEFAULT\...\007guard.com -> install.007guard.com
IE restricted site: HKU\.DEFAULT\...\008i.com -> 008i.com
IE restricted site: HKU\.DEFAULT\...\008k.com -> www.008k.com
IE restricted site: HKU\.DEFAULT\...\00hq.com -> www.00hq.com
IE restricted site: HKU\.DEFAULT\...\010402.com -> 010402.com
IE restricted site: HKU\.DEFAULT\...\032439.com -> 80gw6ry3i3x3qbrkwhxhw.032439.com
IE restricted site: HKU\.DEFAULT\...\0scan.com -> www.0scan.com
IE restricted site: HKU\.DEFAULT\...\1-2005-search.com -> www.1-2005-search.com
IE restricted site: HKU\.DEFAULT\...\1-domains-registrations.com -> www.1-domains-registrations.com
IE restricted site: HKU\.DEFAULT\...\1000gratisproben.com -> www.1000gratisproben.com
IE restricted site: HKU\.DEFAULT\...\1001namen.com -> www.1001namen.com
IE restricted site: HKU\.DEFAULT\...\100888290cs.com -> mir.100888290cs.com
IE restricted site: HKU\.DEFAULT\...\100sexlinks.com -> www.100sexlinks.com
IE restricted site: HKU\.DEFAULT\...\10sek.com -> www.10sek.com
IE restricted site: HKU\.DEFAULT\...\12-26.net -> user1.12-26.net
IE restricted site: HKU\.DEFAULT\...\12-27.net -> user1.12-27.net
IE restricted site: HKU\.DEFAULT\...\123fporn.info -> www.123fporn.info
IE restricted site: HKU\.DEFAULT\...\123haustiereundmehr.com -> www.123haustiereundmehr.com
IE restricted site: HKU\.DEFAULT\...\123moviedownload.com -> www.123moviedownload.com
IE restricted site: HKU\.DEFAULT\...\123simsen.com -> www.123simsen.com

There are 7902 more sites.

IE trusted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\localhost -> localhost
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\007guard.com -> install.007guard.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\008i.com -> 008i.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\008k.com -> www.008k.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\00hq.com -> www.00hq.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\010402.com -> 010402.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\032439.com -> 80gw6ry3i3x3qbrkwhxhw.032439.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\0scan.com -> www.0scan.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\1-2005-search.com -> www.1-2005-search.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\1-domains-registrations.com -> www.1-domains-registrations.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\1000gratisproben.com -> www.1000gratisproben.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\1001namen.com -> www.1001namen.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\100888290cs.com -> mir.100888290cs.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\100sexlinks.com -> www.100sexlinks.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\10sek.com -> www.10sek.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\12-26.net -> user1.12-26.net
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\12-27.net -> user1.12-27.net
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\123fporn.info -> www.123fporn.info
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\123haustiereundmehr.com -> www.123haustiereundmehr.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\123moviedownload.com -> www.123moviedownload.com
IE restricted site: HKU\S-1-5-21-502223781-2076990840-1381161923-1000\...\123simsen.com -> www.123simsen.com

There are 7902 more sites.


==================== Hosts content: ==========================

(If needed Hosts: directive could be included in the fixlist to reset Hosts.)

2009-07-13 22:34 - 2016-05-28 06:08 - 00452676 ___RA C:\Windows\system32\Drivers\etc\hosts

127.0.0.1    www.007guard.com
127.0.0.1    007guard.com
127.0.0.1    008i.com
127.0.0.1    www.008k.com
127.0.0.1    008k.com
127.0.0.1    www.00hq.com
127.0.0.1    00hq.com
127.0.0.1    010402.com
127.0.0.1    www.032439.com
127.0.0.1    032439.com
127.0.0.1    www.0scan.com
127.0.0.1    0scan.com
127.0.0.1    1000gratisproben.com
127.0.0.1    www.1000gratisproben.com
127.0.0.1    1001namen.com
127.0.0.1    www.1001namen.com
127.0.0.1    100888290cs.com
127.0.0.1    www.100888290cs.com
127.0.0.1    www.100sexlinks.com
127.0.0.1    100sexlinks.com
127.0.0.1    10sek.com
127.0.0.1    www.10sek.com
127.0.0.1    www.1-2005-search.com
127.0.0.1    1-2005-search.com
127.0.0.1    123fporn.info
127.0.0.1    www.123fporn.info
127.0.0.1    123haustiereundmehr.com
127.0.0.1    www.123haustiereundmehr.com
127.0.0.1    123moviedownload.com
127.0.0.1    www.123moviedownload.com

There are 15529 more lines.


==================== Other Areas ============================

(Currently there is no automatic fix for this section.)

HKU\S-1-5-21-502223781-2076990840-1381161923-1000\Control Panel\Desktop\\Wallpaper -> C:\Users\Tamara\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg
DNS Servers: 192.168.1.1
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System => (ConsentPromptBehaviorAdmin: 5) (ConsentPromptBehaviorUser: 3) (EnableLUA: 1)
Windows Firewall is enabled.

==================== MSCONFIG/TASK MANAGER disabled items ==

(Currently there is no automatic fix for this section.)


==================== FirewallRules (Whitelisted) ===============

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

FirewallRules: [TCP Query User{CAF36BC8-7CF7-4411-AA80-2192004047AF}C:\windows\splwow64.exe] => (Allow) C:\windows\splwow64.exe
FirewallRules: [UDP Query User{ED04EE94-04D6-4244-B656-CC77B9FEFB60}C:\windows\splwow64.exe] => (Allow) C:\windows\splwow64.exe
FirewallRules: [{6ED79F67-B097-45CB-97CC-8578200C865B}] => (Allow) C:\Program Files\Bonjour\mDNSResponder.exe
FirewallRules: [{1C272543-737B-4D37-B553-B1732D31B81A}] => (Allow) C:\Program Files\Bonjour\mDNSResponder.exe
FirewallRules: [{B8CC3136-6ED9-4ED0-A088-53C5CCAD133F}] => (Allow) C:\Program Files (x86)\Bonjour\mDNSResponder.exe
FirewallRules: [{33A23EB1-E12F-44FC-ABD4-D102094D869B}] => (Allow) C:\Program Files (x86)\Bonjour\mDNSResponder.exe
FirewallRules: [{B2E82A24-EA74-4E82-952F-EB901D720498}] => (Allow) C:\Users\Tamara\AppData\Roaming\BitTorrent\BitTorrent.exe
FirewallRules: [{3551D4BC-D606-4D31-9EB1-D504E046D9DF}] => (Allow) C:\Users\Tamara\AppData\Roaming\BitTorrent\BitTorrent.exe
FirewallRules: [{414E339E-8F67-4F4F-BFEE-093E2DBEDC4C}] => (Allow) C:\Program Files\iTunes\iTunes.exe
FirewallRules: [{C7F1885A-8405-4391-A74C-F051876FE416}] => (Allow) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe] => Enabled:Spybot - Search & Destroy tray access
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe] => Enabled:Spybot-S&D 2 Scanner Service
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdate.exe] => Enabled:Spybot-S&D 2 Updater
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdSvc.exe] => Enabled:Spybot-S&D 2 Background update service

==================== Restore Points =========================

30-05-2016 06:18:58 Windows Update
02-06-2016 14:01:35 Windows Update
05-06-2016 03:00:16 Windows Update
05-06-2016 19:00:09 Windows Backup

==================== Faulty Device Manager Devices =============

Name: CanoScan
Description: CanoScan
Class Guid: 
Manufacturer: 
Service: 
Problem: : The drivers for this device are not installed. (Code 28)
Resolution: To install the drivers for this device, click "Update Driver", which starts the Hardware Update wizard.


==================== Event log errors: =========================

Application errors:
==================
Error: (06/05/2016 09:15:03 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 7441

Error: (06/05/2016 09:15:03 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 7441

Error: (06/05/2016 09:15:03 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (06/04/2016 05:57:10 AM) (Source: ESENT) (EventID: 455) (User: )
Description: DllHost (6048) WebCacheLocal: Error -1811 occurred while opening logfile C:\Users\Tamara\AppData\Local\Microsoft\Windows\WebCache\V0100003.log.

Error: (06/03/2016 02:32:25 PM) (Source: ESENT) (EventID: 474) (User: )
Description: wuaueng.dll (556) SUS20ClientDataStore: The database page read from the file "C:\Windows\SoftwareDistribution\DataStore\DataStore.edb" at offset 939753472 (0x0000000038038000) (database page wuaueng.dll0) for 32768 (0x00008000) bytes failed verification due to a page checksum mismatch.  The expected checksum was [841f841f11f1667e:22bd22bd86417010:d1d0d1d03597322a:89a3765c1e92c94a] and the actual checksum was [8408840811af6637:22bd22bd86417010:d1d7d1d735ce3264:89a3765c1e92c94a].  The read operation will fail with error -1018 (0xfffffc06).  If this condition persists then please restore the database from a previous backup.  This problem is likely due to faulty hardware. Please contact your hardware vendor for further assistance diagnosing the problem.

Error: (06/03/2016 02:31:30 PM) (Source: ESENT) (EventID: 474) (User: )
Description: wuaueng.dll (556) SUS20ClientDataStore: The database page read from the file "C:\Windows\SoftwareDistribution\DataStore\DataStore.edb" at offset 939753472 (0x0000000038038000) (database page wuaueng.dll0) for 32768 (0x00008000) bytes failed verification due to a page checksum mismatch.  The expected checksum was [841f841f11f1667e:22bd22bd86417010:d1d0d1d03597322a:89a3765c1e92c94a] and the actual checksum was [8408840811af6637:22bd22bd86417010:d1d7d1d735ce3264:89a3765c1e92c94a].  The read operation will fail with error -1018 (0xfffffc06).  If this condition persists then please restore the database from a previous backup.  This problem is likely due to faulty hardware. Please contact your hardware vendor for further assistance diagnosing the problem.

Error: (06/03/2016 11:07:27 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 2620

Error: (06/03/2016 11:07:27 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 2620

Error: (06/03/2016 11:07:27 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (06/03/2016 10:05:13 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 3947


System errors:
=============
Error: (06/07/2016 04:55:15 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: The Software Protection service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 120000 milliseconds: Restart the service.

Error: (06/07/2016 04:55:15 AM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: The Intel(R) Dynamic Application Loader Host Interface Service service terminated unexpectedly.  It has done this 1 time(s).

Error: (06/07/2016 04:55:14 AM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: The Intel® ME Service service terminated unexpectedly.  It has done this 1 time(s).

Error: (06/07/2016 04:55:14 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: The Windows Media Player Network Sharing Service service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 30000 milliseconds: Restart the service.

Error: (06/07/2016 04:55:14 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: The Windows Search service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 30000 milliseconds: Restart the service.

Error: (06/07/2016 04:55:14 AM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: The iPod Service service terminated unexpectedly.  It has done this 1 time(s).

Error: (06/07/2016 04:55:14 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: The Windows Presentation Foundation Font Cache 3.0.0.0 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 0 milliseconds: Restart the service.

Error: (06/07/2016 04:55:14 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: The Spybot-S&D 2 Security Center Service service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.

Error: (06/07/2016 04:55:13 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: The Spybot-S&D 2 Updating Service service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 60000 milliseconds: Restart the service.

Error: (06/07/2016 04:55:13 AM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: The Qualcomm Atheros Killer Service V2 service terminated unexpectedly.  It has done this 1 time(s).


==================== Memory info =========================== 

Processor: Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz
Percentage of memory in use: 28%
Total physical RAM: 7885.24 MB
Available physical RAM: 5657.38 MB
Total Virtual: 15768.67 MB
Available Virtual: 13338.55 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:111.69 GB) (Free:11.58 GB) NTFS
Drive d: () (Fixed) (Total:931.51 GB) (Free:740.28 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 111.8 GB) (Disk ID: 14A4AC29)
Partition 1: (Active) - (Size=100 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=111.7 GB) - (Type=07 NTFS)

========================================================
Disk: 1 (MBR Code: Windows 7 or 8) (Size: 931.5 GB) (Disk ID: FE9B4F43)
Partition 1: (Not Active) - (Size=931.5 GB) - (Type=07 NTFS)

==================== End of Addition.txt ============================Rkill.txtFRST.txtRkill.txt

 

Addition.txt

Link to post
Share on other sites

Thanks for those logs, continue as follows please:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into.
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Download AdwCleaner by Xplode onto your Desktop.
 
  • Double click on Adwcleaner.exe to run the tool.
  • Click on the Scan in the Actions box
  • Please wait fot the scan to finish..
  • When "Waiting for action.Please uncheck elements you want to keep" shows in top line..
  • Click on the Cleaning box.
  • Next click OK on the "Closing Programs" pop up box.
  • Click OK on the Information box & again OK to allow the necessary reboot
  • After restart the AdwCleaner(C*)-Notepad log will appear, please copy/paste it in your next reply. Where * is the number relative to list of scans completed...


Next,

Go here: https://www.zemana.com/Download download and install Zemana Anti-malware. Allow a shortcut to be saved to your Desktop.. The tool will be active with a 15 day trial....

Right click on user posted image Zemana Antimalware and select "Run as Administrator"

From the GUI select "Settings"

user posted image

In the new window Select 1. Updates, when complete Select 2. Real Time Protection.

user posted image

In the next window make sure 1. all boxes are checkmarked and the action is "Quarantine" and then " 2. Select the home icon.

user posted image

In the new window select "Scan"

user posted image

When the scan completes check each found entry (if any). For "Suspicious Browser Settings" choose REPAIR for all other entries choose QUARANTINE then select the "Next" tab


The action complete window will open, from there select the "Back" tab. That will take you back to the home screen...

On that screen select the "Reports" tab. (Looks like 3 chimneys)

user posted image

On that screen select and highlite the scan details line, then select "Open Report"

user posted image

Copy and paste that log to your reply...

Next,

Download Sophos Free Virus Removal Tool and save it to your desktop.
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....


Let me see those logs, also give an update on any remaining issues or concerns...

Thank you,

Kevin....
Link to post
Share on other sites

Fix result of Farbar Recovery Scan Tool (x64) Version:07-06-2016
Ran by Tamara (2016-06-08 07:13:06) Run:1
Running from C:\Users\Tamara\Desktop
Loaded Profiles: Tamara (Available Profiles: Tamara)
Boot Mode: Normal
==============================================

fixlist content:
*****************
Start
CreateRestorePoint:
CloseProcesses:
S3 Synth3dVsc; System32\drivers\synth3dvsc.sys [X]
S3 tsusbhub; system32\drivers\tsusbhub.sys [X]
S3 VGPU; System32\drivers\rdvgkmd.sys [X] 
C:\Users\Tamara\AppData\Local\Temp\libeay32.dll
C:\Users\Tamara\AppData\Local\Temp\msvcr120.dll
C:\Users\Tamara\AppData\Local\Temp\sqlite3.dll 
Task: {0E9C034C-45B6-4B7D-9D04-5A047267FDBE} - System32\Tasks\Maintenance Installer Schedualer => C:\Program Files (x86)\Maintenance Installer\MaintenanceInstaller.exe [2016-01-07] (Backup Updater) <==== ATTENTION
Task: {FF98E252-519C-4765-B622-5C2ABC70A04D} - System32\Tasks\System Computer Viewer => C:\Program Files (x86)\System Computer\amjob.exe [2016-05-15] () <==== ATTENTION 
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\69639df789022856\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --profile-directory="Profile 1"
ShortcutWithArgument: C:\Users\Public\Desktop\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75" 
CMD: ipconfig /flushdns
EmptyTemp:
end

*****************

Restore point was successfully created.
Processes closed successfully.
Synth3dVsc => service removed successfully
tsusbhub => service removed successfully
VGPU => service removed successfully
C:\Users\Tamara\AppData\Local\Temp\libeay32.dll => moved successfully
C:\Users\Tamara\AppData\Local\Temp\msvcr120.dll => moved successfully
C:\Users\Tamara\AppData\Local\Temp\sqlite3.dll => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{0E9C034C-45B6-4B7D-9D04-5A047267FDBE}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{0E9C034C-45B6-4B7D-9D04-5A047267FDBE}" => key removed successfully
C:\Windows\System32\Tasks\Maintenance Installer Schedualer => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Maintenance Installer Schedualer" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{FF98E252-519C-4765-B622-5C2ABC70A04D}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{FF98E252-519C-4765-B622-5C2ABC70A04D}" => key removed successfully
C:\Windows\System32\Tasks\System Computer Viewer => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\System Computer Viewer" => key removed successfully
C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk => Shortcut argument removed successfully.
C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk => Shortcut argument removed successfully.
C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\69639df789022856\Google Chrome.lnk => Shortcut argument removed successfully.
C:\Users\Public\Desktop\Google Chrome.lnk => Shortcut argument removed successfully.

=========  ipconfig /flushdns =========


Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========= End of CMD: =========

EmptyTemp: => 709.4 MB temporary data Removed.


The system needed a reboot.

==== End of Fixlog 07:13:19 ====

Fixlog.txt

Link to post
Share on other sites

# AdwCleaner v5.119 - Logfile created 08/06/2016 at 07:24:08
# Updated 30/05/2016 by Xplode
# Database : 2016-06-07.1 [Server]
# Operating system : Windows 7 Ultimate Service Pack 1 (X64)
# Username : Tamara - TAMARA-PC
# Running from : C:\Users\Tamara\Desktop\AdwCleaner.exe
# Option : Clean
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****


***** [ Files ] *****


***** [ DLLs ] *****


***** [ WMI ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****


***** [ Web browsers ] *****


*************************

:: "Tracing" keys deleted
:: Winsock settings cleared

*************************

C:\AdwCleaner\AdwCleaner[C10].txt - [2646 bytes] - [07/06/2016 04:12:28]
C:\AdwCleaner\AdwCleaner[C11].txt - [3023 bytes] - [07/06/2016 04:55:15]
C:\AdwCleaner\AdwCleaner[C12].txt - [874 bytes] - [08/06/2016 07:24:08]
C:\AdwCleaner\AdwCleaner[C3].txt - [1788 bytes] - [31/05/2016 21:42:44]
C:\AdwCleaner\AdwCleaner[C4].txt - [1621 bytes] - [01/06/2016 02:44:02]
C:\AdwCleaner\AdwCleaner[C5].txt - [1768 bytes] - [01/06/2016 05:24:01]
C:\AdwCleaner\AdwCleaner[C6].txt - [2341 bytes] - [03/06/2016 05:01:13]
C:\AdwCleaner\AdwCleaner[C7].txt - [2210 bytes] - [03/06/2016 05:21:58]
C:\AdwCleaner\AdwCleaner[C8].txt - [2357 bytes] - [03/06/2016 06:07:31]
C:\AdwCleaner\AdwCleaner[C9].txt - [2660 bytes] - [04/06/2016 05:57:09]
C:\AdwCleaner\AdwCleaner[S11].txt - [1755 bytes] - [31/05/2016 21:38:22]
C:\AdwCleaner\AdwCleaner[S13].txt - [1083 bytes] - [31/05/2016 22:21:35]
C:\AdwCleaner\AdwCleaner[S14].txt - [1157 bytes] - [01/06/2016 00:03:50]
C:\AdwCleaner\AdwCleaner[S15].txt - [1448 bytes] - [01/06/2016 02:42:51]
C:\AdwCleaner\AdwCleaner[S16].txt - [1595 bytes] - [01/06/2016 05:23:03]
C:\AdwCleaner\AdwCleaner[S17].txt - [1526 bytes] - [02/06/2016 04:51:29]
C:\AdwCleaner\AdwCleaner[S18].txt - [1600 bytes] - [02/06/2016 05:04:19]
C:\AdwCleaner\AdwCleaner[S19].txt - [2156 bytes] - [03/06/2016 05:00:07]
C:\AdwCleaner\AdwCleaner[S1].txt - [2879 bytes] - [08/04/2016 18:35:21]
C:\AdwCleaner\AdwCleaner[S20].txt - [2037 bytes] - [03/06/2016 05:19:13]
C:\AdwCleaner\AdwCleaner[S21].txt - [2184 bytes] - [03/06/2016 06:04:51]
C:\AdwCleaner\AdwCleaner[S22].txt - [2469 bytes] - [04/06/2016 05:43:11]
C:\AdwCleaner\AdwCleaner[S24].txt - [2262 bytes] - [04/06/2016 06:31:16]
C:\AdwCleaner\AdwCleaner[S25].txt - [2336 bytes] - [05/06/2016 17:57:21]
C:\AdwCleaner\AdwCleaner[S26].txt - [2490 bytes] - [06/06/2016 22:17:18]
C:\AdwCleaner\AdwCleaner[S27].txt - [2484 bytes] - [07/06/2016 04:11:18]
C:\AdwCleaner\AdwCleaner[S28].txt - [2848 bytes] - [07/06/2016 04:54:19]
C:\AdwCleaner\AdwCleaner[S29].txt - [2780 bytes] - [08/06/2016 07:21:21]
C:\AdwCleaner\AdwCleaner[S2].txt - [2952 bytes] - [08/04/2016 18:36:29]
C:\AdwCleaner\AdwCleaner[S30].txt - [2858 bytes] - [08/06/2016 07:22:20]
C:\AdwCleaner\AdwCleaner[S31].txt - [2928 bytes] - [08/06/2016 07:23:39]

########## EOF - C:\AdwCleaner\AdwCleaner[C12].txt - [3010 bytes] ##########
 

Link to post
Share on other sites

Fix result of Farbar Recovery Scan Tool (x64) Version:07-06-2016
Ran by Tamara (2016-06-08 07:13:06) Run:1
Running from C:\Users\Tamara\Desktop
Loaded Profiles: Tamara (Available Profiles: Tamara)
Boot Mode: Normal
==============================================

fixlist content:
*****************
Start
CreateRestorePoint:
CloseProcesses:
S3 Synth3dVsc; System32\drivers\synth3dvsc.sys [X]
S3 tsusbhub; system32\drivers\tsusbhub.sys [X]
S3 VGPU; System32\drivers\rdvgkmd.sys [X] 
C:\Users\Tamara\AppData\Local\Temp\libeay32.dll
C:\Users\Tamara\AppData\Local\Temp\msvcr120.dll
C:\Users\Tamara\AppData\Local\Temp\sqlite3.dll 
Task: {0E9C034C-45B6-4B7D-9D04-5A047267FDBE} - System32\Tasks\Maintenance Installer Schedualer => C:\Program Files (x86)\Maintenance Installer\MaintenanceInstaller.exe [2016-01-07] (Backup Updater) <==== ATTENTION
Task: {FF98E252-519C-4765-B622-5C2ABC70A04D} - System32\Tasks\System Computer Viewer => C:\Program Files (x86)\System Computer\amjob.exe [2016-05-15] () <==== ATTENTION 
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75"
ShortcutWithArgument: C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\69639df789022856\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --profile-directory="Profile 1"
ShortcutWithArgument: C:\Users\Public\Desktop\Google Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --load-extension="C:\Program Files (x86)\Google\Chrome\Application\33d37415b657f8c93a441dba992f6e75" 
CMD: ipconfig /flushdns
EmptyTemp:
end

*****************

Restore point was successfully created.
Processes closed successfully.
Synth3dVsc => service removed successfully
tsusbhub => service removed successfully
VGPU => service removed successfully
C:\Users\Tamara\AppData\Local\Temp\libeay32.dll => moved successfully
C:\Users\Tamara\AppData\Local\Temp\msvcr120.dll => moved successfully
C:\Users\Tamara\AppData\Local\Temp\sqlite3.dll => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{0E9C034C-45B6-4B7D-9D04-5A047267FDBE}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{0E9C034C-45B6-4B7D-9D04-5A047267FDBE}" => key removed successfully
C:\Windows\System32\Tasks\Maintenance Installer Schedualer => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Maintenance Installer Schedualer" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{FF98E252-519C-4765-B622-5C2ABC70A04D}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{FF98E252-519C-4765-B622-5C2ABC70A04D}" => key removed successfully
C:\Windows\System32\Tasks\System Computer Viewer => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\System Computer Viewer" => key removed successfully
C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk => Shortcut argument removed successfully.
C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk => Shortcut argument removed successfully.
C:\Users\Tamara\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\69639df789022856\Google Chrome.lnk => Shortcut argument removed successfully.
C:\Users\Public\Desktop\Google Chrome.lnk => Shortcut argument removed successfully.

=========  ipconfig /flushdns =========


Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========= End of CMD: =========

EmptyTemp: => 709.4 MB temporary data Removed.


The system needed a reboot.

==== End of Fixlog 07:13:19 ====

Link to post
Share on other sites

Zemana AntiMalware 2.20.2.911 (Installed)

-------------------------------------------------------
Scan Result            : Completed
Scan Date              : 2016/6/8
Operating System       : Windows 7 64-bit
Processor              : 4X Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz
BIOS Mode              : Legacy
CUID                   : 120C091EEB3155B8052B44
Scan Type              : Smart Scan
Duration               : 0m 34s
Scanned Objects        : 11657
Detected Objects       : 1
Excluded Objects       : 0
Read Level             : SCSI
Auto Upload            : Enabled
Detect All Extensions  : Disabled
Scan Documents         : Disabled
Domain Info            : WORKGROUP,0,2

Detected Objects
-------------------------------------------------------

couponprinter_x64.ocx
Status             : Scanned
Object             : %systemroot%\couponprinter_x64.ocx
MD5                : 722772685CBCCB7C72DB0A965438A9AC
Publisher          : Coupons, Inc.
Size               : 659440
Version            : 5.0.2.8
Detection          : Adware:Win32/Coupons!Ep
Cleaning Action    : Quarantine
Related Objects    :
                File - %systemroot%\couponprinter_x64.ocx
                Registry Entry - HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{1A53AD8B-D0B9-4E7F-88E4-50C07A65F2DC}\@ = C:\Windows\COUPON~2.OCX
                Registry Entry - HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1A53AD8B-D0B9-4E7F-88E4-50C07A65F2DC}\@ = C:\Windows\COUPON~2.OCX
                Registry Entry - HKLM\SOFTWARE\Classes\CLSID\{1A53AD8B-D0B9-4E7F-88E4-50C07A65F2DC}\InprocServer32\@ = C:\Windows\COUPON~2.OCX


Cleaning Result
-------------------------------------------------------
Cleaned               : 1
Reported as safe      : 0
Failed                : 0
 

Link to post
Share on other sites

Hello again Kevin, So far I haven't seen the initial problems I requested help for, however malware bytes has been notifying me that it stopped a malicious web site but I guess that a good thing?

Malwarebytes Anti-Malware
www.malwarebytes.org


Protection, 6/10/2016 3:29 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Starting, 
Protection, 6/10/2016 3:29 AM, SYSTEM, TAMARA-PC, Protection, Malware Protection, Started, 
Protection, 6/10/2016 3:29 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Update, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Manual, IP Database, 2016.6.8.2, 2016.6.9.1, 
Update, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Manual, Domain Database, 2016.6.9.2, 2016.6.9.3, 
Update, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Manual, Malware Database, 2016.6.9.3, 2016.6.10.1, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Starting, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopping, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Stopped, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Refresh, Success, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Starting, 
Protection, 6/10/2016 3:30 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Started, 
Detection, 6/10/2016 3:32 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 50551, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/10/2016 3:32 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 50551, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Detection, 6/10/2016 3:32 AM, SYSTEM, TAMARA-PC, Protection, Malicious Website Protection, Domain, 173.192.117.80, affrh2022.com, 52985, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, 
Scan, 6/10/2016 3:37 AM, SYSTEM, TAMARA-PC, Manual, Start:6/10/2016 3:30 AM, Duration:6 min 40 sec, Threat Scan, Completed, 0 Malware Detections, 0 Non-Malware Detections, 

(end)

 

Link to post
Share on other sites

Thanks for the update, lets leave your system for 24 hours to make sure the issue does not return, after that we can clean up.. The IP address of the outbound calls blocked by Malwarebytes were via Chrome were as follows:

Quote
IP Information for 173.192.117.80
Quick Stats
IP Location United States United States Dallas Softlayer Technologies Inc.
ASN United States AS36351 SOFTLAYER - SoftLayer Technologies Inc., US (registered Dec 12, 2005)
Resolve Host 50.75.c0ad.ip4.static.sl-reverse.com
Whois Server whois.arin.net
IP Address 173.192.117.80

Does that mean anything to you?

Link to post
Share on other sites

Run the following and let me know if the issue clears:

51a612a8b27e2-Zoek.pngScan with ZOEK

Please download ZOEK by Smeenk from here: http://hijackthis.nl/smeenk/ and save it to your desktop (preferred version is the *.exe one)

*.exe Mirror http://smeenk.247fixes.com/Tools/zoek.exe

Temporary disable your AntiVirus and AntiSpyware protection - instructions here or here

  • Right-click on 51a612a8b27e2-Zoek.png icon and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Wait patiently until the main console will appear, it may take a minute or two.
  • In the main box please paste in the following script:
createsrpoint;
autoclean;
emptyclsid;
emptyalltemp;
ipconfig /flushdns >>"%temp%\log.txt";b
CHRdefaults;

 

  • Make sure that Scan All Users option is checked.
  • Push Run Script and wait patiently. The scan may take a couple of minutes.
  • When the scan completes, a zoek-results logfile should open in notepad.
  • If a reboot is needed, it will be opened after it. You may also find it at your main drive (usually C:\ drive)

Please include its content in your next reply. Don't forget to re-enable security software!

Next,

Install Adblock Plus to Chrome: https://chrome.google.com/webstore/detail/adblock-plus/cfhdojbkjhnklbpkdaibdccddilifddb

Install DrWeb Link Ant-virus Link Checker: https://chrome.google.com/webstore/detail/drweb-anti-virus-link-che/aleggpabliehgbeagmfhnodcijcmbonb?hl=en


Post that log, also give an update on any remaining issues or concerns...

Thank you,

Kevin..

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.