Chat with Malwarebytes Expert Here

Wednesday, 21 December 2016

Malwarebytes Annoying Errors/Issues? DIAL +1-888-720-3203

Annoying error message pop-up?

DIAL :+1-888-720-3203 & resolve everything


How can I get rid of pop-up error message from Malwarebytes. It acts like a malware!

SOME COMMON ERRORS WITH Malwarebytes Anti-Malware

0xc000001d error - CENSORED TOPIC
How To Fix Malwarebytes Anti-Malware Error 1812
Malwarebytes SDKDatabaseLoadDefaults error
Adblock Plus • View topic - Script error
How to Fix malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error
Whenever I have Malwarebytes installed I get DNS errors when trying
Annoying message (missing dll file) appearing at start-up
MBAM error: SDKDatabaseLoadDefaults failed with code: 1812
Malwarebytes Anti-Malware: Run-time error '339'
What should I do if I receive an SDK DatabaseLoad Defaults error?






Databases out of date - your database is out of  date. It is important to keep protected by istalling the latest updates.   UPDATE NOW.



When I click on UPDATE NOW, it pops up the same and click on x mark does not make it go away.post-170020-0-74878500-1406489555_thumb.
1PW
1PW
1PW
Spam Hunters
8,377 posts
Interests: Agnes - loved forever.
ID: 2   Posted July 27, 2014
Hello ounbbl and :welcome:

Let's begin here:

Please try the following and let us know if this corrects your issue: MBAM Clean Removal Process 2.x.
If that does not correct the issue, then please read the following and individually attach the 3 requested logs in a reply to this thread: Diagnostic Logs.
The 3 files, from Step 2, to be individually attached from your desktop are: 1) CheckResults.txt 2) FRST.txt 3) Addition.txt. Please do not Copy and Paste them into a reply.
NOTE: There is an FAQ section with valuable information located in Common Questions, Issues, and their Solutions.
Please let us know the status of your issue in a reply to this thread.
Thank You.

0xc000001d error - CENSORED TOPIC
Started by r7t8, July 31
3 posts in this topic
r7t8
New Member
Topic Starter
r7t8
Members
1 post
ID: 1   Posted July 31
In the following thread, Root Admin says:

"MBAM System Requirements were clarified with the latest release"

 and

"Please download the special installer from this page."

https://forums.malwarebytes.org/topic/170731-0xc000001d-error-failed-to-initialize/


Both of these statements are FALSE.  The download page does not clarify the system requirements and the download link in that thread is broken.

I understand that people make mistakes, but I find it very annoying when people blatantly lie, and then lock the topic so no one can complain about it.  The arrogance and rudeness of Malwarebytes seems to have no end.  They just dont care how much of the users time is wasted by their lying, laziness, and product misrepresentation.  If you cannot simply disable SSE2 optimizations at compile time, the least you could do is post a simple statement on the download page like this:

The following CPU's are not supported due to the lack of an SSE2 instruction set:
Intel Pentium III, AMD Athlon XP, VIA C3, Transmeta Crusoe, Intel Quark

Why do you censoreders continue to needlessly waste the users time by forcing them to troubleshoot cryptic error messages?  We will never purchase another new Windows machine that is designed to have backdoors and spyware.  We dont use this old hardware for daily work but millions of people see no reason to throw a perfectly good LCD display in the trash that could be used to monitor traffic from an IDS/firewall appliance.  Why cant the Malwarebytes installer work the same as other installers: they just say the CPU is unsupported and thats the end of it.  No muss, no fuss.  If you are lazy and stupid in one area, I cannot trust your software to do other tasks properly.
Aura
Special Ops
Aura
Trusted Advisors
2,591 posts
Location: Québec, Canada
Interests: Technical Support, Malware Removal & Analysis, Information Security, Gaming.
ID: 2   Posted August 1
  Quote
Both of these statements are FALSE.CCall at +1-888-720-3203

Really?

  Quote
The download page does not clarify the system requirements

Ron never said that the requirements were specified in the download page, however they are specified in the appropriate support article.

https://support.malwarebytes.com/customer/portal/articles/1834851-what-are-the-system-requirements-to-run-malwarebytes-anti-malware-?b_id=6438

  Quote
800 MHz CPU or faster with SSE2 technology
  Quote
the download link in that thread is broken.

Works for me.

muw0vgV.png

Right now, I don't consider that Malwarebytes is wasting your time, it would be quite the opposite since I had to take my own time (I don't work for Malwarebytes however) to prove to you that you didn't do appropriate research before posting here.
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 3   Posted August 1 (edited)
Hello @r7t8

I'm sorry that you're having issues locating the information concerning the lack of certain processor support. The information is on the main product page near the bottom under Tech specs.

https://www.malwarebytes.com/antimalware/

Software Requirements
Windows 10 (32/64-bit)
Windows 8.1 (32/64-bit)
Windows 8 (32/64-bit)
Windows 7 (32/64-bit)
Windows Vista (Service Pack 1 or later, 32/64-bit)
Windows XP (Service Pack 2 or later, 32-bit only)
Internet Explorer 6 or newer


Hardware Requirements:
2048 MB RAM (64-bit OS)
1024 MB RAM (32-bit OS, except 256 MB for Windows XP)
800 MHz CPU or faster with SSE2 technology
20MB of free hard disk space
1024x768 or greater screen resolution
Active internet connection for database and product updates



Side note: SSE2 Technology

  Quote
SSE2, Streaming SIMD Extensions 2, is one of the Intel SIMD (Single Instruction, Multiple Data) processor supplementary instruction sets first introduced by Intel with the initial version of the Pentium 4 in 2001. It extends the earlier SSE instruction set, and is intended to fully replace MMX

SSE2 - Wikipedia

By 2004 even AMD had added such support to their main processors. In theory, one would probably need to have a computer older than about 2005 or so not to have support for SSE2 - I'm sure it's possible that there are some computers even newer possibly up to about 2008 being built or sold with very Call at +1-888-720-3203old hardware that was even obsolete at the time but was cheap. 

One has to realize when working with any computer that is over 5 years old that there may be a need to verify that certain drivers and software are in fact still compatible with an old computer. In this case, the computer would almost certainly have to be over 10 years old.

Thank you for your understanding and again I apologize that you were not able to easily find the requested information.


"Bad Image" error after running Malwarebytes
Started by Guest SherlockTAS, December 10, 2014
Bad

Image

Malwarebytes

wininet.dll
    
23 posts in this topic
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 1   Posted December 10, 2014
I am trying to clean up a computer for a friend's daughter.   I tried downloading and running the Malwarebytes free program as it always worked in the past.  Her computer is an HP laptop running Windows 8, which I hate using, but can get around with time. 



The first time I ran Malwarebytes, I ended up with 4,199 results!!!  I uninstalled some programs I deemed to be malware while the program was scanning (probably shouldn't have done that), and then clicked to quarantine the items when the results finished.  Upon rebooting the computer, it stopped to install some Windows updates and after restarting, the computer failed to load beyond the desktop image.  An error popped up about bad image and explorer.exe. 



From there I rebooted the computer hoping it was just a fluke.  This time the computer loaded, but the majority of the programs did not work right and I kept getting "bad image" errors.  From there I decided to try restoring the computer to an earlier time and unfortunately I picked the restore point on the day most of the malware was installed.  I was a bit freaked out by the way the computer reacted to the last scanning and cleaning by Malwarebytes, so I tried uninstalling most of the malware programs myself.



For the most part I succeeded, but the after results of the one program, PastaLeads, persists.  It set up a proxy server, http=127.0.0.1:8800 and nothing would allow it to be changed.  If you deleted it, it would come right back after closing the connection settings.



Bleepingcomputer claimed using Rkill and Emsisoft Anti-Malware would get rid of it when the directions were followed.  Result = No change.  The Emsisoft scanner found 33 items, but 15 of them could not be removed and those items were all located in a Driver folder.



I installed Comodo Internet Security on the computer, but because of this PastaLeads, it disabled the internet browsers and Comodo's ability to update and scan. 



I need someone's help to get rid of the after effects of PastaLeads and ferret out any other malware.  I am currently doing a Malwarebytes scan to see if it picks anything else up, but I read other people's posts stating that Malwarebytes was unable to solve the same problem.



You might have to go slower with instructions with me.  I am not a novice with computers, but I am not an expert either.
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 2   Posted December 10, 2014
How do you change a title on a post?  I screwed this one up.  I meant to change the title to something else and there is NO edit option on here.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 3   Posted December 10, 2014
Hello SherlockTAS, welcome to Malwarebytes' Malware Removal forum!

My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems.Call at +1-888-720-3203
If you would allow me to call you by your first name I would prefer that. :)

General P2P/Piracy Notice: 


  Quote
If you are using Peer to Peer (P2P) filesharing software such as uTorrent, BitTorrent or similar you must either fully uninstall or completely disable the programme(s) from running whilst receiving assistance at this forum. 
Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.
If you have illegal/cracked/keygen or similar software on the computer, please remove/uninstall the software now and read the policy on Piracy. Failure to do so will also result in your topic being closed.


======================================================

Please read through the points below to ensure this process moves as quickly and efficiently as possible.

Please ensure you read through my instructions thoroughly, and carry out each step in the order specified.
If you are unable to copy/paste your logs directly into your post, please attach the file. 
Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation and providing the best set of instructions for you.
Please backup important files before proceeding with my instructions. Malware removal can be unpredictable.
If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.
Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.
Ensure you are following this topic. Click xetYzdbu.png.pagespeed.ic.U7AjmRUewW.png at the top of the page. 

======================================================



Please do the following after the Malwarebytes Scan has finished. 

If you are unable to download the file, please do so on a clean machine, and transfer the file across using a USB drive. 



xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan

Please download Farbar Recovery Scan Tool (x32) or Farbar Recovery Scan Tool (x64) and save the file to your Desktop.
Note: Download and run the version compatible with your system (32 or 64-bit). Download both if you're unsure; only one will run.
Right-Click FRST.exe / FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Yes to the disclaimer.
Ensure the Addition.txt box is checked.
Click the Scan button and let the programme run.
Upon completion, click OK, then OK on the Addition.txt pop up screen.
Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. 
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 4   Posted December 10, 2014
No important files to worry about.  All my friend's daughter uses it for is pictures and to play The Sims 3.



I have to work with attachments as the browsers refuse to work because of the proxy problem.  This computer doesn't use one, but the setting won't change. 



The 64-bit one worked.  Funny, I saw 86-bit in this computer.



I'm Troy.

Addition.txt

FRST.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 5   Posted December 10, 2014
Hi Troy, 


  Quote
I have to work with attachments as the browsers refuse to work because of the proxy problem.

That's OK.

Please consider the following suggestion, and proceed with the instructions below. 


  Quote
goGMWSt.gifSpybot S&D No Longer Recommended

------------------------------

MVPS.org is no longer recommending Spybot S&D due to poor testing results (scroll down and read under Freeware Antispyware Products).

I would advise uninstalling Spybot S&D. The presence of this programme can make the cleaning of your computer more difficult. You can uninstall the programme by:

Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type appwiz.cpl and click OK.
Search for Spybot, right-click the entry and click Uninstall.
Please inform me of your decision.

STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script

Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type Notepad and click OK.
Copy the entire contents of the codebox below and paste into the Notepad document.
startHKU\S-1-5-21-4180364761-169256126-1362377442-1001\...\MountPoints2: {3d2bdf5d-e2a9-11e3-825b-806e6f6e6963} - "E:\Autorun.exe"GroupPolicy: Group Policy on Chrome detected <======= ATTENTIONCHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTIONProxyEnable: [HKLM] => ProxyEnable is set.ProxyEnable: [HKLM-x32] => ProxyEnable is set.ProxyServer: [HKLM] => http=127.0.0.1:8800;https=127.0.0.1:8800ProxyServer: [HKLM-x32] => http=127.0.0.1:8800;https=127.0.0.1:8800ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled.ProxyEnable: [S-1-5-19] => Internet Explorer proxy is enabled.ProxyEnable: [S-1-5-20] => Internet Explorer proxy is enabled.SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://groovorio.com/results.php?f=4&q={searchTerms}&a=grv_otbrw3_14_35&cd=2XzuyEtN2Y1L1Qzu0Fzz0AzyyCtAzzyB0FyEtDtB0DyCyDtAtN0D0Tzu0SzyzyyCtN1L2XzutAtFtBtFtCtFtDtN1L1Czu1N1C2X1V1F2Z1S1C2W1O1L1C1B2Z1VtCyE1VtByEtN1L1G1B1V1N2Y1L1Qzu2SyEtAyCyCzzyD0EtDtG0C0AtBtDtGzzyByC0EtGyC0D0C0EtGyE0B0EtB0DyCzy0EtA0EtBtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2SzzyEtCyC0B0A0FyBtG0E0AzzyDtGyEyBzzyCtGzyyCzy0FtGyCtCtByEyC0E0E0FtCtDzy0D2Q&cr=599176992&ir=SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://groovorio.com/results.php?f=4&q={searchTerms}&a=grv_otbrw3_14_35&cd=2XzuyEtN2Y1L1Qzu0Fzz0AzyyCtAzzyB0FyEtDtB0DyCyDtAtN0D0Tzu0SzyzyyCtN1L2XzutAtFtBtFtCtFtDtN1L1Czu1N1C2X1V1F2Z1S1C2W1O1L1C1B2Z1VtCyE1VtByEtN1L1G1B1V1N2Y1L1Qzu2SyEtAyCyCzzyD0EtDtG0C0AtBtDtGzzyByC0EtGyC0D0C0EtGyE0B0EtB0DyCzy0EtA0EtBtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2SzzyEtCyC0B0A0FyBtG0E0AzzyDtGyEyBzzyCtGzyyCzy0FtGyCtCtByEyC0E0E0FtCtDzy0D2Q&cr=599176992&ir=SearchScopes: HKU\S-1-5-21-4180364761-169256126-1362377442-1001 -> DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL =SearchScopes: HKU\S-1-5-21-4180364761-169256126-1362377442-1001 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://groovorio.com/results.php?f=4&q={searchTerms}&a=grv_otbrw3_14_35&cd=2XzuyEtN2Y1L1Qzu0Fzz0AzyyCtAzzyB0FyEtDtB0DyCyDtAtN0D0Tzu0SzyzyyCtN1L2XzutAtFtBtFtCtFtDtN1L1Czu1N1C2X1V1F2Z1S1C2W1O1L1C1B2Z1VtCyE1VtByEtN1L1G1B1V1N2Y1L1Qzu2SyEtAyCyCzzyD0EtDtG0C0AtBtDtGzzyByC0EtGyC0D0C0EtGyE0B0EtB0DyCzy0EtA0EtBtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2SzzyEtCyC0B0A0FyBtG0E0AzzyDtGyEyBzzyCtGzyyCzy0FtGyCtCtByEyC0E0E0FtCtDzy0D2Q&cr=599176992&ir=CHR Extension: (TidyNetwork) - C:\Users\Lauren\AppData\Local\Google\Chrome\User Data\Default\Extensions\dmidaiabaeipgkcooijbikmdcofhpakp [2014-11-28]CHR Extension: (snipsmart) - C:\Users\Lauren\AppData\Local\Google\Chrome\User Data\Default\Extensions\enmnbmijajiokgmckkfjaloboghdkfbg [2014-11-25]CHR HKLM-x32\...\Chrome\Extension: [dmidaiabaeipgkcooijbikmdcofhpakp] - No PathS2 51cdb72; "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\Optimizer Pro 3.11\OptProCrash.dll",ENTc:\Program Files (x86)\Optimizer Pro 3.11S2 Orbiter; C:/Program Files (x86)/ORBTR/orbiter.dll [X]C:\Program Files (x86)\ORBTR2014-12-10 03:43 - 2014-12-10 03:43 - 00000000 ____D () C:\Users\Lauren\AppData\Local\WebBarTask: {2A3F9F0D-2517-44C6-B2D6-9A419DAF6764} - \RocketTab No Task File <==== ATTENTIONTask: {40A0FDF5-B9C5-4F07-8A27-3968D8B35DCD} - \TidyNetwork Update No Task File <==== ATTENTIONTask: {97F99540-8098-4A60-898C-7D9072607ECC} - \PastaQuotes No Task File <==== ATTENTIONTask: {A667A033-5C7D-4FF9-BEE1-6215CB04FFD7} - System32\Tasks\WebBarUpdateTask => C:\Program Files\WebBar\wbsvc.exeTask: {CAA7BCEA-616A-44B7-B623-68F546C3C706} - \RocketTab Update Task No Task File <==== ATTENTIONTask: {FCA5F5F3-E679-4E58-8171-46B746981B86} - System32\Tasks\WebBarLaunchTask => C:\Program Files\WebBar\wbsvc.exeC:\Program Files\WebBarAlternateDataStreams: C:\Windows\system32\MRT.exe:$CmdTcIDAlternateDataStreams: C:\Users\Lauren\Desktop\FRST64.exe:$CmdTcID2014-11-28 00:01 - 2014-11-28 00:01 - 00000000 __SHD () C:\Users\Lauren\AppData\Local\EmieBrowserModeListFolder: C:\ProgramData\InstallSightSDKFolder: C:\Windows\system32\appraiserFolder: C:\ProgramData\eBiQOtKELfFolder: C:\ProgramData\Browser2014-11-28 00:16 - 2014-12-10 03:54 - 00000000 ____D () C:\Program Files (x86)\CompuClever2014-11-28 00:16 - 2014-12-10 03:23 - 00000000 ____D () C:\Users\Lauren\AppData\Roaming\CompuClever2014-11-28 00:15 - 2014-11-28 00:15 - 00003784 _____ () C:\Windows\System32\Tasks\WebBarUpdateTask2014-11-28 00:15 - 2014-11-28 00:15 - 00003260 _____ () C:\Windows\System32\Tasks\WebBarLaunchTask2014-11-27 22:58 - 2014-11-27 22:58 - 00800816 _____ (Download Publisher) C:\Users\Lauren\Downloads\Notepad! Setup.exe2014-12-10 08:45 - 2014-10-28 15:17 - 00000000 ____D () C:\ProgramData\83b32e09-56dd-4d15-bbc7-350e8627ec65C:\Users\Lauren\AppData\Local\Temp\snipsmartUntemp.exeCMD: ipconfig /flushdnsCMD: netsh winsock reset allEmptyTemp:end
Click File, Save As and type fixlist.txt as the File Name. 
Important: The file must be saved in the same location as FRST64.exe. 
NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.

Right-Click FRST64.exe and select Run as administrator to run the programme.
Click Fix.
A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply.

STEP 2
BY4dvz9.png AdwCleaner

Please download AdwCleaner and save the file to your Desktop.
Right-Click AdwCleaner.exe and select Run as administrator to run the programme.
Follow the prompts. 
Click Scan. 
Upon completion, click Report. A log (AdwCleaner[R0].txt) will open. Briefly check the log for anything you know to be legitimate. 
Ensure anything you know to be legitimate does not have a checkmark, and click Clean. 
Follow the prompts and allow your computer to reboot. 
After rebooting, a log (AdwCleaner[s0].txt) will open. Copy the contents of the log and paste in your next reply.
-- File and folder backups are made for anything removed using this tool. Should a legitimate file or folder be removed (otherwise known as a 'false-positive'), simple steps can be taken to restore the entry. Please do not overly concern yourself with the contents of AdwCleaner[R0].txt.


STEP 3
E3feWj5.png Junkware Removal Tool (JRT)

Please download Junkware Removal Tool and save the file to your Desktop.
Note: If you unchecked any items in AdwCleaner, please backup the associated folders/files before running JRT.
Temporarily disable your anti-virus software. For instructions, please refer to the following link.
Right-Click JRT.exe and select Run as administrator to run the programme.
Follow the prompts and allow the scan to run uninterrupted. 
Upon completion, a log (JRT.txt) will open on your desktop.
Re-enable your anti-virus software.
Copy the contents of JRT.txt and paste in your next reply.

STEP 4
mlEX1wH.png RogueKiller

Please download RogueKiller (x64) and save the file to your Desktop.
Close any running programmes.
Right-Click RogueKiller.exe and select Run as administrator to run the programme.
Allow the Prescan to complete. Upon completion, a window will open. Click Accept.
A browser window may open. Close the browser window.
Click jpgUwzp.png. Upon completion, click phPvmc6.png.
Close the programme. Do not fix anything!
A log (RKreport.txt) will be open. Copy the contents of the log and paste in your next reply.

======================================================

STEP 5
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

Did you uninstall Spybot?
Fixlog.txt
AdwCleaner[s0].txt
JRT.txt
RKreport.txt
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 6   Posted December 11, 2014
I used the Spybot Search & Destroy to see if it would find anything and very pathetic results I got, too.  I was going to uninstall it, but decided to wait for your word before doing so.  I've uninstalled it now, but it's a pity that they let it go so far downhill.  It was once a geat product.  Should I uninstall the Emsisoft Anti-Malware program as well?



After the "fixlist.txt" part, it asked me to restart the computer and I clicked YES before I realized what was happening.  After it rebooted, the Comodo Internet Security Premium actually succeeded in updating itself, but I stopped it from scanning because I thought it would interfere with what we were doing.  Something is apparently working now at least as it couldn't update before.  Should we repeat something here because you never said anything about restart prompts after the "fixlist.txt"?



Didn't see anything legitimate in the AdwCleaner results to worry about.  The Junkware Removal Tool ran like molasses, unfortunately.  Luckily I had my my own computer to busy myself on while waiting.  I don't think it found anything.  RogueKiller found something.



Here are the other things you asked for.





AdwCleanerR0.txt

Fixlog.txt

JRT.txt

RKreport_SCN_12112014_004639.log
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 7   Posted December 11, 2014
Is it okay to let Comodo do a scan yet?  I intend to uninstall it soon and download a different version because their newest free version does not come with the firewall for some idiotic reason.  Makes no sense considering that you can download it separate.  Going to be using the recommeded tools to uninstall it as thoroughly as possible.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 8   Posted December 11, 2014
Hello Troy, 


  Quote
Should I uninstall the Emsisoft Anti-Malware program as well?

Emsisoft Antimalware is a reputable programme. Far better than Comodo in my (and the security communities') opinion.
And I believe you have the paid-for version? 


  Quote
Should we repeat something here because you never said anything about restart prompts after the "fixlist.txt"?

No, that's OK. The reboot was necessary. 


  Quote
Didn't see anything legitimate in the AdwCleaner results to worry about.

Did you have AdwCleaner remove the items detected by clicking Clean? I see you've attached the report (AdwCleaner[R0].txt) created prior to clicking Clean. 


  Quote
RogueKiller found something.

The items detected by RogueKiller are OK.


  Quote
Is it okay to let Comodo do a scan yet? 

Yes, that's OK. 


  Quote
I intend to uninstall it soon and download a different version because their newest free version does not come with the firewall for some idiotic reason.

Have you considered sticking with the Windows 8 Firewall? It's more than sufficient, and will use far less resources. 

-----------------------

STEP 1
b8zkrsY.png Browser Reset

Instructions on how to backup your Favourites/Bookmarks and other data can be found below.

Internet Explorer: Backup Internet Explorer Favourites
Firefox: Backup Firefox Bookmarks
Chrome: Backup Chrome Bookmarks

Proceed with the reset once done.

Internet Explorer: How to reset Internet Explorer settings
Firefox: Reset Firefox
Chrome: Chrome - Reset browser settings

STEP 2
GfiJrQ9.png Malwarebytes Anti-Malware (MBAM)

Open Malwarebytes Anti-Malware and click Update Now.
Once updated, click the Settings tab, followed by Detection and Protection and tick Scan for rootkits.
Click the Scan tab, ensure Threat Scan is checked and click Scan Now.
Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards. 
If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.
Upon completion of the scan (or after the reboot), click the History tab.
Click Application Logs and double-click the Scan Log.
Click Copy to Clipboard and paste the log in your next reply. 

STEP 3
GzlsbnV.png ESET Online Scan
Note: This scan may take a long time to complete. Please do not browse the Internet whilst your Anti-Virus is disabled.

Please download ESET Online Scan and save the file to your Desktop.
Temporarily disable yoCall at +1-888-720-3203ur anti-virus software. For instructions, please refer to the following link.
Double-click esetsmartinstaller_enu.exe to run the programme. 
Agree to the EULA by placing a checkmark next to Yes, I accept the Terms of Use. Then click Start.
Agree to the Terms of Use once more and click Start. Allow components to download.
Place a checkmark next to Enable detection of potentially unwanted applications.
Click Hide advanced settings. Place a checkmark next to:
Scan archives
Scan for potentially unsafe applications
Enable Anti-Stealth technology
Ensure Remove found threats is unchecked.
Click Start.
Wait for the scan to finish. Please be patient as this can take some time.
Upon completion, click esetListThreats.png. If no threats were found, skip the next two bullet points. 
Click esetExport.png and save the file to your Desktop, naming it something such as "MyEsetScan".
Push the Back button.
Place a checkmark next to xKN1w2nv.png.pagespeed.ic.JWqIaEgZi7.png and click SzOC1p0.png.pagespeed.ce.OWDP45O6oG.png.
Re-enable your anti-virus software.
Copy the contents of the log and paste in your next reply.

======================================================

STEP 4
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

Did your browsers reset OK?
MBAM Scan log
ESET Online Scan log
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 9   Posted December 11, 2014
  Quote


Emsisoft Antimalware is a reputable programme. Far better than Comodo in my (and the security communities') opinion.

And I believe you have the paid-for version?



No.  I downloaded the free version following directions on Bleepingcomputer for supposedly getting rid of the proxy changes the PastaLeads malware had made.  I have no reason to keep it.  It's not my computer and I am satisfied with Comodo on my own computer anyway.  I haven't had any problems with malware or viruses on my own computer for a very long time.



  Quote


Did you have AdwCleaner remove the items detected by clicking Clean? I see you've attached the report (AdwCleaner[R0].txt) created prior to clicking Clean.



I believe I did.  Don't know what happened there.  Maybe I clicked to save the text report before clicking clean.  I did another scan and nothing came up in the results, so I must have clicked clean the first time.  Sorry about that.



  Quote


Have you considered sticking with the Windows 8 Firewall? It's more than sufficient, and will use far less resources.



I wouldn't know how good the Windows 8 Firewall is.  I know how bad it was in XP and if Windows 7 has one, I don't use it.  Perhaps I could use it instead.



Perhaps that would help solve the problem I found when I installed Comodo on this laptop.  I apparently installed it from either the wrong link or something went wrong and I ended up with Antivirus with no firewall, which shouldn't have happened.  Perhaps Avira would be satisfactory for this kid's laptop instead of Comodo.  Comodo is too complex and too advanced for her laptop.



  Quote


Instructions on how to backup your Favourites/Bookmarks and other data can be found below.



Don't need to worry about this.  For some reason my friend and his family don't use bookmarks much.  Me, I'm drowning in them.  I have a hard time understanding how anyone can stand to have a taskbar covered in links or type in every single website they want to visit.  Seems such a waste of time and space when you can have folders on a bookmarks bar and use one click to go to a site.



Anyway, Browser reset done.  No problems.



The Eset scanner has developed a problem.  It gets to 32% and stops scanning.  I cancelled and tried to redo the scan twice and it stops at the same area each time.  It stops at the WildTangent folder.  The Antivirus is off, so I don't know what is going on. 



What do I do now?  It does pick up 6 results before it gets to the WildTangent folder and freezes.



No results from Malwarebytes.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 10   Posted December 12, 2014
Hi Troy, 


  Quote
I wouldn't know how good the Windows 8 Firewall is.

I suggest reading the following article on Firewalls. 
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/?p=2475503


  Quote
What do I do now?

Try stopping and restarting the scan. 
If the scan still does not complete within a timely manner, try this alternative scan. 

Please let me know how the PC is performing afterwards. 

3GlqbMn.png HitmanPro

Please download HitmanPro (x64) and save the file to your Desktop.
Right-Click HitmanPro_x64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Next, and agree to the End User License Agreement (EULA) if prompted. 
Place a checkmark next to No, I only want to perform a one-time scan to check this computer.
Click Next.
The scan will start, and will typically take no longer than 2-3 minutes.
Upon completion, click on the drop-down menu of the found entries (if any) and select: Apply to all => Ignore <=.
Click Next.
Click Save Log, and select your Desktop as the location. Copy the contents of the log and paste in your next reply.
Note: If a drop-down menu is not present after the scan is complete, please do not delete the detected items. Close the HitmanPro window. Navigate to C:\ProgramData\HitmanPro\Logs, open the log, copy the contents and paste in your next reply.
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 11   Posted December 12, 2014
  Quote


Try stopping and restarting the scan.



I rebooted the computer and ran it again.  Took over three hours and had to run it again because I forgot to uncheck "Remove items found".  Second scan took over 2 hours.



Did HitmanPro scan as well and it found very little.



Computer is currently working like it's brand new.



Here are the logs.



You don't know of a way to remove two entries from the Windows 8 Services do you? 



I had to use a removal tool for McAfee because some of it remained behind when I uninstalled it from this laptop.  At the end of using the tool, I got a window with a message like "Uninstalling Incomplete". The two services have apparently been removed as they are gone now from the Task Manager, but their entries remain in the Services list. 



I assume to get rid of the entries I need to find something in the registry?  The entries are McAfee Firewall Core Service and McAfee Validation Trust Protection Service.



The descriptions say <Failed to Read Description.  Error Code: 2>

HitmanPro_20141212_0328.log

MyEsetScan.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 12   Posted December 12, 2014
Hello Troy, 


  Quote
Computer is currently working like it's brand new.

Excellent. 


  Quote
You don't know of a way to remove two entries from the Windows 8 Services do you?

Yes, we can remove these. 

Please run a fresh FRST scan first. 

xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan

Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Yes to the disclaimer.
Ensure the Addition.txt box is checked.
Click the Scan button and let the programme run.
Upon completion, click OK, then OK on the Addition.txt pop up screen.
Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. 
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 13   Posted December 12, 2014
I'm using the laptop to answer for once.  I think I'll keep using the attachments.  Seems a lot cleaner and more easy to read that way.

Addition.txt

FRST.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 14   Posted December 12, 2014
Hi Troy, 

Please do the following. 

STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script

Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type Notepad and click OK.
Copy the entire contents of the codebox below and paste into the Notepad document.
startCloseProcesses:C:\Program Files (x86)\Common Files\Common dictionary\node\conf.jsC:\Users\Lauren\Desktop\revosetup.exeC:\Users\Lauren\Downloads\ccsetup418.exeC:\$Recycle.Bin\S-1-5-21-4180364761-169256126-1362377442-1001\$R72XHAD.exeC:\$Recycle.Bin\S-1-5-21-4180364761-169256126-1362377442-1001\$RQQYEZ9.exeC:\ProgramData\InstallSightSDKC:\ProgramData\eBiQOtKELfS3 mfencrk; C:\Windows\system32\DRIVERS\mfencrk.sys [96592 2014-07-24] (McAfee, Inc.)C:\Windows\system32\DRIVERS\mfencrk.sysS3 cleanhlp; \??\C:\Program Files (x86)\Emsisoft Anti-Malware\cleanhlp64.sys [X]CMD: ipconfig /flushdnsEmptyTemp:end
Click File, Save As and type fixlist.txt as the File Name. 
Important: The file must be saved in the same location as FRST64.exe. 
NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.

Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Fix.
A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply.

STEP 2
YjhLJro.png SystemLook

Please download SystemLook (x64) and save the file to your Desktop.
Right-Click SystemLook_x64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Copy the entire contents of the codebox below and paste into the textfield.
:filefind*McAfee*:folderfind​*McAfee*:regfindMcAfee
Click the Ji0XpU4.png button to start the scan.
Upon completion, a log (SystemLook.txt) will open. Copy the contents of the log and paste in your next reply.
Click the OCFv7xc.png button. 

======================================================

STEP 3
xpfNZP4A.png.pagespeed.ic.bp5cRl1pJg.jpg Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

Fixlog.txt
SystemLook.txt
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 15   Posted December 12, 2014
Don't be surprised by the results in the Fixlog.txt.  I stumbled across the Downloads folder on the laptop and deleted the .exe files that were in there figuring they were just a waste of space.  I intend to securely delete them using Ccleaner if that's ok.



I was shocked by the results of the SystemLook.

Fixlog.txt

SystemLook.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 16   Posted December 13, 2014
Hello Troy, 



Which McAfee reCall at +1-888-720-3203moval tool did you run? 



Which version of McAfee did you have installed?
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 17   Posted December 13, 2014
  On 13/12/2014 at 11:01 PM, LiquidTension said:
Hello Troy, 



Which McAfee removal tool did you run? 



Which version of McAfee did you have installed?



According to the online Specs for the laptop, this is what I have here.  http://h10025.www1.hp.com/ewfrf/wc/document?docname=c04272271&tmp_task=prodinfoCategory&cc=us&dlc=en〈=en&lc=en&product=7124129



It says it came with a Free 30-day Trial of McAfee LiveSafe service included.  



Had to look for the tool again.  The laptop / notebook for some reason emptied the recycle bin on it's own.  



I probably ran this.  http://www.majorgeeks.com/files/details/mcafee_consumer_product_removal_tool.html
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 18   Posted December 14, 2014
Hi Troy, 

Nothing significant that's related to McAfee has been left over. 
So I wouldn't worry any about it. 

Lets update the vulnerable software to reduce the risk of reinfection. 

STEP 1
CXrghb6.png Update Outdated Software
Outdated software contain security risks that must be patched. Please download and install the latest version of the programmes below.

3bWY3LP.png Adobe Shockwave Player
U5NwUGc.png Google Chrome
u9DsAVv.png Follow these instructions to check for and download the latest Windows Updates.

STEP 2
oxliOQk.png Security Check

Please download SecurityCheck and save the file to your Desktop.
Double-click SecurityCheck.exe and follow the onscreen instructions inside the black box.
A log (checkup.txt) will automatically open on your Desktop.
Copy the contents of the log and paste in your next reply.

======================================================

STEP 3
pfNZP4A.png LogsCall at +1-888-720-3203
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

checkup.txt
How is your computer performing? Are there any outstanding issues?
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 19   Posted December 14, 2014
Adobe Shockwave Player and Google Chrome updated.  Installed 1 critical update on Windows Update.  It claims there are 3 optional ones available.  All three have generic descriptions as usual.  Here are links to info on these three optional updates.  What's your opinion of them, because I don't understand this Windows 8 very well yet.



http://support.microsoft.com/kb/3000850

http://support.microsoft.com/kb/3013769

http://support.microsoft.com/kb/3013816



Here is the log.  I may uninstall Bitdefender.  It may be one of the best Antivirus programs out there, but the interface is blunt and not user-friendly at all.  It told me it detected some things and I am still not sure if I found a list yet, beyond the lousy description in the logs.  Avira free seemed too plain and lacked features, so I passed on it.  Everything I've looked at so far makes me prefer Comodo.



 Results of screen317's Security Check version 0.99.93  
   x64 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Firewall Enabled!  
Bitdefender Antivirus Free Edition   
 Antivirus up to date!   
`````````Anti-malware/Other Utilities Check:````````` 
 MVPS Hosts File  
 Google Chrome (39.0.2171.95) 
````````Process Check: objlist.exe by Laurent````````  
 Bitdefender Antivirus Free Edition gzserv.exe  
 Bitdefender Antivirus Free Edition gziface.exe  
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  % 
````````````````````End of Log`````````````````````` 


So far the computer is functioning very well.  No problems to report as I sort out things on the computer to make it more user-friendly.  Installed Classic Shell so it would have a start menu again.  Am I free to delete all the programs we downloaded yet?  

I have to create a "Recovery set" yet so the exclamation mark goes away from the HP Support Assistant.  

What exactly is OneDrive sync and can it be disabled?  It always says files can't sync and I understand that this is a common problem, but I don't know what it's for.  I understand it has something to do with sharing files in the cloud, but I know nothing about how that works nor why my friend's daughter would be likely to use it.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 20   Posted December 14, 2014
Hi Troy, 


  Quote
It claims there are 3 optional ones available.  All three have generic descriptions as usual.  Here are links to info on these three optional updates.  What's your opinion of them, because I don't understand this Windows 8 very well yet.

I would go ahead and install the optional updates. There's no harm in doing so. 


  Quote
It may be one of the best Antivirus programs out there

Have a read of the following article on picking an Anti-Virus:
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/?p=2316629


  Quote
Am I free to delete all the programs we downloaded yet?  

Instructions on how to do so below. 


  Quote
What exactly is OneDrive sync and can it be disabled?

OneDrive (from Microsoft) is free online storage solution across multiple platforms (PC, tablet, mobile device, etc).
OneDrive will sync files stored to all devices connected, allowing seamless accessibility no matter what device you're using.

If OneDrive is not used, it can be disabled.  

----------------

At this stage, I think we're just about all set. 

All Clean!
Congratulations, your computer appears clean! :)
I no longer see signs of malware on your computer, and feel satisfied that our work here is done. The steps below will remove the tools we have used, and reset any settings changed. I have also provided a list of resources and tools that you may find useful. 

My help will always be free. But if you are happy with the help provided, and would like to support my fight against malware and/or buy me a beer, please consider a donation. YSCcjW7.png

AFZxnZc.jpg DelFix

Please download DelFix and save the file to your Desktop.
Double-click DelFix.exe to run the programme.
Place a checkmark next to the following items:
Activate UAC
Remove disinfection tools
Create registry backup
Purge system restore
Reset system settings
Click the Run button.
-- This will remove the specialised tools we used to disinfect your system. Any leftover logs, files, folders or tools remaining on your Desktop which were not removed can be deleted manually (right-click the file + delete).

======================================================

I have compiled below a list of resources you may find useful. The articles document information on computer security, common infection vectors and how you can stay safe on the Internet.

Answers to common security questions - Best Practices by quietman7, MVP
How Malware Spreads - How did I get infected? by quietman7, MVP
Simple and easy ways to keep your computer safe and secure on the Internet by Lawrence Abrams, MVP
How to Prevent Malware by miekiemoes, MVP
How to backup and restore your data using Cobian Backup by YourHighness
Slow Computer/browser? It May Not Be Malware by quietman7, MVP

The following programmes come highly recommended in the security community.

xKsUqI5A.png.pagespeed.ic.vn1Hlvqi8h.jpg AdBlock is a browser add-on that blocks annoying banners, pop-ups and video ads.
E8I37RF.pngCryptoPrevent places policy restrictions on loading points for ransomware (eg. CryptoWall), helping prevent the execution of malware. 
EG85Vjt.png Malwarebytes Anti-Exploit (MBAE) is designed to prevent zero-day malware from exploiting vulnerable software.
x6YRrgUC.png.pagespeCall at +1-888-720-3203ic.HjgFxjvw2Z.jpg Malwarebytes Anti-Malware Premium (MBAM) works in real-time along side your Anti-Virus to prevent malware execution.
xjv4nhMJ.png.pagespeed.ic.A5YbWn1eDO.png NoScript is a Firefox add-on that blocks the actions of malicious scripts by using whitelisting and other technology.
3O8r9Uq.png Sandboxie isolates programmes of your choice, preventing files from being written to your HDD unless approved by you.
DgW1XL2.png.pagespeed.ce.v1OlJl_ZAS.png Secunia PSI will scan your computer for vulnerable software that is outdated, and automatically find the latest update for you.
xj1OLIec.png.pagespeed.ic.k6hhwopU0q.jpg SpywareBlaster is a form of passive protection, designed to block the actions of malicious websites and tracking cookies.
xJEP5iWI.png.pagespeed.ic.4tmM1lM7DQ.png Web of Trust (WOT) is a browser add-on designed to alert you before interacting with a potentially malicious website.
-- Please feel free to ask if you have any questions or concerns on computer security or the programmes above.

======================================================

Please confirm you have no outstanding issues, and are happy with the state of your computer. Once I have confirmation things are in order, we can wrap things up and I will close this thread. 



I installed the three updates and used the DelFix.exe program and everything seems to be working just fine.  





I will mark this topic as solved. 



All the best, 

Adam
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 23   Posted December 16, 2014
Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!


"Bad Image" errors after running Malwarebytes to clean up infections
Started by eajack, April 1, 2014
    
24 posts in this topic
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 1   Posted April 1, 2014
This computer was infected with some sort of malware after clicking on an attachment in an email. I tried running SEP full scans and then Malwarebytes scans to clean it up, which usually work fine. Many infections were found and removed. However, now every time the computer is rebooted or a program is run, Windows is throwing a "Bad Image" error. Clicking OK closes the error, and the programs work, but the errors are very annoying. Is there some way to correct this problem?



Error example:



iexplore.exe - Bad Image



C:\PROGRA~2\Wincert\WIN32C~1.DLL is either not designed to run on Windows or it contains an error. Try installing the program again using the original installation media or contact your system administrator or the software vendor for support.



Regards,
Eric



Logs attached:





attach.txt

dds.txt
B-boy/StyLe/Call at +1-888-720-3203
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 2   Posted April 1, 2014
Hello! Welcome to Malwarebytes Forums! welcome.gif
My name is Georgi and and I will be helping you with your computer problems.

Before we begin, please note the following:

I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
The logs can take some time to research, so please be patient with me.
Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
Instructions that I give are for your system only!
Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.


Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.


Regards,

Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 3   Posted April 1, 2014
Georgi, thanks for your help. Please see below for the FRST and Addition logs.



Regards,
Eric





Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 13-03-2014  01
Ran by dfiore (administrator) on LT-DFIORE on 01-04-2014 15:48:07
Running from C:\Users\dfiore\Desktop
Microsoft Windows 7 Professional  Service Pack 1 (X86) OS Language: English(US)
Internet Explorer Version 11
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(Cisco Systems, Inc.) C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe
(Microsoft Corporation) C:\Windows\system32\WLANExt.exe
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\WLTRYSVC.EXE
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\bcmwltry.exe
(Intel® Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\Smc.exe
(Microsoft Corporation) C:\Windows\system32\wbem\unsecapp.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\UNS\UNS.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe
(Intel Corporation) C:\Program Files\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Renesas Electronics Corporation) C:\Program Files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\WLTRAY.EXE
(Cisco Systems, Inc.) C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe
(Dropbox, Inc.) C:\Users\dfiore\AppData\Roaming\Dropbox\bin\Dropbox.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Adobe Systems Incorporated) C:\Windows\system32\Macromed\Flash\FlashUtil32_12_0_0_77_ActiveX.exe
(Microsoft CorporationCall at +1-888-720-3203C:\Windows\System32\MsSpellCheckingFacility.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Windows\system32\AUDIODG.EXE


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [uSB3MON] - C:\Program Files\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-02-27] (Intel Corporation)
HKLM\...\Run: [NUSB3MON] - C:\Program Files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe [113288 2010-11-17] (Renesas Electronics Corporation)
HKLM\...\Run: [broadcom Wireless Manager UI] - C:\Program Files\Dell\DW WLAN Card\WLTRAY.exe [6803968 2012-06-14] (Dell Inc.)
HKLM\...\Run: [Adobe ARM] - C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM\...\Run: [Cisco AnyConnect Secure Mobility Agent for Windows] - C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe [523216 2011-08-03] (Cisco Systems, Inc.)
HKLM\...\Run: [Logitech Download Assistant] - C:\Windows\System32\LogiLDA.dll [1425208 2012-09-20] (Logitech, Inc.)
HKLM\...\Run: [RadioRage EPM Support] - C:\Program Files\RadioRage_4j\bar\1.bin\4jmedint.exe [12872 2013-12-20] (Mindspark Interactive Network, Inc.)
Winlogon\Notify\SEP: C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\WinLogoutNotifier.dll [X]
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL => C:\ProgramData\Wincert\win32cert.dll [7168 2013-11-04] ()
IFEO\bitguard.exe: [Debugger] tasklist.exe
IFEO\bprotect.exe: [Debugger] tasklist.exe
IFEO\bpsvc.exe: [Debugger] tasklist.exe
IFEO\browsemngr.exe: [Debugger] tasklist.exe
IFEO\browserdefender.exe: [Debugger] tasklist.exe
IFEO\browsermngr.exe: [Debugger] tasklist.exe
IFEO\browserprotect.exe: [Debugger] tasklist.exe
IFEO\browsersafeguard.exe: [Debugger] tasklist.exe
IFEO\bundlesweetimsetup.exe: [Debugger] tasklist.exe
IFEO\cltmngsvc.exe: [Debugger] tasklist.exe
IFEO\delta babylon.exe: [Debugger] tasklist.exe
IFEO\delta tb.exe: [Debugger] tasklist.exe
IFEO\delta2.exe: [Debugger] tasklist.exe
IFEO\deltainstaller.exe: [Debugger] tasklist.exe
IFEO\deltasetup.exe: [Debugger] tasklist.exe
IFEO\deltatb.exe: [Debugger] tasklist.exe
IFEO\deltatb_2501-c733154b.exe: [Debugger] tasklist.exe
IFEO\dprotectsvc.exe: [Debugger] tasklist.exe
IFEO\iminentsetup.exe: [Debugger] tasklist.exe
IFEO\protectedsearch.exe: [Debugger] tasklist.exe
IFEO\rjatydimofu.exe: [Debugger] tasklist.exe
IFEO\searchprotection.exe: [Debugger] tasklist.exe
IFEO\searchprotector.exe: [Debugger] tasklist.exe
IFEO\snapdo.exe: [Debugger] tasklist.exe
IFEO\stinst32.exe: [Debugger] tasklist.exe
IFEO\stinst64.exe: [Debugger] tasklist.exe
IFEO\sweetimsetup.exe: [Debugger] tasklist.exe
IFEO\tbdelta.exetoolbar783881609.exe: [Debugger] tasklist.exe
IFEO\utiljumpflip.exe: [Debugger] tasklist.exe
Startup: C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk
ShortcutTarget: Dropbox.lnk -> C:\Users\dfiore\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.)
Startup: C:\Users\ksobczyk\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Logitech . Product Registration.lnk
ShortcutTarget: Logitech . Product Registration.lnk -> C:\Program Files\Common Files\Logishrd\eReg\SetPoint\eReg.exe (Leader Technologies/Logitech)
HKLM\...\AppCertDlls: [x64] -> c:\program files\music toolbar\datamngr\x64\apcrtldr.dll <===== ATTENTION
HKLM\...\AppCertDlls: [x86] -> C:\Program Files\Music Toolbar\Datamngr\apcrtldr.dll <===== ATTENTION

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.com/
HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
URLSearchHook: HKCU - (No Name) - {3c35ad63-af1d-4e21-b484-b6651a8efcf9} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
SearchScopes: HKLM - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask.com/search/GGmain.jhtml?p2=^ZX^xdm039^YYA^us&si=radiopi&ptb=D20A7F93-E7EA-4874-B5A0-D1A3E32CF55B&ind=2013122010&n=77fdcdda&psa=&st=sb&searchfor={searchTerms}
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.ask.com/sr?src=ieb&gct=ds&appid=1239&systemid=2&v=a11465-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
SearchScopes: HKCU - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask.com/search/GGmain.jhtml?p2=^ZX^xdm039^YYA^us&si=radiopi&ptb=D20A7F93-E7EA-4874-B5A0-D1A3E32CF55B&ind=2013122010&n=77fdcdda&psa=&st=sb&searchfor={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.ask.com/sr?src=ieb&gct=ds&appid=1239&systemid=2&v=a11465-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
BHO: Toolbar BHO - {48909954-14fb-4971-a7b3-47e7af10b38a} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
BHO: Search Assistant BHO - {5848763c-2668-44ca-adbe-2999a6ee2858} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\bin\IPS\IPSBHO.DLL (Symantec Corporation)
BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO: DialIEBHO Class - {E14EB96C-AC90-45BE-9FDE-37C5652F1A65} - C:\Program Files\Mitel\Unified Communicator Advanced 4.1\DialIE.dll (Mitel Networks Corporation)
Toolbar: HKLM - RadioRage - {78ba36c9-6036-482b-b48d-ecca6f964b84} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} https://secure.logmein.com//activex/ractrl.cab?lmi=1007
Tcpip\Parameters: [DhcpNameServer] 10.16.64.59

Chrome:
=======

CHR DefaultSearchKeyword: ask.com
CHR DefaultSearchProvider: Ask.com
CHR DefaultSearchURL: http://dts.search.ask.com/sr?src=crb&gct=ds&appid=1239&systemid=2&v=u10666-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
CHR DefaultNewTabURL:
CHR Plugin: (Shockwave Flash) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\PepperFlash\pepflashplayer.dll ()
CHR Plugin: (Chrome Remote Desktop Viewer) - internal-remoting-viewer
CHR Plugin: (Native Client) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\ppGoogleNaClPluginChrome.dll ()
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\pdf.dll ()
CHR Plugin: (Adobe Acrobat) - C:\Program Files\Adobe\Reader 11.0\Reader\Browser\nppdf32.dll (Adobe Systems Inc.)
CHR Plugin: (Google Update) - C:\Program Files\Google\Update\1.3.21.153\npGoogleUpdate3.dll No File
CHR Plugin: (Intel® Identity Protection Technology) - C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation)
CHR Plugin: (Intel® Identity Protection Technology) - C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation)
CHR Extension: (Music Box Toolbar) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd [2013-12-23]
CHR Extension: (YouTube) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2013-08-14]
CHR Extension: (Google Search) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2013-08-14]
CHR Extension: (Google Wallet) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-08-22]
CHR Extension: (Gmail) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2013-08-14]
CHR HKLM\...\Chrome\Extension: [aaaaiihjniipljfegaknmbkneamnoajd] - C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx [2013-08-20]

========================== Services (Whitelisted) =================

S3 cphs; C:\Windows\system32\IntelCpHeciSvc.exe [276248 2012-02-08] (Intel Corporation)
R2 Intel® Capability Licensing Service Interface; C:\Program Files\Intel\iCLS Client\HeciServer.exe [458464 2012-02-02] (Intel® Corporation)
R2 jhi_service; C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [161560 2012-02-28] (Intel Corporation)
S2 RadioRage_4jService; C:\Program Files\RadioRage_4j\bar\1.bin\4jbarsvc.exe [88648 2013-12-20] ()
R2 SepMasterService; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe [137224 2011-06-17] (Symantec Corporation)
R3 SmcService; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\Smc.exe [1664744 2011-06-17] (Symantec Corporation)
S3 SNAC; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\snac.exe [280496 2011-06-17] (Symantec Corporation)
R2 vpnagent; C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe [468432 2011-08-03] (Cisco Systems, Inc.)
R2 wltrysvc; C:\Program Files\Dell\DW WLAN Card\bcmwltry.exe [5512192 2012-06-14] (Dell Inc.)

==================== Drivers (Whitelisted) ====================

S3 acsock; C:\Windows\System32\DRIVERS\acsock.sys [77968 2011-08-03] (Cisco Systems, Inc.)
R3 BCM42RLY; C:\Windows\System32\drivers\BCM42RLY.sys [18536 2012-06-14] (Broadcom Corporation)
R1 BHDrvx86; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\BASHDefs\20140319.011\BHDrvx86.sys [1098968 2014-04-01] (Symantec Corporation)
R3 e1cexpress; C:\Windows\System32\DRIVERS\e1c6232.sys [280744 2011-11-30] (Intel Corporation)
R1 eeCtrl; C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys [376920 2013-11-21] (Symantec Corporation)
R3 EraserUtilRebootDrv; C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [108120 2013-11-21] (Symantec Corporation)
R1 IDSVix86; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\IPSDefs\20140331.001\IDSvix86.sys [395992 2014-03-25] (Symantec Corporation)
R0 iusb3hcs; C:\Windows\System32\DRIVERS\iusb3hcs.sys [13592 2012-02-27] (Intel Corporation)
R3 iusb3hub; C:\Windows\System32\DRIVERS\iusb3hub.sys [348440 2012-02-27] (Intel Corporation)
R3 iusb3xhc; C:\Windows\System32\DRIVERS\iusb3xhc.sys [792856 2012-02-27] (Intel Corporation)
S3 LEqdUsb; C:\Windows\System32\Drivers\LEqdUsb.Sys [43704 2012-09-18] (Logitech, Inc.)
S3 LHidEqd; C:\Windows\System32\Drivers\LHidEqd.Sys [12216 2012-09-18] (Logitech, Inc.)
R3 MEI; C:\Windows\System32\DRIVERS\HECI.sys [46080 2011-11-10] (Intel Corporation)
R3 NAVENG; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\VirusDefs\20140401.002\NAVENG.SYS [93272 2014-03-08] (Symantec Corporation)
R3 NAVEX15; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\VirusDefs\20140401.002\NAVEX15.SYS [1612376 2014-03-08] (Symantec Corporation)
R1 SRTSP; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SRTSP.SYS [516216 2011-06-17] (Symantec Corporation)
R1 SRTSPX; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SRTSPX.SYS [50168 2011-06-17] (Symantec Corporation)
R0 stdcfltn; C:\Windows\System32\DRIVERS\stdcfltn.sys [17904 2011-07-15] (ST Microelectronics)
R3 ST_ACCEL; C:\Windows\System32\DRIVERS\ST_ACCEL.sys [59888 2011-11-04] (STMicroelectronics)
S3 SyDvCtrl; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\SyDvCtrl32.sys [23984 2011-06-17] (Symantec Corporation)
R0 SymDS; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMDS.SYS [340088 2011-06-17] (Symantec Corporation)
R0 SymEFA; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMEFA.SYS [756856 2011-06-17] (Symantec Corporation)
R3 SymEvent; C:\Windows\system32\Drivers\SYMEVENT.SYS [127096 2012-12-05] (Symantec Corporation)
R1 SymIRON; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\Ironx86.SYS [136312 2011-06-17] (Symantec Corporation)
R1 SYMNETS; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMNETS.SYS [299640 2011-06-17] (Symantec Corporation)
R1 SysPlant; C:\Windows\System32\Drivers\SysPlant.sys [92080 2012-12-05] (Symantec Corporation)
R1 Teefer2; C:\Windows\System32\DRIVERS\Teefer.sys [50096 2011-06-17] (Symantec Corporation)
U3 mbr; \??\C:\Users\dfiore\AppData\Local\Temp\mbr.sys [X]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-01 15:48 - 2014-04-01 15:48 - 00015763 _____ () C:\Users\dfiore\Desktop\FRST.txt
2014-04-01 15:47 - 2014-04-01 15:48 - 00000000 ____D () C:\FRST
2014-04-01 15:46 - 2014-04-01 15:46 - 01145856 _____ (Farbar) C:\Users\dfiore\Desktop\FRST.exe
2014-04-01 14:07 - 2014-04-01 14:07 - 00688992 ____R (Swearware) C:\Users\dfiore\Downloads\dds.scr
2014-04-01 14:07 - 2014-04-01 14:07 - 00013275 _____ () C:\Users\dfiore\Desktop\dds.txt
2014-04-01 14:07 - 2014-04-01 14:07 - 00009927 _____ () C:\Users\dfiore\Desktop\attach.txt
2014-03-31 16:13 - 2014-03-31 17:11 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 16:12 - 2014-03-31 17:47 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-03-31 16:12 - 2014-03-31 16:12 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 16:12 - 2014-03-05 09:26 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-31 16:12 - 2014-03-05 09:26 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-31 16:12 - 2014-03-05 09:26 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 16:08 - 2014-03-31 16:08 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Malwarebytes
2014-03-31 16:07 - 2014-03-31 16:12 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-12 01:30 - 2014-03-01 00:30 - 17074688 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-12 01:30 - 2014-03-01 00:11 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-12 01:30 - 2014-03-01 00:10 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-03-12 01:30 - 2014-02-28 23:52 - 00061952 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-03-12 01:30 - 2014-02-28 23:51 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-03-12 01:30 - 2014-02-28 23:47 - 02168320 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-03-12 01:30 - 2014-02-28 23:43 - 00043008 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-03-12 01:30 - 2014-02-28 23:43 - 00032768 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-03-12 01:30 - 2014-02-28 23:40 - 00440832 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-03-12 01:30 - 2014-02-28 23:38 - 00112128 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-03-12 01:30 - 2014-02-28 23:38 - 00108032 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-03-12 01:30 - 2014-02-28 23:37 - 00553472 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-03-12 01:30 - 2014-02-28 23:31 - 00646144 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-03-12 01:30 - 2014-02-28 23:25 - 00208896 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-03-12 01:30 - 2014-02-28 23:16 - 00164864 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-03-12 01:30 - 2014-02-28 23:14 - 04244480 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-03-12 01:30 - 2014-02-28 23:03 - 00524288 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-03-12 01:30 - 2014-02-28 23:00 - 01964032 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-03-12 01:30 - 2014-02-28 22:57 - 11266048 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-03-12 01:30 - 2014-02-28 22:32 - 01820160 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-03-12 01:30 - 2014-02-28 22:27 - 01156096 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-03-12 01:30 - 2014-02-28 22:25 - 00703488 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-03-12 01:30 - 2014-02-06 21:07 - 02349056 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-03-12 01:30 - 2014-02-03 22:04 - 01230336 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll
2014-03-12 01:30 - 2014-02-03 22:04 - 00509440 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll
2014-03-12 01:30 - 2014-01-28 22:06 - 00381440 _____ (Microsoft Corporation) C:\Windows\system32\wer.dll
2014-03-12 01:30 - 2014-01-27 22:07 - 00185344 _____ (Microsoft Corporation) C:\Windows\system32\wwansvc.dll

==================== One Month Modified Files and Folders =======

2014-04-01 15:48 - 2014-04-01 15:48 - 00015763 _____ () C:\Users\dfiore\Desktop\FRST.txt
2014-04-01 15:48 - 2014-04-01 15:47 - 00000000 ____D () C:\FRST
2014-04-01 15:46 - 2014-04-01 15:46 - 01145856 _____ (Farbar) C:\Users\dfiore\Desktop\FRST.exe
2014-04-01 15:30 - 2013-01-02 16:58 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-04-01 15:15 - 2012-12-04 16:05 - 01626720 _____ () C:\Windows\WindowsUpdate.log
2014-04-01 15:02 - 2013-08-14 08:25 - 00000886 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-04-01 14:07 - 2014-04-01 14:07 - 00688992 ____R (Swearware) C:\Users\dfiore\Downloads\dds.scr
2014-04-01 14:07 - 2014-04-01 14:07 - 00013275 _____ () C:\Users\dfiore\Desktop\dds.txt
2014-04-01 14:07 - 2014-04-01 14:07 - 00009927 _____ () C:\Users\dfiore\Desktop\attach.txt
2014-04-01 14:05 - 2013-11-18 16:46 - 00000000 ___RD () C:\Users\dfiore\Dropbox
2014-04-01 14:05 - 2013-11-18 16:43 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Dropbox
2014-04-01 14:04 - 2012-12-05 14:56 - 00000104 _____ () C:\Windows\system32\config\netlogon.ftl
2014-04-01 13:35 - 2009-07-14 00:34 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-01 13:35 - 2009-07-14 00:34 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-01 13:34 - 2013-08-14 08:25 - 00000882 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-04-01 13:33 - 2010-11-20 17:01 - 00782470 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-01 13:28 - 2009-07-14 00:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-01 13:28 - 2009-07-14 00:39 - 00029943 _____ () C:\Windows\setupact.log
2014-03-31 17:48 - 2013-08-05 10:32 - 00000000 ____D () C:\Users\dfiore
2014-03-31 17:47 - 2014-03-31 16:12 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-03-31 17:47 - 2013-08-05 10:01 - 00000000 ____D () C:\Users\Administrator
2014-03-31 17:47 - 2012-12-05 16:56 - 00000000 ____D () C:\Users\ksobczyk
2014-03-31 17:47 - 2012-12-05 15:04 - 00000000 ____D () C:\Users\ejack-a
2014-03-31 17:47 - 2012-12-04 16:06 - 00000000 ____D () C:\Users\IT Dept
2014-03-31 17:47 - 2010-11-20 20:47 - 00000000 ___RD () C:\Users\Public\Recorded TV
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\system32\wfp
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\registration
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\AppCompat
2014-03-31 17:22 - 2010-11-20 17:48 - 00452442 _____ () C:\Windows\PFRO.log
2014-03-31 17:11 - 2014-03-31 16:13 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 17:01 - 2013-12-20 12:24 - 00000000 ____D () C:\Program Files\Music Toolbar
2014-03-31 16:12 - 2014-03-31 16:12 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 16:12 - 2014-03-31 16:07 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-31 16:08 - 2014-03-31 16:08 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Malwarebytes
2014-03-19 03:01 - 2013-08-05 10:36 - 00000000 ____D () C:\Windows\system32\MRT
2014-03-19 03:00 - 2012-12-05 13:13 - 87350280 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-03-15 06:58 - 2013-08-14 08:25 - 00002129 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-03-12 03:17 - 2009-07-14 00:33 - 00303528 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-03-12 03:01 - 2012-12-06 11:17 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-03-12 01:30 - 2013-01-02 16:58 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-03-12 01:30 - 2013-01-02 16:58 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-03-05 09:26 - 2014-03-31 16:12 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-05 09:26 - 2014-03-31 16:12 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-05 09:26 - 2014-03-31 16:12 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys

Some content of TEMP:
====================
C:\Users\dfiore\AppData\Local\Temp\BundleSweetIMSetup.exe
C:\Users\dfiore\AppData\Local\Temp\Delta.exe
C:\Users\dfiore\AppData\Local\Temp\DeltaTB.exe
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.dll
C:\Users\dfiore\AppData\Local\Temp\MybabylonTB.exe
C:\Users\dfiore\AppData\Local\Temp\smses.exe
C:\Users\dfiore\AppData\Local\Temp\WSSetup.exe
C:\Users\ksobczyk\AppData\Local\Temp\LMkRstPt.exe
C:\Users\ksobczyk\AppData\Local\Temp\SearchWithGoogleUpdate.exe


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-03-30 00:23

==================== End Of Log ============================





Additional scan result of Farbar Recovery Scan Tool (x86) Version: 13-03-2014  01
Ran by dfiore at 2014-04-01 15:48:26
Running from C:\Users\dfiore\Desktop
Boot Mode: Normal
==========================================================


==================== Security Center ========================

AV: Symantec Endpoint Protection (Enabled - Up to date) {63DF5164-9100-186D-2187-8DC619EFD8BF}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Symantec Endpoint Protection (Enabled - Up to date) {D8BEB080-B73A-17E3-1B37-B6B462689202}
FW: Symantec Endpoint Protection (Enabled) {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}

==================== Installed Programs ======================

2007 Microsoft Office Suite Service Pack 3 (SP3) (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{6E107EB7-8B55-48BF-ACCB-199F86A2CD93}) (Version:  - Microsoft)
2007 Microsoft Office Suite Service Pack 3 (SP3) (Version:  - Microsoft) Hidden
Adobe Digital Editions 2.0 (HKLM\...\Adobe Digital Editions 2.0) (Version: 2.0 - Adobe Systems Incorporated)
Adobe Flash Player 12 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 12.0.0.77 - Adobe Systems Incorporated)
Adobe Reader XI (11.0.06) (HKLM\...\{AC76BA86-7AD7-1033-7B44-AB0000000001}) (Version: 11.0.06 - Adobe Systems Incorporated)
Cisco AnyConnect Secure Mobility Client  (HKLM\...\Cisco AnyConnect Secure Mobility Client) (Version: 3.0.3054 - Cisco Systems, Inc.)
Cisco AnyConnect Secure Mobility Client (Version: 3.0.3054 - Cisco Systems, Inc.) Hidden
Citrix Online Launcher (HKLM\...\{AC7E7905-8C59-4806-A96D-30936A2B1FC5}) (Version: 1.0.168 - Citrix)
Dropbox (HKCU\...\Dropbox) (Version: 2.4.11 - Dropbox, Inc.)
DW WLAN Card Utility (HKLM\...\DW WLAN Card Utility) (Version: 5.100.82.142 - Dell Inc.)
eReg (Version: 1.20.138.34 - Logitech, Inc.) Hidden
Google Chrome (HKLM\...\Google Chrome) (Version: 33.0.1750.154 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
Google Toolbar for Internet Explorer (Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (Version: 1.3.23.9 - Google Inc.) Hidden
GoToMeeting 6.0.0.1259 (HKCU\...\GoToMeeting) (Version: 6.0.0.1259 - CitrixOnline)
Intel® Management Engine Components (HKLM\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 8.0.3.1427 - Intel Corporation)
Intel® Network Connections Drivers (HKLM\...\PROSet) (Version: 16.8 - Intel)
Intel® OpenCL CPU Runtime (HKLM\...\{FCB3772C-B7D0-4933-B1A9-3707EBACC573}) (Version:  - Intel Corporation)
Intel® Processor Graphics (HKLM\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 8.15.10.2639 - Intel Corporation)
Intel® USB 3.0 eXtensible Host Controller Driver (HKLM\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.4.220 - Intel Corporation)
Intel® Trusted Connect Service Client (HKLM\...\{51A66ED3-200E-4147-8D1E-E8D30936FD26}) (Version: 1.23.605.1 - Intel Corporation)
Malwarebytes Anti-Malware version 2.00.0.1000 (HKLM\...\Malwarebytes Anti-Malware_is1) (Version: 2.00.0.1000 - Malwarebytes Corporation)
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (Version: 4.5.50938 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office File Validation Add-In (HKLM\...\{90140000-2005-0000-0000-0000000FF1CE}) (Version: 14.0.5130.5003 - Microsoft Corporation)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (French) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Standard 2007 (HKLM\...\STANDARD) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office Standard 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Save as PDF or XPS Add-in for 2007 Microsoft Office programs (HKLM\...\{90120000-00B2-0409-0000-0000000FF1CE}) (Version: 12.0.4518.1014 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mitel Unified Communicator Advanced 4.1 (HKLM\...\{6F497C65-FC83-4E30-B1B9-9527A6CB3B0B}) (Version: 4.1.18.1 - Mitel Networks)
MSXML 4.0 SP2 (KB954430) (HKLM\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
RadioRage Internet Explorer Toolbar (HKLM\...\RadioRage_4jbar Uninstall Internet Explorer) (Version:  - Mindspark Interactive Network)
Renesas Electronics USB 3.0 Host Controller Driver (HKLM\...\InstallShield_{5442DAB8-7177-49E1-8B22-09A049EA5996}) (Version: 2.0.30.0 - Renesas Electronics Corporation)
Renesas Electronics USB 3.0 Host Controller Driver (Version: 2.0.30.0 - Renesas Electronics Corporation) Hidden
ST Microelectronics 3 Axis Digital Accelerometer Solution (HKLM\...\{9C24F411-9CA7-4A8A-91F3-F08A4A38EB31}) (Version: 4.10.0016 - ST Microelectronics)
Symantec Endpoint Protection (HKLM\...\{A3AEEA68-AC93-4F6F-8D2D-78BBF7E422B8}) (Version: 12.1.671.4971 - Symantec Corporation)
Update for 2007 Microsoft Office System (KB967642) (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{C444285D-5E4F-48A4-91DD-47AAAA68E92D}) (Version:  - Microsoft)
Update for Microsoft Office 2007 Help for Common Features (KB963673) (HKLM\...\{90120000-006E-0409-0000-0000000FF1CE}_STANDARD_{AB365889-0395-4FAD-B702-CA5985D53D42}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{A024FC7B-77DE-45DE-A058-1C049A17BFB3}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2687493) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{6FAA03BD-2B51-4029-9AD9-64A3B8E3C84C}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767849) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{CB68A5B0-3508-4193-AEB9-AF636DAECE0F}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{E9A82945-BA29-4EE8-8F2A-2F49545E9CF2}) (Version:  - Microsoft)
Update for Microsoft Office Excel 2007 Help (KB963678) (HKLM\...\{90120000-0016-0409-0000-0000000FF1CE}_STANDARD_{199DF7B6-169C-448C-B511-1054101BE9C9}) (Version:  - Microsoft)
Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit Edition (HKLM\...\{90120000-001A-0409-0000-0000000FF1CE}_STANDARD_{ED38F8A3-4F61-494E-8BCA-E3AC7760C924}) (Version:  - Microsoft)
Update for Microsoft Office Outlook 2007 Help (KB963677) (HKLM\...\{90120000-001A-0409-0000-0000000FF1CE}_STANDARD_{0451F231-E3E3-4943-AB9F-58EB96171784}) (Version:  - Microsoft)
Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2878234) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{EC1934B0-AE0F-4BBD-8955-54BB3247ED9E}) (Version:  - Microsoft)
Update for Microsoft Office Powerpoint 2007 Help (KB963669) (HKLM\...\{90120000-0018-0409-0000-0000000FF1CE}_STANDARD_{397B1D4F-ED7B-4ACA-A637-43B670843876}) (Version:  - Microsoft)
Update for Microsoft Office Script Editor Help (KB963671) (HKLM\...\{90120000-006E-0409-0000-0000000FF1CE}_STANDARD_{CD11C6A2-FFC6-4271-8EAB-79C3582F505C}) (Version:  - Microsoft)
Update for Microsoft Office Word 2007 Help (KB963665) (HKLM\...\{90120000-001B-0409-0000-0000000FF1CE}_STANDARD_{80E762AA-C921-4839-9D7D-DB62A72C0726}) (Version:  - Microsoft)

==================== Restore Points  =========================

01-03-2014 08:00:12 Windows Update
09-03-2014 05:00:01 Scheduled Checkpoint
12-03-2014 07:00:20 Windows Update
19-03-2014 07:00:11 Windows Update
27-03-2014 04:00:01 Scheduled Checkpoint
31-03-2014 21:41:00 Restore Operation

==================== Hosts content: ==========================

2009-07-13 22:04 - 2009-06-10 17:39 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {42D16469-643F-4000-86F0-3906FC658CDD} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-08-14] (Google Inc.)
Task: {6A915F87-DB77-4349-8EEA-42857C132454} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-08-14] (Google Inc.)
Task: {FF8A942A-FEA3-4856-888E-607A00AC87DD} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2014-03-12] (Adobe Systems Incorporated)
Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files\Google\Update\GoogleUpdate.exe

==================== Loaded Modules (whitelisted) =============

2012-12-04 18:06 - 2012-02-21 15:09 - 01198872 _____ () C:\Program Files\Intel\Intel® Management Engine Components\UNS\ACE.dll
2012-12-04 17:45 - 2012-02-01 12:34 - 00094208 _____ () C:\Windows\System32\IccLibDll.dll
2013-10-18 19:55 - 2013-10-18 19:55 - 25100288 _____ () C:\Users\dfiore\AppData\Roaming\Dropbox\bin\libcef.dll

==================== Alternate Data Streams (whitelisted) =========


==================== Safe Mode (whitelisted) ===================

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\SepMasterService => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\SmcService => ""="Service"

==================== Disabled items from MSCONFIG ==============


==================== Faulty Device Manager Devices =============

Name: Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows
Description: Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows
Class Guid: {4d36e972-e325-11ce-bfc1-08002be10318}
Manufacturer: Cisco Systems
Service: vpnva
Problem: : This device is disabled. (Code 22)
Resolution: In Device Manager, click "Action", and then click "Enable Device". This starts the Enable Device wizard. Follow the instructions.


==================== Event log errors: =========================

Application errors:
==================
Error: (04/01/2014 01:28:56 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (04/01/2014 00:30:05 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "1".Error in manifest or policy file "2" on line 3.
The manifest file root element must be assembly.

Error: (03/31/2014 05:48:12 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:45:12 PM) (Source: System Restore) (User: )
Description: An unspecified error occurred during System Restore: (Scheduled Checkpoint). Additional information: 0x80070002.

Error: (03/31/2014 05:44:42 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:22:22 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:16:56 PM) (Source: Symantec AntiVirus) (User: )
Description: Security Risk Found!Bloodhound.MalPE in File: C:\Windows\Temp\40532e42\SetupDataMngr_BearShare.exe by: Auto-Protect scan.  Action: Quarantine succeeded : Access denied.  Action Description: The file was quarantined successfully.

Error: (03/31/2014 05:09:44 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (03/31/2014 05:08:51 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: The Cryptographic Services service failed to initialize the VSS backup "System Writer" object.


Details:
Could not query the status of the EventSystem service.

System Error:
A system shutdown is in progress.
.

Error: (03/31/2014 04:56:38 PM) (Source: Symantec AntiVirus) (User: )
Description: SONAR has generated an error: code 1: description: Heuristic Scan or Load Failure


System errors:
=============
Error: (04/01/2014 01:34:13 PM) (Source: Microsoft-Windows-GroupPolicy) (User: TX)
Description: The processing of Group Policy failed because of lack of network connectivity to a domain controller. This may be a transient condition. A success message would be generated once the machine gets connected to the domain controller and Group Policy has succesfully processed. If you do not see a success message for several hours, then contact your administrator.

Error: (04/01/2014 01:28:52 PM) (Source: Microsoft-Windows-GroupPolicy) (User: NT AUTHORITY)
Description: The processing of Group Policy failed because of lack of network connectivity to a domain controller. This may be a transient condition. A success message would be generated once the machine gets connected to the domain controller and Group Policy has succesfully processed. If you do not see a success message for several hours, then contact your administrator.

Error: (04/01/2014 01:28:48 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (04/01/2014 01:28:48 PM) (Source: NETLOGON) (User: )
Description: This computer was not able to set up a secure session with a domain
controller in domain TX due to the following:
%%1311

This may lead to authentication problems. Make sure that this
computer is connected to the network. If the problem persists,
please contact your domain administrator.



ADDITIONAL INFO

If this computer is a domain controller for the specified domain, it
sets up the secure session to the primary domain controller emulator in the specified
domain. Otherwise, this computer sets up the secure session to any domain controller
in the specified domain.

Error: (03/31/2014 05:48:07 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 05:48:07 PM) (Source: Service Control Manager) (User: )
Description: The Windows Firewall service terminated with service-specific error %%5.

Error: (03/31/2014 05:44:36 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 05:22:18 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 05:09:40 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5

Error: (03/31/2014 04:52:03 PM) (Source: DCOM) (User: )
Description: 1084WSearch{9E175B6D-F52A-11D8-B9A5-505054503030}


Microsoft Office Sessions:
=========================
Error: (02/13/2014 04:23:05 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6683.5002, Microsoft Office Version: 12.0.6612.1000. This session lasted 499822 seconds with 60 seconds of active time.  This session ended with a crash.

Error: (12/17/2013 04:18:40 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6683.5002, Microsoft Office Version: 12.0.6612.1000. This session lasted 43143 seconds with 60 seconds of active time.  This session ended with a crash.

Error: (12/07/2012 10:01:12 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 6, Application Name: Microsoft Office Outlook, Application Version: 12.0.6665.5003, Microsoft Office Version: 12.0.6612.1000. This session lasted 1158 seconds with 840 seconds of active time.  This session ended with a crash.


CodeIntegrity Errors:
===================================
  Date: 2014-04-01 15:45:47.482
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 15:38:36.979
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 15:20:54.354
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 15:01:22.868
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 14:18:48.846
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 14:03:11.548
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:34:14.688
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:28:46.934
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:20:07.985
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.

  Date: 2014-04-01 13:04:13.145
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.


==================== Memory info ===========================

Percentage of memory in use: 40%
Total physical RAM: 3483.94 MB
Available physical RAM: 2073.56 MB
Total Pagefile: 6966.16 MB
Available Pagefile: 5560.01 MB
Total Virtual: 2047.88 MB
Available Virtual: 1902.99 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:297.76 GB) (Free:251.3 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 298 GB) (Disk ID: 5A8CC490)
Partition 1: (Not Active) - (Size=39 MB) - (Type=DE)
Partition 2: (Active) - (Size=300 MB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=298 GB) - (Type=07 NTFS)

==================== End Of Log ============================
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 4   Posted April 1, 2014
Hi,


Please download the following file => fixlist.txt and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.



Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 5   Posted April 2, 2014
Georgi,



So far, so good. The error pop-ups have stopped after FRST rebooted the PC. The fixlog is below. There is one odd additional problem, but I don't know if it's related. I can copy/paste the logs into this reply using Chrome, but not IE.



Regards,
Eric





Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 13-03-2014  01
Ran by dfiore at 2014-04-02 08:40:55 Run:1
Running from C:\Users\dfiore\Desktop
Boot Mode: Normal

==============================================

Content of fixlist:
*****************
start
HKLM\...\Run: [RadioRage EPM Support] - C:\Program Files\RadioRage_4j\bar\1.bin\4jmedint.exe [12872 2013-12-20] (Mindspark Interactive Network, Inc.)
C:\Program Files\RadioRage_4j
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL => C:\ProgramData\Wincert\win32cert.dll [7168 2013-11-04] ()
C:\ProgramData\Wincert
IFEO\bitguard.exe: [Debugger] tasklist.exe
IFEO\bprotect.exe: [Debugger] tasklist.exe
IFEO\bpsvc.exe: [Debugger] tasklist.exe
IFEO\browsemngr.exe: [Debugger] tasklist.exe
IFEO\browserdefender.exe: [Debugger] tasklist.exe
IFEO\browsermngr.exe: [Debugger] tasklist.exe
IFEO\browserprotect.exe: [Debugger] tasklist.exe
IFEO\browsersafeguard.exe: [Debugger] tasklist.exe
IFEO\bundlesweetimsetup.exe: [Debugger] tasklist.exe
IFEO\cltmngsvc.exe: [Debugger] tasklist.exe
IFEO\delta babylon.exe: [Debugger] tasklist.exe
IFEO\delta tb.exe: [Debugger] tasklist.exe
IFEO\delta2.exe: [Debugger] tasklist.exe
IFEO\deltainstaller.exe: [Debugger] tasklist.exe
IFEO\deltasetup.exe: [Debugger] tasklist.exe
IFEO\deltatb.exe: [Debugger] tasklist.exe
IFEO\deltatb_2501-c733154b.exe: [Debugger] tasklist.exe
IFEO\dprotectsvc.exe: [Debugger] tasklist.exe
IFEO\iminentsetup.exe: [Debugger] tasklist.exe
IFEO\protectedsearch.exe: [Debugger] tasklist.exe
IFEO\rjatydimofu.exe: [Debugger] tasklist.exe
IFEO\searchprotection.exe: [Debugger] tasklist.exe
IFEO\searchprotector.exe: [Debugger] tasklist.exe
IFEO\snapdo.exe: [Debugger] tasklist.exe
IFEO\stinst32.exe: [Debugger] tasklist.exe
IFEO\stinst64.exe: [Debugger] tasklist.exe
IFEO\sweetimsetup.exe: [Debugger] tasklist.exe
IFEO\tbdelta.exetoolbar783881609.exe: [Debugger] tasklist.exe
IFEO\utiljumpflip.exe: [Debugger] tasklist.exe
HKLM\...\AppCertDlls: [x64] -> c:\program files\music toolbar\datamngr\x64\apcrtldr.dll <===== ATTENTION
HKLM\...\AppCertDlls: [x86] -> C:\Program Files\Music Toolbar\Datamngr\apcrtldr.dll <===== ATTENTION
c:\program files\music toolbar
URLSearchHook: HKCU - (No Name) - {3c35ad63-af1d-4e21-b484-b6651a8efcf9} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
SearchScopes: HKLM - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask...t=sb&searchfor={searchTerms}
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
SearchScopes: HKCU - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask...t=sb&searchfor={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
BHO: Toolbar BHO - {48909954-14fb-4971-a7b3-47e7af10b38a} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
BHO: Search Assistant BHO - {5848763c-2668-44ca-adbe-2999a6ee2858} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
Toolbar: HKLM - RadioRage - {78ba36c9-6036-482b-b48d-ecca6f964b84} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
CHR DefaultSearchKeyword: ask.com
CHR DefaultSearchProvider: Ask.com
CHR DefaultSearchURL: http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
CHR DefaultNewTabURL:
CHR Extension: (Music Box Toolbar) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd [2013-12-23]
CHR HKLM\...\Chrome\Extension: [aaaaiihjniipljfegaknmbkneamnoajd] - C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx [2013-08-20]
S2 RadioRage_4jService; C:\Program Files\RadioRage_4j\bar\1.bin\4jbarsvc.exe [88648 2013-12-20] ()
U3 mbr; \??\C:\Users\dfiore\AppData\Local\Temp\mbr.sys [X]
cmd: netsh winsock reset
cmd: ipconfig /flushdns
C:\Users\dfiore\AppData\Local\Temp
end
*****************

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\RadioRage EPM Support => Value deleted successfully.
C:\Program Files\RadioRage_4j => Moved successfully.
"C:\\PROGRA~2\\Wincert\\WIN32C~1.DLL" => Value Data removed successfully.
C:\ProgramData\Wincert => Moved successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bitguard.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bprotect.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bpsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsemngr.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browserdefender.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsermngr.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browserprotect.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsersafeguard.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bundlesweetimsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\cltmngsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta babylon.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta tb.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta2.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltainstaller.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltasetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltatb.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltatb_2501-c733154b.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\dprotectsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\iminentsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\protectedsearch.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\rjatydimofu.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\searchprotection.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\searchprotector.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\snapdo.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\stinst32.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\stinst64.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\sweetimsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\tbdelta.exetoolbar783881609.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\utiljumpflip.exe => Key deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls\\x64 => Value deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls\\x86 => Value deleted successfully.
C:\Program Files\Music Toolbar => Moved successfully.
HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks\\{3c35ad63-af1d-4e21-b484-b6651a8efcf9} => Value deleted successfully.
HKCR\CLSID\{3c35ad63-af1d-4e21-b484-b6651a8efcf9} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key not found.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key not found.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key not found.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{48909954-14fb-4971-a7b3-47e7af10b38a} => Key deleted successfully.
HKCR\CLSID\{48909954-14fb-4971-a7b3-47e7af10b38a} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5848763c-2668-44ca-adbe-2999a6ee2858} => Key deleted successfully.
HKCR\CLSID\{5848763c-2668-44ca-adbe-2999a6ee2858} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\\{78ba36c9-6036-482b-b48d-ecca6f964b84} => Value deleted successfully.
HKCR\CLSID\{78ba36c9-6036-482b-b48d-ecca6f964b84} => Key deleted successfully.
CHR DefaultSearchKeyword: ask.com ==> The Chrome "Settings" can be used to fix the entry.
CHR DefaultSearchProvider: Ask.com ==> The Chrome "Settings" can be used to fix the entry.
CHR DefaultSearchURL: http://dts.search.as...pn_ptnrs=AG2&q={searchTerms} ==> The Chrome "Settings" can be used to fix the entry.
C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd => Moved successfully.
HKLM\SOFTWARE\Google\Chrome\Extensions\aaaaiihjniipljfegaknmbkneamnoajd => Key deleted successfully.
C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx => Moved successfully.
RadioRage_4jService => Service deleted successfully.
mbr => Service deleted successfully.

=========  netsh winsock reset =========


Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.


========= End of CMD: =========


=========  ipconfig /flushdns =========


Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========= End of CMD: =========


"C:\Users\dfiore\AppData\Local\Temp" directory move:

C:\Users\dfiore\AppData\Local\Temp\-1875523080.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\0F830070-0CD2-43A9-8B10-8EE7D13C9C4C.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1063393295.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\106714465.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\107593.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\108810.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\113119538.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\113319.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1140969456.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\115454935.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\120916.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\124194002.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\124194455.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\12620995.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\128810.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\129200.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\129714.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1304802455.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1305183456.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13109325.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1319954988.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\132179.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13228323.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13276901.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\132881.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\133046653.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13FE8336-264E-489A-AAF0-FF51AA3563ED.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1404951868.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1419222246.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\142132.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1425040663.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1475744482.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\147998.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1488554707.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1498066181.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1499160684.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\15369234.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\154338169.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1559838.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\157042072.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1570817435.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1584867914.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\15987902.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\162241.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\165158.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\168122.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\174284.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1753479146.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\176632615.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\177647698.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\177763856.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18078238.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18282131.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18307653.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1859466631.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190118.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190149337.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190273795.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1919625655.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2049619.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2094197123.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2180481651.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\22945188.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\22965250.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\230553.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\23093405.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\233705.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2341918.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2363731095.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2363841591.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2364190362.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2370450.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\23753273.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2376018545.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2419444247.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2445421674.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2447905.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\257498401.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\259304.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\261308351.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\264562.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2667975.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\268727.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\271816.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2755398.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\278846233.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2798651212.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\281505270.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2846300.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2875909.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2986685348.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\300278742.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\319256.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\334325789.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\336302353.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\349015717.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\355704244.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\357590109.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\359051.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\362371087.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\365003698.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\365425914.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\378068.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\402420.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\41522645.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\41528402.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4437588.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\447212028.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\448682135.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\449559984.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\455156239.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\472081739.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\483852.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\497892.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4FAD6123-4E8E-4F34-B5B4-AC5B70598B41.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5039799.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\535535.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\545199657.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\556113814.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\556614266.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\56371944.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\56371975.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5717249.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\580448.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5829835.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5865684.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\6221663.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\6468238.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\65068.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\653784.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\66882605.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\673284.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\70686533.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\714000.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\73477921.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\739257.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\76287452.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\769498534.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\77270696.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\775371.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\779562393.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\782573290.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\795411174.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\82649.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\84646.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\872763.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\876804212.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\881492962.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\92043819.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\948733980.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\95117850.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\960888.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\982483532.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\984567768.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\986330720.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\995130.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\AdobeARM.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\AdobeARM_NotLocked.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\apnPixel.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\apnuserid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\appid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Attach.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\bearsharemusicboxtoolbarha-manifest.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\BundleSweetIMSetup.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\chrome_installer.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1132.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR12E2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1629.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR17FF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR19B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1D21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1D95.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1EEA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR217D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR220F.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR23F4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR25B8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR29B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2A4A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2A71.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2B15.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2B92.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2BEF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2C6A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2D89.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2E6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2F21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2F2A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3327.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR33A4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3587.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3660.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR379.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3D01.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3F12.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3FAF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR421E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR427A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR444.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4598.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4604.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4653.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR47B9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4AA6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4FD8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR513B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5561.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR57D1.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5887.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5903.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5A21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5A45.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5C37.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR606C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR608D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR620C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR621A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR645D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6517.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR654B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR681D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6C02.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6DF6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6E5C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR711.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7239.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR72D9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR74C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7610.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR79C1.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A2B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A7C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A7D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR80D4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR824C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8273.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR83B2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR83E2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8412.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8499.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR84D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR84E0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8516.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR881C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8AD3.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8C2D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8EA5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR90AA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR90D9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9111.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR94C3.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR95D5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR96E5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR972.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9745.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR98E4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9CE6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9DA6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9DB4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9F96.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA43A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA8CC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA8FB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA978.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAC52.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAC97.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAD05.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAE9A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB052.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB28E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB3C8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB46.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB497.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB5B8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB654.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBAA7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBC1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBDB0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRC4D4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRC59B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCD1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCD2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCFF0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD4CB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD854.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD923.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDA1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDB19.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDB60.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDD3C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDDC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDF18.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE205.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE3D6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE510.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE6A6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE6B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE97.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE98.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE983.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE9FC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVREA2C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVREF5F.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4BE.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4CB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4E8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4FA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF693.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF72A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF7EA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF874.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF8B0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF9D8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRFAB2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRFE2C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\D1D4E1E8-362C-46FF-927B-D3020A51E1C5.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DDS.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Delta.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DeltaTB.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1479.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1A27.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1B57.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1D67.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH236A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH282D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH29F1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH2BEC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH352C.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH37F7.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3A18.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3B5E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3FBB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4505.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH481.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH482D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4B19.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4F2D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH53D8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH58E3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH5C89.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH5F06.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH607E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH67F5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH6CC2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7142.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7380.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7611.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH788.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7BD6.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7BF3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH80CF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH82EF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH8388.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH85CB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH93A0.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH93E9.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH949E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH95B4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH998.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA0DC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA2F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA7B8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA973.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHAD0A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHB4AB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHB791.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHBCE3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHBD61.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHC484.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHC7A9.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCCCB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCCD.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCD69.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHD853.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHD87B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHDCA4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHDD52.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHEC8F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF08E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF093.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF58A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF5F3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHFCC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHFCE5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\ExchangePerflog_8484fa31aac168fdcfcccd43.dat => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp\FXSAPIDebugLogFile.txt" => Scheduled to move on reboot.
C:\Users\dfiore\AppData\Local\Temp\GoogleToolbarInstaller1.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\GoogleToolbarInstaller2.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst18A8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst22FC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst2338.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst2A35.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3330.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3772.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3955.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3C6D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3ECD.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst46FE.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4DD1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E3E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E4E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E5D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E6D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4F67.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst514A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst51B5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5408.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5485.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst54F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst559E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5FE4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6AD1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6CB5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6E2B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7187.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst726B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst785A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst790F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst796D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7A85.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7AA5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7B41.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7B6F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7DE0.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst88B8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9057.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9877.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9F4A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstA707.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstABD2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC781.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC8C4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC936.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstCA7D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstE1D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstE92B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstED50.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstF659.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Kno6009.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoC01.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoCEE2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoDF17.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\log3 => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\MSB1CACH.LEX => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\MybabylonTB.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsb54D2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsb5DF4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsc3995.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsc3996.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsg44CA.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh1485.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh2634.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh8E31.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm1E18.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm5E35.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm5E36.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsmC719.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsn3B10.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsr5E05.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsw221C.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsw221D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nswC7A7.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx1496.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx3AFF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx8F2D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\StructuredQuery.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\sysid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\trackid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\TX+dfiore.bmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wbxtra_08222013_130624.wbt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog00.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog01.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog02.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog03.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog04.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog05.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog06.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog07.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog08.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog09.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog10.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog11.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog12.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog13.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog14.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog15.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog16.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog17.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmsetup.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\WSSetup.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF017DF219D4F8F14A.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF01BC172CFC8745CF.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF03AAAB6D88B8640B.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF049C287DED3C1D8F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF08EA7C18A1899A84.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF0AC5AD194E512590.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF13C4B7CC02CDE39C.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF14AE218EB553DAF1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF179C6350D9DBDA95.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF1B92A4483CE9A3EF.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF1E1D592422700CA0.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF24DC6E487CFDD274.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF24EE199B10F01CA9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF30C842F71A961DD4.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF336C899F4D3CC4FD.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF33A80F8EC18A57D6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF3B62A4036C7BC07D.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF3BBF4FB6BCF17652.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF400F3EBD04466C52.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF477DA2A47113B142.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF48145D69A1897085.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF60EC0E060C785EF9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF63876EF923B8998F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF645C13E363DBE8B8.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF6BA7DFA2EDCF47B6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF6FCD494B88C1CADA.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7029C0CC9E5B78E6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7052B44998638C2F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7A4E822AD33EFEC1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF83F1A9606478F74B.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF84D99F23B2DC85C0.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF881270AF5FE6DA67.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF9225C5366F221EAD.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF9BB58FDFBBBEA2B9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFA871417E28F2EB24.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFB0D9A3CE5C36D5D4.TMP => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp\~DFB4D467AFD5FA79AE.TMP" => Scheduled to move on reboot.
C:\Users\dfiore\AppData\Local\Temp\~DFBC9E4F4F23AB0E0D.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFBCB025A51E66F6C8.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFBE4661E0783A6221.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC216825882621D40.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC3336FC454394735.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC7D1CAE63E2457E7.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC7EA6E49C09368E2.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC8F1DB709A893D01.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFCD4E8C35384A3DAB.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFCED2B6BEA9E83AB2.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFD8886EEDEF570C20.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE08BA69C196E21C4.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE7174C362297A25A.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE9334242E42D87B9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE979D6DF64325225.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFEAF706B4FC230799.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFEE9A6EAC679E27C1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFF324F3FFF29048C9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFF5FBC5FF1D2EAF90.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~nsu.tmp\Au_.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\{d4be399f-cfdf-462f-b234-2e3a62cff5a8}\geodata.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Temp1_fwdhealthtraineeenrollmentandtraining.zip\JuliaFioreVHA Training Certificate.pdf => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\outlook logging\firstrun.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\DropboxNSISTools.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\nsExec.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\UAC.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsiC64E.tmp\DropboxNSISTools.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsiC64E.tmp\UAC.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\msohtmlclip1\01\clip_colorschememapping.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\msohtmlclip1\01\clip_themedata.thmx => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\5SZG8K10.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\7LJU14B1.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\9X9YDR7M.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D5D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D6E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D6F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\G2M35114.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\J0QSONNQ.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\L1BRWOM0.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\LROC1CLD.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\MCGJIO0D.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\OODJ89ZP.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\QQZCE09X.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\QVD8COQ1.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\U4MAVGLT.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DTX\Reporting\ReportingHelper.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\DownloaderApp.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\G2MInst.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\G2MInstX.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\queue.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\WebDeploymentPluginInst.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\G2MOutlookAddin_util.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\G2M_G2MInstaller.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\log137D.tmp\G2MStart.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\log137D.tmp\GoToMeeting_00.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\DownloaderAppMsi\CB16A7AB-2AC6-4814-A5CB-7A92592B3037.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\TPRKRIPE\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\NC7QE085\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\EWM00HCX\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\7QE72PK5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\History\History.IE5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\History\History.IE5\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Cookies\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\manifest.json => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp" directory. => Scheduled to move on reboot.


=> Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-04-02 08:43:39)<=

C:\Users\dfiore\AppData\Local\Temp\FXSAPIDebugLogFile.txt => Is moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFB4D467AFD5FA79AE.TMP => Is moved successfully.
C:\Users\dfiore\AppData\Local\Temp => Moved successfully.

==== End of Fixlog ====
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 6   Posted April 2, 2014
Hello,



I have encountered similar problems with Internet Explorer version 11 before and I believe that there is a bug with the IPBoard forum software not with the browser himself.



http://community.invisionpower.com/resources/bugs.html/_/ip-board/internet-explorer-11-copy-paste-issue-r42941



The fix is already implemented (but I don't know if the version of Ipboard used here is the latest one).



A colleague of mine told me for a temporary solution before and it worked for another user. You can give it a try:

You should be able to copy/paste if you use that little switch in the upper left hand corner of the reply and by switching it off that should disable the RTE editor and IE11 will probably allow you to copy/paste again.



If no luck then go ahaid and reset IE settings to default:



How to reset Internet Explorer settings





Let me know about the results.







Regards,

Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 7   Posted April 2, 2014
The copy/paste issue with IE and the forum isn't really an issue, and I won't bother trying to fix it. I just wasn't sure if it was indicative of malware or a virus, which it does not seem to be.



That said, things seem to be working fine now. Is there anything else you need me to do, or logs to show you?



Thank you,

Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 8   Posted April 2, 2014
Hi Eric,



I understand but you can still try the solutions above because they will not cause any harm. :)



Also if you don't mind, I want to make sure there is nothing lurking on the system so just in case I want you to go through these steps:



The most of them should take no more than 5 minutes each (but the time they take to complete can vary depending on the size of your hard and the speed of your computer).





STEP 1





Please download RKill by Grinler from the link below and save it to your desktop.

Rkill
Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
If nothing happens or if the tool does not run, please let me know in your next reply.
A log pops up at the end of the run. This log file is located at C:\rkill.log.
Please post the log in your next reply.





STEP 2





Please download RogueKillerX64.exe and save to the desktop.
Close all windows and browsers
Right-click the program and select 'Run as Administrator'
Press the scan button.
A report opens on the desktop named - RKreport.txt
Please copy and past the results at pastebin.com and post the link to the log in your next reply.




STEP 3




Please download the latest version of TDSSKiller from here and save it to your Desktop.

Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.

Put a checkmark beside loaded modules.
Sbf88.png
A reboot will be needed to apply the changes. Do it.
TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
Then click on Change parameters in TDSSKiller.
Check all boxes then click OK.

Click the Start Scan button.

The scan should take no longer than 2 minutes.
If a suspicious object is detected, the default action will be Skip, click on Continue.
67776163.jpg
If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
62117367.jpg
Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and past the results at pastebin.com and post the link to the log in your next reply.




STEP 4





Please download Malwarebytes Anti-Malware to your desktop.


Double-click mbam-setup-2.0.0.1000.exe and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to the following:
Launch Malwarebytes Anti-Malware
A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
Click Finish.
On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
A Threat Scan will begin.
With some infections, you may see this message box.
'Could not load DDA driver'
Click 'Yes' to this message, to allow the driver to load after a restart.
Allow the computer to restart. Continue with the rest of these instructions.
When the scan is complete, click Apply Actions.
Wait for the prompt to restart the computer to appear, then click on Yes.
After the restart once you are back at your desktop, open MBAM once more.
Click on the History tab > Application Logs.
Double click on the scan log which shows the Date and time of the scan just performed.
Click 'Copy to Clipboard'
Paste the contents of the clipboard into your reply.




STEP 5





1.Please download HitmanPro.

For 32-bit Operating System - dEMD6.gif.
This is the mirror - dEMD6.gif
For 64-bit Operating System - dEMD6.gif
This is the mirror - dEMD6.gif
2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).

Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.

3.Click on the next button. You must agree with the terms of EULA. (if asked)

4.Check the box beside "No, I only want to perform a one-time scan to check this computer".

5.Click on the next button.

6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.

7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!

8.Click on the next button.

9.Click on the "Save Log" button.

10.Save that file to your desktop and post the content of that file in your next reply.

Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro

Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.







STEP 6





Please download AdwCleaner by Xplode and save to your Desktop.

Double click on AdwCleaner.exe to run the tool.
Vista/Windows 7/8 users right-click and select Run As Administrator.
Click on the Scan button.
AdwCleaner will begin to scan your computer like it did before.
After the scan has finished click on the Clean button.
Press OK when asked to close all programs and follow the onscreen prompts.
Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
Copy and paste the contents of that logfile in your next reply.
A copy of that logfile will also be saved in the C:\AdwCleaner folder.




STEP 7





thisisujrt.gif  Please download Junkware Removal Tool to your desktop.

Shut down your protection software now to avoid potential conflicts.
Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
Post the contents of JRT.txt into your next message.




STEP 8





Download Security Check by screen317 from here.

Save it to your Desktop.
Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
A Notepad document should open automatically called checkup.txt; please post the contents of that document.


and then if there aren't any issues left I'll give you my final recommendations. smile.png





Regards,

Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 9   Posted April 2, 2014
Rkill's log. More to come as I run them...



Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 04/02/2014 04:33:21 PM in x86 mode.
Windows Version: Windows 7 Professional Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * Windows Defender Disabled

   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001

Checking Windows Service Integrity: 

 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Manual

Searching for Missing Digital Signatures: 

 * No issues found.

Checking HOSTS File: 

 * No issues found.

Program finished at: 04/02/2014 04:33:50 PM
Execution time: 0 hours(s), 0 minute(s), and 28 seconds(s)
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 10   Posted April 2, 2014
The Roguekiller64 does not work on this system, it is 32-bit. I will not continue with the other steps as your first post specifies to run everything in the order you list.



-Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 11   Posted April 2, 2014
Hi Eric,



Here is the link for the 32 bit version of RogueKiller => RogueKiller.exe





Regards,

Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 12   Posted April 2, 2014
RogueKiller's log: http://pastebin.com/jc1H1PZ4 More to come



-Eric
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 13   Posted April 2, 2014
TDSSKiller's results: http://pastebin.com/DeYtPLgp



The program said there was nothing detected. More to come.



-Eric
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 14   Posted April 2, 2014
MBAM scan came up clean:



Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 4/2/2014
Scan Time: 5:17:02 PM
Logfile: 
Administrator: Yes

Version: 2.00.0.1000
Malware Database: v2014.04.02.08
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled

OS: Windows 7 Service Pack 1
CPU: x86
File System: NTFS
User: dfiore

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 336546
Time Elapsed: 10 min, 34 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 15   Posted April 2, 2014
Whoops! I did AdwCleaner before HitmanPro. Here's Adw's results:



# AdwCleaner v3.023 - Report created 02/04/2014 at 17:22:08
# Updated 01/04/2014 by Xplode
# Operating System : Windows 7 Professional Service Pack 1 (32 bits)
# Username : dfiore - LT-DFIORE
# Running from : C:\Users\dfiore\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

[#] Folder Deleted : C:\ProgramData\BitGuard
[#] Folder Deleted : C:\ProgramData\Browser Manager
[#] Folder Deleted : C:\ProgramData\BrowserProtect
Folder Deleted : C:\Program Files\BearShare Applications
Folder Deleted : C:\Users\dfiore\AppData\Local\RadioRage_4j
Folder Deleted : C:\Users\dfiore\AppData\LocalLow\iac
Folder Deleted : C:\Users\dfiore\AppData\LocalLow\RadioRage_4j

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.FeedManager
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.FeedManager.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLMenu
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLMenu.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLPanel
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLPanel.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.MultipleButton
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.MultipleButton.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.PseudoTransparentPlugin
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.PseudoTransparentPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.Radio
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.Radio.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.RadioSettings
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.RadioSettings.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ScriptButton
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ScriptButton.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.SettingsPlugin
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.SettingsPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ThirdPartyInstaller
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ThirdPartyInstaller.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ToolbarProtector
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ToolbarProtector.1
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@RadioRage_4j.com/Plugin
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{00A2B7C6-7487-4B99-9F6C-1FDF57FE130B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{10273591-D084-4328-A7D0-49E051FCDE7B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{11D4B723-18CA-48C6-BA13-965488F19A70}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BF72F68-72D8-461D-A884-329D936C5581}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{53855564-CF81-410C-9C1C-321C7E067816}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{581C7D7D-F809-4E03-A631-74C069D5F04A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{60B34F47-3FDD-46F8-AB6C-AAABEA55C3D6}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6562E272-88E1-4DFF-8FF8-FE1A05323D36}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{68122F44-3A4A-4EDB-B28F-0C0E07F89BD0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{78E9D883-93CD-4072-BEF3-38EE581E2839}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{83AC1413-FCE4-4A46-9DD5-4F31F306E71F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D740AD89-BAF4-47D5-9B5E-343D30F07A7A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DFEB941C-8B58-4899-97C3-88FE394E1285}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E23760BE-23A3-4CEF-9304-66AF079F53DB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E6AD866F-EA06-476A-8432-ED943683FAB1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{ECEF0D95-32FA-48D3-8A2D-D6453B5B7361}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F69FE1BE-09C3-460C-AC89-8CCD9D3DF1CC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F706E19B-6C14-4272-BA98-2F16636A898D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A25AA6E2-1CDE-4D0F-A5D4-4898D7FB3C86}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A5C9CB1C-1C0A-45A2-81CC-1DD342D0A478}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{0978C5FA-83C0-4118-A54F-99DACCEECB8C}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{1ED65BE2-AE84-46CB-8EA6-1C2B86ADF768}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{1FDAD7F1-B87C-4E79-9150-DE235FF80B3A}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{395C94B1-59E6-4C65-8AF2-0F6763BC70A6}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4A50E810-71EB-43A8-A665-19ED8CCD1630}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4DD9EB5D-8657-4856-A804-535841B09D73}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{569A9014-22E3-4F11-A243-CA4E3D95ADED}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{597494DA-C59F-4EDF-B2D1-CE137E2DB9E4}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{5E5E0B49-1A81-4ACC-BD6B-FF5F4EFEF01A}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{B872D222-3F52-4CD9-A4BE-9D69EE4F293D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C4C4F1F4-3074-4CB6-9FB8-0A64273166F0}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D0E90465-CF35-480D-B520-E1E3BDE802F5}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{581C7D7D-F809-4E03-A631-74C069D5F04A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{60B34F47-3FDD-46F8-AB6C-AAABEA55C3D6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{68122F44-3A4A-4EDB-B28F-0C0E07F89BD0}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7C3B01BC-53A5-48A0-A43B-0C67731134B9}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F706E19B-6C14-4272-BA98-2F16636A898D}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0ABE0FED-50E7-4E42-A125-57C0A11DBCDE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44DB423D-A0DB-4664-9477-CCDCEB7CD666}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{53855564-CF81-410C-9C1C-321C7E067816}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A25AA6E2-1CDE-4D0F-A5D4-4898D7FB3C86}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5C9CB1C-1C0A-45A2-81CC-1DD342D0A478}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B5731AB1-8566-4441-AEFB-9AFB2EEA63D9}
Key Deleted : HKCU\Software\APN DTX
Key Deleted : HKCU\Software\RadioRage_4j
Key Deleted : HKCU\Software\AppDataLow\Software\RadioRage_4j
Key Deleted : HKLM\Software\RadioRage_4j
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RadioRage_4jbar Uninstall Firefox
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RadioRage_4jbar Uninstall Internet Explorer

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.16521


-\\ Google Chrome v33.0.1750.154

[ File : C:\Users\ksobczyk\AppData\Local\Google\Chrome\User Data\Default\preferences ]


[ File : C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\preferences ]

Deleted : homepage
Deleted : search_url
Deleted : keyword

*************************

AdwCleaner[R0].txt - [7434 octets] - [02/04/2014 17:20:52]
AdwCleaner[s0].txt - [7555 octets] - [02/04/2014 17:22:08]

########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [7615 octets] ##########
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 16   Posted April 2, 2014
HitmanPro log:



HitmanPro 3.7.9.216www.hitmanpro.com    Computer name . . . . : LT-DFIORE   Windows . . . . . . . : 6.1.1.7601.X86/4   User name . . . . . . : TX\dfiore   UAC . . . . . . . . . : Enabled   License . . . . . . . : Free    Scan date . . . . . . : 2014-04-02 17:27:34   Scan mode . . . . . . : Normal   Scan duration . . . . : 4m 33s   Disk access mode  . . : Direct disk access (SRB)   Cloud . . . . . . . . : Internet   Reboot  . . . . . . . : No    Threats . . . . . . . : 0   Traces  . . . . . . . : 53    Objects scanned . . . : 1,008,007   Files scanned . . . . : 34,061   Remnants scanned  . . : 241,726 files / 732,220 keys Potential Unwanted Programs _________________________________________________    session/startup_urls[0]   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Preferences    ask.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Web Data    C:\Users\dfiore\AppData\LocalLow\DataMngr\ (iLivid)   C:\Users\dfiore\AppData\LocalLow\DataMngr\{7CA1F051-A4FB-4143-B263-02B41E571EED}64 (iLivid) Cookies _____________________________________________________________________    C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:247realmedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.360yield.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.mlnadvertising.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.yieldmanager.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.creative-serving.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.p161.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pointroll.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pubmatic.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.undertone.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.yahoo.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtech.de   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtechus.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:advertising.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:apmebf.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:at.atwola.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:atdmt.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:atlanticmedia.122.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:bs.serving-sys.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:burstnet.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:casalemedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:collective-media.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:dmtracker.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:fanatics.112.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:fastclick.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:gntbcstglobal.112.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:interclick.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:invitemedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:journalregistercompany.122.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:media6degrees.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:mediaplex.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:patrickhillery.112.2o7.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:pointroll.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:questionmarket.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:realmedia.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:revsci.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ru4.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:serving-sys.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:smartadserver.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:specificclick.net   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:statcounter.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:stats.adotube.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:statse.webtrendslive.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:tacoda.at.atwola.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:tribalfusion.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.burstnet.com   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:zedo.com   C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Cookies\PK34828E.txt   C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Cookies\Y82V154E.txt  
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 17   Posted April 2, 2014
JRT's log:



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.3 (03.23.2014:1)
OS: Windows 7 Professional x86
Ran by dfiore on Wed 04/02/2014 at 17:36:49.66
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\Users\dfiore\appdata\locallow\datamngr"



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 04/02/2014 at 17:40:03.68
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 18   Posted April 2, 2014
I think SecurityCheck is for 64Bit, because when I ran it, it said "unsupported operating system." If you want me to run a different version, I can probably do so tomorrow. As well as any fixes you prescribe.



Thanks.



-Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 19   Posted April 3, 2014
Hi Eric,





Please restart the computer and run SecurityCheck one more time. It should produce a log this time. :)



Also to ged rid of this entry:



  Quote
 session/startup_urls[0]
   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Preferences

   ask.com
   C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Web Data


go ahead and reset Google Chrome settings to default => https://support.google.com/chrome/answer/3296214?hl=en





Regards,

Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 20   Posted April 3, 2014
Here's the results from SecurityCheck:



 Results of screen317's Security Check version 0.99.81  
 Windows 7 Service Pack 1 x86 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Security Center service is not running! This report may not be accurate! 
 Windows Firewall Enabled!  
Symantec Endpoint Protection   
 WMI entry may not exist for antivirus; attempting automatic update. 
`````````Anti-malware/Other Utilities Check:````````` 
 Adobe Reader XI  
 Google Chrome 33.0.1750.152  
 Google Chrome 33.0.1750.154  
````````Process Check: objlist.exe by Laurent````````  
 Norton ccSvcHst.exe 
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  
````````````````````End of Log`````````````````````` 


Also, I reset the Chrome browser settings as suggested.

Any further steps you recommend?

Thanks,
Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 21   Posted April 3, 2014
Hi Eric,



Before I let you go I want to check something...from the SecurityCheck log it seems that your SecurityCenter service isn't running at the moment:



  Quote
``````````````Antivirus/Firewall Check:``````````````
 Windows Security Center service is not running! This report may not be accurate!


Please download Farbar Service Scanner and run it on the computer with the issue.

Make sure that all options are checked.
Press "Scan".
It will create a log (FSS.txt) in the same directory the tool is run.
Please copy and paste the log to your reply.




Regards,

Georgi

eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 22   Posted April 3, 2014
Here's the results for the FSS:



Farbar Service Scanner Version: 25-02-2014
Ran by dfiore (administrator) on 03-04-2014 at 17:01:31
Running from "C:\Users\dfiore\Desktop"
Microsoft Windows 7 Professional  Service Pack 1 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Attempt to access Google IP returned error. Google IP is unreachable
Attempt to access Google.com returned error: Google.com is unreachable
Attempt to access Yahoo.com returned error: Yahoo.com is unreachable


Windows Firewall:
=============

Firewall Disabled Policy: 
==================


System Restore:
============

System Restore Disabled Policy: 
========================


Action Center:
============


Windows Update:
============

Windows Autoupdate Disabled Policy: 
============================


Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is set to Demand. The default start type is Auto.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.


Windows Defender Disabled Policy: 
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1


Other Services:
==============


File Check:
========
C:\Windows\system32\nsisvc.dll => MD5 is legit
C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit
C:\Windows\system32\dhcpcore.dll => MD5 is legit
C:\Windows\system32\Drivers\afd.sys
[2013-10-09 06:16] - [2013-09-13 20:48] - 0338944 ____A (Microsoft Corporation) F81BB7E487EDCEAB630A7EE66CF23913

C:\Windows\system32\Drivers\tdx.sys => MD5 is legit
C:\Windows\system32\Drivers\tcpip.sys
[2013-10-09 06:16] - [2013-09-07 22:07] - 1294272 ____A (Microsoft Corporation) CA59F7C570AF70BC174F477CFE2D9EE3

C:\Windows\system32\dnsrslvr.dll => MD5 is legit
C:\Windows\system32\mpssvc.dll => MD5 is legit
C:\Windows\system32\bfe.dll => MD5 is legit
C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit
C:\Windows\system32\SDRSVC.dll => MD5 is legit
C:\Windows\system32\vssvc.exe => MD5 is legit
C:\Windows\system32\wscsvc.dll => MD5 is legit
C:\Windows\system32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\system32\wuaueng.dll => MD5 is legit
C:\Windows\system32\qmgr.dll => MD5 is legit
C:\Windows\system32\es.dll => MD5 is legit
C:\Windows\system32\cryptsvc.dll
[2013-08-13 16:37] - [2013-07-09 00:46] - 0140288 ____A (Microsoft Corporation) 7CA1BECEA5DE2643ADDAD32670E7A4C9

C:\Program Files\Windows Defender\MpSvc.dll
[2013-08-05 10:05] - [2013-05-27 00:57] - 0680960 ____A (Microsoft Corporation) 082CF481F659FAE0DE51AD060881EB47

C:\Windows\system32\ipnathlp.dll => MD5 is legit
C:\Windows\system32\iphlpsvc.dll => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit


**** End of log ****
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 23   Posted April 3, 2014
Hello,





It seems that the Security Center service is running so no additional actions are needed anymore. smile.png



And here are my final recommendations to you:



Nicely done !  icon_bananas.gif This is the end of our journey if you don't have any more questions.

Thank you for following my instructions perfectly.  :)
I have some final words for you.
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.







STEP 1 CLEANUP







To remove all of the tools we used and the files and folders they created, please do the following:





Download the following file => fixlist.txt and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST/FRST64 and press the Fix button just once and wait.
It's no needed to post the log this time.





Please download OTC.exe by OldTimer and save it to your desktop.


Right-click the OTC.exe and choose Run as Administrator.
Click on CleanUp! button.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes.


Next please download Delfix.exe by Xplode and save it to your desktop.
Please start it and check the box next to "Remove disinfection tools" and click on the run button.
The tool will delete itself once it finishes.


Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.







STEP 2 SECURITY ADVICES




Change all your passwords !


Since your computer was infected for peace of mind, I would however advise you that all your passwords be changed immediately including those for bank accounts, credit cards and home loans, PIN codes etc)!! (just in case).

If you're storing password in the browser to access websites than they are non encrypted well (only if you use Firefox with master password protection activated provide better security). So I strongly recommend to change as much password as possible. Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.

Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use PC Tools Password Generator to create random passwords and then install an application like KeePass Password Safe to store them for easy access.If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft





Keep your antivirus software turned on and up-to-date



Make sure your antivirus software is turned on and up-to-date.
New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
Note:
You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
You should scan your computer with an AntiSpyware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
Be sure to check for and download any definition updates prior to performing a scan.
Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.




Install HIPS based software if needed (or use Limited Account with UAC enabled)



I usually recommend to users to install HIPS based software but this type software is only effective in the right hands since it require from the users to take the right decisions.



HIPS based software controls what an application is allowed to do and not allowed to do.
It monitors what each application tries to do, how it use the internet and give you the ability to block any suspicious activity occurring on your computer.
In my opinion the best way to prevent an unknown malware from gaining access is to use some HIPS programs (like COMODO Firewall, PrivateFirewall, Online Armor etc.) to control the access rights of legitimate applications, although this would only be advisable for experienced users. (so if you don't feel comfortable using such software then you can skip this advice)



However, you should be aware though that (if you install Comodo Firewall and not the whole package Comodo Internet Security) this is not an replacement for a standard antivirus application. It's a great tool to add another layer of protection to your existent antivirus application. Also note that if you have an antivirus installed then you should install Comodo Firewall (and not Comodo Internet Security to avoid conflicts).



It takes some time and knowledge to configure it for individual purposes but once done, you should not have a problems with it.
There are so many reviews on YouTube and blogs about all these programs.
Keep in mind to choose carefully in order to avoid conflicts or instability caused by incompatible security programs.
Also having more than one "real-time" program can be a drain on your PC's efficiency so please refrain doing so.

More information about HIPS can be found here: What is Host Intrusion Prevention System (HIPS) and how does it work?



If you like Comodo you should choose for yourself which version of Comodo you will use 5 or 7. Personally I stick to version 5 at least for now.



If these kind of programs are difficult for you to use then you can use limited user account (LUA) with UAC enabled. If you need administrative privileges to perform some tasks, then you can use Run As or log on as the administrator account for that specific task.





Be prepared for CryptoLocker:





CryptoLocker Ransomware Information Guide and FAQ

Cryptolocker Ransomware: What You Need To Know

New CryptoLocker Ransomware Variant Spread Through Yahoo Messenger

CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ





Since the prevention is better than cure you can use gpedit built-in Windows or CryptoPrevent (described in the first link) to secure the PC against this locker.

Another way is to use Comodo Firewall and to add all local disks to Protected Files and Folders

You may want to check HitmanPro.Alert.CryptoGuard and add install it to be safe when surfing the net.





Practice Safe Internet


One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.  Below are a list of simple precautions to take to keep your computer clean and running securely:


If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that.  Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
.exe, .com, .bat, .pif, .scr or .cmd do not open the attachment unless you know for a fact that it is clean.  For the casual computer user, you will almost never receive a valid attachment of this type.
If you receive an attachment from someone you know, and it looks suspicious, then it probably is.  The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams.  For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message  or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.  We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window.  If there is a menu that comes up saying Add to Favorites... you know it's a fake.
Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.




Tweak your browsers


MOZILLA FIREFOX


To prevent further infections be sure to install the following add-ons NoScript and AdBlock Plus



  Quote
Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.


Adblock Plus can be found here.



  Quote
NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.


NoScript can be found here




Google Chrome


If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.

However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access





For Internet Explorer 9/10 read the articles below:


Security and privacy features in Internet Explorer 9

Enhanced Protected Mode
Use Tracking Protection in Internet Explorer

Security in Internet Explorer 10



Immunize your browsers with SpywareBlaster 5 and Spybot Search and Destroy 1.6

Also MBAM acquired the following software Malwarebytes Anti-Exploit and it should work with the most popular browsers. Beware the product is in beta stage.

Changelog can be seen here and known issues here.




Make the extensions for known file types visible:


Be wary of files with a double extension such as jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.





Create an image of your system (you can use the built-in Windows software as well if you prefere)



Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
The download link is here.
The tutorial on how to create an system image can be found here.
The tutorial on how to restore an system image can be found here.
Be sure to read the tutorial first.




Follow this list and your potential for being infected again will reduce dramatically.

Safe Surfing!  smile.png


If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. 


IPersistFile error messages.
Started by Ni3K, February 20, 2009
6 posts in this topic
Ni3K
New Member
Topic Starter
Ni3K
Members
4 posts
ID: 1   Posted February 20, 2009
Hi MBAM,

Not sure what this particular problem is but each time i check either "Check for updates automatically at" or "Run quick scan automatically at" boxes the following error appears

before the check is made: IPersistFile::Save,error code 0x800705b

The box after i click ok on the error message is then checked.

I have ran the utility for removing MBAM and reinstalling as stated here but each time on a new install the above error message appears.

MBAM v 1.34 on XP SP3. I am running the paid version of MBAM. This may be no biggy but its a tad annoying.

Grateful for any advise...thxs. :)
GT500
Mostly Cantankerous
GT500
Trusted Advisors
6,292 posts
Location: Fortville, IN
ID: 2   Posted February 20, 2009
Please check this list of errors and fixes.
Ni3K
New Member
Topic Starter
Ni3K
Members
4 posts
ID: 3   Posted February 20, 2009
  GT500 said:
Please check this list of errors and fixes.
Unfortunately the problem persists.. Checked double checked and even restarted the task scheduler service, which btw was on auto, but i still get the above error messages.

Just annoying. Thanks for your assist though.. :)
GT500
Mostly Cantankerous
GT500
Trusted Advisors
6,292 posts
Location: Fortville, IN
ID: 4   Posted February 20, 2009
I assume you are running Malwarebytes' Anti-Malware under a user account that has administrator rights?

If so, please follow these instructions for troubleshooting scheduled tasks.

It's also possible that something else is blocking MBAM from creating it's scheduled tasks, so you may also want to turn off any security software you have while trying to schedule the updates and scans.
Ni3K
New Member
Topic Starter
Ni3K
Members
4 posts
ID: 5   Posted February 21, 2009
  GT500 said:
I assume you are running Malwarebytes' Anti-Malware under a user account that has administrator rights?
If so, please follow these instructions for troubleshooting scheduled tasks.

It's also possible that something else is blocking MBAM from creating it's scheduled tasks, so you may also want to turn off any security software you have while trying to schedule the updates and scans.

Thxs GT500,

I believe there is a problem with the task scheduler as you reported. After a reboot i found the following error message in the log file:

:D" "Task Scheduler Service"

Started at 20/02/2009 08:13:28

"Malwarebytes' Scheduled Update for Computer.job" (mbam.exe) 20/02/2009 09:00:00 ** ERROR **

The attempt to retrieve account information for the specified task failed; therefore, the task did not run. Either an error occurred, or no account information existed for the task.

The specific error is:

0x8004130f: No account information could be found in the Task Scheduler security database for the task indicated.

Will attempt to resolve this issue elsewhere as this is not MBAM's problem.
Interesting error. I assume it means you need to change what user the task is running as.

Error Number: Error 1812
Error Name: Malwarebytes Error 1812
Error Description: Error 1812: Malwarebytes Anti-Malware has encountered a problem and needs to close. We are sorry for the inconvenience.
Developer: Malwarebytes Corporation
Software: Malwarebytes Anti-Malware
Applies to: Windows XP, Vista, 7, 8

Symptoms of Error 1812
"Error 1812" appears and crashes the active program window.
Your PC frequently crashes with Error 1812 when running the same program.
“Malwarebytes Error 1812” is displayed.
Windows runs sluggishly and responds slowly to mouse or keyboard input.
Your computer periodically “freezes” for a few seconds at a time.
These 1812 error messages can appear during program installation, while a Malwarebytes Corporation-related software program (eg. Malwarebytes Anti-Malware) is running, during Windows startup or shutdown, or even during the installation of the Windows operating system. Keeping track of when and where your 1812 error occurs is a critical piece of information in troubleshooting the problem.
Causes of Error 1812
Corrupt download or incomplete installation of Malwarebytes Anti-Malware software.
Corruption in Windows registry from a recent Malwarebytes Anti-Malware-related software change (install or uninstall).
Virus or malware infection that has corrupted Windows system files or Malwarebytes Anti-Malware-related program files.
Another program maliciously or mistakenly deleted Malwarebytes Anti-Malware-related files.
Runtime Errors such as “Error 1812” can be caused by a variety of factors, so it is important that you troubleshoot each of the possible causes to prevent it from recurring.
Runtime Errors Knowledgebase
ARTICLE ID:
125194
ARTICLE AUTHOR:
Jay Geater
LAST UPDATED:
11/21/2016
POPULARITY:

Download Now
Error Fix

Microsoft Partner
Learn More 



Recommendation: Scan your PC for computer errors.
How To Fix Malwarebytes Anti-Malware Error 1812
Below is a list of troubleshooting steps to resolve your Error 1812 problems. These troubleshooting steps get progressively more difficult and time consuming, so we strongly recommend attempting them in ascending order to avoid unnecessary time and effort.

Please Note: Click the [ Open ] image to expand the troubleshooting instructions for each step below. You can also click the [ Close ] image to hide the instructions as you proceed through each step.
OpenStep 1: Repair Registry Entries Associated with Error 1812
OpenStep 2: Conduct a Full Malware Scan of Your PC
OpenStep 3: Clean Out Your System Junk (Temporary Files and Folders) With Disk Cleanup (cleanmgr)
OpenStep 4: Update Your PC Device Drivers
OpenStep 5: Utilize Windows System Restore to "Undo" Recent System Changes
OpenStep 6: Uninstall and Reinstall the Malwarebytes Anti-Malware Program Associated with Error 1812
OpenStep 7: Run Windows System File Checker ("sfc /scannow")
OpenStep 8: Install All Available Windows Updates
OpenStep 9: Perform a Clean Installation of Windows
Recommendation: Scan your PC for computer errors.

Operating System Information
1812 error messages can occur in any of the following Microsoft Windows operating systems:
Windows 10
Windows 8
Windows 7
Windows Vista
Windows XP
Windows ME
Windows 2000

Are You Still Experiencing Error 1812 Issues?
Please reach out to us anytime on social media for more help:

Malwarebytes SDKDatabaseLoadDefaults error
Avatar user by Crispin7652 on Mar 30, 2015 at 6:25 PM |SOFTWARE
2

See more RELATED PROJECTS

Sharepoint Server
Installation and configuration of SharePoint server on single server.

Server room upgrade and virtualisation
Server room overhaul. Virtualise Windows and Linux servers whilst upgrading OS and application, provide hardware/software failure resilience, provide server/application testing platform and provide better power outage resilience.

Establishing a PACS Environment
I was asked to participate in the establishment and upkeep of a picture archiving and communication system (PACS) for Westlake Regional Hospital.

TECHNOLOGY IN THIS DISCUSSION

Malwarebytes 
168091 Followers Follow

Malwarebytes 
Join the Community! Creating your account only takes a few minutes.Join Now
Anyone come across this error? Malwarebytes forums has numerous posts but no solutions, each person is asked to download numerous programs and attach the logs and then jump through so many hoops that still do not resolve the issue.

I tried the FREE version to see how it performs, the program installs OK, but when you run a scan and it finishes the Pre Scan stage it throws up this SDKDatabaseLoadDefaults error 1812 or 2 and appears to delete the definitions in the C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware folder?

This is on a personal laptop with Win8.1 Enterprise x64 that's domain joined (it's my laptop but use it at work sometimes). Tried the older v1.75 and the latest v2.1.4.1018 with same problem? Tried disjoining and using local admin account, safe mode, disabling UAC but no luck. Tried a  test on my Lenovo Miix 10 Tablet with the same version of Win8.1 Enterprise on the same domain and policies and it runs it fine, so can't figure out why it works on one and not the other?

So, has anyone seen this issue with Malwarebytes?

Reply Subscribe     
RELATED TOPICS:
outlook room finder drop down missing
Remove malware from terminal server
Quickbooks occasionally asks for windows admin. permissions for dbmanagerexe.exe
15 Replies
starg33ker
Ghost Chili
starg33ker Mar 30, 2015 at 7:19 PM 
Sorry to ask the obvious but have you simply tried reinstalling it?

I haven't had any issues. I freaking love MBAM! Only thing that's annoying is that I have to log into Admin to update clients when there's an interface update (my version was before it was centrally managed). The virus definitions updates itself though, so it doesn't worry me that much. Stuff I save for a rainy weekend to come in and do.

Spice Reply
Crispin7652
Pimiento
OP
Crispin7652 Mar 30, 2015 at 7:41 PM 
I've uninstalled/reinstalled till i'm blue in the face, made no difference, even following the reinstall guides on the Malwarebytes forums for a clean install hasn't worked.

I've just tried it on a Toshiba 22" AIO touchscreen with Win8.1 x64 Enterprise at another location and get the same issue? So well baffled now. Seems it's not just Win8.1, people with Win7 have got the same issue on home PCs/laptops so go figure? Looks like finding something else as this issue seems to be ongoing.

Spice Reply
shawn8023
Pimiento
shawn8023 Mar 30, 2015 at 7:41 PM 
I had the same issue on a couple of our machines.  Reinstalling did not resolve the issue either. MalwareBytes recommended their Clean Uninstall Tool.  This did not work either.

Spice Reply
Crispin7652
Pimiento
OP
Crispin7652 Mar 30, 2015 at 8:02 PM 
Thanks for the replies!

Seems those machines affected never get it resolved from reading the Malwarebytes forums, people have gone through so many steps and scans only to find it's not virus/malware related and then the suggestions/help seem to stop there with no further progress on the issue!

I'm going to put a spare HDD in my laptop and do a fresh install of Win8.1 x64 Enterprise. Not going to connect it to our domain yet, just going to install MBAM to see what happens.

Spice Reply
ThumbsUp
Poblano
ThumbsUp Mar 31, 2015 at 12:34 AM 
There is a way to install it by hiding the installation.  Some malware is aware of its file names and install location.

(1) rename the downloaded installation file (example: FindThisSucker.exe)

(2) reboot to safe mode and install the renamed file.

(3) once the install is done, find the installation folder (program files?) and rename the MBAM.exe file to something/anything else (example HaHaHa.exe).

(4) fix your program shortcuts to point to the renamed EXE file (HaHaHa.exe ???).

(5) run the first time while still in safe mode, reboot to safe mode, run again

(6) if step 5 runs clean, reboot to normal, run again. else, repeat step 5 till clean.

Spice Reply
Crispin7652
Pimiento
OP
Crispin7652 Mar 31, 2015 at 3:46 AM 
Malwarebytes Chameleon already does this, allows you to run MBAM on an infected machine: https://www.malwarebytes.org/chameleon/ needless to say, even that doesn't solve the issue, still get the same error!

I don't personally believe it's Malware, it's happening to too many people on different systems (standalone/domain/laptop/desktop) and OS versions (XP/Vista/7/8/8.1/x86/x64) so what exactly all those systems have in common that stops MBAM working is anyones guess, so we all must have the same undetectable virus/malware or, heaven forbid, infected firmware!!

Spice Reply
dianepryor
Pimiento
dianepryor Apr 5, 2015 at 1:40 AM 1ST POST
I'm experiencing this problem as well...very frustrating.  I agree that this is a software glitch and wish that resident geniuses over at Malwarebytes would look at it seriously.  If you do a Google search on SDK errors, the problem goes back for far too long not to have been fixed by now.  Other than that, I LOVE MBAM.

Spice Reply
dianepryor
Pimiento
dianepryor Apr 5, 2015 at 11:13 PM 
Addendum:  I ran Chameleon last night and it seems to have solved the problem!  I'm switching my vote from "software problem" to "malware".

Spice Reply
wurms2
Pimiento
wurms2 May 11, 2015 at 10:33 PM 1ST POST
I was getting the error code: 2.

Here is what I did to resolve this:

Load Hirens Boot CD onto a USB and startup with that.

Run MalwareBytes from Hirens Boot CD (updating definitions)

-It detected 1 object. I believe it was a PUM.Hijack. PUM stands for Potentially Unwanted Modification, which could come from virus or changes from another program, or GPOs.

I removed the PUM Ran the registry cleaner via CCleaner in Hirens Boot CD (backup registry first!!!).

Rebooted computer. Was then able to run malwarebytes!!! Hooray %uFEFF

Spice Reply
RobOley
Anaheim
RobOley Jun 4, 2015 at 11:19 PM 
Did wurms2 suggestion work? I tried to do it from a CD not a USB and ran into new sets of issues. Will in Hiren's I could not establish a network connection. Thus I could not update Malwarebytes. When I tried to run I got a run error 15. 

update: Created a USB boot and still not working. From the USB the win_Xp installed with missing icons/shortcuts/and programs??? 

Edited Jun 5, 2015 at 12:44 AM
Spice Reply
Wanito
Pimiento
Wanito Nov 24, 2015 at 10:42 PM 1ST POST
Issue was resolved by deleting the outdated malware bytes folder in the program data area. It appears to have left the outdated folder on upgrade. The scan tries to access the outdated data causing the error. Go to programdata\malwarebytes. You will see 2 malwarebytes anti-Malware folders. Delete the older one and restart the machine. Run the scan and it should work.

Spice Reply
RobOley
Anaheim
RobOley Nov 24, 2015 at 11:00 PM 
I only have one.

Spice Reply
rogalskij
Jalapeno
rogalskij May 11, 2016 at 6:30 PM 
I am going to revive this thread since we have discovered this is happening to us on multiple machines. What we have tried so far: 

Updating the definitions
uninstalling and reinstalling
deleting the scheduled scan/update
Checked for 2 instances of the programdata folder, only found one
Any thoughts or assistance would be appreciated.  We are on version: 2.2.1.1043

Malwarebytes
Malwarebytes
(1126)
Spice Reply
imaduddinmian
Pimiento
imaduddinmian May 12, 2016 at 8:29 PM 1ST POST
I had the same issue with version: 2.2.1.1043%uFEFF. Here is my solution:

1. Download "Chameleon" from this link https://www.malwarebytes.org/chameleon/

%uFEFF2. Extract to a file

3. Run mbam-chameleon-3.1.30.0\Chameleon\Windows\%uFEFFmbam-chameleon%uFEFF.exe

This will update MBAM and run scan.

Spice Reply
coleensootsman-eicher
Sonora
coleensootsman-eicher Jul 28, 2016 at 10:47 PM 1ST POST
I have done all of the above with no joy -- I