Annoying error message pop-up?
DIAL :+1-888-720-3203 & resolve everything
How can I get rid of pop-up error message from Malwarebytes. It acts like a malware!
SOME COMMON ERRORS WITH Malwarebytes Anti-Malware
0xc000001d error - CENSORED TOPICHow To Fix Malwarebytes Anti-Malware Error 1812
Malwarebytes SDKDatabaseLoadDefaults error
Adblock Plus • View topic - Script error
How to Fix malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error
Whenever I have Malwarebytes installed I get DNS errors when trying
Annoying message (missing dll file) appearing at start-up
MBAM error: SDKDatabaseLoadDefaults failed with code: 1812
Malwarebytes Anti-Malware: Run-time error '339'
What should I do if I receive an SDK DatabaseLoad Defaults error?
Databases out of date - your database is out of date. It is important to keep protected by istalling the latest updates. UPDATE NOW.
When I click on UPDATE NOW, it pops up the same and click on x mark does not make it go away.post-170020-0-74878500-1406489555_thumb.
1PW
1PW
1PW
Spam Hunters
8,377 posts
Interests: Agnes - loved forever.
ID: 2 Posted July 27, 2014
Hello ounbbl and :welcome:
Let's begin here:
Please try the following and let us know if this corrects your issue: MBAM Clean Removal Process 2.x.
If that does not correct the issue, then please read the following and individually attach the 3 requested logs in a reply to this thread: Diagnostic Logs.
The 3 files, from Step 2, to be individually attached from your desktop are: 1) CheckResults.txt 2) FRST.txt 3) Addition.txt. Please do not Copy and Paste them into a reply.
NOTE: There is an FAQ section with valuable information located in Common Questions, Issues, and their Solutions.
Please let us know the status of your issue in a reply to this thread.
Thank You.
0xc000001d error - CENSORED TOPIC
Started by r7t8, July 31
3 posts in this topic
r7t8
New Member
Topic Starter
r7t8
Members
1 post
ID: 1 Posted July 31
In the following thread, Root Admin says:
"MBAM System Requirements were clarified with the latest release"
and
"Please download the special installer from this page."
https://forums.malwarebytes.org/topic/170731-0xc000001d-error-failed-to-initialize/
Both of these statements are FALSE. The download page does not clarify the system requirements and the download link in that thread is broken.
I understand that people make mistakes, but I find it very annoying when people blatantly lie, and then lock the topic so no one can complain about it. The arrogance and rudeness of Malwarebytes seems to have no end. They just dont care how much of the users time is wasted by their lying, laziness, and product misrepresentation. If you cannot simply disable SSE2 optimizations at compile time, the least you could do is post a simple statement on the download page like this:
The following CPU's are not supported due to the lack of an SSE2 instruction set:
Intel Pentium III, AMD Athlon XP, VIA C3, Transmeta Crusoe, Intel Quark
Why do you censoreders continue to needlessly waste the users time by forcing them to troubleshoot cryptic error messages? We will never purchase another new Windows machine that is designed to have backdoors and spyware. We dont use this old hardware for daily work but millions of people see no reason to throw a perfectly good LCD display in the trash that could be used to monitor traffic from an IDS/firewall appliance. Why cant the Malwarebytes installer work the same as other installers: they just say the CPU is unsupported and thats the end of it. No muss, no fuss. If you are lazy and stupid in one area, I cannot trust your software to do other tasks properly.
Aura
Special Ops
Aura
Trusted Advisors
2,591 posts
Location: Québec, Canada
Interests: Technical Support, Malware Removal & Analysis, Information Security, Gaming.
ID: 2 Posted August 1
Quote
Both of these statements are FALSE.CCall at +1-888-720-3203
Really?
Quote
The download page does not clarify the system requirements
Ron never said that the requirements were specified in the download page, however they are specified in the appropriate support article.
https://support.malwarebytes.com/customer/portal/articles/1834851-what-are-the-system-requirements-to-run-malwarebytes-anti-malware-?b_id=6438
Quote
800 MHz CPU or faster with SSE2 technology
Quote
the download link in that thread is broken.
Works for me.
muw0vgV.png
Right now, I don't consider that Malwarebytes is wasting your time, it would be quite the opposite since I had to take my own time (I don't work for Malwarebytes however) to prove to you that you didn't do appropriate research before posting here.
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 3 Posted August 1 (edited)
Hello @r7t8
I'm sorry that you're having issues locating the information concerning the lack of certain processor support. The information is on the main product page near the bottom under Tech specs.
https://www.malwarebytes.com/antimalware/
Software Requirements
Windows 10 (32/64-bit)
Windows 8.1 (32/64-bit)
Windows 8 (32/64-bit)
Windows 7 (32/64-bit)
Windows Vista (Service Pack 1 or later, 32/64-bit)
Windows XP (Service Pack 2 or later, 32-bit only)
Internet Explorer 6 or newer
Hardware Requirements:
2048 MB RAM (64-bit OS)
1024 MB RAM (32-bit OS, except 256 MB for Windows XP)
800 MHz CPU or faster with SSE2 technology
20MB of free hard disk space
1024x768 or greater screen resolution
Active internet connection for database and product updates
Side note: SSE2 Technology
Quote
SSE2, Streaming SIMD Extensions 2, is one of the Intel SIMD (Single Instruction, Multiple Data) processor supplementary instruction sets first introduced by Intel with the initial version of the Pentium 4 in 2001. It extends the earlier SSE instruction set, and is intended to fully replace MMX
SSE2 - Wikipedia
By 2004 even AMD had added such support to their main processors. In theory, one would probably need to have a computer older than about 2005 or so not to have support for SSE2 - I'm sure it's possible that there are some computers even newer possibly up to about 2008 being built or sold with very Call at +1-888-720-3203old hardware that was even obsolete at the time but was cheap.
One has to realize when working with any computer that is over 5 years old that there may be a need to verify that certain drivers and software are in fact still compatible with an old computer. In this case, the computer would almost certainly have to be over 10 years old.
Thank you for your understanding and again I apologize that you were not able to easily find the requested information.
"Bad Image" error after running Malwarebytes
Started by Guest SherlockTAS, December 10, 2014
Bad
Image
Malwarebytes
wininet.dll
23 posts in this topic
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 1 Posted December 10, 2014
I am trying to clean up a computer for a friend's daughter. I tried downloading and running the Malwarebytes free program as it always worked in the past. Her computer is an HP laptop running Windows 8, which I hate using, but can get around with time.
The first time I ran Malwarebytes, I ended up with 4,199 results!!! I uninstalled some programs I deemed to be malware while the program was scanning (probably shouldn't have done that), and then clicked to quarantine the items when the results finished. Upon rebooting the computer, it stopped to install some Windows updates and after restarting, the computer failed to load beyond the desktop image. An error popped up about bad image and explorer.exe.
From there I rebooted the computer hoping it was just a fluke. This time the computer loaded, but the majority of the programs did not work right and I kept getting "bad image" errors. From there I decided to try restoring the computer to an earlier time and unfortunately I picked the restore point on the day most of the malware was installed. I was a bit freaked out by the way the computer reacted to the last scanning and cleaning by Malwarebytes, so I tried uninstalling most of the malware programs myself.
For the most part I succeeded, but the after results of the one program, PastaLeads, persists. It set up a proxy server, http=127.0.0.1:8800 and nothing would allow it to be changed. If you deleted it, it would come right back after closing the connection settings.
Bleepingcomputer claimed using Rkill and Emsisoft Anti-Malware would get rid of it when the directions were followed. Result = No change. The Emsisoft scanner found 33 items, but 15 of them could not be removed and those items were all located in a Driver folder.
I installed Comodo Internet Security on the computer, but because of this PastaLeads, it disabled the internet browsers and Comodo's ability to update and scan.
I need someone's help to get rid of the after effects of PastaLeads and ferret out any other malware. I am currently doing a Malwarebytes scan to see if it picks anything else up, but I read other people's posts stating that Malwarebytes was unable to solve the same problem.
You might have to go slower with instructions with me. I am not a novice with computers, but I am not an expert either.
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 2 Posted December 10, 2014
How do you change a title on a post? I screwed this one up. I meant to change the title to something else and there is NO edit option on here.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 3 Posted December 10, 2014
Hello SherlockTAS, welcome to Malwarebytes' Malware Removal forum!
My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems.Call at +1-888-720-3203
If you would allow me to call you by your first name I would prefer that. :)
General P2P/Piracy Notice:
Quote
If you are using Peer to Peer (P2P) filesharing software such as uTorrent, BitTorrent or similar you must either fully uninstall or completely disable the programme(s) from running whilst receiving assistance at this forum.
Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.
If you have illegal/cracked/keygen or similar software on the computer, please remove/uninstall the software now and read the policy on Piracy. Failure to do so will also result in your topic being closed.
======================================================
Please read through the points below to ensure this process moves as quickly and efficiently as possible.
Please ensure you read through my instructions thoroughly, and carry out each step in the order specified.
If you are unable to copy/paste your logs directly into your post, please attach the file.
Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation and providing the best set of instructions for you.
Please backup important files before proceeding with my instructions. Malware removal can be unpredictable.
If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.
Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.
Ensure you are following this topic. Click xetYzdbu.png.pagespeed.ic.U7AjmRUewW.png at the top of the page.
======================================================
Please do the following after the Malwarebytes Scan has finished.
If you are unable to download the file, please do so on a clean machine, and transfer the file across using a USB drive.
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan
Please download Farbar Recovery Scan Tool (x32) or Farbar Recovery Scan Tool (x64) and save the file to your Desktop.
Note: Download and run the version compatible with your system (32 or 64-bit). Download both if you're unsure; only one will run.
Right-Click FRST.exe / FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Yes to the disclaimer.
Ensure the Addition.txt box is checked.
Click the Scan button and let the programme run.
Upon completion, click OK, then OK on the Addition.txt pop up screen.
Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply.
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 4 Posted December 10, 2014
No important files to worry about. All my friend's daughter uses it for is pictures and to play The Sims 3.
I have to work with attachments as the browsers refuse to work because of the proxy problem. This computer doesn't use one, but the setting won't change.
The 64-bit one worked. Funny, I saw 86-bit in this computer.
I'm Troy.
Addition.txt
FRST.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 5 Posted December 10, 2014
Hi Troy,
Quote
I have to work with attachments as the browsers refuse to work because of the proxy problem.
That's OK.
Please consider the following suggestion, and proceed with the instructions below.
Quote
goGMWSt.gifSpybot S&D No Longer Recommended
------------------------------
MVPS.org is no longer recommending Spybot S&D due to poor testing results (scroll down and read under Freeware Antispyware Products).
I would advise uninstalling Spybot S&D. The presence of this programme can make the cleaning of your computer more difficult. You can uninstall the programme by:
Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type appwiz.cpl and click OK.
Search for Spybot, right-click the entry and click Uninstall.
Please inform me of your decision.
STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script
Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type Notepad and click OK.
Copy the entire contents of the codebox below and paste into the Notepad document.
startHKU\S-1-5-21-4180364761-169256126-1362377442-1001\...\MountPoints2: {3d2bdf5d-e2a9-11e3-825b-806e6f6e6963} - "E:\Autorun.exe"GroupPolicy: Group Policy on Chrome detected <======= ATTENTIONCHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTIONProxyEnable: [HKLM] => ProxyEnable is set.ProxyEnable: [HKLM-x32] => ProxyEnable is set.ProxyServer: [HKLM] => http=127.0.0.1:8800;https=127.0.0.1:8800ProxyServer: [HKLM-x32] => http=127.0.0.1:8800;https=127.0.0.1:8800ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled.ProxyEnable: [S-1-5-19] => Internet Explorer proxy is enabled.ProxyEnable: [S-1-5-20] => Internet Explorer proxy is enabled.SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://groovorio.com/results.php?f=4&q={searchTerms}&a=grv_otbrw3_14_35&cd=2XzuyEtN2Y1L1Qzu0Fzz0AzyyCtAzzyB0FyEtDtB0DyCyDtAtN0D0Tzu0SzyzyyCtN1L2XzutAtFtBtFtCtFtDtN1L1Czu1N1C2X1V1F2Z1S1C2W1O1L1C1B2Z1VtCyE1VtByEtN1L1G1B1V1N2Y1L1Qzu2SyEtAyCyCzzyD0EtDtG0C0AtBtDtGzzyByC0EtGyC0D0C0EtGyE0B0EtB0DyCzy0EtA0EtBtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2SzzyEtCyC0B0A0FyBtG0E0AzzyDtGyEyBzzyCtGzyyCzy0FtGyCtCtByEyC0E0E0FtCtDzy0D2Q&cr=599176992&ir=SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://groovorio.com/results.php?f=4&q={searchTerms}&a=grv_otbrw3_14_35&cd=2XzuyEtN2Y1L1Qzu0Fzz0AzyyCtAzzyB0FyEtDtB0DyCyDtAtN0D0Tzu0SzyzyyCtN1L2XzutAtFtBtFtCtFtDtN1L1Czu1N1C2X1V1F2Z1S1C2W1O1L1C1B2Z1VtCyE1VtByEtN1L1G1B1V1N2Y1L1Qzu2SyEtAyCyCzzyD0EtDtG0C0AtBtDtGzzyByC0EtGyC0D0C0EtGyE0B0EtB0DyCzy0EtA0EtBtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2SzzyEtCyC0B0A0FyBtG0E0AzzyDtGyEyBzzyCtGzyyCzy0FtGyCtCtByEyC0E0E0FtCtDzy0D2Q&cr=599176992&ir=SearchScopes: HKU\S-1-5-21-4180364761-169256126-1362377442-1001 -> DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL =SearchScopes: HKU\S-1-5-21-4180364761-169256126-1362377442-1001 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://groovorio.com/results.php?f=4&q={searchTerms}&a=grv_otbrw3_14_35&cd=2XzuyEtN2Y1L1Qzu0Fzz0AzyyCtAzzyB0FyEtDtB0DyCyDtAtN0D0Tzu0SzyzyyCtN1L2XzutAtFtBtFtCtFtDtN1L1Czu1N1C2X1V1F2Z1S1C2W1O1L1C1B2Z1VtCyE1VtByEtN1L1G1B1V1N2Y1L1Qzu2SyEtAyCyCzzyD0EtDtG0C0AtBtDtGzzyByC0EtGyC0D0C0EtGyE0B0EtB0DyCzy0EtA0EtBtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2SzzyEtCyC0B0A0FyBtG0E0AzzyDtGyEyBzzyCtGzyyCzy0FtGyCtCtByEyC0E0E0FtCtDzy0D2Q&cr=599176992&ir=CHR Extension: (TidyNetwork) - C:\Users\Lauren\AppData\Local\Google\Chrome\User Data\Default\Extensions\dmidaiabaeipgkcooijbikmdcofhpakp [2014-11-28]CHR Extension: (snipsmart) - C:\Users\Lauren\AppData\Local\Google\Chrome\User Data\Default\Extensions\enmnbmijajiokgmckkfjaloboghdkfbg [2014-11-25]CHR HKLM-x32\...\Chrome\Extension: [dmidaiabaeipgkcooijbikmdcofhpakp] - No PathS2 51cdb72; "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\Optimizer Pro 3.11\OptProCrash.dll",ENTc:\Program Files (x86)\Optimizer Pro 3.11S2 Orbiter; C:/Program Files (x86)/ORBTR/orbiter.dll [X]C:\Program Files (x86)\ORBTR2014-12-10 03:43 - 2014-12-10 03:43 - 00000000 ____D () C:\Users\Lauren\AppData\Local\WebBarTask: {2A3F9F0D-2517-44C6-B2D6-9A419DAF6764} - \RocketTab No Task File <==== ATTENTIONTask: {40A0FDF5-B9C5-4F07-8A27-3968D8B35DCD} - \TidyNetwork Update No Task File <==== ATTENTIONTask: {97F99540-8098-4A60-898C-7D9072607ECC} - \PastaQuotes No Task File <==== ATTENTIONTask: {A667A033-5C7D-4FF9-BEE1-6215CB04FFD7} - System32\Tasks\WebBarUpdateTask => C:\Program Files\WebBar\wbsvc.exeTask: {CAA7BCEA-616A-44B7-B623-68F546C3C706} - \RocketTab Update Task No Task File <==== ATTENTIONTask: {FCA5F5F3-E679-4E58-8171-46B746981B86} - System32\Tasks\WebBarLaunchTask => C:\Program Files\WebBar\wbsvc.exeC:\Program Files\WebBarAlternateDataStreams: C:\Windows\system32\MRT.exe:$CmdTcIDAlternateDataStreams: C:\Users\Lauren\Desktop\FRST64.exe:$CmdTcID2014-11-28 00:01 - 2014-11-28 00:01 - 00000000 __SHD () C:\Users\Lauren\AppData\Local\EmieBrowserModeListFolder: C:\ProgramData\InstallSightSDKFolder: C:\Windows\system32\appraiserFolder: C:\ProgramData\eBiQOtKELfFolder: C:\ProgramData\Browser2014-11-28 00:16 - 2014-12-10 03:54 - 00000000 ____D () C:\Program Files (x86)\CompuClever2014-11-28 00:16 - 2014-12-10 03:23 - 00000000 ____D () C:\Users\Lauren\AppData\Roaming\CompuClever2014-11-28 00:15 - 2014-11-28 00:15 - 00003784 _____ () C:\Windows\System32\Tasks\WebBarUpdateTask2014-11-28 00:15 - 2014-11-28 00:15 - 00003260 _____ () C:\Windows\System32\Tasks\WebBarLaunchTask2014-11-27 22:58 - 2014-11-27 22:58 - 00800816 _____ (Download Publisher) C:\Users\Lauren\Downloads\Notepad! Setup.exe2014-12-10 08:45 - 2014-10-28 15:17 - 00000000 ____D () C:\ProgramData\83b32e09-56dd-4d15-bbc7-350e8627ec65C:\Users\Lauren\AppData\Local\Temp\snipsmartUntemp.exeCMD: ipconfig /flushdnsCMD: netsh winsock reset allEmptyTemp:end
Click File, Save As and type fixlist.txt as the File Name.
Important: The file must be saved in the same location as FRST64.exe.
NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.
Right-Click FRST64.exe and select Run as administrator to run the programme.
Click Fix.
A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply.
STEP 2
BY4dvz9.png AdwCleaner
Please download AdwCleaner and save the file to your Desktop.
Right-Click AdwCleaner.exe and select Run as administrator to run the programme.
Follow the prompts.
Click Scan.
Upon completion, click Report. A log (AdwCleaner[R0].txt) will open. Briefly check the log for anything you know to be legitimate.
Ensure anything you know to be legitimate does not have a checkmark, and click Clean.
Follow the prompts and allow your computer to reboot.
After rebooting, a log (AdwCleaner[s0].txt) will open. Copy the contents of the log and paste in your next reply.
-- File and folder backups are made for anything removed using this tool. Should a legitimate file or folder be removed (otherwise known as a 'false-positive'), simple steps can be taken to restore the entry. Please do not overly concern yourself with the contents of AdwCleaner[R0].txt.
STEP 3
E3feWj5.png Junkware Removal Tool (JRT)
Please download Junkware Removal Tool and save the file to your Desktop.
Note: If you unchecked any items in AdwCleaner, please backup the associated folders/files before running JRT.
Temporarily disable your anti-virus software. For instructions, please refer to the following link.
Right-Click JRT.exe and select Run as administrator to run the programme.
Follow the prompts and allow the scan to run uninterrupted.
Upon completion, a log (JRT.txt) will open on your desktop.
Re-enable your anti-virus software.
Copy the contents of JRT.txt and paste in your next reply.
STEP 4
mlEX1wH.png RogueKiller
Please download RogueKiller (x64) and save the file to your Desktop.
Close any running programmes.
Right-Click RogueKiller.exe and select Run as administrator to run the programme.
Allow the Prescan to complete. Upon completion, a window will open. Click Accept.
A browser window may open. Close the browser window.
Click jpgUwzp.png. Upon completion, click phPvmc6.png.
Close the programme. Do not fix anything!
A log (RKreport.txt) will be open. Copy the contents of the log and paste in your next reply.
======================================================
STEP 5
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.
Did you uninstall Spybot?
Fixlog.txt
AdwCleaner[s0].txt
JRT.txt
RKreport.txt
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 6 Posted December 11, 2014
I used the Spybot Search & Destroy to see if it would find anything and very pathetic results I got, too. I was going to uninstall it, but decided to wait for your word before doing so. I've uninstalled it now, but it's a pity that they let it go so far downhill. It was once a geat product. Should I uninstall the Emsisoft Anti-Malware program as well?
After the "fixlist.txt" part, it asked me to restart the computer and I clicked YES before I realized what was happening. After it rebooted, the Comodo Internet Security Premium actually succeeded in updating itself, but I stopped it from scanning because I thought it would interfere with what we were doing. Something is apparently working now at least as it couldn't update before. Should we repeat something here because you never said anything about restart prompts after the "fixlist.txt"?
Didn't see anything legitimate in the AdwCleaner results to worry about. The Junkware Removal Tool ran like molasses, unfortunately. Luckily I had my my own computer to busy myself on while waiting. I don't think it found anything. RogueKiller found something.
Here are the other things you asked for.
AdwCleanerR0.txt
Fixlog.txt
JRT.txt
RKreport_SCN_12112014_004639.log
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 7 Posted December 11, 2014
Is it okay to let Comodo do a scan yet? I intend to uninstall it soon and download a different version because their newest free version does not come with the firewall for some idiotic reason. Makes no sense considering that you can download it separate. Going to be using the recommeded tools to uninstall it as thoroughly as possible.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 8 Posted December 11, 2014
Hello Troy,
Quote
Should I uninstall the Emsisoft Anti-Malware program as well?
Emsisoft Antimalware is a reputable programme. Far better than Comodo in my (and the security communities') opinion.
And I believe you have the paid-for version?
Quote
Should we repeat something here because you never said anything about restart prompts after the "fixlist.txt"?
No, that's OK. The reboot was necessary.
Quote
Didn't see anything legitimate in the AdwCleaner results to worry about.
Did you have AdwCleaner remove the items detected by clicking Clean? I see you've attached the report (AdwCleaner[R0].txt) created prior to clicking Clean.
Quote
RogueKiller found something.
The items detected by RogueKiller are OK.
Quote
Is it okay to let Comodo do a scan yet?
Yes, that's OK.
Quote
I intend to uninstall it soon and download a different version because their newest free version does not come with the firewall for some idiotic reason.
Have you considered sticking with the Windows 8 Firewall? It's more than sufficient, and will use far less resources.
-----------------------
STEP 1
b8zkrsY.png Browser Reset
Instructions on how to backup your Favourites/Bookmarks and other data can be found below.
Internet Explorer: Backup Internet Explorer Favourites
Firefox: Backup Firefox Bookmarks
Chrome: Backup Chrome Bookmarks
Proceed with the reset once done.
Internet Explorer: How to reset Internet Explorer settings
Firefox: Reset Firefox
Chrome: Chrome - Reset browser settings
STEP 2
GfiJrQ9.png Malwarebytes Anti-Malware (MBAM)
Open Malwarebytes Anti-Malware and click Update Now.
Once updated, click the Settings tab, followed by Detection and Protection and tick Scan for rootkits.
Click the Scan tab, ensure Threat Scan is checked and click Scan Now.
Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards.
If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.
Upon completion of the scan (or after the reboot), click the History tab.
Click Application Logs and double-click the Scan Log.
Click Copy to Clipboard and paste the log in your next reply.
STEP 3
GzlsbnV.png ESET Online Scan
Note: This scan may take a long time to complete. Please do not browse the Internet whilst your Anti-Virus is disabled.
Please download ESET Online Scan and save the file to your Desktop.
Temporarily disable yoCall at +1-888-720-3203ur anti-virus software. For instructions, please refer to the following link.
Double-click esetsmartinstaller_enu.exe to run the programme.
Agree to the EULA by placing a checkmark next to Yes, I accept the Terms of Use. Then click Start.
Agree to the Terms of Use once more and click Start. Allow components to download.
Place a checkmark next to Enable detection of potentially unwanted applications.
Click Hide advanced settings. Place a checkmark next to:
Scan archives
Scan for potentially unsafe applications
Enable Anti-Stealth technology
Ensure Remove found threats is unchecked.
Click Start.
Wait for the scan to finish. Please be patient as this can take some time.
Upon completion, click esetListThreats.png. If no threats were found, skip the next two bullet points.
Click esetExport.png and save the file to your Desktop, naming it something such as "MyEsetScan".
Push the Back button.
Place a checkmark next to xKN1w2nv.png.pagespeed.ic.JWqIaEgZi7.png and click SzOC1p0.png.pagespeed.ce.OWDP45O6oG.png.
Re-enable your anti-virus software.
Copy the contents of the log and paste in your next reply.
======================================================
STEP 4
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.
Did your browsers reset OK?
MBAM Scan log
ESET Online Scan log
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 9 Posted December 11, 2014
Quote
Emsisoft Antimalware is a reputable programme. Far better than Comodo in my (and the security communities') opinion.
And I believe you have the paid-for version?
No. I downloaded the free version following directions on Bleepingcomputer for supposedly getting rid of the proxy changes the PastaLeads malware had made. I have no reason to keep it. It's not my computer and I am satisfied with Comodo on my own computer anyway. I haven't had any problems with malware or viruses on my own computer for a very long time.
Quote
Did you have AdwCleaner remove the items detected by clicking Clean? I see you've attached the report (AdwCleaner[R0].txt) created prior to clicking Clean.
I believe I did. Don't know what happened there. Maybe I clicked to save the text report before clicking clean. I did another scan and nothing came up in the results, so I must have clicked clean the first time. Sorry about that.
Quote
Have you considered sticking with the Windows 8 Firewall? It's more than sufficient, and will use far less resources.
I wouldn't know how good the Windows 8 Firewall is. I know how bad it was in XP and if Windows 7 has one, I don't use it. Perhaps I could use it instead.
Perhaps that would help solve the problem I found when I installed Comodo on this laptop. I apparently installed it from either the wrong link or something went wrong and I ended up with Antivirus with no firewall, which shouldn't have happened. Perhaps Avira would be satisfactory for this kid's laptop instead of Comodo. Comodo is too complex and too advanced for her laptop.
Quote
Instructions on how to backup your Favourites/Bookmarks and other data can be found below.
Don't need to worry about this. For some reason my friend and his family don't use bookmarks much. Me, I'm drowning in them. I have a hard time understanding how anyone can stand to have a taskbar covered in links or type in every single website they want to visit. Seems such a waste of time and space when you can have folders on a bookmarks bar and use one click to go to a site.
Anyway, Browser reset done. No problems.
The Eset scanner has developed a problem. It gets to 32% and stops scanning. I cancelled and tried to redo the scan twice and it stops at the same area each time. It stops at the WildTangent folder. The Antivirus is off, so I don't know what is going on.
What do I do now? It does pick up 6 results before it gets to the WildTangent folder and freezes.
No results from Malwarebytes.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 10 Posted December 12, 2014
Hi Troy,
Quote
I wouldn't know how good the Windows 8 Firewall is.
I suggest reading the following article on Firewalls.
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/?p=2475503
Quote
What do I do now?
Try stopping and restarting the scan.
If the scan still does not complete within a timely manner, try this alternative scan.
Please let me know how the PC is performing afterwards.
3GlqbMn.png HitmanPro
Please download HitmanPro (x64) and save the file to your Desktop.
Right-Click HitmanPro_x64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Next, and agree to the End User License Agreement (EULA) if prompted.
Place a checkmark next to No, I only want to perform a one-time scan to check this computer.
Click Next.
The scan will start, and will typically take no longer than 2-3 minutes.
Upon completion, click on the drop-down menu of the found entries (if any) and select: Apply to all => Ignore <=.
Click Next.
Click Save Log, and select your Desktop as the location. Copy the contents of the log and paste in your next reply.
Note: If a drop-down menu is not present after the scan is complete, please do not delete the detected items. Close the HitmanPro window. Navigate to C:\ProgramData\HitmanPro\Logs, open the log, copy the contents and paste in your next reply.
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 11 Posted December 12, 2014
Quote
Try stopping and restarting the scan.
I rebooted the computer and ran it again. Took over three hours and had to run it again because I forgot to uncheck "Remove items found". Second scan took over 2 hours.
Did HitmanPro scan as well and it found very little.
Computer is currently working like it's brand new.
Here are the logs.
You don't know of a way to remove two entries from the Windows 8 Services do you?
I had to use a removal tool for McAfee because some of it remained behind when I uninstalled it from this laptop. At the end of using the tool, I got a window with a message like "Uninstalling Incomplete". The two services have apparently been removed as they are gone now from the Task Manager, but their entries remain in the Services list.
I assume to get rid of the entries I need to find something in the registry? The entries are McAfee Firewall Core Service and McAfee Validation Trust Protection Service.
The descriptions say <Failed to Read Description. Error Code: 2>
HitmanPro_20141212_0328.log
MyEsetScan.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 12 Posted December 12, 2014
Hello Troy,
Quote
Computer is currently working like it's brand new.
Excellent.
Quote
You don't know of a way to remove two entries from the Windows 8 Services do you?
Yes, we can remove these.
Please run a fresh FRST scan first.
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan
Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Yes to the disclaimer.
Ensure the Addition.txt box is checked.
Click the Scan button and let the programme run.
Upon completion, click OK, then OK on the Addition.txt pop up screen.
Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply.
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 13 Posted December 12, 2014
I'm using the laptop to answer for once. I think I'll keep using the attachments. Seems a lot cleaner and more easy to read that way.
Addition.txt
FRST.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 14 Posted December 12, 2014
Hi Troy,
Please do the following.
STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script
Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type Notepad and click OK.
Copy the entire contents of the codebox below and paste into the Notepad document.
startCloseProcesses:C:\Program Files (x86)\Common Files\Common dictionary\node\conf.jsC:\Users\Lauren\Desktop\revosetup.exeC:\Users\Lauren\Downloads\ccsetup418.exeC:\$Recycle.Bin\S-1-5-21-4180364761-169256126-1362377442-1001\$R72XHAD.exeC:\$Recycle.Bin\S-1-5-21-4180364761-169256126-1362377442-1001\$RQQYEZ9.exeC:\ProgramData\InstallSightSDKC:\ProgramData\eBiQOtKELfS3 mfencrk; C:\Windows\system32\DRIVERS\mfencrk.sys [96592 2014-07-24] (McAfee, Inc.)C:\Windows\system32\DRIVERS\mfencrk.sysS3 cleanhlp; \??\C:\Program Files (x86)\Emsisoft Anti-Malware\cleanhlp64.sys [X]CMD: ipconfig /flushdnsEmptyTemp:end
Click File, Save As and type fixlist.txt as the File Name.
Important: The file must be saved in the same location as FRST64.exe.
NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.
Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Click Fix.
A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply.
STEP 2
YjhLJro.png SystemLook
Please download SystemLook (x64) and save the file to your Desktop.
Right-Click SystemLook_x64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
Copy the entire contents of the codebox below and paste into the textfield.
:filefind*McAfee*:folderfind*McAfee*:regfindMcAfee
Click the Ji0XpU4.png button to start the scan.
Upon completion, a log (SystemLook.txt) will open. Copy the contents of the log and paste in your next reply.
Click the OCFv7xc.png button.
======================================================
STEP 3
xpfNZP4A.png.pagespeed.ic.bp5cRl1pJg.jpg Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.
Fixlog.txt
SystemLook.txt
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 15 Posted December 12, 2014
Don't be surprised by the results in the Fixlog.txt. I stumbled across the Downloads folder on the laptop and deleted the .exe files that were in there figuring they were just a waste of space. I intend to securely delete them using Ccleaner if that's ok.
I was shocked by the results of the SystemLook.
Fixlog.txt
SystemLook.txt
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 16 Posted December 13, 2014
Hello Troy,
Which McAfee reCall at +1-888-720-3203moval tool did you run?
Which version of McAfee did you have installed?
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 17 Posted December 13, 2014
On 13/12/2014 at 11:01 PM, LiquidTension said:
Hello Troy,
Which McAfee removal tool did you run?
Which version of McAfee did you have installed?
According to the online Specs for the laptop, this is what I have here. http://h10025.www1.hp.com/ewfrf/wc/document?docname=c04272271&tmp_task=prodinfoCategory&cc=us&dlc=en〈=en&lc=en&product=7124129
It says it came with a Free 30-day Trial of McAfee LiveSafe service included.
Had to look for the tool again. The laptop / notebook for some reason emptied the recycle bin on it's own.
I probably ran this. http://www.majorgeeks.com/files/details/mcafee_consumer_product_removal_tool.html
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 18 Posted December 14, 2014
Hi Troy,
Nothing significant that's related to McAfee has been left over.
So I wouldn't worry any about it.
Lets update the vulnerable software to reduce the risk of reinfection.
STEP 1
CXrghb6.png Update Outdated Software
Outdated software contain security risks that must be patched. Please download and install the latest version of the programmes below.
3bWY3LP.png Adobe Shockwave Player
U5NwUGc.png Google Chrome
u9DsAVv.png Follow these instructions to check for and download the latest Windows Updates.
STEP 2
oxliOQk.png Security Check
Please download SecurityCheck and save the file to your Desktop.
Double-click SecurityCheck.exe and follow the onscreen instructions inside the black box.
A log (checkup.txt) will automatically open on your Desktop.
Copy the contents of the log and paste in your next reply.
======================================================
STEP 3
pfNZP4A.png LogsCall at +1-888-720-3203
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.
checkup.txt
How is your computer performing? Are there any outstanding issues?
Guest SherlockTAS
Topic Starter
Guest SherlockTAS
Guests
ID: 19 Posted December 14, 2014
Adobe Shockwave Player and Google Chrome updated. Installed 1 critical update on Windows Update. It claims there are 3 optional ones available. All three have generic descriptions as usual. Here are links to info on these three optional updates. What's your opinion of them, because I don't understand this Windows 8 very well yet.
http://support.microsoft.com/kb/3000850
http://support.microsoft.com/kb/3013769
http://support.microsoft.com/kb/3013816
Here is the log. I may uninstall Bitdefender. It may be one of the best Antivirus programs out there, but the interface is blunt and not user-friendly at all. It told me it detected some things and I am still not sure if I found a list yet, beyond the lousy description in the logs. Avira free seemed too plain and lacked features, so I passed on it. Everything I've looked at so far makes me prefer Comodo.
Results of screen317's Security Check version 0.99.93
x64 (UAC is enabled)
Internet Explorer 11
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Bitdefender Antivirus Free Edition
Antivirus up to date!
`````````Anti-malware/Other Utilities Check:`````````
MVPS Hosts File
Google Chrome (39.0.2171.95)
````````Process Check: objlist.exe by Laurent````````
Bitdefender Antivirus Free Edition gzserv.exe
Bitdefender Antivirus Free Edition gziface.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: %
````````````````````End of Log``````````````````````
So far the computer is functioning very well. No problems to report as I sort out things on the computer to make it more user-friendly. Installed Classic Shell so it would have a start menu again. Am I free to delete all the programs we downloaded yet?
I have to create a "Recovery set" yet so the exclamation mark goes away from the HP Support Assistant.
What exactly is OneDrive sync and can it be disabled? It always says files can't sync and I understand that this is a common problem, but I don't know what it's for. I understand it has something to do with sharing files in the cloud, but I know nothing about how that works nor why my friend's daughter would be likely to use it.
LiquidTension
Malwarebytes Staff
LiquidTension
Moderators
2,364 posts
ID: 20 Posted December 14, 2014
Hi Troy,
Quote
It claims there are 3 optional ones available. All three have generic descriptions as usual. Here are links to info on these three optional updates. What's your opinion of them, because I don't understand this Windows 8 very well yet.
I would go ahead and install the optional updates. There's no harm in doing so.
Quote
It may be one of the best Antivirus programs out there
Have a read of the following article on picking an Anti-Virus:
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/?p=2316629
Quote
Am I free to delete all the programs we downloaded yet?
Instructions on how to do so below.
Quote
What exactly is OneDrive sync and can it be disabled?
OneDrive (from Microsoft) is free online storage solution across multiple platforms (PC, tablet, mobile device, etc).
OneDrive will sync files stored to all devices connected, allowing seamless accessibility no matter what device you're using.
If OneDrive is not used, it can be disabled.
----------------
At this stage, I think we're just about all set.
All Clean!
Congratulations, your computer appears clean! :)
I no longer see signs of malware on your computer, and feel satisfied that our work here is done. The steps below will remove the tools we have used, and reset any settings changed. I have also provided a list of resources and tools that you may find useful.
My help will always be free. But if you are happy with the help provided, and would like to support my fight against malware and/or buy me a beer, please consider a donation. YSCcjW7.png
AFZxnZc.jpg DelFix
Please download DelFix and save the file to your Desktop.
Double-click DelFix.exe to run the programme.
Place a checkmark next to the following items:
Activate UAC
Remove disinfection tools
Create registry backup
Purge system restore
Reset system settings
Click the Run button.
-- This will remove the specialised tools we used to disinfect your system. Any leftover logs, files, folders or tools remaining on your Desktop which were not removed can be deleted manually (right-click the file + delete).
======================================================
I have compiled below a list of resources you may find useful. The articles document information on computer security, common infection vectors and how you can stay safe on the Internet.
Answers to common security questions - Best Practices by quietman7, MVP
How Malware Spreads - How did I get infected? by quietman7, MVP
Simple and easy ways to keep your computer safe and secure on the Internet by Lawrence Abrams, MVP
How to Prevent Malware by miekiemoes, MVP
How to backup and restore your data using Cobian Backup by YourHighness
Slow Computer/browser? It May Not Be Malware by quietman7, MVP
The following programmes come highly recommended in the security community.
xKsUqI5A.png.pagespeed.ic.vn1Hlvqi8h.jpg AdBlock is a browser add-on that blocks annoying banners, pop-ups and video ads.
E8I37RF.pngCryptoPrevent places policy restrictions on loading points for ransomware (eg. CryptoWall), helping prevent the execution of malware.
EG85Vjt.png Malwarebytes Anti-Exploit (MBAE) is designed to prevent zero-day malware from exploiting vulnerable software.
x6YRrgUC.png.pagespeCall at +1-888-720-3203ic.HjgFxjvw2Z.jpg Malwarebytes Anti-Malware Premium (MBAM) works in real-time along side your Anti-Virus to prevent malware execution.
xjv4nhMJ.png.pagespeed.ic.A5YbWn1eDO.png NoScript is a Firefox add-on that blocks the actions of malicious scripts by using whitelisting and other technology.
3O8r9Uq.png Sandboxie isolates programmes of your choice, preventing files from being written to your HDD unless approved by you.
DgW1XL2.png.pagespeed.ce.v1OlJl_ZAS.png Secunia PSI will scan your computer for vulnerable software that is outdated, and automatically find the latest update for you.
xj1OLIec.png.pagespeed.ic.k6hhwopU0q.jpg SpywareBlaster is a form of passive protection, designed to block the actions of malicious websites and tracking cookies.
xJEP5iWI.png.pagespeed.ic.4tmM1lM7DQ.png Web of Trust (WOT) is a browser add-on designed to alert you before interacting with a potentially malicious website.
-- Please feel free to ask if you have any questions or concerns on computer security or the programmes above.
======================================================
Please confirm you have no outstanding issues, and are happy with the state of your computer. Once I have confirmation things are in order, we can wrap things up and I will close this thread.
I installed the three updates and used the DelFix.exe program and everything seems to be working just fine.
I will mark this topic as solved.
All the best,
Adam
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 23 Posted December 16, 2014
Glad we could help. :)
If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.
Other members who need assistance please start your own topic in a new thread. Thanks!
"Bad Image" errors after running Malwarebytes to clean up infections
Started by eajack, April 1, 2014
24 posts in this topic
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 1 Posted April 1, 2014
This computer was infected with some sort of malware after clicking on an attachment in an email. I tried running SEP full scans and then Malwarebytes scans to clean it up, which usually work fine. Many infections were found and removed. However, now every time the computer is rebooted or a program is run, Windows is throwing a "Bad Image" error. Clicking OK closes the error, and the programs work, but the errors are very annoying. Is there some way to correct this problem?
Error example:
iexplore.exe - Bad Image
C:\PROGRA~2\Wincert\WIN32C~1.DLL is either not designed to run on Windows or it contains an error. Try installing the program again using the original installation media or contact your system administrator or the software vendor for support.
Regards,
Eric
Logs attached:
attach.txt
dds.txt
B-boy/StyLe/Call at +1-888-720-3203
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 2 Posted April 1, 2014
Hello! Welcome to Malwarebytes Forums! welcome.gif
My name is Georgi and and I will be helping you with your computer problems.
Before we begin, please note the following:
I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
The logs can take some time to research, so please be patient with me.
Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
Instructions that I give are for your system only!
Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.
Please download Farbar Recovery Scan Tool and save it to your desktop.
Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 3 Posted April 1, 2014
Georgi, thanks for your help. Please see below for the FRST and Addition logs.
Regards,
Eric
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 13-03-2014 01
Ran by dfiore (administrator) on LT-DFIORE on 01-04-2014 15:48:07
Running from C:\Users\dfiore\Desktop
Microsoft Windows 7 Professional Service Pack 1 (X86) OS Language: English(US)
Internet Explorer Version 11
Boot Mode: Normal
The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/
==================== Processes (Whitelisted) =================
(Cisco Systems, Inc.) C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe
(Microsoft Corporation) C:\Windows\system32\WLANExt.exe
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\WLTRYSVC.EXE
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\bcmwltry.exe
(Intel® Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\Smc.exe
(Microsoft Corporation) C:\Windows\system32\wbem\unsecapp.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
(Intel Corporation) C:\Program Files\Intel\Intel® Management Engine Components\UNS\UNS.exe
(Symantec Corporation) C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe
(Intel Corporation) C:\Program Files\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Renesas Electronics Corporation) C:\Program Files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe
(Dell Inc.) C:\Program Files\Dell\DW WLAN Card\WLTRAY.EXE
(Cisco Systems, Inc.) C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe
(Dropbox, Inc.) C:\Users\dfiore\AppData\Roaming\Dropbox\bin\Dropbox.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Adobe Systems Incorporated) C:\Windows\system32\Macromed\Flash\FlashUtil32_12_0_0_77_ActiveX.exe
(Microsoft CorporationCall at +1-888-720-3203C:\Windows\System32\MsSpellCheckingFacility.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Windows\system32\AUDIODG.EXE
==================== Registry (Whitelisted) ==================
HKLM\...\Run: [uSB3MON] - C:\Program Files\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-02-27] (Intel Corporation)
HKLM\...\Run: [NUSB3MON] - C:\Program Files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe [113288 2010-11-17] (Renesas Electronics Corporation)
HKLM\...\Run: [broadcom Wireless Manager UI] - C:\Program Files\Dell\DW WLAN Card\WLTRAY.exe [6803968 2012-06-14] (Dell Inc.)
HKLM\...\Run: [Adobe ARM] - C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM\...\Run: [Cisco AnyConnect Secure Mobility Agent for Windows] - C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe [523216 2011-08-03] (Cisco Systems, Inc.)
HKLM\...\Run: [Logitech Download Assistant] - C:\Windows\System32\LogiLDA.dll [1425208 2012-09-20] (Logitech, Inc.)
HKLM\...\Run: [RadioRage EPM Support] - C:\Program Files\RadioRage_4j\bar\1.bin\4jmedint.exe [12872 2013-12-20] (Mindspark Interactive Network, Inc.)
Winlogon\Notify\SEP: C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\WinLogoutNotifier.dll [X]
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL => C:\ProgramData\Wincert\win32cert.dll [7168 2013-11-04] ()
IFEO\bitguard.exe: [Debugger] tasklist.exe
IFEO\bprotect.exe: [Debugger] tasklist.exe
IFEO\bpsvc.exe: [Debugger] tasklist.exe
IFEO\browsemngr.exe: [Debugger] tasklist.exe
IFEO\browserdefender.exe: [Debugger] tasklist.exe
IFEO\browsermngr.exe: [Debugger] tasklist.exe
IFEO\browserprotect.exe: [Debugger] tasklist.exe
IFEO\browsersafeguard.exe: [Debugger] tasklist.exe
IFEO\bundlesweetimsetup.exe: [Debugger] tasklist.exe
IFEO\cltmngsvc.exe: [Debugger] tasklist.exe
IFEO\delta babylon.exe: [Debugger] tasklist.exe
IFEO\delta tb.exe: [Debugger] tasklist.exe
IFEO\delta2.exe: [Debugger] tasklist.exe
IFEO\deltainstaller.exe: [Debugger] tasklist.exe
IFEO\deltasetup.exe: [Debugger] tasklist.exe
IFEO\deltatb.exe: [Debugger] tasklist.exe
IFEO\deltatb_2501-c733154b.exe: [Debugger] tasklist.exe
IFEO\dprotectsvc.exe: [Debugger] tasklist.exe
IFEO\iminentsetup.exe: [Debugger] tasklist.exe
IFEO\protectedsearch.exe: [Debugger] tasklist.exe
IFEO\rjatydimofu.exe: [Debugger] tasklist.exe
IFEO\searchprotection.exe: [Debugger] tasklist.exe
IFEO\searchprotector.exe: [Debugger] tasklist.exe
IFEO\snapdo.exe: [Debugger] tasklist.exe
IFEO\stinst32.exe: [Debugger] tasklist.exe
IFEO\stinst64.exe: [Debugger] tasklist.exe
IFEO\sweetimsetup.exe: [Debugger] tasklist.exe
IFEO\tbdelta.exetoolbar783881609.exe: [Debugger] tasklist.exe
IFEO\utiljumpflip.exe: [Debugger] tasklist.exe
Startup: C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk
ShortcutTarget: Dropbox.lnk -> C:\Users\dfiore\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.)
Startup: C:\Users\ksobczyk\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Logitech . Product Registration.lnk
ShortcutTarget: Logitech . Product Registration.lnk -> C:\Program Files\Common Files\Logishrd\eReg\SetPoint\eReg.exe (Leader Technologies/Logitech)
HKLM\...\AppCertDlls: [x64] -> c:\program files\music toolbar\datamngr\x64\apcrtldr.dll <===== ATTENTION
HKLM\...\AppCertDlls: [x86] -> C:\Program Files\Music Toolbar\Datamngr\apcrtldr.dll <===== ATTENTION
==================== Internet (Whitelisted) ====================
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.com/
HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
URLSearchHook: HKCU - (No Name) - {3c35ad63-af1d-4e21-b484-b6651a8efcf9} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
SearchScopes: HKLM - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask.com/search/GGmain.jhtml?p2=^ZX^xdm039^YYA^us&si=radiopi&ptb=D20A7F93-E7EA-4874-B5A0-D1A3E32CF55B&ind=2013122010&n=77fdcdda&psa=&st=sb&searchfor={searchTerms}
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.ask.com/sr?src=ieb&gct=ds&appid=1239&systemid=2&v=a11465-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
SearchScopes: HKCU - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask.com/search/GGmain.jhtml?p2=^ZX^xdm039^YYA^us&si=radiopi&ptb=D20A7F93-E7EA-4874-B5A0-D1A3E32CF55B&ind=2013122010&n=77fdcdda&psa=&st=sb&searchfor={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.ask.com/sr?src=ieb&gct=ds&appid=1239&systemid=2&v=a11465-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
BHO: Toolbar BHO - {48909954-14fb-4971-a7b3-47e7af10b38a} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
BHO: Search Assistant BHO - {5848763c-2668-44ca-adbe-2999a6ee2858} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\bin\IPS\IPSBHO.DLL (Symantec Corporation)
BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO: DialIEBHO Class - {E14EB96C-AC90-45BE-9FDE-37C5652F1A65} - C:\Program Files\Mitel\Unified Communicator Advanced 4.1\DialIE.dll (Mitel Networks Corporation)
Toolbar: HKLM - RadioRage - {78ba36c9-6036-482b-b48d-ecca6f964b84} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} https://secure.logmein.com//activex/ractrl.cab?lmi=1007
Tcpip\Parameters: [DhcpNameServer] 10.16.64.59
Chrome:
=======
CHR DefaultSearchKeyword: ask.com
CHR DefaultSearchProvider: Ask.com
CHR DefaultSearchURL: http://dts.search.ask.com/sr?src=crb&gct=ds&appid=1239&systemid=2&v=u10666-202&apn_uid=0516841430644234&apn_dtid=IME002&o=APN10641&apn_ptnrs=AG2&q={searchTerms}
CHR DefaultNewTabURL:
CHR Plugin: (Shockwave Flash) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\PepperFlash\pepflashplayer.dll ()
CHR Plugin: (Chrome Remote Desktop Viewer) - internal-remoting-viewer
CHR Plugin: (Native Client) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\ppGoogleNaClPluginChrome.dll ()
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files\Google\Chrome\Application\33.0.1750.154\pdf.dll ()
CHR Plugin: (Adobe Acrobat) - C:\Program Files\Adobe\Reader 11.0\Reader\Browser\nppdf32.dll (Adobe Systems Inc.)
CHR Plugin: (Google Update) - C:\Program Files\Google\Update\1.3.21.153\npGoogleUpdate3.dll No File
CHR Plugin: (Intel® Identity Protection Technology) - C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation)
CHR Plugin: (Intel® Identity Protection Technology) - C:\Program Files\Intel\Intel® Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation)
CHR Extension: (Music Box Toolbar) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd [2013-12-23]
CHR Extension: (YouTube) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2013-08-14]
CHR Extension: (Google Search) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2013-08-14]
CHR Extension: (Google Wallet) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-08-22]
CHR Extension: (Gmail) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2013-08-14]
CHR HKLM\...\Chrome\Extension: [aaaaiihjniipljfegaknmbkneamnoajd] - C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx [2013-08-20]
========================== Services (Whitelisted) =================
S3 cphs; C:\Windows\system32\IntelCpHeciSvc.exe [276248 2012-02-08] (Intel Corporation)
R2 Intel® Capability Licensing Service Interface; C:\Program Files\Intel\iCLS Client\HeciServer.exe [458464 2012-02-02] (Intel® Corporation)
R2 jhi_service; C:\Program Files\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [161560 2012-02-28] (Intel Corporation)
S2 RadioRage_4jService; C:\Program Files\RadioRage_4j\bar\1.bin\4jbarsvc.exe [88648 2013-12-20] ()
R2 SepMasterService; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\ccSvcHst.exe [137224 2011-06-17] (Symantec Corporation)
R3 SmcService; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\Smc.exe [1664744 2011-06-17] (Symantec Corporation)
S3 SNAC; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\snac.exe [280496 2011-06-17] (Symantec Corporation)
R2 vpnagent; C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe [468432 2011-08-03] (Cisco Systems, Inc.)
R2 wltrysvc; C:\Program Files\Dell\DW WLAN Card\bcmwltry.exe [5512192 2012-06-14] (Dell Inc.)
==================== Drivers (Whitelisted) ====================
S3 acsock; C:\Windows\System32\DRIVERS\acsock.sys [77968 2011-08-03] (Cisco Systems, Inc.)
R3 BCM42RLY; C:\Windows\System32\drivers\BCM42RLY.sys [18536 2012-06-14] (Broadcom Corporation)
R1 BHDrvx86; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\BASHDefs\20140319.011\BHDrvx86.sys [1098968 2014-04-01] (Symantec Corporation)
R3 e1cexpress; C:\Windows\System32\DRIVERS\e1c6232.sys [280744 2011-11-30] (Intel Corporation)
R1 eeCtrl; C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys [376920 2013-11-21] (Symantec Corporation)
R3 EraserUtilRebootDrv; C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [108120 2013-11-21] (Symantec Corporation)
R1 IDSVix86; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\IPSDefs\20140331.001\IDSvix86.sys [395992 2014-03-25] (Symantec Corporation)
R0 iusb3hcs; C:\Windows\System32\DRIVERS\iusb3hcs.sys [13592 2012-02-27] (Intel Corporation)
R3 iusb3hub; C:\Windows\System32\DRIVERS\iusb3hub.sys [348440 2012-02-27] (Intel Corporation)
R3 iusb3xhc; C:\Windows\System32\DRIVERS\iusb3xhc.sys [792856 2012-02-27] (Intel Corporation)
S3 LEqdUsb; C:\Windows\System32\Drivers\LEqdUsb.Sys [43704 2012-09-18] (Logitech, Inc.)
S3 LHidEqd; C:\Windows\System32\Drivers\LHidEqd.Sys [12216 2012-09-18] (Logitech, Inc.)
R3 MEI; C:\Windows\System32\DRIVERS\HECI.sys [46080 2011-11-10] (Intel Corporation)
R3 NAVENG; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\VirusDefs\20140401.002\NAVENG.SYS [93272 2014-03-08] (Symantec Corporation)
R3 NAVEX15; C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Data\Definitions\VirusDefs\20140401.002\NAVEX15.SYS [1612376 2014-03-08] (Symantec Corporation)
R1 SRTSP; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SRTSP.SYS [516216 2011-06-17] (Symantec Corporation)
R1 SRTSPX; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SRTSPX.SYS [50168 2011-06-17] (Symantec Corporation)
R0 stdcfltn; C:\Windows\System32\DRIVERS\stdcfltn.sys [17904 2011-07-15] (ST Microelectronics)
R3 ST_ACCEL; C:\Windows\System32\DRIVERS\ST_ACCEL.sys [59888 2011-11-04] (STMicroelectronics)
S3 SyDvCtrl; C:\Program Files\Symantec\Symantec Endpoint Protection\12.1.671.4971.105\Bin\SyDvCtrl32.sys [23984 2011-06-17] (Symantec Corporation)
R0 SymDS; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMDS.SYS [340088 2011-06-17] (Symantec Corporation)
R0 SymEFA; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMEFA.SYS [756856 2011-06-17] (Symantec Corporation)
R3 SymEvent; C:\Windows\system32\Drivers\SYMEVENT.SYS [127096 2012-12-05] (Symantec Corporation)
R1 SymIRON; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\Ironx86.SYS [136312 2011-06-17] (Symantec Corporation)
R1 SYMNETS; C:\Windows\System32\Drivers\SEP\0C01029F\136B.105\x86\SYMNETS.SYS [299640 2011-06-17] (Symantec Corporation)
R1 SysPlant; C:\Windows\System32\Drivers\SysPlant.sys [92080 2012-12-05] (Symantec Corporation)
R1 Teefer2; C:\Windows\System32\DRIVERS\Teefer.sys [50096 2011-06-17] (Symantec Corporation)
U3 mbr; \??\C:\Users\dfiore\AppData\Local\Temp\mbr.sys [X]
==================== NetSvcs (Whitelisted) ===================
==================== One Month Created Files and Folders ========
2014-04-01 15:48 - 2014-04-01 15:48 - 00015763 _____ () C:\Users\dfiore\Desktop\FRST.txt
2014-04-01 15:47 - 2014-04-01 15:48 - 00000000 ____D () C:\FRST
2014-04-01 15:46 - 2014-04-01 15:46 - 01145856 _____ (Farbar) C:\Users\dfiore\Desktop\FRST.exe
2014-04-01 14:07 - 2014-04-01 14:07 - 00688992 ____R (Swearware) C:\Users\dfiore\Downloads\dds.scr
2014-04-01 14:07 - 2014-04-01 14:07 - 00013275 _____ () C:\Users\dfiore\Desktop\dds.txt
2014-04-01 14:07 - 2014-04-01 14:07 - 00009927 _____ () C:\Users\dfiore\Desktop\attach.txt
2014-03-31 16:13 - 2014-03-31 17:11 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 16:12 - 2014-03-31 17:47 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-03-31 16:12 - 2014-03-31 16:12 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 16:12 - 2014-03-05 09:26 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-31 16:12 - 2014-03-05 09:26 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-31 16:12 - 2014-03-05 09:26 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 16:08 - 2014-03-31 16:08 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Malwarebytes
2014-03-31 16:07 - 2014-03-31 16:12 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-12 01:30 - 2014-03-01 00:30 - 17074688 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-12 01:30 - 2014-03-01 00:11 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-12 01:30 - 2014-03-01 00:10 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-03-12 01:30 - 2014-02-28 23:52 - 00061952 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-03-12 01:30 - 2014-02-28 23:51 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-03-12 01:30 - 2014-02-28 23:47 - 02168320 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-03-12 01:30 - 2014-02-28 23:43 - 00043008 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-03-12 01:30 - 2014-02-28 23:43 - 00032768 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-03-12 01:30 - 2014-02-28 23:40 - 00440832 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-03-12 01:30 - 2014-02-28 23:38 - 00112128 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-03-12 01:30 - 2014-02-28 23:38 - 00108032 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-03-12 01:30 - 2014-02-28 23:37 - 00553472 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-03-12 01:30 - 2014-02-28 23:31 - 00646144 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-03-12 01:30 - 2014-02-28 23:25 - 00208896 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-03-12 01:30 - 2014-02-28 23:16 - 00164864 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-03-12 01:30 - 2014-02-28 23:14 - 04244480 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-03-12 01:30 - 2014-02-28 23:03 - 00524288 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-03-12 01:30 - 2014-02-28 23:00 - 01964032 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-03-12 01:30 - 2014-02-28 22:57 - 11266048 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-03-12 01:30 - 2014-02-28 22:32 - 01820160 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-03-12 01:30 - 2014-02-28 22:27 - 01156096 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-03-12 01:30 - 2014-02-28 22:25 - 00703488 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-03-12 01:30 - 2014-02-06 21:07 - 02349056 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-03-12 01:30 - 2014-02-03 22:04 - 01230336 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll
2014-03-12 01:30 - 2014-02-03 22:04 - 00509440 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll
2014-03-12 01:30 - 2014-01-28 22:06 - 00381440 _____ (Microsoft Corporation) C:\Windows\system32\wer.dll
2014-03-12 01:30 - 2014-01-27 22:07 - 00185344 _____ (Microsoft Corporation) C:\Windows\system32\wwansvc.dll
==================== One Month Modified Files and Folders =======
2014-04-01 15:48 - 2014-04-01 15:48 - 00015763 _____ () C:\Users\dfiore\Desktop\FRST.txt
2014-04-01 15:48 - 2014-04-01 15:47 - 00000000 ____D () C:\FRST
2014-04-01 15:46 - 2014-04-01 15:46 - 01145856 _____ (Farbar) C:\Users\dfiore\Desktop\FRST.exe
2014-04-01 15:30 - 2013-01-02 16:58 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-04-01 15:15 - 2012-12-04 16:05 - 01626720 _____ () C:\Windows\WindowsUpdate.log
2014-04-01 15:02 - 2013-08-14 08:25 - 00000886 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-04-01 14:07 - 2014-04-01 14:07 - 00688992 ____R (Swearware) C:\Users\dfiore\Downloads\dds.scr
2014-04-01 14:07 - 2014-04-01 14:07 - 00013275 _____ () C:\Users\dfiore\Desktop\dds.txt
2014-04-01 14:07 - 2014-04-01 14:07 - 00009927 _____ () C:\Users\dfiore\Desktop\attach.txt
2014-04-01 14:05 - 2013-11-18 16:46 - 00000000 ___RD () C:\Users\dfiore\Dropbox
2014-04-01 14:05 - 2013-11-18 16:43 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Dropbox
2014-04-01 14:04 - 2012-12-05 14:56 - 00000104 _____ () C:\Windows\system32\config\netlogon.ftl
2014-04-01 13:35 - 2009-07-14 00:34 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-01 13:35 - 2009-07-14 00:34 - 00021312 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-01 13:34 - 2013-08-14 08:25 - 00000882 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-04-01 13:33 - 2010-11-20 17:01 - 00782470 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-01 13:28 - 2009-07-14 00:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-01 13:28 - 2009-07-14 00:39 - 00029943 _____ () C:\Windows\setupact.log
2014-03-31 17:48 - 2013-08-05 10:32 - 00000000 ____D () C:\Users\dfiore
2014-03-31 17:47 - 2014-03-31 16:12 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-03-31 17:47 - 2013-08-05 10:01 - 00000000 ____D () C:\Users\Administrator
2014-03-31 17:47 - 2012-12-05 16:56 - 00000000 ____D () C:\Users\ksobczyk
2014-03-31 17:47 - 2012-12-05 15:04 - 00000000 ____D () C:\Users\ejack-a
2014-03-31 17:47 - 2012-12-04 16:06 - 00000000 ____D () C:\Users\IT Dept
2014-03-31 17:47 - 2010-11-20 20:47 - 00000000 ___RD () C:\Users\Public\Recorded TV
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\system32\wfp
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\registration
2014-03-31 17:47 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\AppCompat
2014-03-31 17:22 - 2010-11-20 17:48 - 00452442 _____ () C:\Windows\PFRO.log
2014-03-31 17:11 - 2014-03-31 16:13 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 17:01 - 2013-12-20 12:24 - 00000000 ____D () C:\Program Files\Music Toolbar
2014-03-31 16:12 - 2014-03-31 16:12 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 16:12 - 2014-03-31 16:07 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-31 16:08 - 2014-03-31 16:08 - 00000000 ____D () C:\Users\dfiore\AppData\Roaming\Malwarebytes
2014-03-19 03:01 - 2013-08-05 10:36 - 00000000 ____D () C:\Windows\system32\MRT
2014-03-19 03:00 - 2012-12-05 13:13 - 87350280 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-03-15 06:58 - 2013-08-14 08:25 - 00002129 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-03-12 03:17 - 2009-07-14 00:33 - 00303528 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-03-12 03:01 - 2012-12-06 11:17 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-03-12 01:30 - 2013-01-02 16:58 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-03-12 01:30 - 2013-01-02 16:58 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-03-05 09:26 - 2014-03-31 16:12 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-05 09:26 - 2014-03-31 16:12 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-05 09:26 - 2014-03-31 16:12 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
Some content of TEMP:
====================
C:\Users\dfiore\AppData\Local\Temp\BundleSweetIMSetup.exe
C:\Users\dfiore\AppData\Local\Temp\Delta.exe
C:\Users\dfiore\AppData\Local\Temp\DeltaTB.exe
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.dll
C:\Users\dfiore\AppData\Local\Temp\MybabylonTB.exe
C:\Users\dfiore\AppData\Local\Temp\smses.exe
C:\Users\dfiore\AppData\Local\Temp\WSSetup.exe
C:\Users\ksobczyk\AppData\Local\Temp\LMkRstPt.exe
C:\Users\ksobczyk\AppData\Local\Temp\SearchWithGoogleUpdate.exe
==================== Bamital & volsnap Check =================
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit
LastRegBack: 2014-03-30 00:23
==================== End Of Log ============================
Additional scan result of Farbar Recovery Scan Tool (x86) Version: 13-03-2014 01
Ran by dfiore at 2014-04-01 15:48:26
Running from C:\Users\dfiore\Desktop
Boot Mode: Normal
==========================================================
==================== Security Center ========================
AV: Symantec Endpoint Protection (Enabled - Up to date) {63DF5164-9100-186D-2187-8DC619EFD8BF}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Symantec Endpoint Protection (Enabled - Up to date) {D8BEB080-B73A-17E3-1B37-B6B462689202}
FW: Symantec Endpoint Protection (Enabled) {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
==================== Installed Programs ======================
2007 Microsoft Office Suite Service Pack 3 (SP3) (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{6E107EB7-8B55-48BF-ACCB-199F86A2CD93}) (Version: - Microsoft)
2007 Microsoft Office Suite Service Pack 3 (SP3) (Version: - Microsoft) Hidden
Adobe Digital Editions 2.0 (HKLM\...\Adobe Digital Editions 2.0) (Version: 2.0 - Adobe Systems Incorporated)
Adobe Flash Player 12 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 12.0.0.77 - Adobe Systems Incorporated)
Adobe Reader XI (11.0.06) (HKLM\...\{AC76BA86-7AD7-1033-7B44-AB0000000001}) (Version: 11.0.06 - Adobe Systems Incorporated)
Cisco AnyConnect Secure Mobility Client (HKLM\...\Cisco AnyConnect Secure Mobility Client) (Version: 3.0.3054 - Cisco Systems, Inc.)
Cisco AnyConnect Secure Mobility Client (Version: 3.0.3054 - Cisco Systems, Inc.) Hidden
Citrix Online Launcher (HKLM\...\{AC7E7905-8C59-4806-A96D-30936A2B1FC5}) (Version: 1.0.168 - Citrix)
Dropbox (HKCU\...\Dropbox) (Version: 2.4.11 - Dropbox, Inc.)
DW WLAN Card Utility (HKLM\...\DW WLAN Card Utility) (Version: 5.100.82.142 - Dell Inc.)
eReg (Version: 1.20.138.34 - Logitech, Inc.) Hidden
Google Chrome (HKLM\...\Google Chrome) (Version: 33.0.1750.154 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
Google Toolbar for Internet Explorer (Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (Version: 1.3.23.9 - Google Inc.) Hidden
GoToMeeting 6.0.0.1259 (HKCU\...\GoToMeeting) (Version: 6.0.0.1259 - CitrixOnline)
Intel® Management Engine Components (HKLM\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 8.0.3.1427 - Intel Corporation)
Intel® Network Connections Drivers (HKLM\...\PROSet) (Version: 16.8 - Intel)
Intel® OpenCL CPU Runtime (HKLM\...\{FCB3772C-B7D0-4933-B1A9-3707EBACC573}) (Version: - Intel Corporation)
Intel® Processor Graphics (HKLM\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 8.15.10.2639 - Intel Corporation)
Intel® USB 3.0 eXtensible Host Controller Driver (HKLM\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.4.220 - Intel Corporation)
Intel® Trusted Connect Service Client (HKLM\...\{51A66ED3-200E-4147-8D1E-E8D30936FD26}) (Version: 1.23.605.1 - Intel Corporation)
Malwarebytes Anti-Malware version 2.00.0.1000 (HKLM\...\Malwarebytes Anti-Malware_is1) (Version: 2.00.0.1000 - Malwarebytes Corporation)
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (Version: 4.5.50938 - Microsoft Corporation) Hidden
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office File Validation Add-In (HKLM\...\{90140000-2005-0000-0000-0000000FF1CE}) (Version: 14.0.5130.5003 - Microsoft Corporation)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (French) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Standard 2007 (HKLM\...\STANDARD) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office Standard 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Save as PDF or XPS Add-in for 2007 Microsoft Office programs (HKLM\...\{90120000-00B2-0409-0000-0000000FF1CE}) (Version: 12.0.4518.1014 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (HKLM\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mitel Unified Communicator Advanced 4.1 (HKLM\...\{6F497C65-FC83-4E30-B1B9-9527A6CB3B0B}) (Version: 4.1.18.1 - Mitel Networks)
MSXML 4.0 SP2 (KB954430) (HKLM\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
RadioRage Internet Explorer Toolbar (HKLM\...\RadioRage_4jbar Uninstall Internet Explorer) (Version: - Mindspark Interactive Network)
Renesas Electronics USB 3.0 Host Controller Driver (HKLM\...\InstallShield_{5442DAB8-7177-49E1-8B22-09A049EA5996}) (Version: 2.0.30.0 - Renesas Electronics Corporation)
Renesas Electronics USB 3.0 Host Controller Driver (Version: 2.0.30.0 - Renesas Electronics Corporation) Hidden
ST Microelectronics 3 Axis Digital Accelerometer Solution (HKLM\...\{9C24F411-9CA7-4A8A-91F3-F08A4A38EB31}) (Version: 4.10.0016 - ST Microelectronics)
Symantec Endpoint Protection (HKLM\...\{A3AEEA68-AC93-4F6F-8D2D-78BBF7E422B8}) (Version: 12.1.671.4971 - Symantec Corporation)
Update for 2007 Microsoft Office System (KB967642) (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{C444285D-5E4F-48A4-91DD-47AAAA68E92D}) (Version: - Microsoft)
Update for Microsoft Office 2007 Help for Common Features (KB963673) (HKLM\...\{90120000-006E-0409-0000-0000000FF1CE}_STANDARD_{AB365889-0395-4FAD-B702-CA5985D53D42}) (Version: - Microsoft)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{A024FC7B-77DE-45DE-A058-1C049A17BFB3}) (Version: - Microsoft)
Update for Microsoft Office 2007 suites (KB2687493) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{6FAA03BD-2B51-4029-9AD9-64A3B8E3C84C}) (Version: - Microsoft)
Update for Microsoft Office 2007 suites (KB2767849) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{CB68A5B0-3508-4193-AEB9-AF636DAECE0F}) (Version: - Microsoft)
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{E9A82945-BA29-4EE8-8F2A-2F49545E9CF2}) (Version: - Microsoft)
Update for Microsoft Office Excel 2007 Help (KB963678) (HKLM\...\{90120000-0016-0409-0000-0000000FF1CE}_STANDARD_{199DF7B6-169C-448C-B511-1054101BE9C9}) (Version: - Microsoft)
Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit Edition (HKLM\...\{90120000-001A-0409-0000-0000000FF1CE}_STANDARD_{ED38F8A3-4F61-494E-8BCA-E3AC7760C924}) (Version: - Microsoft)
Update for Microsoft Office Outlook 2007 Help (KB963677) (HKLM\...\{90120000-001A-0409-0000-0000000FF1CE}_STANDARD_{0451F231-E3E3-4943-AB9F-58EB96171784}) (Version: - Microsoft)
Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2878234) 32-Bit Edition (HKLM\...\{90120000-0012-0000-0000-0000000FF1CE}_STANDARD_{EC1934B0-AE0F-4BBD-8955-54BB3247ED9E}) (Version: - Microsoft)
Update for Microsoft Office Powerpoint 2007 Help (KB963669) (HKLM\...\{90120000-0018-0409-0000-0000000FF1CE}_STANDARD_{397B1D4F-ED7B-4ACA-A637-43B670843876}) (Version: - Microsoft)
Update for Microsoft Office Script Editor Help (KB963671) (HKLM\...\{90120000-006E-0409-0000-0000000FF1CE}_STANDARD_{CD11C6A2-FFC6-4271-8EAB-79C3582F505C}) (Version: - Microsoft)
Update for Microsoft Office Word 2007 Help (KB963665) (HKLM\...\{90120000-001B-0409-0000-0000000FF1CE}_STANDARD_{80E762AA-C921-4839-9D7D-DB62A72C0726}) (Version: - Microsoft)
==================== Restore Points =========================
01-03-2014 08:00:12 Windows Update
09-03-2014 05:00:01 Scheduled Checkpoint
12-03-2014 07:00:20 Windows Update
19-03-2014 07:00:11 Windows Update
27-03-2014 04:00:01 Scheduled Checkpoint
31-03-2014 21:41:00 Restore Operation
==================== Hosts content: ==========================
2009-07-13 22:04 - 2009-06-10 17:39 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts
==================== Scheduled Tasks (whitelisted) =============
Task: {42D16469-643F-4000-86F0-3906FC658CDD} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-08-14] (Google Inc.)
Task: {6A915F87-DB77-4349-8EEA-42857C132454} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files\Google\Update\GoogleUpdate.exe [2013-08-14] (Google Inc.)
Task: {FF8A942A-FEA3-4856-888E-607A00AC87DD} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2014-03-12] (Adobe Systems Incorporated)
Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files\Google\Update\GoogleUpdate.exe
==================== Loaded Modules (whitelisted) =============
2012-12-04 18:06 - 2012-02-21 15:09 - 01198872 _____ () C:\Program Files\Intel\Intel® Management Engine Components\UNS\ACE.dll
2012-12-04 17:45 - 2012-02-01 12:34 - 00094208 _____ () C:\Windows\System32\IccLibDll.dll
2013-10-18 19:55 - 2013-10-18 19:55 - 25100288 _____ () C:\Users\dfiore\AppData\Roaming\Dropbox\bin\libcef.dll
==================== Alternate Data Streams (whitelisted) =========
==================== Safe Mode (whitelisted) ===================
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\SepMasterService => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\SmcService => ""="Service"
==================== Disabled items from MSCONFIG ==============
==================== Faulty Device Manager Devices =============
Name: Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows
Description: Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows
Class Guid: {4d36e972-e325-11ce-bfc1-08002be10318}
Manufacturer: Cisco Systems
Service: vpnva
Problem: : This device is disabled. (Code 22)
Resolution: In Device Manager, click "Action", and then click "Enable Device". This starts the Enable Device wizard. Follow the instructions.
==================== Event log errors: =========================
Application errors:
==================
Error: (04/01/2014 01:28:56 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
Error: (04/01/2014 00:30:05 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "1".Error in manifest or policy file "2" on line 3.
The manifest file root element must be assembly.
Error: (03/31/2014 05:48:12 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
Error: (03/31/2014 05:45:12 PM) (Source: System Restore) (User: )
Description: An unspecified error occurred during System Restore: (Scheduled Checkpoint). Additional information: 0x80070002.
Error: (03/31/2014 05:44:42 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
Error: (03/31/2014 05:22:22 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
Error: (03/31/2014 05:16:56 PM) (Source: Symantec AntiVirus) (User: )
Description: Security Risk Found!Bloodhound.MalPE in File: C:\Windows\Temp\40532e42\SetupDataMngr_BearShare.exe by: Auto-Protect scan. Action: Quarantine succeeded : Access denied. Action Description: The file was quarantined successfully.
Error: (03/31/2014 05:09:44 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
Error: (03/31/2014 05:08:51 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: The Cryptographic Services service failed to initialize the VSS backup "System Writer" object.
Details:
Could not query the status of the EventSystem service.
System Error:
A system shutdown is in progress.
.
Error: (03/31/2014 04:56:38 PM) (Source: Symantec AntiVirus) (User: )
Description: SONAR has generated an error: code 1: description: Heuristic Scan or Load Failure
System errors:
=============
Error: (04/01/2014 01:34:13 PM) (Source: Microsoft-Windows-GroupPolicy) (User: TX)
Description: The processing of Group Policy failed because of lack of network connectivity to a domain controller. This may be a transient condition. A success message would be generated once the machine gets connected to the domain controller and Group Policy has succesfully processed. If you do not see a success message for several hours, then contact your administrator.
Error: (04/01/2014 01:28:52 PM) (Source: Microsoft-Windows-GroupPolicy) (User: NT AUTHORITY)
Description: The processing of Group Policy failed because of lack of network connectivity to a domain controller. This may be a transient condition. A success message would be generated once the machine gets connected to the domain controller and Group Policy has succesfully processed. If you do not see a success message for several hours, then contact your administrator.
Error: (04/01/2014 01:28:48 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5
Error: (04/01/2014 01:28:48 PM) (Source: NETLOGON) (User: )
Description: This computer was not able to set up a secure session with a domain
controller in domain TX due to the following:
%%1311
This may lead to authentication problems. Make sure that this
computer is connected to the network. If the problem persists,
please contact your domain administrator.
ADDITIONAL INFO
If this computer is a domain controller for the specified domain, it
sets up the secure session to the primary domain controller emulator in the specified
domain. Otherwise, this computer sets up the secure session to any domain controller
in the specified domain.
Error: (03/31/2014 05:48:07 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5
Error: (03/31/2014 05:48:07 PM) (Source: Service Control Manager) (User: )
Description: The Windows Firewall service terminated with service-specific error %%5.
Error: (03/31/2014 05:44:36 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5
Error: (03/31/2014 05:22:18 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5
Error: (03/31/2014 05:09:40 PM) (Source: Service Control Manager) (User: )
Description: The RadioRageService service failed to start due to the following error:
%%5
Error: (03/31/2014 04:52:03 PM) (Source: DCOM) (User: )
Description: 1084WSearch{9E175B6D-F52A-11D8-B9A5-505054503030}
Microsoft Office Sessions:
=========================
Error: (02/13/2014 04:23:05 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6683.5002, Microsoft Office Version: 12.0.6612.1000. This session lasted 499822 seconds with 60 seconds of active time. This session ended with a crash.
Error: (12/17/2013 04:18:40 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6683.5002, Microsoft Office Version: 12.0.6612.1000. This session lasted 43143 seconds with 60 seconds of active time. This session ended with a crash.
Error: (12/07/2012 10:01:12 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 6, Application Name: Microsoft Office Outlook, Application Version: 12.0.6665.5003, Microsoft Office Version: 12.0.6612.1000. This session lasted 1158 seconds with 840 seconds of active time. This session ended with a crash.
CodeIntegrity Errors:
===================================
Date: 2014-04-01 15:45:47.482
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 15:38:36.979
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 15:20:54.354
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 15:01:22.868
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 14:18:48.846
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 14:03:11.548
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 13:34:14.688
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 13:28:46.934
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 13:20:07.985
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
Date: 2014-04-01 13:04:13.145
Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\sysfer.dll because the set of per-page image hashes could not be found on the system.
==================== Memory info ===========================
Percentage of memory in use: 40%
Total physical RAM: 3483.94 MB
Available physical RAM: 2073.56 MB
Total Pagefile: 6966.16 MB
Available Pagefile: 5560.01 MB
Total Virtual: 2047.88 MB
Available Virtual: 1902.99 MB
==================== Drives ================================
Drive c: () (Fixed) (Total:297.76 GB) (Free:251.3 GB) NTFS
==================== MBR & Partition Table ==================
========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 298 GB) (Disk ID: 5A8CC490)
Partition 1: (Not Active) - (Size=39 MB) - (Type=DE)
Partition 2: (Active) - (Size=300 MB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=298 GB) - (Type=07 NTFS)
==================== End Of Log ============================
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 4 Posted April 1, 2014
Hi,
Please download the following file => fixlist.txt and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 5 Posted April 2, 2014
Georgi,
So far, so good. The error pop-ups have stopped after FRST rebooted the PC. The fixlog is below. There is one odd additional problem, but I don't know if it's related. I can copy/paste the logs into this reply using Chrome, but not IE.
Regards,
Eric
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 13-03-2014 01
Ran by dfiore at 2014-04-02 08:40:55 Run:1
Running from C:\Users\dfiore\Desktop
Boot Mode: Normal
==============================================
Content of fixlist:
*****************
start
HKLM\...\Run: [RadioRage EPM Support] - C:\Program Files\RadioRage_4j\bar\1.bin\4jmedint.exe [12872 2013-12-20] (Mindspark Interactive Network, Inc.)
C:\Program Files\RadioRage_4j
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL => C:\ProgramData\Wincert\win32cert.dll [7168 2013-11-04] ()
C:\ProgramData\Wincert
IFEO\bitguard.exe: [Debugger] tasklist.exe
IFEO\bprotect.exe: [Debugger] tasklist.exe
IFEO\bpsvc.exe: [Debugger] tasklist.exe
IFEO\browsemngr.exe: [Debugger] tasklist.exe
IFEO\browserdefender.exe: [Debugger] tasklist.exe
IFEO\browsermngr.exe: [Debugger] tasklist.exe
IFEO\browserprotect.exe: [Debugger] tasklist.exe
IFEO\browsersafeguard.exe: [Debugger] tasklist.exe
IFEO\bundlesweetimsetup.exe: [Debugger] tasklist.exe
IFEO\cltmngsvc.exe: [Debugger] tasklist.exe
IFEO\delta babylon.exe: [Debugger] tasklist.exe
IFEO\delta tb.exe: [Debugger] tasklist.exe
IFEO\delta2.exe: [Debugger] tasklist.exe
IFEO\deltainstaller.exe: [Debugger] tasklist.exe
IFEO\deltasetup.exe: [Debugger] tasklist.exe
IFEO\deltatb.exe: [Debugger] tasklist.exe
IFEO\deltatb_2501-c733154b.exe: [Debugger] tasklist.exe
IFEO\dprotectsvc.exe: [Debugger] tasklist.exe
IFEO\iminentsetup.exe: [Debugger] tasklist.exe
IFEO\protectedsearch.exe: [Debugger] tasklist.exe
IFEO\rjatydimofu.exe: [Debugger] tasklist.exe
IFEO\searchprotection.exe: [Debugger] tasklist.exe
IFEO\searchprotector.exe: [Debugger] tasklist.exe
IFEO\snapdo.exe: [Debugger] tasklist.exe
IFEO\stinst32.exe: [Debugger] tasklist.exe
IFEO\stinst64.exe: [Debugger] tasklist.exe
IFEO\sweetimsetup.exe: [Debugger] tasklist.exe
IFEO\tbdelta.exetoolbar783881609.exe: [Debugger] tasklist.exe
IFEO\utiljumpflip.exe: [Debugger] tasklist.exe
HKLM\...\AppCertDlls: [x64] -> c:\program files\music toolbar\datamngr\x64\apcrtldr.dll <===== ATTENTION
HKLM\...\AppCertDlls: [x86] -> C:\Program Files\Music Toolbar\Datamngr\apcrtldr.dll <===== ATTENTION
c:\program files\music toolbar
URLSearchHook: HKCU - (No Name) - {3c35ad63-af1d-4e21-b484-b6651a8efcf9} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
SearchScopes: HKLM - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask...t=sb&searchfor={searchTerms}
SearchScopes: HKLM - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
SearchScopes: HKCU - {110a9ea2-8810-4c04-b916-cfd4e9427fec} URL = http://search.tb.ask...t=sb&searchfor={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} URL = http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
BHO: Toolbar BHO - {48909954-14fb-4971-a7b3-47e7af10b38a} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
BHO: Search Assistant BHO - {5848763c-2668-44ca-adbe-2999a6ee2858} - C:\Program Files\RadioRage_4j\bar\1.bin\4jSrcAs.dll (Mindspark)
Toolbar: HKLM - RadioRage - {78ba36c9-6036-482b-b48d-ecca6f964b84} - C:\Program Files\RadioRage_4j\bar\1.bin\4jbar.dll (Mindspark)
CHR DefaultSearchKeyword: ask.com
CHR DefaultSearchProvider: Ask.com
CHR DefaultSearchURL: http://dts.search.as...pn_ptnrs=AG2&q={searchTerms}
CHR DefaultNewTabURL:
CHR Extension: (Music Box Toolbar) - C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd [2013-12-23]
CHR HKLM\...\Chrome\Extension: [aaaaiihjniipljfegaknmbkneamnoajd] - C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx [2013-08-20]
S2 RadioRage_4jService; C:\Program Files\RadioRage_4j\bar\1.bin\4jbarsvc.exe [88648 2013-12-20] ()
U3 mbr; \??\C:\Users\dfiore\AppData\Local\Temp\mbr.sys [X]
cmd: netsh winsock reset
cmd: ipconfig /flushdns
C:\Users\dfiore\AppData\Local\Temp
end
*****************
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\RadioRage EPM Support => Value deleted successfully.
C:\Program Files\RadioRage_4j => Moved successfully.
"C:\\PROGRA~2\\Wincert\\WIN32C~1.DLL" => Value Data removed successfully.
C:\ProgramData\Wincert => Moved successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bitguard.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bprotect.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bpsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsemngr.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browserdefender.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsermngr.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browserprotect.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\browsersafeguard.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\bundlesweetimsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\cltmngsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta babylon.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta tb.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\delta2.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltainstaller.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltasetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltatb.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\deltatb_2501-c733154b.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\dprotectsvc.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\iminentsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\protectedsearch.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\rjatydimofu.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\searchprotection.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\searchprotector.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\snapdo.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\stinst32.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\stinst64.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\sweetimsetup.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\tbdelta.exetoolbar783881609.exe => Key deleted successfully.
HKLM\Software\microsoft\windows nt\currentversion\Image File Execution Options\utiljumpflip.exe => Key deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls\\x64 => Value deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls\\x86 => Value deleted successfully.
C:\Program Files\Music Toolbar => Moved successfully.
HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks\\{3c35ad63-af1d-4e21-b484-b6651a8efcf9} => Value deleted successfully.
HKCR\CLSID\{3c35ad63-af1d-4e21-b484-b6651a8efcf9} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key not found.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{110a9ea2-8810-4c04-b916-cfd4e9427fec} => Key not found.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2002} => Key not found.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{48909954-14fb-4971-a7b3-47e7af10b38a} => Key deleted successfully.
HKCR\CLSID\{48909954-14fb-4971-a7b3-47e7af10b38a} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5848763c-2668-44ca-adbe-2999a6ee2858} => Key deleted successfully.
HKCR\CLSID\{5848763c-2668-44ca-adbe-2999a6ee2858} => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\\{78ba36c9-6036-482b-b48d-ecca6f964b84} => Value deleted successfully.
HKCR\CLSID\{78ba36c9-6036-482b-b48d-ecca6f964b84} => Key deleted successfully.
CHR DefaultSearchKeyword: ask.com ==> The Chrome "Settings" can be used to fix the entry.
CHR DefaultSearchProvider: Ask.com ==> The Chrome "Settings" can be used to fix the entry.
CHR DefaultSearchURL: http://dts.search.as...pn_ptnrs=AG2&q={searchTerms} ==> The Chrome "Settings" can be used to fix the entry.
C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaiihjniipljfegaknmbkneamnoajd => Moved successfully.
HKLM\SOFTWARE\Google\Chrome\Extensions\aaaaiihjniipljfegaknmbkneamnoajd => Key deleted successfully.
C:\Users\dfiore\AppData\Local\bearsharemusicboxtoolbarha\GC\toolbar.crx => Moved successfully.
RadioRage_4jService => Service deleted successfully.
mbr => Service deleted successfully.
========= netsh winsock reset =========
Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.
========= End of CMD: =========
========= ipconfig /flushdns =========
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
========= End of CMD: =========
"C:\Users\dfiore\AppData\Local\Temp" directory move:
C:\Users\dfiore\AppData\Local\Temp\-1875523080.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\0F830070-0CD2-43A9-8B10-8EE7D13C9C4C.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1063393295.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\106714465.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\107593.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\108810.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\113119538.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\113319.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1140969456.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\115454935.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\120916.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\124194002.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\124194455.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\12620995.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\128810.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\129200.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\129714.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1304802455.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1305183456.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13109325.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1319954988.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\132179.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13228323.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13276901.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\132881.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\133046653.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\13FE8336-264E-489A-AAF0-FF51AA3563ED.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1404951868.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1419222246.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\142132.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1425040663.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1475744482.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\147998.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1488554707.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1498066181.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1499160684.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\15369234.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\154338169.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1559838.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\157042072.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1570817435.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1584867914.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\15987902.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\162241.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\165158.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\168122.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\174284.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1753479146.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\176632615.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\177647698.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\177763856.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18078238.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18282131.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\18307653.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1859466631.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190118.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190149337.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\190273795.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\1919625655.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2049619.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2094197123.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2180481651.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\22945188.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\22965250.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\230553.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\23093405.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\233705.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2341918.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2363731095.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2363841591.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2364190362.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2370450.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\23753273.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2376018545.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2419444247.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2445421674.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2447905.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\257498401.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\259304.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\261308351.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\264562.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2667975.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\268727.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\271816.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2755398.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\278846233.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2798651212.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\281505270.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2846300.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2875909.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2986685348.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\300278742.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\319256.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\334325789.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\336302353.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\349015717.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\355704244.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\357590109.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\359051.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\362371087.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\365003698.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\365425914.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\378068.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\402420.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\41522645.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\41528402.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4437588.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\447212028.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\448682135.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\449559984.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\455156239.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\472081739.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\483852.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\497892.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4FAD6123-4E8E-4F34-B5B4-AC5B70598B41.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5039799.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\535535.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\545199657.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\556113814.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\556614266.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\56371944.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\56371975.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5717249.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\580448.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5829835.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5865684.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\6221663.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\6468238.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\65068.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\653784.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\66882605.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\673284.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\70686533.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\714000.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\73477921.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\739257.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\76287452.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\769498534.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\77270696.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\775371.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\779562393.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\782573290.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\795411174.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\82649.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\84646.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\872763.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\876804212.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\881492962.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\92043819.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\948733980.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\95117850.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\960888.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\982483532.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\984567768.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\986330720.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\995130.od => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\AdobeARM.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\AdobeARM_NotLocked.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\apnPixel.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\apnuserid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\appid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Attach.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\bearsharemusicboxtoolbarha-manifest.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\BundleSweetIMSetup.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\chrome_installer.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1132.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR12E2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1629.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR17FF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR19B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1D21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1D95.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR1EEA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR217D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR220F.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR23F4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR25B8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR29B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2A4A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2A71.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2B15.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2B92.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2BEF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2C6A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2D89.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2E6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2F21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR2F2A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3327.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR33A4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3587.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3660.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR379.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3D01.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3F12.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR3FAF.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR421E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR427A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR444.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4598.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4604.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4653.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR47B9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4AA6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR4FD8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR513B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5561.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR57D1.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5887.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5903.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5A21.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5A45.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR5C37.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR606C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR608D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR620C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR621A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR645D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6517.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR654B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR681D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6C02.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6DF6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR6E5C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR711.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7239.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR72D9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR74C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7610.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR79C1.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A2B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A7C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR7A7D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR80D4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR824C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8273.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR83B2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR83E2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8412.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8499.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR84D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR84E0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8516.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR881C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8AD3.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8C2D.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR8EA5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR90AA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR90D9.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9111.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR94C3.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR95D5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR96E5.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR972.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9745.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR98E4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9CE6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9DA6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9DB4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVR9F96.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA43A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA8CC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA8FB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRA978.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAC52.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAC97.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAD05.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRAE9A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB052.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB28E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB3C8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB46.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB497.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB5B8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRB654.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBAA7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBC1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRBDB0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRC4D4.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRC59B.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCD1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCD2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRCFF0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD4CB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD854.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRD923.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDA1E.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDB19.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDB60.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDD3C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDDC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRDF18.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE205.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE3D6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE510.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE6A6.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE6B7.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE97.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE98.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE983.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRE9FC.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVREA2C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVREF5F.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4BE.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4CB.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4E8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF4FA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF693.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF72A.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF7EA.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF874.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF8B0.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRF9D8.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRFAB2.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CVRFE2C.tmp.cvr => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\D1D4E1E8-362C-46FF-927B-D3020A51E1C5.Diagnose.0.etl => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DDS.txt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Delta.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DeltaTB.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1479.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1A27.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1B57.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH1D67.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH236A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH282D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH29F1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH2BEC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH352C.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH37F7.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3A18.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3B5E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH3FBB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4505.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH481.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH482D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4B19.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH4F2D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH53D8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH58E3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH5C89.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH5F06.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH607E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH67F5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH6CC2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7142.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7380.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7611.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH788.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7BD6.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH7BF3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH80CF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH82EF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH8388.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH85CB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH93A0.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH93E9.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH949E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH95B4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWH998.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA0DC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA2F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA7B8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA86D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHA973.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHAD0A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHB4AB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHB791.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHBCE3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHBD61.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHC484.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHC7A9.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCCCB.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCCD.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHCD69.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHD853.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHD87B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHDCA4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHDD52.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHEC8F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF08E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF093.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF58A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHF5F3.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHFCC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DWHFCE5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\ExchangePerflog_8484fa31aac168fdcfcccd43.dat => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp\FXSAPIDebugLogFile.txt" => Scheduled to move on reboot.
C:\Users\dfiore\AppData\Local\Temp\GoogleToolbarInstaller1.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\GoogleToolbarInstaller2.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst18A8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst22FC.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst2338.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst2A35.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3330.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3772.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3955.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3C6D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst3ECD.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst46FE.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4DD1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E3E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E4E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E5D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4E6D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst4F67.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst514A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst51B5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5408.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5485.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst54F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst559E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst5FE4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6AD1.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6CB5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst6E2B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7187.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst726B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst785A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst790F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst796D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7A85.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7AA5.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7B41.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7B6F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst7DE0.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst88B8.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9057.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9877.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jst9F4A.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstA707.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstABD2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC781.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC8C4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstC936.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstCA7D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstE1D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstE92B.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstED50.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\jstF659.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Kno6009.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoC01.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoCEE2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\KnoDF17.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\log3 => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\MSB1CACH.LEX => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\MybabylonTB.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsb54D2.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsb5DF4.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsc3995.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsc3996.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsg44CA.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh1485.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh2634.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsh8E31.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm1E18.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm5E35.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsm5E36.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsmC719.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsn3B10.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsr5E05.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsw221C.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsw221D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nswC7A7.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx1496.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx3AFF.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsx8F2D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\StructuredQuery.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\sysid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\trackid.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\TX+dfiore.bmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wbxtra_08222013_130624.wbt => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog00.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog01.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog02.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog03.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog04.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog05.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog06.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog07.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog08.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog09.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog10.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog11.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog12.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog13.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog14.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog15.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog16.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmplog17.sqm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\wmsetup.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\WSSetup.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF017DF219D4F8F14A.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF01BC172CFC8745CF.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF03AAAB6D88B8640B.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF049C287DED3C1D8F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF08EA7C18A1899A84.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF0AC5AD194E512590.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF13C4B7CC02CDE39C.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF14AE218EB553DAF1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF179C6350D9DBDA95.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF1B92A4483CE9A3EF.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF1E1D592422700CA0.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF24DC6E487CFDD274.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF24EE199B10F01CA9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF30C842F71A961DD4.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF336C899F4D3CC4FD.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF33A80F8EC18A57D6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF3B62A4036C7BC07D.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF3BBF4FB6BCF17652.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF400F3EBD04466C52.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF477DA2A47113B142.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF48145D69A1897085.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF60EC0E060C785EF9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF63876EF923B8998F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF645C13E363DBE8B8.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF6BA7DFA2EDCF47B6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF6FCD494B88C1CADA.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7029C0CC9E5B78E6.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7052B44998638C2F.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF7A4E822AD33EFEC1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF83F1A9606478F74B.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF84D99F23B2DC85C0.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF881270AF5FE6DA67.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF9225C5366F221EAD.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DF9BB58FDFBBBEA2B9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFA871417E28F2EB24.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFB0D9A3CE5C36D5D4.TMP => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp\~DFB4D467AFD5FA79AE.TMP" => Scheduled to move on reboot.
C:\Users\dfiore\AppData\Local\Temp\~DFBC9E4F4F23AB0E0D.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFBCB025A51E66F6C8.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFBE4661E0783A6221.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC216825882621D40.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC3336FC454394735.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC7D1CAE63E2457E7.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC7EA6E49C09368E2.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFC8F1DB709A893D01.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFCD4E8C35384A3DAB.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFCED2B6BEA9E83AB2.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFD8886EEDEF570C20.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE08BA69C196E21C4.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE7174C362297A25A.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE9334242E42D87B9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFE979D6DF64325225.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFEAF706B4FC230799.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFEE9A6EAC679E27C1.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFF324F3FFF29048C9.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFF5FBC5FF1D2EAF90.TMP => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~nsu.tmp\Au_.exe => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\{d4be399f-cfdf-462f-b234-2e3a62cff5a8}\geodata.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Temp1_fwdhealthtraineeenrollmentandtraining.zip\JuliaFioreVHA Training Certificate.pdf => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\outlook logging\firstrun.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\DropboxNSISTools.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\nsExec.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsxA675.tmp\UAC.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsiC64E.tmp\DropboxNSISTools.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\nsiC64E.tmp\UAC.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\msohtmlclip1\01\clip_colorschememapping.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\msohtmlclip1\01\clip_themedata.thmx => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\5SZG8K10.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\7LJU14B1.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\9X9YDR7M.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D5D.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D6E.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\dat9D6F.tmp => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\G2M35114.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\J0QSONNQ.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\L1BRWOM0.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\LROC1CLD.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\MCGJIO0D.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\OODJ89ZP.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\QQZCE09X.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\QVD8COQ1.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\Low\U4MAVGLT.htm => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\DTX\Reporting\ReportingHelper.dll => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CRX_75DAF8CB7768\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\DownloaderApp.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\G2MInst.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\G2MInstX.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\queue.xml => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\WebDeploymentPluginInst.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\G2MOutlookAddin_util.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\G2M_G2MInstaller.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\log137D.tmp\G2MStart.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\GoToMeeting\1259\log137D.tmp\GoToMeeting_00.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\CitrixLogs\DownloaderAppMsi\CB16A7AB-2AC6-4814-A5CB-7A92592B3037.log => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\TPRKRIPE\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\NC7QE085\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\EWM00HCX\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\7QE72PK5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\History\History.IE5\desktop.ini => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\History\History.IE5\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\acrord32_sbx\Cookies\index.dat => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\7580_20256\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5940_4327\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5884_5943\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5484_20403\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_6612\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_29144\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_27467\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_20688\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_14063\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_12768\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5452_1075\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\5156_25978\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_5156\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\4120_434\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3396_31819\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_6592\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_32062\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\3392_22095\manifest.json => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\crl-set => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\manifest.fingerprint => Moved successfully.
C:\Users\dfiore\AppData\Local\Temp\2116_18772\manifest.json => Moved successfully.
Could not move "C:\Users\dfiore\AppData\Local\Temp" directory. => Scheduled to move on reboot.
=> Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-04-02 08:43:39)<=
C:\Users\dfiore\AppData\Local\Temp\FXSAPIDebugLogFile.txt => Is moved successfully.
C:\Users\dfiore\AppData\Local\Temp\~DFB4D467AFD5FA79AE.TMP => Is moved successfully.
C:\Users\dfiore\AppData\Local\Temp => Moved successfully.
==== End of Fixlog ====
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 6 Posted April 2, 2014
Hello,
I have encountered similar problems with Internet Explorer version 11 before and I believe that there is a bug with the IPBoard forum software not with the browser himself.
http://community.invisionpower.com/resources/bugs.html/_/ip-board/internet-explorer-11-copy-paste-issue-r42941
The fix is already implemented (but I don't know if the version of Ipboard used here is the latest one).
A colleague of mine told me for a temporary solution before and it worked for another user. You can give it a try:
You should be able to copy/paste if you use that little switch in the upper left hand corner of the reply and by switching it off that should disable the RTE editor and IE11 will probably allow you to copy/paste again.
If no luck then go ahaid and reset IE settings to default:
How to reset Internet Explorer settings
Let me know about the results.
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 7 Posted April 2, 2014
The copy/paste issue with IE and the forum isn't really an issue, and I won't bother trying to fix it. I just wasn't sure if it was indicative of malware or a virus, which it does not seem to be.
That said, things seem to be working fine now. Is there anything else you need me to do, or logs to show you?
Thank you,
Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 8 Posted April 2, 2014
Hi Eric,
I understand but you can still try the solutions above because they will not cause any harm. :)
Also if you don't mind, I want to make sure there is nothing lurking on the system so just in case I want you to go through these steps:
The most of them should take no more than 5 minutes each (but the time they take to complete can vary depending on the size of your hard and the speed of your computer).
STEP 1
Please download RKill by Grinler from the link below and save it to your desktop.
Rkill
Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
If nothing happens or if the tool does not run, please let me know in your next reply.
A log pops up at the end of the run. This log file is located at C:\rkill.log.
Please post the log in your next reply.
STEP 2
Please download RogueKillerX64.exe and save to the desktop.
Close all windows and browsers
Right-click the program and select 'Run as Administrator'
Press the scan button.
A report opens on the desktop named - RKreport.txt
Please copy and past the results at pastebin.com and post the link to the log in your next reply.
STEP 3
Please download the latest version of TDSSKiller from here and save it to your Desktop.
Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
Put a checkmark beside loaded modules.
Sbf88.png
A reboot will be needed to apply the changes. Do it.
TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
Then click on Change parameters in TDSSKiller.
Check all boxes then click OK.
Click the Start Scan button.
The scan should take no longer than 2 minutes.
If a suspicious object is detected, the default action will be Skip, click on Continue.
67776163.jpg
If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
62117367.jpg
Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and past the results at pastebin.com and post the link to the log in your next reply.
STEP 4
Please download Malwarebytes Anti-Malware to your desktop.
Double-click mbam-setup-2.0.0.1000.exe and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to the following:
Launch Malwarebytes Anti-Malware
A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
Click Finish.
On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
A Threat Scan will begin.
With some infections, you may see this message box.
'Could not load DDA driver'
Click 'Yes' to this message, to allow the driver to load after a restart.
Allow the computer to restart. Continue with the rest of these instructions.
When the scan is complete, click Apply Actions.
Wait for the prompt to restart the computer to appear, then click on Yes.
After the restart once you are back at your desktop, open MBAM once more.
Click on the History tab > Application Logs.
Double click on the scan log which shows the Date and time of the scan just performed.
Click 'Copy to Clipboard'
Paste the contents of the clipboard into your reply.
STEP 5
1.Please download HitmanPro.
For 32-bit Operating System - dEMD6.gif.
This is the mirror - dEMD6.gif
For 64-bit Operating System - dEMD6.gif
This is the mirror - dEMD6.gif
2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).
Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.
3.Click on the next button. You must agree with the terms of EULA. (if asked)
4.Check the box beside "No, I only want to perform a one-time scan to check this computer".
5.Click on the next button.
6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.
7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!
8.Click on the next button.
9.Click on the "Save Log" button.
10.Save that file to your desktop and post the content of that file in your next reply.
Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro
Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.
STEP 6
Please download AdwCleaner by Xplode and save to your Desktop.
Double click on AdwCleaner.exe to run the tool.
Vista/Windows 7/8 users right-click and select Run As Administrator.
Click on the Scan button.
AdwCleaner will begin to scan your computer like it did before.
After the scan has finished click on the Clean button.
Press OK when asked to close all programs and follow the onscreen prompts.
Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
Copy and paste the contents of that logfile in your next reply.
A copy of that logfile will also be saved in the C:\AdwCleaner folder.
STEP 7
thisisujrt.gif Please download Junkware Removal Tool to your desktop.
Shut down your protection software now to avoid potential conflicts.
Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
Post the contents of JRT.txt into your next message.
STEP 8
Download Security Check by screen317 from here.
Save it to your Desktop.
Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
A Notepad document should open automatically called checkup.txt; please post the contents of that document.
and then if there aren't any issues left I'll give you my final recommendations. smile.png
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 9 Posted April 2, 2014
Rkill's log. More to come as I run them...
Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
http://www.bleepingcomputer.com/forums/topic308364.html
Program started at: 04/02/2014 04:33:21 PM in x86 mode.
Windows Version: Windows 7 Professional Service Pack 1
Checking for Windows services to stop:
* No malware services found to stop.
Checking for processes to terminate:
* No malware processes found to kill.
Checking Registry for malware related settings:
* No issues found in the Registry.
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
Performing miscellaneous checks:
* Windows Defender Disabled
[HKLM\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware" = dword:00000001
Checking Windows Service Integrity:
* Windows Defender (WinDefend) is not Running.
Startup Type set to: Manual
Searching for Missing Digital Signatures:
* No issues found.
Checking HOSTS File:
* No issues found.
Program finished at: 04/02/2014 04:33:50 PM
Execution time: 0 hours(s), 0 minute(s), and 28 seconds(s)
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 10 Posted April 2, 2014
The Roguekiller64 does not work on this system, it is 32-bit. I will not continue with the other steps as your first post specifies to run everything in the order you list.
-Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 11 Posted April 2, 2014
Hi Eric,
Here is the link for the 32 bit version of RogueKiller => RogueKiller.exe
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 12 Posted April 2, 2014
RogueKiller's log: http://pastebin.com/jc1H1PZ4 More to come
-Eric
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 13 Posted April 2, 2014
TDSSKiller's results: http://pastebin.com/DeYtPLgp
The program said there was nothing detected. More to come.
-Eric
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 14 Posted April 2, 2014
MBAM scan came up clean:
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 4/2/2014
Scan Time: 5:17:02 PM
Logfile:
Administrator: Yes
Version: 2.00.0.1000
Malware Database: v2014.04.02.08
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled
OS: Windows 7 Service Pack 1
CPU: x86
File System: NTFS
User: dfiore
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 336546
Time Elapsed: 10 min, 34 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 0
(No malicious items detected)
Registry Values: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 0
(No malicious items detected)
Physical Sectors: 0
(No malicious items detected)
(end)
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 15 Posted April 2, 2014
Whoops! I did AdwCleaner before HitmanPro. Here's Adw's results:
# AdwCleaner v3.023 - Report created 02/04/2014 at 17:22:08
# Updated 01/04/2014 by Xplode
# Operating System : Windows 7 Professional Service Pack 1 (32 bits)
# Username : dfiore - LT-DFIORE
# Running from : C:\Users\dfiore\Desktop\AdwCleaner.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
[#] Folder Deleted : C:\ProgramData\BitGuard
[#] Folder Deleted : C:\ProgramData\Browser Manager
[#] Folder Deleted : C:\ProgramData\BrowserProtect
Folder Deleted : C:\Program Files\BearShare Applications
Folder Deleted : C:\Users\dfiore\AppData\Local\RadioRage_4j
Folder Deleted : C:\Users\dfiore\AppData\LocalLow\iac
Folder Deleted : C:\Users\dfiore\AppData\LocalLow\RadioRage_4j
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.FeedManager
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.FeedManager.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLMenu
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLMenu.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLPanel
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.HTMLPanel.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.MultipleButton
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.MultipleButton.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.PseudoTransparentPlugin
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.PseudoTransparentPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.Radio
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.Radio.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.RadioSettings
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.RadioSettings.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ScriptButton
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ScriptButton.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.SettingsPlugin
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.SettingsPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ThirdPartyInstaller
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ThirdPartyInstaller.1
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ToolbarProtector
Key Deleted : HKLM\SOFTWARE\Classes\RadioRage_4j.ToolbarProtector.1
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@RadioRage_4j.com/Plugin
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{00A2B7C6-7487-4B99-9F6C-1FDF57FE130B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{10273591-D084-4328-A7D0-49E051FCDE7B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{11D4B723-18CA-48C6-BA13-965488F19A70}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BF72F68-72D8-461D-A884-329D936C5581}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{53855564-CF81-410C-9C1C-321C7E067816}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{581C7D7D-F809-4E03-A631-74C069D5F04A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{60B34F47-3FDD-46F8-AB6C-AAABEA55C3D6}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6562E272-88E1-4DFF-8FF8-FE1A05323D36}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{68122F44-3A4A-4EDB-B28F-0C0E07F89BD0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{78E9D883-93CD-4072-BEF3-38EE581E2839}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{83AC1413-FCE4-4A46-9DD5-4F31F306E71F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D740AD89-BAF4-47D5-9B5E-343D30F07A7A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DFEB941C-8B58-4899-97C3-88FE394E1285}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E23760BE-23A3-4CEF-9304-66AF079F53DB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E6AD866F-EA06-476A-8432-ED943683FAB1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{ECEF0D95-32FA-48D3-8A2D-D6453B5B7361}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F69FE1BE-09C3-460C-AC89-8CCD9D3DF1CC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F706E19B-6C14-4272-BA98-2F16636A898D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A25AA6E2-1CDE-4D0F-A5D4-4898D7FB3C86}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A5C9CB1C-1C0A-45A2-81CC-1DD342D0A478}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{0978C5FA-83C0-4118-A54F-99DACCEECB8C}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{1ED65BE2-AE84-46CB-8EA6-1C2B86ADF768}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{1FDAD7F1-B87C-4E79-9150-DE235FF80B3A}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{395C94B1-59E6-4C65-8AF2-0F6763BC70A6}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4A50E810-71EB-43A8-A665-19ED8CCD1630}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4DD9EB5D-8657-4856-A804-535841B09D73}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{569A9014-22E3-4F11-A243-CA4E3D95ADED}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{597494DA-C59F-4EDF-B2D1-CE137E2DB9E4}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{5E5E0B49-1A81-4ACC-BD6B-FF5F4EFEF01A}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{B872D222-3F52-4CD9-A4BE-9D69EE4F293D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C4C4F1F4-3074-4CB6-9FB8-0A64273166F0}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D0E90465-CF35-480D-B520-E1E3BDE802F5}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{581C7D7D-F809-4E03-A631-74C069D5F04A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{60B34F47-3FDD-46F8-AB6C-AAABEA55C3D6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{68122F44-3A4A-4EDB-B28F-0C0E07F89BD0}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7C3B01BC-53A5-48A0-A43B-0C67731134B9}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{9638B7D6-11F5-4406-B387-327642A11FFB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F706E19B-6C14-4272-BA98-2F16636A898D}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0ABE0FED-50E7-4E42-A125-57C0A11DBCDE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44DB423D-A0DB-4664-9477-CCDCEB7CD666}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{53855564-CF81-410C-9C1C-321C7E067816}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A25AA6E2-1CDE-4D0F-A5D4-4898D7FB3C86}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5C9CB1C-1C0A-45A2-81CC-1DD342D0A478}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B5731AB1-8566-4441-AEFB-9AFB2EEA63D9}
Key Deleted : HKCU\Software\APN DTX
Key Deleted : HKCU\Software\RadioRage_4j
Key Deleted : HKCU\Software\AppDataLow\Software\RadioRage_4j
Key Deleted : HKLM\Software\RadioRage_4j
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RadioRage_4jbar Uninstall Firefox
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RadioRage_4jbar Uninstall Internet Explorer
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.16521
-\\ Google Chrome v33.0.1750.154
[ File : C:\Users\ksobczyk\AppData\Local\Google\Chrome\User Data\Default\preferences ]
[ File : C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\preferences ]
Deleted : homepage
Deleted : search_url
Deleted : keyword
*************************
AdwCleaner[R0].txt - [7434 octets] - [02/04/2014 17:20:52]
AdwCleaner[s0].txt - [7555 octets] - [02/04/2014 17:22:08]
########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [7615 octets] ##########
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 16 Posted April 2, 2014
HitmanPro log:
HitmanPro 3.7.9.216www.hitmanpro.com Computer name . . . . : LT-DFIORE Windows . . . . . . . : 6.1.1.7601.X86/4 User name . . . . . . : TX\dfiore UAC . . . . . . . . . : Enabled License . . . . . . . : Free Scan date . . . . . . : 2014-04-02 17:27:34 Scan mode . . . . . . : Normal Scan duration . . . . : 4m 33s Disk access mode . . : Direct disk access (SRB) Cloud . . . . . . . . : Internet Reboot . . . . . . . : No Threats . . . . . . . : 0 Traces . . . . . . . : 53 Objects scanned . . . : 1,008,007 Files scanned . . . . : 34,061 Remnants scanned . . : 241,726 files / 732,220 keys Potential Unwanted Programs _________________________________________________ session/startup_urls[0] C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Preferences ask.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Web Data C:\Users\dfiore\AppData\LocalLow\DataMngr\ (iLivid) C:\Users\dfiore\AppData\LocalLow\DataMngr\{7CA1F051-A4FB-4143-B263-02B41E571EED}64 (iLivid) Cookies _____________________________________________________________________ C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:247realmedia.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.360yield.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.mlnadvertising.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.yieldmanager.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.creative-serving.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.p161.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pointroll.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pubmatic.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.undertone.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.yahoo.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtech.de C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtechus.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:advertising.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:apmebf.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:at.atwola.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:atdmt.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:atlanticmedia.122.2o7.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:bs.serving-sys.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:burstnet.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:casalemedia.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:collective-media.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:dmtracker.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:fanatics.112.2o7.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:fastclick.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:gntbcstglobal.112.2o7.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:interclick.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:invitemedia.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:journalregistercompany.122.2o7.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:media6degrees.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:mediaplex.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:patrickhillery.112.2o7.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:pointroll.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:questionmarket.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:realmedia.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:revsci.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:ru4.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:serving-sys.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:smartadserver.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:specificclick.net C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:statcounter.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:stats.adotube.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:statse.webtrendslive.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:tacoda.at.atwola.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:tribalfusion.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.burstnet.com C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Cookies:zedo.com C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Cookies\PK34828E.txt C:\Users\dfiore\AppData\Roaming\Microsoft\Windows\Cookies\Y82V154E.txt
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 17 Posted April 2, 2014
JRT's log:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.3 (03.23.2014:1)
OS: Windows 7 Professional x86
Ran by dfiore on Wed 04/02/2014 at 17:36:49.66
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
~~~ Files
~~~ Folders
Successfully deleted: [Folder] "C:\Users\dfiore\appdata\locallow\datamngr"
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 04/02/2014 at 17:40:03.68
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 18 Posted April 2, 2014
I think SecurityCheck is for 64Bit, because when I ran it, it said "unsupported operating system." If you want me to run a different version, I can probably do so tomorrow. As well as any fixes you prescribe.
Thanks.
-Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 19 Posted April 3, 2014
Hi Eric,
Please restart the computer and run SecurityCheck one more time. It should produce a log this time. :)
Also to ged rid of this entry:
Quote
session/startup_urls[0]
C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Preferences
ask.com
C:\Users\dfiore\AppData\Local\Google\Chrome\User Data\Default\Web Data
go ahead and reset Google Chrome settings to default => https://support.google.com/chrome/answer/3296214?hl=en
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 20 Posted April 3, 2014
Here's the results from SecurityCheck:
Results of screen317's Security Check version 0.99.81
Windows 7 Service Pack 1 x86 (UAC is enabled)
Internet Explorer 11
``````````````Antivirus/Firewall Check:``````````````
Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Enabled!
Symantec Endpoint Protection
WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
Adobe Reader XI
Google Chrome 33.0.1750.152
Google Chrome 33.0.1750.154
````````Process Check: objlist.exe by Laurent````````
Norton ccSvcHst.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:
````````````````````End of Log``````````````````````
Also, I reset the Chrome browser settings as suggested.
Any further steps you recommend?
Thanks,
Eric
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 21 Posted April 3, 2014
Hi Eric,
Before I let you go I want to check something...from the SecurityCheck log it seems that your SecurityCenter service isn't running at the moment:
Quote
``````````````Antivirus/Firewall Check:``````````````
Windows Security Center service is not running! This report may not be accurate!
Please download Farbar Service Scanner and run it on the computer with the issue.
Make sure that all options are checked.
Press "Scan".
It will create a log (FSS.txt) in the same directory the tool is run.
Please copy and paste the log to your reply.
Regards,
Georgi
eajack
New Member
Topic Starter
eajack
Members
15 posts
ID: 22 Posted April 3, 2014
Here's the results for the FSS:
Farbar Service Scanner Version: 25-02-2014
Ran by dfiore (administrator) on 03-04-2014 at 17:01:31
Running from "C:\Users\dfiore\Desktop"
Microsoft Windows 7 Professional Service Pack 1 (X86)
Boot Mode: Normal
****************************************************************
Internet Services:
============
Connection Status:
==============
Localhost is accessible.
LAN connected.
Attempt to access Google IP returned error. Google IP is unreachable
Attempt to access Google.com returned error: Google.com is unreachable
Attempt to access Yahoo.com returned error: Yahoo.com is unreachable
Windows Firewall:
=============
Firewall Disabled Policy:
==================
System Restore:
============
System Restore Disabled Policy:
========================
Action Center:
============
Windows Update:
============
Windows Autoupdate Disabled Policy:
============================
Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is set to Demand. The default start type is Auto.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.
Windows Defender Disabled Policy:
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1
Other Services:
==============
File Check:
========
C:\Windows\system32\nsisvc.dll => MD5 is legit
C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit
C:\Windows\system32\dhcpcore.dll => MD5 is legit
C:\Windows\system32\Drivers\afd.sys
[2013-10-09 06:16] - [2013-09-13 20:48] - 0338944 ____A (Microsoft Corporation) F81BB7E487EDCEAB630A7EE66CF23913
C:\Windows\system32\Drivers\tdx.sys => MD5 is legit
C:\Windows\system32\Drivers\tcpip.sys
[2013-10-09 06:16] - [2013-09-07 22:07] - 1294272 ____A (Microsoft Corporation) CA59F7C570AF70BC174F477CFE2D9EE3
C:\Windows\system32\dnsrslvr.dll => MD5 is legit
C:\Windows\system32\mpssvc.dll => MD5 is legit
C:\Windows\system32\bfe.dll => MD5 is legit
C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit
C:\Windows\system32\SDRSVC.dll => MD5 is legit
C:\Windows\system32\vssvc.exe => MD5 is legit
C:\Windows\system32\wscsvc.dll => MD5 is legit
C:\Windows\system32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\system32\wuaueng.dll => MD5 is legit
C:\Windows\system32\qmgr.dll => MD5 is legit
C:\Windows\system32\es.dll => MD5 is legit
C:\Windows\system32\cryptsvc.dll
[2013-08-13 16:37] - [2013-07-09 00:46] - 0140288 ____A (Microsoft Corporation) 7CA1BECEA5DE2643ADDAD32670E7A4C9
C:\Program Files\Windows Defender\MpSvc.dll
[2013-08-05 10:05] - [2013-05-27 00:57] - 0680960 ____A (Microsoft Corporation) 082CF481F659FAE0DE51AD060881EB47
C:\Windows\system32\ipnathlp.dll => MD5 is legit
C:\Windows\system32\iphlpsvc.dll => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
**** End of log ****
B-boy/StyLe/
FFreestyleRR
B-boy/StyLe/
Experts
1,558 posts
Location: Bulgaria
ID: 23 Posted April 3, 2014
Hello,
It seems that the Security Center service is running so no additional actions are needed anymore. smile.png
And here are my final recommendations to you:
Nicely done ! icon_bananas.gif This is the end of our journey if you don't have any more questions.
Thank you for following my instructions perfectly. :)
I have some final words for you.
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.
STEP 1 CLEANUP
To remove all of the tools we used and the files and folders they created, please do the following:
Download the following file => fixlist.txt and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
Run FRST/FRST64 and press the Fix button just once and wait.
It's no needed to post the log this time.
Please download OTC.exe by OldTimer and save it to your desktop.
Right-click the OTC.exe and choose Run as Administrator.
Click on CleanUp! button.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes.
Next please download Delfix.exe by Xplode and save it to your desktop.
Please start it and check the box next to "Remove disinfection tools" and click on the run button.
The tool will delete itself once it finishes.
Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
STEP 2 SECURITY ADVICES
Change all your passwords !
Since your computer was infected for peace of mind, I would however advise you that all your passwords be changed immediately including those for bank accounts, credit cards and home loans, PIN codes etc)!! (just in case).
If you're storing password in the browser to access websites than they are non encrypted well (only if you use Firefox with master password protection activated provide better security). So I strongly recommend to change as much password as possible. Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.
Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use PC Tools Password Generator to create random passwords and then install an application like KeePass Password Safe to store them for easy access.If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft
Keep your antivirus software turned on and up-to-date
Make sure your antivirus software is turned on and up-to-date.
New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
Note:
You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
You should scan your computer with an AntiSpyware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
Be sure to check for and download any definition updates prior to performing a scan.
Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.
Install HIPS based software if needed (or use Limited Account with UAC enabled)
I usually recommend to users to install HIPS based software but this type software is only effective in the right hands since it require from the users to take the right decisions.
HIPS based software controls what an application is allowed to do and not allowed to do.
It monitors what each application tries to do, how it use the internet and give you the ability to block any suspicious activity occurring on your computer.
In my opinion the best way to prevent an unknown malware from gaining access is to use some HIPS programs (like COMODO Firewall, PrivateFirewall, Online Armor etc.) to control the access rights of legitimate applications, although this would only be advisable for experienced users. (so if you don't feel comfortable using such software then you can skip this advice)
However, you should be aware though that (if you install Comodo Firewall and not the whole package Comodo Internet Security) this is not an replacement for a standard antivirus application. It's a great tool to add another layer of protection to your existent antivirus application. Also note that if you have an antivirus installed then you should install Comodo Firewall (and not Comodo Internet Security to avoid conflicts).
It takes some time and knowledge to configure it for individual purposes but once done, you should not have a problems with it.
There are so many reviews on YouTube and blogs about all these programs.
Keep in mind to choose carefully in order to avoid conflicts or instability caused by incompatible security programs.
Also having more than one "real-time" program can be a drain on your PC's efficiency so please refrain doing so.
More information about HIPS can be found here: What is Host Intrusion Prevention System (HIPS) and how does it work?
If you like Comodo you should choose for yourself which version of Comodo you will use 5 or 7. Personally I stick to version 5 at least for now.
If these kind of programs are difficult for you to use then you can use limited user account (LUA) with UAC enabled. If you need administrative privileges to perform some tasks, then you can use Run As or log on as the administrator account for that specific task.
Be prepared for CryptoLocker:
CryptoLocker Ransomware Information Guide and FAQ
Cryptolocker Ransomware: What You Need To Know
New CryptoLocker Ransomware Variant Spread Through Yahoo Messenger
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
Since the prevention is better than cure you can use gpedit built-in Windows or CryptoPrevent (described in the first link) to secure the PC against this locker.
Another way is to use Comodo Firewall and to add all local disks to Protected Files and Folders
You may want to check HitmanPro.Alert.CryptoGuard and add install it to be safe when surfing the net.
Practice Safe Internet
One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will. Below are a list of simple precautions to take to keep your computer clean and running securely:
If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
.exe, .com, .bat, .pif, .scr or .cmd do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you. We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake.
Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
Tweak your browsers
MOZILLA FIREFOX
To prevent further infections be sure to install the following add-ons NoScript and AdBlock Plus
Quote
Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.
Adblock Plus can be found here.
Quote
NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.
NoScript can be found here
Google Chrome
If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.
However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access
For Internet Explorer 9/10 read the articles below:
Security and privacy features in Internet Explorer 9
Enhanced Protected Mode
Use Tracking Protection in Internet Explorer
Security in Internet Explorer 10
Immunize your browsers with SpywareBlaster 5 and Spybot Search and Destroy 1.6
Also MBAM acquired the following software Malwarebytes Anti-Exploit and it should work with the most popular browsers. Beware the product is in beta stage.
Changelog can be seen here and known issues here.
Make the extensions for known file types visible:
Be wary of files with a double extension such as jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.
Create an image of your system (you can use the built-in Windows software as well if you prefere)
Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
The download link is here.
The tutorial on how to create an system image can be found here.
The tutorial on how to restore an system image can be found here.
Be sure to read the tutorial first.
Follow this list and your potential for being infected again will reduce dramatically.
Safe Surfing! smile.png
If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.
Other members who need assistance please start your own topic in a new thread.
IPersistFile error messages.
Started by Ni3K, February 20, 2009
6 posts in this topic
Ni3K
New Member
Topic Starter
Ni3K
Members
4 posts
ID: 1 Posted February 20, 2009
Hi MBAM,
Not sure what this particular problem is but each time i check either "Check for updates automatically at" or "Run quick scan automatically at" boxes the following error appears
before the check is made: IPersistFile::Save,error code 0x800705b
The box after i click ok on the error message is then checked.
I have ran the utility for removing MBAM and reinstalling as stated here but each time on a new install the above error message appears.
MBAM v 1.34 on XP SP3. I am running the paid version of MBAM. This may be no biggy but its a tad annoying.
Grateful for any advise...thxs. :)
GT500
Mostly Cantankerous
GT500
Trusted Advisors
6,292 posts
Location: Fortville, IN
ID: 2 Posted February 20, 2009
Please check this list of errors and fixes.
Ni3K
New Member
Topic Starter
Ni3K
Members
4 posts
ID: 3 Posted February 20, 2009
GT500 said:
Please check this list of errors and fixes.
Unfortunately the problem persists.. Checked double checked and even restarted the task scheduler service, which btw was on auto, but i still get the above error messages.
Just annoying. Thanks for your assist though.. :)
GT500
Mostly Cantankerous
GT500
Trusted Advisors
6,292 posts
Location: Fortville, IN
ID: 4 Posted February 20, 2009
I assume you are running Malwarebytes' Anti-Malware under a user account that has administrator rights?
If so, please follow these instructions for troubleshooting scheduled tasks.
It's also possible that something else is blocking MBAM from creating it's scheduled tasks, so you may also want to turn off any security software you have while trying to schedule the updates and scans.
Ni3K
New Member
Topic Starter
Ni3K
Members
4 posts
ID: 5 Posted February 21, 2009
GT500 said:
I assume you are running Malwarebytes' Anti-Malware under a user account that has administrator rights?
If so, please follow these instructions for troubleshooting scheduled tasks.
It's also possible that something else is blocking MBAM from creating it's scheduled tasks, so you may also want to turn off any security software you have while trying to schedule the updates and scans.
Thxs GT500,
I believe there is a problem with the task scheduler as you reported. After a reboot i found the following error message in the log file:
:D" "Task Scheduler Service"
Started at 20/02/2009 08:13:28
"Malwarebytes' Scheduled Update for Computer.job" (mbam.exe) 20/02/2009 09:00:00 ** ERROR **
The attempt to retrieve account information for the specified task failed; therefore, the task did not run. Either an error occurred, or no account information existed for the task.
The specific error is:
0x8004130f: No account information could be found in the Task Scheduler security database for the task indicated.
Will attempt to resolve this issue elsewhere as this is not MBAM's problem.
Interesting error. I assume it means you need to change what user the task is running as.
Error Number: Error 1812
Error Name: Malwarebytes Error 1812
Error Description: Error 1812: Malwarebytes Anti-Malware has encountered a problem and needs to close. We are sorry for the inconvenience.
Developer: Malwarebytes Corporation
Software: Malwarebytes Anti-Malware
Applies to: Windows XP, Vista, 7, 8
Symptoms of Error 1812
"Error 1812" appears and crashes the active program window.
Your PC frequently crashes with Error 1812 when running the same program.
“Malwarebytes Error 1812” is displayed.
Windows runs sluggishly and responds slowly to mouse or keyboard input.
Your computer periodically “freezes” for a few seconds at a time.
These 1812 error messages can appear during program installation, while a Malwarebytes Corporation-related software program (eg. Malwarebytes Anti-Malware) is running, during Windows startup or shutdown, or even during the installation of the Windows operating system. Keeping track of when and where your 1812 error occurs is a critical piece of information in troubleshooting the problem.
Causes of Error 1812
Corrupt download or incomplete installation of Malwarebytes Anti-Malware software.
Corruption in Windows registry from a recent Malwarebytes Anti-Malware-related software change (install or uninstall).
Virus or malware infection that has corrupted Windows system files or Malwarebytes Anti-Malware-related program files.
Another program maliciously or mistakenly deleted Malwarebytes Anti-Malware-related files.
Runtime Errors such as “Error 1812” can be caused by a variety of factors, so it is important that you troubleshoot each of the possible causes to prevent it from recurring.
Runtime Errors Knowledgebase
ARTICLE ID:
125194
ARTICLE AUTHOR:
Jay Geater
LAST UPDATED:
11/21/2016
POPULARITY:
Download Now
Error Fix
Microsoft Partner
Learn More
Recommendation: Scan your PC for computer errors.
How To Fix Malwarebytes Anti-Malware Error 1812
Below is a list of troubleshooting steps to resolve your Error 1812 problems. These troubleshooting steps get progressively more difficult and time consuming, so we strongly recommend attempting them in ascending order to avoid unnecessary time and effort.
Please Note: Click the [ Open ] image to expand the troubleshooting instructions for each step below. You can also click the [ Close ] image to hide the instructions as you proceed through each step.
OpenStep 1: Repair Registry Entries Associated with Error 1812
OpenStep 2: Conduct a Full Malware Scan of Your PC
OpenStep 3: Clean Out Your System Junk (Temporary Files and Folders) With Disk Cleanup (cleanmgr)
OpenStep 4: Update Your PC Device Drivers
OpenStep 5: Utilize Windows System Restore to "Undo" Recent System Changes
OpenStep 6: Uninstall and Reinstall the Malwarebytes Anti-Malware Program Associated with Error 1812
OpenStep 7: Run Windows System File Checker ("sfc /scannow")
OpenStep 8: Install All Available Windows Updates
OpenStep 9: Perform a Clean Installation of Windows
Recommendation: Scan your PC for computer errors.
Operating System Information
1812 error messages can occur in any of the following Microsoft Windows operating systems:
Windows 10
Windows 8
Windows 7
Windows Vista
Windows XP
Windows ME
Windows 2000
Are You Still Experiencing Error 1812 Issues?
Please reach out to us anytime on social media for more help:
Malwarebytes SDKDatabaseLoadDefaults error
Avatar user by Crispin7652 on Mar 30, 2015 at 6:25 PM |SOFTWARE
2
See more RELATED PROJECTS
Sharepoint Server
Installation and configuration of SharePoint server on single server.
Server room upgrade and virtualisation
Server room overhaul. Virtualise Windows and Linux servers whilst upgrading OS and application, provide hardware/software failure resilience, provide server/application testing platform and provide better power outage resilience.
Establishing a PACS Environment
I was asked to participate in the establishment and upkeep of a picture archiving and communication system (PACS) for Westlake Regional Hospital.
TECHNOLOGY IN THIS DISCUSSION
Malwarebytes
168091 Followers Follow
Malwarebytes
Join the Community! Creating your account only takes a few minutes.Join Now
Anyone come across this error? Malwarebytes forums has numerous posts but no solutions, each person is asked to download numerous programs and attach the logs and then jump through so many hoops that still do not resolve the issue.
I tried the FREE version to see how it performs, the program installs OK, but when you run a scan and it finishes the Pre Scan stage it throws up this SDKDatabaseLoadDefaults error 1812 or 2 and appears to delete the definitions in the C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware folder?
This is on a personal laptop with Win8.1 Enterprise x64 that's domain joined (it's my laptop but use it at work sometimes). Tried the older v1.75 and the latest v2.1.4.1018 with same problem? Tried disjoining and using local admin account, safe mode, disabling UAC but no luck. Tried a test on my Lenovo Miix 10 Tablet with the same version of Win8.1 Enterprise on the same domain and policies and it runs it fine, so can't figure out why it works on one and not the other?
So, has anyone seen this issue with Malwarebytes?
Reply Subscribe
RELATED TOPICS:
outlook room finder drop down missing
Remove malware from terminal server
Quickbooks occasionally asks for windows admin. permissions for dbmanagerexe.exe
15 Replies
starg33ker
Ghost Chili
starg33ker Mar 30, 2015 at 7:19 PM
Sorry to ask the obvious but have you simply tried reinstalling it?
I haven't had any issues. I freaking love MBAM! Only thing that's annoying is that I have to log into Admin to update clients when there's an interface update (my version was before it was centrally managed). The virus definitions updates itself though, so it doesn't worry me that much. Stuff I save for a rainy weekend to come in and do.
Spice Reply
Crispin7652
Pimiento
OP
Crispin7652 Mar 30, 2015 at 7:41 PM
I've uninstalled/reinstalled till i'm blue in the face, made no difference, even following the reinstall guides on the Malwarebytes forums for a clean install hasn't worked.
I've just tried it on a Toshiba 22" AIO touchscreen with Win8.1 x64 Enterprise at another location and get the same issue? So well baffled now. Seems it's not just Win8.1, people with Win7 have got the same issue on home PCs/laptops so go figure? Looks like finding something else as this issue seems to be ongoing.
Spice Reply
shawn8023
Pimiento
shawn8023 Mar 30, 2015 at 7:41 PM
I had the same issue on a couple of our machines. Reinstalling did not resolve the issue either. MalwareBytes recommended their Clean Uninstall Tool. This did not work either.
Spice Reply
Crispin7652
Pimiento
OP
Crispin7652 Mar 30, 2015 at 8:02 PM
Thanks for the replies!
Seems those machines affected never get it resolved from reading the Malwarebytes forums, people have gone through so many steps and scans only to find it's not virus/malware related and then the suggestions/help seem to stop there with no further progress on the issue!
I'm going to put a spare HDD in my laptop and do a fresh install of Win8.1 x64 Enterprise. Not going to connect it to our domain yet, just going to install MBAM to see what happens.
Spice Reply
ThumbsUp
Poblano
ThumbsUp Mar 31, 2015 at 12:34 AM
There is a way to install it by hiding the installation. Some malware is aware of its file names and install location.
(1) rename the downloaded installation file (example: FindThisSucker.exe)
(2) reboot to safe mode and install the renamed file.
(3) once the install is done, find the installation folder (program files?) and rename the MBAM.exe file to something/anything else (example HaHaHa.exe).
(4) fix your program shortcuts to point to the renamed EXE file (HaHaHa.exe ???).
(5) run the first time while still in safe mode, reboot to safe mode, run again
(6) if step 5 runs clean, reboot to normal, run again. else, repeat step 5 till clean.
Spice Reply
Crispin7652
Pimiento
OP
Crispin7652 Mar 31, 2015 at 3:46 AM
Malwarebytes Chameleon already does this, allows you to run MBAM on an infected machine: https://www.malwarebytes.org/chameleon/ needless to say, even that doesn't solve the issue, still get the same error!
I don't personally believe it's Malware, it's happening to too many people on different systems (standalone/domain/laptop/desktop) and OS versions (XP/Vista/7/8/8.1/x86/x64) so what exactly all those systems have in common that stops MBAM working is anyones guess, so we all must have the same undetectable virus/malware or, heaven forbid, infected firmware!!
Spice Reply
dianepryor
Pimiento
dianepryor Apr 5, 2015 at 1:40 AM 1ST POST
I'm experiencing this problem as well...very frustrating. I agree that this is a software glitch and wish that resident geniuses over at Malwarebytes would look at it seriously. If you do a Google search on SDK errors, the problem goes back for far too long not to have been fixed by now. Other than that, I LOVE MBAM.
Spice Reply
dianepryor
Pimiento
dianepryor Apr 5, 2015 at 11:13 PM
Addendum: I ran Chameleon last night and it seems to have solved the problem! I'm switching my vote from "software problem" to "malware".
Spice Reply
wurms2
Pimiento
wurms2 May 11, 2015 at 10:33 PM 1ST POST
I was getting the error code: 2.
Here is what I did to resolve this:
Load Hirens Boot CD onto a USB and startup with that.
Run MalwareBytes from Hirens Boot CD (updating definitions)
-It detected 1 object. I believe it was a PUM.Hijack. PUM stands for Potentially Unwanted Modification, which could come from virus or changes from another program, or GPOs.
I removed the PUM Ran the registry cleaner via CCleaner in Hirens Boot CD (backup registry first!!!).
Rebooted computer. Was then able to run malwarebytes!!! Hooray %uFEFF
Spice Reply
RobOley
Anaheim
RobOley Jun 4, 2015 at 11:19 PM
Did wurms2 suggestion work? I tried to do it from a CD not a USB and ran into new sets of issues. Will in Hiren's I could not establish a network connection. Thus I could not update Malwarebytes. When I tried to run I got a run error 15.
update: Created a USB boot and still not working. From the USB the win_Xp installed with missing icons/shortcuts/and programs???
Edited Jun 5, 2015 at 12:44 AM
Spice Reply
Wanito
Pimiento
Wanito Nov 24, 2015 at 10:42 PM 1ST POST
Issue was resolved by deleting the outdated malware bytes folder in the program data area. It appears to have left the outdated folder on upgrade. The scan tries to access the outdated data causing the error. Go to programdata\malwarebytes. You will see 2 malwarebytes anti-Malware folders. Delete the older one and restart the machine. Run the scan and it should work.
Spice Reply
RobOley
Anaheim
RobOley Nov 24, 2015 at 11:00 PM
I only have one.
Spice Reply
rogalskij
Jalapeno
rogalskij May 11, 2016 at 6:30 PM
I am going to revive this thread since we have discovered this is happening to us on multiple machines. What we have tried so far:
Updating the definitions
uninstalling and reinstalling
deleting the scheduled scan/update
Checked for 2 instances of the programdata folder, only found one
Any thoughts or assistance would be appreciated. We are on version: 2.2.1.1043
Malwarebytes
Malwarebytes
(1126)
Spice Reply
imaduddinmian
Pimiento
imaduddinmian May 12, 2016 at 8:29 PM 1ST POST
I had the same issue with version: 2.2.1.1043%uFEFF. Here is my solution:
1. Download "Chameleon" from this link https://www.malwarebytes.org/chameleon/
%uFEFF2. Extract to a file
3. Run mbam-chameleon-3.1.30.0\Chameleon\Windows\%uFEFFmbam-chameleon%uFEFF.exe
This will update MBAM and run scan.
Spice Reply
coleensootsman-eicher
Sonora
coleensootsman-eicher Jul 28, 2016 at 10:47 PM 1ST POST
I have done all of the above with no joy -- I did find a second program data folder, removed it, with no success.
I can see during the Chameleon run that there are numerous issues detected, but Chameleon stalls when MBAM throws the 1812 error.
I found a MBAM support thread where a user may have sorted out the issue
How to Fix malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error
Computer errors like malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error is really annoying, as it really affects the performance of your computer system. Many people like you have encountered this error every so often. This article is designed to explain what malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai is, what causes this malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error and the most important thing is how to fix this error. So let's begin.
Note: The manual fix requires sufficient computer know-how. If you're not confident of performing the manual fix, it's recommended that you use this Error Fix Tool to automatically fix the problem.
Download malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error fix tool
Overview of malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai File:
File Name:
malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai (Free Scan)
File Description:
Malwarebytes Anti-Malware
Product Name:
Malwarebytes Anti-Malware
Product Version:
1.42
File md5:
454da26868b5ee7801247623c61a04a7
File type:
42_francai file
OS Infected:
Windows NT/2000/2003/XP/Vista/2008/7/8/10
Recommended:
Download malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error Free Scan Tool
What's malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error?
malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file is an important DLL file which belongs to Malwarebytes Anti-Malware by Malwarebytes Anti-Malware. This file ensures the Windows system and Malwarebytes Anti-Malware perform properly. If you receive this error when you try to run a software or use a system function, you should know that your software or Windows system may have some issue. The corruption or deletion of malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file will lead to malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error when the software or Windows system call this file. Usually, you will not receive malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error unless there is some issue with your file or Windows system.
What Causes malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error?
There are many possibilities that cause this malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error.
malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file was deleted when another program was uninstalled from your computer.
A new version of malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file installed by another program is overwritten and is not compatible with other programs giving malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error.
The malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file was deliberately or mistakenly deleted by another computer user or program.
The registry entries of malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file are corrupted.
There is a problem with a hardware.
How to Fix malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai Error?
Though computer error messages like malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error are not dangerous, it could be a sign to a more serious problem. When Windows or software gives error messages, it means to attract your attention and needs you to fix the problem. In order to keep your PC perform properly, please follow the steps to fix your error:
Step 1. Run a virus scan over your system.
The first thing you need to ensure is that this error is not caused by computer malware. There are a lot of computer malware that could really attack your computer causing various issues. Malware infection may be the cause of malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error. They are able to change or delete program files, and change program and system settings. To ensure this malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error is not caused by computer malware, you'd better use your antivirus software and run a virus scan over your computer system.
Step 2. Re-register the malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file.
If you ran a virus scan and do not find any malware on your computer, then you can re-register the malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file. Usually, when a program is installed, it will register its files in the registry. If the malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file is not properly registered, Windows or Malwarebytes Anti-Malware will not be able to work correctly. To register malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file,
2.1 Open an elevated command prompt.
Windows 7, Windows Vista and Windows 10:
Click Start, type cmd in the Search box, right click Command Prompt, and click Run as administrator. When User Account Control pops up, click Yes to continue.
Windows 8 and 8.1:
Swipe your mouse to the right edge of the screen, click Search, type cmd in the Search box, right click Command Prompt, and click Run as administrator. When User Account Control pops up, click Yes to continue.
2.2 In the command prompt window, type regsvr32 [full path of the malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai file]. An example is regsvr32 C:\Windows\System32\example.dll
2.3 After malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai is registered, it will give you a message telling you that it's successfully registered.
Step 3. Run SFC /scannow to repair system files.
System File Checker is a very useful Windows utility which can scan for corrupted Windows system files and then replace them. If your file is missing or not found, you can run System File Checker to get it back.
To do it,
3.1 Open an elevated command prompt.
Windows 7, Windows Vista and Windows 10
Click Start, type cmd in the Search box, right click Command Prompt, and click Run as administrator. When User Account Control pops up, click Yes to continue.
Windows 8 and 8.1
Swipe your mouse to the right edge of the screen, click Search, type cmd in the Search box, right click Command Prompt, and click Run as administrator. When User Account Control pops up, click Yes to continue.
3.2 In the command prompt window, type in sfc /scannow and then hit Enter key.
Wait until System File Checker scans and replaces all corrupted or missing files.
Step 4: Repair the registry.
If you've tried the steps above but cannot get malwarebytes-anti-malware_malwarebytes_anti-malware_1.42_francai error fixed, then you can try to repair the registry. As it's known to all, the registry is the most important database where all settings of hardware and software on your computer is stored. Improper or incomplete software uninstallation can modify the registry and leave some invalid entries in the registry. When there is an issue in the registry, you can see some symptoms, such as DLL errors, EXE errors, and slow PC performance. It's not wise to manually look through the registry and fix it unless you're an experienced computer professional. A slightest mistake in the registry will lead to further damage to your system. The best and most recommended way to get your registry problems fixed is to run this brilliant fix tool. It will help you repair your registry and improve your PC performance.
Recommended: If you're not good at computers, it's recommended that you use this Automatic Error Fix Tool to fix this kind of problem.
Malwarebytes Anti-Exploit for dummies Updated
6 Oct, 2016 by Margus Saluste (updated on 2016/12/18)
“How I wish there was something easier to use than Microsoft EMET!” one guy sighed one day. “Remember the days when you installed EMET 2 or 3 and every browser and Office program actually worked after applying the new configuration?”
So yeah, troubleshooting Microsoft Enhanced Mitigation Experience Toolkit configuration is quite some task. Is there some alternative out there?
“Yes, there is!” some guys from Malwarebytes jump up. You know, the company that makes the renowned Malwarebytes Anti-Malware product. Now they’ve got a new free product that has huge potential of replacing EMET on devices that are run less experienced users.
As usual, there is a free version that protects common web browsers and Java only. The paid version adds support for Adobe Reader, Microsoft Office programs and many media players, plus the ability to create custom shields.
Here’s Malwarebytes Anti-Exploit aka MBAE. No configuration required, no definition updates, just install and forget. It works in Windows XP, Vista, 7, 8/8.1 and 10.
Since the arrival of Malwarebytes 3.0 in December of 2016, MBAE is in perpetual beta mode, but still free. Please note that installing Malwarebytes 3 can uninstall Anti-Exploit automatically, please see the instructions below on how to reinstall it.
Installing Malwarebytes Anti-Exploit Free
Go to http://filehippo.com/download_malwarebytes_anti_exploit/ to grab the product installer (currently, there’s no way of downloading MBAE from Malwarebytes’ web site) and click the Download Free Version button.
Malwarebytes Anti-Exploit setup is mostly a series of buttons called “Next”. The important bit of using the free version of this product is the Additional Tasks screen. Clear the Enable free trial of Malwarebytes Anti-Exploit Premium check box.
Malwarebytes Anti-Exploit Setup - Select Additional Tasks
Malwarebytes Anti-Exploit Setup – Select Additional Tasks.
Using Malwarebytes Anti-Exploit Free (not much to write here)
You don’t believe me? Let’s see.
First, Malwarebytes Anti-Exploit icon appears in the Notification area of Taskbar (aka System Tray). Right-clicking it allows opening the program, starting and stopping protection (you do not want to do the latter) and hiding the icon (why on Earth would you need that?).
Malwarebytes Anti-Exploit system tray icon options
Malwarebytes Anti-Exploit system tray icon options
This is how the program window looks like. General tab provides two buttons: Stop/Start Protection and Close.
It also shows the number of shielded (protected) applications and blocked exploit attempts. Version of the program is visible here, too.
Nothing much to do here.
Malwarebytes Anti-Exploit, General tab
Malwarebytes Anti-Exploit, General tab
The Shields tab lists all applications that the free version of Malwarebytes Anti-Exploit is able to protect (note the lock icons) and the ones it is not. Again, you can’t be busy here for long.
Malwarebytes Anti-Exploit, Shields tab
Malwarebytes Anti-Exploit, Shields tab
Logs tab is useful if the number of blocked exploits is larger than zero. Otherwise, it lists the dates and times when you started shielded applications.
The Exclude button is not available until an exploit has been blocked. You should not use it unless you really know that the blocked code or file is 100% safe. If you run into problems with seemingly legitimate items, scroll to the right to verify that the blocked file really was the item you wanted to open or run (see FilePath column).
Clear button… yeah, this is your homework to guess what this one does. Logs… clear… um, tricky! 😛
Malwarebytes Anti-Exploit, Logs tab
Malwarebytes Anti-Exploit, Logs tab
Exclusions tab is for paid version users and has Remove Exclusion button. This tab is usually empty, so I will not show it here. See for yourself! 😀
Malwarebytes Anti-Exploit version 1.06 added a brand new tab, Settings.
Automatically upgrade to new versions enables or disables program updates. This one should be enabled.
Show notification traybar tooltips turns System Tray notifications on and off. The tooltips might get annoying pretty soon, as they also pop up each time you launch a protected program. You can safely disable this option.
Remember to click Apply after making changes.
Malwarebytes Anti-Exploit, Settings tab
Malwarebytes Anti-Exploit, Settings tab
Here’s an example notification that appears in Taskbar Notification area.
Malwarebytes Anti-Exploit, system tray notification
Malwarebytes Anti-Exploit, system tray notification
Oh, did you notice the Advanced settings button in Settings tab? This one is for those who know about what each protection technique does, and get ready to experience some crashes. You do not normally need to click this one – the defaults are your safest bet.
But if you ever mess up advanced settings, the Restore defaults button is your best friend. Remember to click Apply after making changes.
Malwarebytes Anti-Exploit, Advanced Settings
Malwarebytes Anti-Exploit, Advanced Settings
Finally, About tab has some links to useful web pages at malwarebytes.org and allows activating the paid version.
And last, but not least: older versions of Malwarebytes Anti-Exploit ask you before performing fully automatic upgrades. Leave the Always upgrade automatically and transparently option enabled and click OK to accept an update. No “next”-buttons or “uninstall-old-version-first” dialogs.
Malwarebytes Anti-Exploit, new version available
Annoying message (missing dll file) appearing at start-up
by quests1 / February 1, 2009 11:34 PM PST
Hi all, I have this annoying message that keeps popping up every time I switch on my spare PC. The message is as follows:
"C\WINDOWS\SYSTEM32\YHVJIMOT.DLL is missing" and I cannot get rid of it from the start-up menu. You can click on it, and it goes away, but the next time you switch the computer on, it is there again. I have also noticed that I can no longer run de-frag. I click on the icon, but it just says, "cannot run defrag" ????
The computer is an Advent 3111 running XP Home Edition. The computer has 1gb ram memory, 40gb hard drive, 2.53gz processor. Any help or advice would be very greatful. Bill.
Discussion is locked
Flag
Permalink
Track this discussion Thread display: Collapse / Expand
22 total posts
Collapse -
(NT) Tried Google? JIMOT.DLL
by Coryphaeus / February 2, 2009 1:01 AM PST
In reply to: Annoying message (missing dll file) appearing at start-up
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
JIMOT.DLL
by quests1 / February 2, 2009 1:12 AM PST
In reply to: Tried Google? JIMOT.DLL
Have tried that, but the file is nowhere to be found. Someone did say that It must be an old software/hardware file that I removed and I may have removed more files than required.????
The problem is that not having a copy of Windows XP, only a recovery disc, does not help in any way.
Bill.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
This is often a result of having ...
by Edward ODaniel / February 2, 2009 1:23 AM PST
In reply to: Annoying message (missing dll file) appearing at start-up
either removed a program or having some malware eliminated at some point.
On the assumption that it is malware that is incompletely removed you would be well advised to download and install and run both MalwareBytes and Super Anti-Spyware.
If they don't find anything and the message box persists you can likely eliminate the message box either through a quick Registry Edit and removal of inappropriate values in the HKCU\Run or HKLM\Run keys. You can also accomplish this by downloading Mike Lin'd Startup Control Panel - http://www.mlin.net/StartupCPL.shtml - and I would suggest the 34 Kb Standalone EXE Version which you can unzip onto your desktop for use.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Another possibility
by MarkFlax Forum moderator / February 2, 2009 1:30 AM PST
In reply to: This is often a result of having ...
Assuming Edward is right that this is either software incompletely removed or malware deleted, then another possibility to check is the Startup tab of the System Configuration Editor, (MSCONFIG).
Goto Start > Run, type in msconfig , and click OK. In he new window click the Startup tab, and scroll down the list looking for any unusual entries. Drag the column headers apart if necessary to see the full path/details.
If you find anything for YHVJIMOT.DLL, remove the tick.
By amending the System Configuration Editor you are changing what is loaded at Startup. You will see an information/warning window when you click Apply, and then the next time you reboot the system, an information window will display telling you you have chosen Selective Startup. That window can be suppressed from within the window itself.
Mark
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
DLL file
by quests1 / February 2, 2009 4:46 AM PST
In reply to: Another possibility
Mark,
That has done the trick, many thanks for your help and advice. Bill
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Mark, Mike Lin's Startup Control Panel also shows ...
by Edward ODaniel / February 2, 2009 6:15 AM PST
In reply to: Another possibility
tabs for User Startup, Common Startup, and Run once entries which covers anything in the MSCONFIG which makes it handy and easy to use.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Ahh, didn't know that.
by MarkFlax Forum moderator / February 2, 2009 6:55 AM PST
In reply to: Mark, Mike Lin's Startup Control Panel also shows ...
I know of Mike Lin. I use his Startup Monitor. It's only about 60Kb, and it just sits in memory scanning the Run etc keys of the registry, and if anything ever attempts to add a run command this monitor pops up and asks if I want to allow it.
It's saved me problems many times. Happy
I have other startup monitors as well, ZoneAlarm and Windows Defender, but this one always manages to pop up first.
I wonder if 3 monitors is a little over the top? <g>
I see that the problem is solved now with all our help, so that's great.
Mark
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Dll file
by quests1 / February 2, 2009 1:36 AM PST
In reply to: This is often a result of having ...
Edward,
Not to clever when it comes to regedit and then trying to locate the file, UNLESS someone can guide me through it. I have downloded the file you mentioned and will then have to open it in my spare PC and see what happens. Give me about an hour or so and if I still get a problem, I will let you know. Thanks.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
New problem, cannot run defrag?
by quests1 / February 2, 2009 5:49 PM PST
In reply to: Dll file
Thank you guys for all your help with the annoying message about the missing dll file. All sorted out on that front. Now, my next problem is that I cannot run defrag. When I click on the defrag file, it says "Defrag not available"??
What I would like to know is there any way that I can copy the defrag program off my laptop, and then place it on my pc? Would that do the job, or do I have to obtain a copy of Windows XP as I only have a rescue disc for my Dell laptop, an not my old Advent 3111.
Thanks again. Bill.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Is that the full error message?
by MarkFlax Forum moderator / February 2, 2009 7:17 PM PST
In reply to: New problem, cannot run defrag?
When I Googled "XP Defrag not available", I didn't see any relevant hits.
It may be that there has been virus damage to the system. It isn't clear what caused that .dll startup error message in the first place, either software uninstalled or the remnants of malware,
Let us know if that is the full error message, or if not, what the full one is.
Mark
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
defrag not working?
by quests1 / February 2, 2009 8:04 PM PST
In reply to: Is that the full error message?
Hi there Mark and Kees, yes, the computer had the antivirus 2009 nasty in it, and it took me a few days to sort it out.
I have taken all, but the operating system off it and now starting to find a few little problems along the way. I click on start, programs, accessories, system tools and then defrag and then the program comes on asking me which drive I want to defrag. I click on C and then the enter key, only to get the message "cannot run defrag". I did get another essage last night saying "defrag not available" but whatever message I get, it will not run. Had I got a XP system disc. I would have run that in the computer to see if I could repair it, failing that, remove XP and then re-install it. However, I only have a rescue disc from my Dell laptop and that does nothing when I put it into the pc. It is a shame because this morning I have tried to copy a disc from my dvd drive onto my cd drive and I now get a message saying "cannot write to cd" so I seem to be getting more error messages each time I try something different. ANYWAY, its the defrag that I need to sort out at present, so I will try your suggestions and get back to you later. Bill.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
That Antivirus2009 is bad news
by MarkFlax Forum moderator / February 3, 2009 1:46 AM PST
In reply to: defrag not working?
and it seems it has done more damage than at first thought.
How did you remove it?
There's a long discussion in our Spyware forum about this, the tools to be used, and the problems encountered, to remove this, here;
http://forums.cnet.com/5208-6132_102-0.html?forumID=32&threadID=300720&messageID=2809021#2809021
What security applications did you use?
Mark
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
That Antivirus2009 is bad news
by quests1 / February 3, 2009 2:32 AM PST
In reply to: That Antivirus2009 is bad news
Mark,
The computer belonged to a friend who paid for the upgrade on the antivirus 2009, and then wondered why he was getting nowhere fast. He tried in vain to contact the website via e-mails and then got a telephone number from his credit card company, four days later. Too late for a refund, so he decided to chuck it away. I then brought it home and looked up information about the 2009 virus and through one of the guys, managed to remove it (I hope) and then started to delete the friends information from his hard drive. I have tried he defrag again using the start, run, dfrg.msg which then opens up the defrag screen asking ou to select which drive. I select C and then enter, but then I get the following message: "disc defrager could not start"
So it would seem that I have no way of running defrag. I have also checked out my cd and dvd drives and can play music on both, and rip a cd onto Windows Media player, but cannot burn a cd?
I think I need to beg,borrow,or steal a copy of XP. Bill.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
The malware may have run deep
by MarkFlax Forum moderator / February 3, 2009 4:05 AM PST
In reply to: That Antivirus2009 is bad news
and although you feel you have removed all of the Antivirus2009 infection, you may not have done.
I would follow the guidance given in the link I gave you previously, and in particular, download, install, and update Malwarebytes, (MBAM), from http://www.malwarebytes.org/
Then, boot the computer into Safe Mode, and run MalwareBytes from there to perform a full scan.
If the infection prevents you from installing MBAM on this computer, have a look at Grif Thomas' post in that thread in the link I gave, as he provides a workaround to fool any preventative action.
Mark
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Malware software & Antivirus 2009
by quests1 / February 5, 2009 2:35 AM PST
In reply to: The malware may have run deep
Mark,
Pulled down the malware software, installed it in my laptop and was amazed at what it found. I then copied it on to my pc and tried to open it, but no go? I then shut down the pc, opened in safe mode and tried to open it again, but no joy. For some unknown reason, it will not open up on my pc, okay with my other laptops though. So I think that I now need to beg, steal or borrow a copy of XP, or even find a hard drive that has it on and swop it over. We have a thing called Freecycle here in Worcester, so I might put a posting on there. Regards. Bill.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Re: Try this
by Tufenuf / February 5, 2009 2:45 AM PST
In reply to: Malware software & Antivirus 2009
Bill, Rename the Mbam.exe to something else then run it. Check out Marianna's post in the thread at the link below.
http://forums.cnet.com/5208-6142_102-0.html?forumID=5&threadID=318277&messageID=2919909&tag=forums06;posts#2919909
Tufenuf
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Renaming file.
by quests1 / February 5, 2009 8:00 PM PST
In reply to: Re: Try this
Tufenuf,
Renamed the file to bills.exe and tried to run it, but no joy. It comes up with the message "cannot run program, MSVBVM60.DLL is missing. Try re-installing. So I tried re-installing three time, and then re-naming the MBAM file, but still no joy. I have also heard today that unless I have the correct XP software and licence number, Windows will not let me register it on-line.?? Bill.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
Re: dll missing
by Kees Bakker / February 5, 2009 8:36 PM PST
In reply to: Renaming file.
Either something went wrong with the install, or the program expects the Microsoft Visual Basic runtime 6.0 to be present. You can download that from http://www.microsoft.com/downloads/details.aspx?FamilyID=bf9a24f9-b5c5-48f4-8edd-cdf2d29a79d5&DisplayLang=en. Might work, if installed, might not work, but won't harm anyway.
And it could be that it only will download on validated versions of XP. But for the moment I assume that the XP on this machine is legal and validated.
Kees
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
The "Try re-installing ..." part does not mean ...
by Edward ODaniel / February 6, 2009 12:11 AM PST
In reply to: Renaming file.
reinstalling MalwareBytes but the Visual Basic runtime library because it was written in VB. XP comes with the library but apparently during your exorcism of AV 2009 you either eliminated the runtimes or corrupted them.
Kees gave you the link to the VB runtimes -
http://www.microsoft.com/downloads/details.aspx?FamilyID=bf9a24f9-b5c5-48f4-8edd-cdf2d29a79d5&DisplayLang=en
Now, on to the DEFRAG problem.
First, DEFRAG needs plenty of free space on the drive so if your drive is almost full uninstall or delete what you don't need or move it to other media.
Second, Defrag will often fail to run if there is a disk problem so first run CHKDSK /r /f from the command prompt (even better if you can boot to the Recovery Console and run it from there) then try defrag again.
If it still fails to run try the following:
Go to the Run box on the Start Menu and type in: sfc /scannow (sfc if not reconized, and please note that there is a space between sfc and /scannow)
This command will immediately initiate the Windows File Protection service to scan all protected files and verify their integrity, replacing any files with which it finds a problem. In all likelihood you will be prompted to insert the Windows XP CD.
Now again try defrag after SFC has completed.
You might also make use of CONTIG which is designed as a file defragmenter but will work on a whole drive with "wildcards".
http://technet.microsoft.com/en-us/sysinternals/bb897428.aspx
The command for defragging the whole drive would be contig -s c:\*.* and it is relatively fast depending on size of drive.
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
"If I click on the defrag file".
by Kees Bakker / February 2, 2009 7:32 PM PST
In reply to: New problem, cannot run defrag?
- What exactly do you click on?
- What happens if you go to the command prompt and type defrag c: (+ enter). Mine starts running.
- What happens if you type dfrg.msc in the Start>Run window (+ OK)? Mine starts running.
Kees
Flag
Permalink
THIS WAS HELPFUL (0)
Collapse -
RE: DLL missing.
by quests1 / February 5, 2009 10:40 PM PST
In reply to: "If I click on the defrag file".
Kees, Yes, it is a legal copy of XP on the computer, it has the licence plate label on the back of the tower. Problem as I have said before, is that you do not get the full disc anymore, only a recovery disc, and that is a waste of time. I have tried re-installing the malware several times and changed the name. My windows update tells me that everything is updated and running fine! But it is not, so, back to the drawing board I think. Bill.
Whenever I have Malwarebytes installed I get DNS errors when trying to access the internet (self.Malwarebytes)
submitted 6 months ago by Molotuff
As the title says, and when I uninstall I can access the internet again.
5 commentsshare
all 5 comments
sorted by: best
[–]peaserist 1 point 6 months ago*
So that's what's causing them. Every so often, maybe twice a week, my internet will cut out and my web browsers will say it's a dns problem. Turning airplane mode on and off fixes it.
Never suspected malwarebytes, so this interests me greatly.
permalinkembed
[–]Malwarebytes 1 point 6 months ago
Hi /u/peaserist , please contact our support team at https://support.malwarebytes.org/customer/portal/emails/new?b_id=6400 and our team can assist you in figuring out what's going on. Thanks!
permalinkembedparent
[–]ihazurinternet 1 point 6 months ago
Do your default DNS servers change, if so, what to?
Also, do you have any changes within your hosts file?
permalinkembed
[–]oneupthextraman 1 point 6 months ago
Also, is your main AV updating? Have you scanned with malware bytes? It might be blocking going to some bad DNS (especially if you are using pro, maybe)? What is the actual error?
permalinkembedparent
[–]Malwarebytes 1 point 6 months ago
Hi /u/Molotuff , please contact our support team at https://support.malwarebytes.org/customer/portal/emails/new?b_id=6400 and our team can assist you in figuring out what's going on
MBAM error: SDKDatabaseLoadDefaults failed with code: 1812
Started by Dymium, November 22, 2014
error
code
failed
failure
database
update
59 posts in this topic
1 2 3 NEXT Page 1 of 3
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 1 Posted November 22, 2014
My previous topic is here
On 22/11/2014 at 8:51 PM, Dymium said:
Whenever I try to run a scan, MBAM will ask to install database updates. Whether or not I let it install database updates, it will fail with either "SDKDatabaseLoadDefaults failed with code: 1812" or "SDKDatabaseLoadDefaults failed with code: 2".
This same issue happens in both Chameleon mode and in Windows Safe Mode.
I'm currently running Windows 7. (Ignore the Windows 8 theme)
747cfe6e17.png
I have no idea what is causing this error, and if it is malware or not and I was told that I can get better support here.
Some things to note:
My disk is not encrypted with TrueCrypt
I have no other installed AVs besides MBAM
A scan I did with Comodo Internet Security turned up clean
Clean uninstalling and then reinstalling MBAM doesn't fix this error
This error happens in Chameleon mode and Safe Mode
Attached are the FRST and MBAM logs.
Addition.txt
CheckResults.txt
FRST.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 2 Posted November 22, 2014
Hello and post-32477-1261866970.gif
P2P/Piracy Warning:
Quote
If you're using Peer 2 Peer software such as uTorrent, BitTorrent or similar you must either fully uninstall them or completely disable them from running while being assisted here.Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.If you have illegal/cracked software, cracks, keygens etc. on the system, please remove or uninstall them now and read the policy on Piracy.
Next,
Please download Malwarebytes Anti-Rootkit from the following link:
https://malwarebytes.app.box.com/s/xiaxsbl4cjdyyqx5wp8q
Unzip the contents to a folder in a convenient location.
Open the folder where the contents were unzipped and run mbar.exe
Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
Click on the Cleanup button to remove any threats and reboot if prompted to do so.
Wait while the system shuts down and the cleanup process is performed.
Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
When done, please post the two logs produced they will be in the MBAR folder... mbar-log.txt and system-log.txt
Kevin....
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 3 Posted November 22, 2014
On 22/11/2014 at 11:46 PM, kevinf80 said:
Hello and post-32477-1261866970.gif
P2P/Piracy Warning:
Next,
Please download Malwarebytes Anti-Rootkit from the following link:
https://malwarebytes.app.box.com/s/xiaxsbl4cjdyyqx5wp8q
Unzip the contents to a folder in a convenient location.
Open the folder where the contents were unzipped and run mbar.exe
Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
Click on the Cleanup button to remove any threats and reboot if prompted to do so.
Wait while the system shuts down and the cleanup process is performed.
Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
When done, please post the two logs produced they will be in the MBAR folder... mbar-log.txt and system-log.txt
Kevin....
The link ( https://malwarebytes.app.box.com/s/xiaxsbl4cjdyyqx5wp8q)leads to a removed file, and I can't download MBAM anti-rootkit from it.
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 4 Posted November 22, 2014
Okay, instead of using that link, I went ahead and downloaded MBAM Anti-Rootkit from http://www.malwarebytes.org/downloads/ .
Updating the database goes fine, but when MBAR tries to scan, I get this error:
9Lmn9Wb.jpg
I have tried restarting and then running the scan, and I get the same error.
It only left one log, not two. I have attached it to this post.
system-log.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 5 Posted November 22, 2014
See if you can run FRST from the recovery environment as follows:
Please download Farbar Recovery Scan Tool from here:
http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/
save it to a USB flash drive. Ensure to get the correct version for your system, 32 bit or 64 bit
Note: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
Plug the flash drive into the infected PC.
If you are using Windows 8 consult How to use the Windows 8 System Recovery Environment Command Prompt Here: http://www.bleepingcomputer.com/tutorials/windows-8-recovery-environment-command-prompt/ to enter System Recovery Command prompt.
If you are using Vista or Windows 7 enter System Recovery Options.
Plug the flashdrive into the infected PC.
Enter System Recovery Options I give two methods, use whichever is convenient for you.
To enter System Recovery Options from the Advanced Boot Options:
Restart the computer.
As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
Use the arrow keys to select the Repair your computer menu item.
Select Your Country as the keyboard language settings, and then click Next.
Select the operating system you want to repair, and then click Next.
Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
Insert the installation disc.
Restart your computer.
If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
Click Repair your computer.
Select Your Country as the keyboard language settings, and then click Next.
Select the operating system you want to repair, and then click Next.
Select your user account and click Next.
On the System Recovery Options menu you may get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
Select Command Prompt
In the command window type in notepad and press Enter.
The notepad opens. Under File menu select Open.
Select "Computer" and find your flash drive letter and close the notepad.
In the command window type e:\frst64 or e:\frst depending on your version. Press Enter
Note: Replace letter e with the drive letter of your flash drive.
The tool will start to run.
When the tool opens click Yes to disclaimer.
Type the following in the edit box after "Search:".
explorer.exe
Click Search button and post the log (Search.txt) it makes to your reply.
Kevin...
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 6 Posted November 22, 2014
Okay, did that.
Search.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 7 Posted November 22, 2014
explorer.exe is patched we need to replace with FRST.. do the following:
Save the attached file fixlist.txt to your flash drive, same place as FRST.
Now please enter System Recovery Options as you did to get the log.
Run FRST and press the Fix button just once and wait.
The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.
Re-boot your PC to normal mode, see what happens when you give Malwarebytes a run...
Fixlist.txt
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 8 Posted November 22, 2014
Did that, it just reverted my custom start button.
MBAM still won't scan, I get "SDKDatabaseLoadDefaults failed with code: 2" like from before.
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 9 Posted November 22, 2014
Run this please:
Please download RogueKiller and save it to your desktop from the following link: http://www.bleepingcomputer.com/download/roguekiller/
Quit all running programs.
For Windows XP, double-click to start.
For Vista,Windows 7/8, Right-click on the program and select Run as Administrator to start and when prompted allow it to run.
Read and accept the EULA (End User Licene Agreement)
Click Scan to scan the system.
When the scan completes select "Report", log will open. Close the program > Don't Fix anything!
Post back the report which should also be located here:
C:\Programdata\RogueKiller\Logs <-------- W7/8
C:\Documents and Settings\All Users\Application Data\RogueKiller\Logs <------XP
Kevin...
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 10 Posted November 22, 2014
Done.
RKreport_SCN_11222014_175540.log
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 11 Posted November 22, 2014
Go here: https://forums.malwarebytes.org/index.php?/topic/146017-mbam-clean-removal-process-2x/ follow those instructions for clean install of Malwarebytes,
When reinstalling the program please try the latest version from here:
http://www.malwarebytes.org/mwb-download/
Right click and choose "Run as administrator" to open Malwarebytes Anti-Malware and from the Dashboard please Check for Updates by clicking the Update Now... link
Open up Malwarebytes > Settings > Detection and Protection > Enable Scan for rootkit and Under Non Malware Protection set both PUP and PUM to Treat detections as malware.
Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.
Once completed please click on the History > Application Logs and find your scan log and open it and then click on the "copy to clipboard" button and post back the results on your next reply.
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 12 Posted November 22, 2014
Scan still won't run, same error as before.
Malwarebytes Anti-Malwarewww.malwarebytes.orgScan Date: 11/22/2014Scan Time: 6:30:11 PMLogfile: Administrator: YesVersion: 0.00.0.0000Malware Database: v2014.11.22.15Rootkit Database: v2014.11.22.01License: FreeMalware Protection: DisabledMalicious Website Protection: DisabledSelf-protection: DisabledOS: Windows 7 Service Pack 1CPU: x64File System: NTFSUser: AdministratorScan Type: Result: FailedObjects Scanned: 0(No malicious items detected)Time Elapsed: 0 min, 0 secMemory: DisabledStartup: DisabledFilesystem: DisabledArchives: EnabledRootkits: DisabledHeuristics: DisabledPUP: DisabledPUM: DisabledProcesses: 0(No malicious items detected)Modules: 0(No malicious items detected)Registry Keys: 0(No malicious items detected)Registry Values: 0(No malicious items detected)Registry Data: 0(No malicious items detected)Folders: 0(No malicious items detected)Files: 0(No malicious items detected)Physical Sectors: 0(No malicious items detected)(end)
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 13 Posted November 22, 2014
All settings are disabled, Open Malwarebytes, select "Settings" then select "General settings" then select "Restore default settings" > then select "Detection and Protection" then select "Recommended Settings"
Will malwarebytes now run a threat scan?
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 14 Posted November 23, 2014
On 23/11/2014 at 5:21 AM, kevinf80 said:
All settings are disabled, Open Malwarebytes, select "Settings" then select "General settings" then select "Restore default settings" > then select "Detection and Protection" then select "Recommended Settings"
Will malwarebytes now run a threat scan?
No, I still get the same error that I have been getting.
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 15 Posted November 23, 2014
Download RKill from here: http://www.bleepingcomputer.com/download/rkill/
There are three buttons to choose from with different names on, select the first one and save it to your desktop.
Double-click on the Rkill desktop icon to run the tool.
If using Vista or Windows 7/8, right-click on it and Run As Administrator.
A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
A log pops up at the end of the run. This log file is located at C:\rkill.log. Please post this in your next reply.
If you do not see the black box flash on the screen delete the icon from the desktop and go back to the link for the download, select the next button and try to run the tool again, continue to repeat this process using the remaining buttons until the tool runs. You will find further links if you scroll down the page with other names, try them one at a time.
If the tool does not run from any of the links provided, please let me know.
Next,
Read the following link before we continue and run Combofix:
ComboFix usage, Questions, Help? - Look here
Next,
Delete any versions of Combofix that you may have on your Desktop, download a fresh copy from either of the following links :-
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
http://www.infospyware.net/antimalware/combofix/
Ensure that Combofix is saved directly to the Desktop <--- Very important
Disable all security programs as they will have a negative effect on Combofix, instructions available here http://www.bleepingcomputer.com/forums/topic114351.html if required. Be aware the list may not have all programs listed, if you need more help please ask.
Close any open browsers and any other programs you might have running
Double click the combofix.gif icon to run the tool (Vista or Windows 7 users right click and select "Run as Administrator)
Instructions for running Combofix available here http://www.bleepingcomputer.com/combofix/how-to-use-combofix if required.
If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review
****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****
Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell us when you reply. Read here http://thespykiller.co.uk/index.php?page=20 why disabling autoruns is recommended.
*EXTRA NOTES*
If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)
Post the log in next reply please...
Kevin
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 16 Posted November 23, 2014
Sorry for the long wait for my reply.
There was no C:\rkill.log , but Rkill left a log in the folder I ran it from. I've attached it to this post.
I've also attached the ComboFix log.
Rkill.txt
ComboFix.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 17 Posted November 23, 2014
Thanks for the logs, continue please.....
1. Close any open browsers.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
3. Open notepad and copy/paste the text in the Codebox below into it:
ClearJavaCache::
Save this as CFScript.txt, and as Type: All Files(*.*) in the same location as ComboFix.exe
CF3.jpg
CFScriptB-4.gif
Refering to the picture above, drag CFScript into ComboFix.exe
When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Next,
Run Eset Online Scanner
**Note** You will need to use Internet explorer for this scan - Vista and Windows 7/8 right click on IE shortcut and run as admin.
(To run ESET Online Scanner in a browser other than Internet Explorer, you'll need to download ESET SMART Installer during the process)
Go to Eset web page http://www.eset.com/us/online-scanner/ to run an online scan from ESET.
Turn off the real time scanner of any existing antivirus program while performing the online scan
click on the Run ESET Online Scanner button
Tick the box next to YES, I accept the Terms of Use.
Click Start
When asked, allow the add/on to be installed
Click Start
Make sure that the option "Remove found threats" is UNticked
Click on Advanced Settings, ensure the following options are checked:
Scan for potentially unsafe applications
Enable Anti-Stealth Technology
Click Scan
wait for the virus definitions to be downloaded
Wait for the scan to finish
When the scan is complete
If no threats were found
put a checkmark in "Uninstall application on close"
close program
report to me that nothing was found
If threats were found
click on "list of threats found"
click on "export to text file" and save it as ESET SCAN and save to the desktop
Click on back
put a checkmark in "Uninstall application on close"
click on finish
close program
Copy and paste the report in next reply.
Kevin...
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 18 Posted November 24, 2014
Nothing was found in the scan.
ComboFix.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 19 Posted November 24, 2014
Thanks for those logs, continus as follows and run a clean install of Malwarebytes:
Download and save mbam-clean.exe and save to your desktop from the following:
http://www.malwarebytes.org/mbam-clean.exe
Now do the following:
Click on Start and select Control Panel
Open Uninstall a Program for XP use Add/Remove Programs
Uninstall Malwarebytes' Anti-Malware
Restart your computer, very important to do that!!
Run mbam-clean.exe
It will ask to restart your computer, please allow it to do so, very important!!
Next, D/L and install Malwarebytes again and update as follows :-
Download Malwarebytes Anti-Malware to your desktop.
Double-click mbam-setup and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to the following:
Launch Malwarebytes Anti-Malware
A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
Click Finish.
On the Dashboard, click the 'Update Now >>' link
After the update completes Select > Settings > Detection and Protection > Enable Scan for rootkit and Under Non Malware Protection set both PUP and PUM to Treat detections as malware.
Now select > Scan > Threat scan > Scan now
When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
In most cases, a restart will be required.
Wait for the prompt to restart the computer to appear, then click on Yes.
After the restart (If applicable) once you are back at your desktop, open MBAM once more.
Click on the History tab > Application Logs.
Double click on the scan log which shows the Date and time of the scan just performed.
Click 'Copy to Clipboard'
Paste the contents of the clipboard into your reply.
Kevin
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 20 Posted November 25, 2014
I followed your instructions exactly, and the scan will still not run. It produces the same error that's in my original post.
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 21 Posted November 25, 2014
We must have missed deep rooted malware/infection, continue please:
Re-run FRST make sure all boxes are checkmarked under "Whitelist" also make sure only "Addition.txt" is checkmarked under "Optional scan"
Post both logs, FRST.txt and Addition.txt
Next,
Please download Gmer from Here by clicking on the "Download EXE" Button.
Double click on the randomly named GMER.exe. If asked to allow gmer.sys driver to load, please consent.
If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO.
In the right panel, you will see several boxes that have been checked. Uncheck the following ...
Sections
IAT/EAT
Show All ( should be unchecked by default )
Leave everything else as it is.
Close all other running Programs as well as your Browsers.
Click the Scan button & wait for it to finish.
Once done click on the Save.. button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post.
Save it where you can easily find it, such as your desktop.
Please post the content of the ark.txt here.
**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries
**If GMER crashes** Follow the instructions here and disable your security temporarily…
Next,
Please download aswMBR from here: http://files.avast.com/files/rootkit-scanner/aswmbr.exe Save to your desktop.
Double click theaswMBR.exe icon, and click Run
There will be a short delay before the next dialog box comes up. Please just wait a minute or two.
When asked if you'd like to "download the latest Avast! virus definitions", click Yes.
Typically this is about a 100MB download so depending on your connection speed it can take a short while to download and become ready.
Click the Scan button to start the scan once the update has finished downloading
On completion of the scan, click the save log button, save it to your desktop, then copy and paste it in your next reply.
Note: There will also be a file on your desktop named MBR.dat do not delete this for now. It is an actual backup of the MBR (master boot record).
Thanks,
Kevin...
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 22 Posted November 26, 2014
GMER runs, but it gets this error partway through the scan:
------------------------------------------------------C:\Users\Administrator\ntuser.dat: The process cannot access the file because it is being used by another process.---------------------------OK ---------------------------It then says it has completed scanning, and the log it produces is empty.
All the other scans ran OK, I posted the logs.
Addition.txt
aswMBR.txt
FRST.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 23 Posted November 26, 2014
GMER should not show that error. was GMER running from an account with Admistrator status?
Run this please...
Please read carefully and follow these steps.
Download TDSSKiller from here http://support.kaspersky.com/downloads/utils/tdsskiller.exe and save it to your Desktop.
Doubleclick on tdssk.jpg to run the application.
The "Ready to scan" window will open, Click on "Change parameters"
tda.png
Place a checkmark next to Verify Driver Digital Signature and Detect TDLFS file system, (Leave "Service & Drivers" and "Boot Sectors" ticked. Click OK.
td1.png
Select "Start Scan"
tdb.png
If an infected file is detected, the default action will be Cure, click on Continue.
td2.png
If a suspicious file is detected, the default action will be Skip, click on Continue.
td3.png
It may ask you to reboot the computer to complete the process. Click on Reboot Now.
td4.png
If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.
Thanks,
Kevin..
Dymium
New Member
Topic Starter
Dymium
Members
34 posts
ID: 24 Posted November 27, 2014
GMER was running with full administrator status.
TDSSKiller found no infections.
TDSS log.txt
kevinf80
Forum Deity
kevinf80
Trusted Advisors
15,750 posts
Location: Sunderland. UK
ID: 25 Posted November 27, 2014
Select Windows key and R key together. Into the run box type regedit tap enter, Registry Editor will open.....
Expand the following key :-
HKEY_LOCAL_MACHINE >SOFTWARE > Policies > Microsoft > Windows > safer > codeidentifiers > 0
Do not expand the folder 0 Right click on that folder and choose "Export"
reg-2.png
A new widow will open, make sure to change "saved in" to Desktop.
reg2-1.png
From the desktop right click on the reg file > select > send to > compressed (zipped) folder....
Is there a cure for "SDKDatabaseLoadDefaults failed" problem?
Started by gallilaw, March 29, 2015
SDKDatabaseLoadDefaults
9 posts in this topic
gallilaw
New Member
Topic Starter
gallilaw
Members
1 post
ID: 1 Posted March 29, 2015
I have the SDKDatabaseLoadDefaults problem and have found recent threads where users with the problem have been asked to perform many lengthy and rigourous operations in order to find and solve the cause for the problem.... but I have not found a thread where the process they were required to go through ended in success. Maybe it was successful, maybe it wasn't. The thread doesn't tell us. Obviously, users with the problem don't want to go through a long and difficult process that doesn't fix the problem.
Please let us know what process has actually achieved SUCCESS in finding and fixing the cause of the SDKDatabaseLoadDefaults problem.
If no solution for the problem has been found, but MWB is working to find it, it would be nice to know that as well.
Thanks.
Firefox
Forum Deity
Firefox
Trusted Advisors
15,204 posts
Location: USA
ID: 2 Posted March 29, 2015
Hello and Welcome to Malwarebytes :)
Can't speak for Malwarebytes, as I don't work for them, but I know every computer is different. Lets see if this solves your issue..
Let's try this first....
Please uninstall your current version of MBAM and reinstall the latest build - MBAM Clean Removal Process for version 2x
If that does not correct the issue, then Please read the following and in your next reply ATTACH the 3 requested logs - Diagnostic Logs
(the three files should be CheckResults.txt, FRST.txt and Addition.txt)
NOTE: There is an FAQ section with valuable information located here => Common Questions, Issues, and their Solutions
Thank You,
Firefox
Maurice Naggar
Staff
Maurice Naggar
Moderators
16,643 posts
Location: USA
Interests: Security, Windows, Windows Update, malware prevention
ID: 3 Posted March 30, 2015 (edited)
Hello Galilaw and welcome to the Malwarebytes forum. Salutations Firefox.
The issue at hand does not happen universally. But when it does, it is most often seen right around the time of version upgrade. Sometimes it may even be at the next following automated scan run.
In any event, the easiest ( and most often cures) are:
Doing a reboot ( Restart ).
If no joy, do a cold boot start ( power off, count to 30, Power back on).
Other tip:
Do this please: Empty out the Quarantine area, plus the reports History area.
Start the Anti-Malware ( which you can do by double-clicking the icon in the Taskbar or on the Desktop).
Click HISTORY. On The Quarantine area, if there is many items there, please click once the top check box at upper Left, and then click the Delete All button at the bottom.
Next, Click on button marked Application Logs. please click once the top check box at upper Left, and then click the Delete All button at the bottom. Then Close the program.
One further tip:
Some situations do also involve a un-dealt with infection of some sort, so....
Please see about doing a Scan run using Chameleon.
See this guide on the Knowledge base-> https://support.malwarebytes.org/customer/portal/articles/1833358?b_id=6447
If the SDKDatabaseLoadDefaults Code 2 error still happens then a Uninstall thru Control Panel's Programs and Features is the thing to do.
Then a new installation:
Get the very latest Malwarebytes' Anti-Malware version by following the link below.
http://downloads.malwarebytes.org/file/mbam
Save the file and double-click it to begin the installation, selecting options you desire when presented.
When finished with install, be sure to do a Restart right after the install completion.
Edited April 2, 2015 by Maurice Naggar
Jekko
Staff
Jekko
Staff
221 posts
ID: 4 Posted April 1, 2015
On 29/03/2015 at 11:55 PM, gallilaw said:
I have the SDKDatabaseLoadDefaults problem and have found recent threads where users with the problem have been asked to perform many lengthy and rigourous operations in order to find and solve the cause for the problem.... but I have not found a thread where the process they were required to go through ended in success. Maybe it was successful, maybe it wasn't. The thread doesn't tell us. Obviously, users with the problem don't want to go through a long and difficult process that doesn't fix the problem.
Please let us know what process has actually achieved SUCCESS in finding and fixing the cause of the SDKDatabaseLoadDefaults problem.
If no solution for the problem has been found, but MWB is working to find it, it would be nice to know that as well.
Thanks.
Hi there gallilaw,
We are currently researching this issue and trying to find a fix for it. So far the popular workarounds have been posted by Maurice above me, but if you would like to help us try to track down why this is happening, I'm looking for:
The diagnostic logs listed here: https://forums.malwarebytes.org/index.php?/topic/146024-diagnostic-logs/
A copy of your Malwarebytes Program Data: C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware
If you could get us those items, that would greatly help us :)
gloria_patri
New Member
gloria_patri
Members
2 posts
ID: 5 Posted April 4, 2015
Doing a Scan run using Chameleon helped this second time. No uninstall/install needed! Thank you Jesus and Maurice :) Happy Resurrection Sunday ~
Maurice Naggar
Staff
Maurice Naggar
Moderators
16,643 posts
Location: USA
Interests: Security, Windows, Windows Update, malware prevention
ID: 6 Posted April 4, 2015
:welcome: Hi Gloria,
Thank you for the good news.
In most of the recent cases I have seen, the SDK Code 2 is actually from a compound situation of (a) having too many scheduled automatic Threat scan tasks in the Scheduler and also from (b) having the choice in the automatic Scan task to have it ( also) do a Checkup for Update within that same automatic job.
Therefore, My current & revised advice is to review very very closely all the automated tasks in Settings -> Automated Scheduling.
a) reduce or remove duplicated or un-needed Threat scan jobs
b) remove the doing of a automated Check for Update from the task for Threat scans.
gloria_patri
New Member
gloria_patri
Members
2 posts
ID: 7 Posted April 4, 2015 (edited)
Thank You Maurice! I did all as you advised regarding Automated Scheduling in e-mail to lisa. We are one in the same! Much obliged! God's spede ~
Edited April 4, 2015 by Maurice Naggar
webutton99z
New Member
webutton99z
Members
1 post
ID: 8 Posted April 6, 2015
I was getting the error last night and I followed the minimum instructions - delete the quaratine items and the history items and exited the program. I restarted and it worked without a problem. :D
"Malwarebytes Anti-Malware: Run-time error '339'"
Started by rebelrider87, May 3, 2013
run-time error
malwarebytes
installation
2 posts in this topic
rebelrider87
New Member
Topic Starter
rebelrider87
Members
4 posts
ID: 1 Posted May 3, 2013
I am new here. I just downloaded Malwarebytes Anti-Malware so I can try to find the source of some very annoying popups in my lower left and right hand corners. I turned off my firewall and Microsoft Security Essentials before installation. When it tries to open I get the message "Run-time error '339': Component 'ieframe.dll' or one of its dependencies not correctly registered: a file is missing or invalid"
I am on Windows 7.
How do I proceed to open Malwarebytes, run the program and eliminate the malware?
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 2 Posted May 4, 2013
Please create an mbam-check log:
Download mbam-check.exe from here and save it to your desktop
Double-click on mbam-check.exe to run it, it should then open a log file
Please do not copy and paste the entire contents of the log into your next post, instead please attach the log CheckResults.txt file which should now be located on your desktop to your next post
Next, Please run the following scanner and send back the logs.
Download DDS from one of the locations below and save to your Desktop
dds.scr
dds.com
Temporarily disable any script blocker if your Anti-Virus/Anti-Malware has it.
How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs
Once downloaded you can disconnect from the Internet and disable your Ant-Virus temporarily if needed.
Then double click dds.scr or dds.com to run the tool.
Click the Run button if prompted with an Open File - Security Warning dialog box.
A black DOS console should open and run for a moment.
When done, DDS will open two (2) logs:
DDS.txt
Attach.txt
Save both reports to your desktop
Please include the following logs in your next reply: DDS.txt and Attach.txt
You can ignore the note about zipping the Attach.txt file in most cases.
What should I do if I receive an SDK DatabaseLoad Defaults error?
When using Malwarebytes Anti-Malware, sometimes you may receive the following error messages:
SDKDatabaseLoadDefaultsLoad failed with code:2
SDKDatabaseLoadDefaultsLoad failed with code:1812
These errors occur when two database updates are occurring at the same time. Please make sure you have the latest version of Malwarebytes Anti-Malware. This usually happens as a result of a scheduled update and a scheduled scan that are configured near or on the same time. To prevent these errors from happening, please do the following.
Launch Malwarebytes Anti-Malware
Click Settings > Automated Scheduling
Double-click on a Scheduled Scan
Uncheck the box, Check for updates before scanning
Repeat steps 3 and 4 for any other scheduled scans
Restart the computer
Additionally, please try to limit the number of scheduled updates you have. If you have multiple updates scheduled, it may be best to remove ones that are redundant to help prevent this error from occurring. If you are still seeing the SDK errors after making these changes, please contact our Support team and we can assist further.
Error: SDKDatabaseLoadDefaults failed (v2.0.0.1)
Started by nrnoble, April 2, 2014
11 posts in this topic
nrnoble
New Member
Topic Starter
nrnoble
Members
6 posts
ID: 1 Posted April 2, 2014
Today I purchased the premium edition and I am getting this error:
---------------------------
Malwarebytes Anti-Malware
---------------------------
SDKDatabaseLoadDefaults failed with code: 2
---------------------------
OK
---------------------------
See attached image
Version 2.0.0.1 (downloaded today)
I've noticed that it keeps downloading the database because it thinks there is no database installed. It downloads the database without errors, but continues report a scan error "SDKDatabaseLoadDefaults failed". Plus the website protection is disabled.
I found this topic, but its closed as having been resolved as fixed: https://forums.malwarebytes.org/index.php?showtopic=142302
I've uninstalled\re-installed, Rebooted, and tried various other trouble shooting efforts, but have yet to find a solution.
Win7 Ultimate with all required updates.
No other malware or virus protection installed.
System very clean, recently installed OS less than a week ago.
post-159843-0-52118700-1396439722_thumb.
post-159843-0-18513000-1396439821_thumb.
post-159843-0-49950900-1396439883_thumb.
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 2 Posted April 2, 2014
Please try the following and let us know if it resolves the issue or not.
MBAM Clean Removal Process
Thanks
nrnoble
New Member
Topic Starter
nrnoble
Members
6 posts
ID: 3 Posted April 2, 2014
Thanks, I followed the directions but, unfortunately I am now getting a similar error with a different error code: 1812
post-159843-0-62209600-1396442834_thumb.
Firefox
Forum Deity
Firefox
Trusted Advisors
15,204 posts
Location: USA
ID: 4 Posted April 2, 2014
Until Ron returns, please provide the logs below so that he may review them and see what may be causing the issue....
STEP 1
NOTE: If you have Win8/8.1 Skip Step 1 and go to Step 2 as DDS does not work on Win8/8.1
Please run the DDS scanner and send back both logs as attachments to your next reply.
Download DDS from one of the locations below and save it to your Desktop:
dds.scr
dds.com
Temporarily disable any script blocker if your Anti-Virus/Anti-Malware has it.
How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs
Once downloaded you can disconnect from the Internet and disable your Ant-Virus temporarily if needed.
Then double click dds.scr or dds.com to run the tool.
Click the Run button if prompted with an Open File - Security Warning dialog box.
A black DOS console should open and run for a moment.
When done, DDS will open two (2) logs:
DDS.txt
Attach.txt
Save both reports to your desktop
Please include both of the following logs in your next reply as an attachment: DDS.txt and Attach.txt
You can ignore the note about zipping the Attach.txt file and just post it or attach it.
STEP 2
Please run mbam-check and send back the log as an attachment to your next reply.
Download mbam-check.exe from HERE and save it to your desktop
Double-click on mbam-check.exe to run it, it should then open a log file
Please do not copy and paste the entire contents of the log into your next post; instead please attach to your next reply the CheckResults.txt log file which should now be located on your desktop.
STEP 3
Please run the FRST tool and send back both logs as attachments to your next reply.
Download Farbar Recovery Scan Tool and save it to your desktop.
Note: You need to run the version compatible with your system. If you are not sure which version applies to your system, download both of them and try to run them. Only one of them will run on your system - that will be the right version.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your next reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your next reply.
nrnoble
New Member
Topic Starter
nrnoble
Members
6 posts
ID: 5 Posted April 2, 2014
Thanks I will do that
What does error 1812 mean? If I have a basic understanding of what might be wrong, I might be able to figure out why its not working on my system.
Firefox
Forum Deity
Firefox
Trusted Advisors
15,204 posts
Location: USA
ID: 6 Posted April 2, 2014
Not sure what the code means at the moment, but the logs should help to figure out what may be causing your issues...
nrnoble
New Member
Topic Starter
nrnoble
Members
6 posts
ID: 7 Posted April 2, 2014
Files attached
CheckResults.txt
dds.txt
attach.txt
Firefox
Forum Deity
Firefox
Trusted Advisors
15,204 posts
Location: USA
ID: 8 Posted April 2, 2014
nrnoble, thanks for posting those logs.
This computer is having quite a few issues that are either due to a software/hardware conflict or possibly due to and infection or previous infection. Its going to be best to have an expert help you get that computer checked out to rule any possible infections first. This is done for free by one of our expert volunteers in a different section of the forum. Simply follow the instructions below.
Being that you are probably infected, feel free to follow the instructions below to receive free, one-on-one expert assistance in checking your system and clearing out any infections and correcting any damage done by the malware.
Please see the following pinned topic which has information on how to get help with this: Available Assistance for Possibly Infected Computers
Thank you
==== Event Viewer Messages From Past Week ========.4/2/2014 6:20:34 AM, Error: Ntfs [137] - The default transaction resource manager on volume Z: encountered a non-retryable error and could not start. The data contains the error code.4/2/2014 6:09:55 AM, Error: Ntfs [137] - The default transaction resource manager on volume V: encountered a non-retryable error and could not start. The data contains the error code.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 7 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 6 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 5 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 4 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 3 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 2 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 1 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 5:38:10 AM, Error: Microsoft-Windows-Kernel-Processor-Power [35] - Performance power management features on processor 0 in group 0 are disabled due to a firmware problem. Check with the computer manufacturer for updated firmware.4/2/2014 4:42:02 AM, Error: VDS Basic Provider [1] - Unexpected failure. Error code: 490@010100044/1/2014 2:56:23 PM, Error: Microsoft-Windows-WMPNSS-Service [14365] - Proximity detection failed due to unknown error '0x80004004'. The best proximity time detected was -1 milliseconds.3/31/2014 5:52:54 PM, Error: Service Control Manager [7000] - The Vstor2 MntApi 2.0 Driver (shared) service failed to start due to the following error: The system cannot find the file specified.3/31/2014 5:52:54 PM, Error: Service Control Manager [7000] - The VMware USB Arbitration Service service failed to start due to the following error: The system cannot find the file specified.3/31/2014 5:49:36 PM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the VMware Authorization Service service to connect.3/31/2014 5:49:36 PM, Error: Service Control Manager [7000] - The VMware Authorization Service service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.3/31/2014 4:28:47 PM, Error: Service Control Manager [7000] - The Vstor2 MntApi 1.0 Driver (shared) service failed to start due to the following error: The system cannot find the file specified.3/31/2014 3:30:17 PM, Error: Schannel [36888] - The following fatal alert was generated: 43. The internal error state is 252.3/29/2014 7:23:30 PM, Error: Service Control Manager [7032] - The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the Windows Management Instrumentation service, but this action failed with the following error: An instance of the service is already running.3/29/2014 7:23:30 PM, Error: Service Control Manager [7032] - The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the IKE and AuthIP IPsec Keying Modules service, but this action failed with the following error: An instance of the service is already running.3/29/2014 7:23:30 PM, Error: Service Control Manager [7032] - The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the Computer Browser service, but this action failed with the following error: An instance of the service is already running.3/29/2014 7:22:30 PM, Error: Service Control Manager [7032] - The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the Server service, but this action failed with the following error: An instance of the service is already running.3/29/2014 7:22:30 PM, Error: Service Control Manager [7032] - The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the Application Experience service, but this action failed with the following error: An instance of the service is already running.3/29/2014 7:21:30 PM, Error: Service Control Manager [7034] - The Application Management service terminated unexpectedly. It has done this 1 time(s).3/29/2014 7:21:30 PM, Error: Service Control Manager [7034] - The Application Information service terminated unexpectedly. It has done this 1 time(s).3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Windows Update service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Windows Management Instrumentation service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The User Profile Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Themes service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Task Scheduler service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The System Event Notification Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Shell Hardware Detection service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Server service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Remote Desktop Configuration service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Multimedia Class Scheduler service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The IP Helper service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The IKE and AuthIP IPsec Keying Modules service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Computer Browser service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Certificate Propagation service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Background Intelligent Transfer Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:21:30 PM, Error: Service Control Manager [7031] - The Application Experience service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.3/29/2014 7:16:19 PM, Error: srv [2017] - The server was unable to allocate from the system nonpaged pool because the server reached the configured limit for nonpaged pool allocations.3/29/2014 7:14:45 PM, Error: Microsoft-Windows-WindowsUpdateClient [20] - Installation Failure: Windows failed to install the following update with error 0x800706be: Service Pack 1 for Microsoft Office 2013 (KB2850036) 32-Bit Edition.3/29/2014 3:03:00 AM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the Windows Search service to connect.3/29/2014 3:03:00 AM, Error: Service Control Manager [7000] - The Windows Search service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.3/29/2014 3:03:00 AM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1053" attempting to start the service WSearch with arguments "" in order to run the server: {7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}3/28/2014 8:52:41 PM, Error: Schannel [36888] - The following fatal alert was generated: 10. The internal error state is 10.3/28/2014 8:29:04 PM, Error: Service Control Manager [7011] - A timeout (30000 milliseconds) was reached while waiting for a transaction response from the osppsvc service.3/28/2014 1:25:14 PM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the Steam Client Service service to connect.3/28/2014 1:25:14 PM, Error: Service Control Manager [7000] - The Steam Client Service service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.3/27/2014 6:57:58 PM, Error: Microsoft-Windows-WER-SystemErrorReporting [1001] - The computer has rebooted from a bugcheck. The bugcheck was: 0x00000050 (0xfffffa80c39c11f8, 0x0000000000000000, 0xfffff80002bba3e0, 0x0000000000000005). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 032714-16083-01..
nrnoble
New Member
Topic Starter
nrnoble
Members
6 posts
ID: 9 Posted April 2, 2014
Several of those errors have already been resolved and are nolonger a concern, and were not a result of virus infection.
At this time I am only concerned with any error that preventing Malwarebyes from operating.
What does malwarebye error 1812 mean?
Thanks
AdvancedSetup
Staff
AdvancedSetup
Root Admin
63,643 posts
Location: US
ID: 10 Posted April 2, 2014
It means one of the files was corrupted. Please follow the directions posted by Firefox if you wish to get the computer fixed. You have obvious issue in the Event Logs there are from today not from before.
Thank you
Jcolagrossi
Staff
Jcolagrossi
Moderators
61 posts
ID: 11 Posted May 26, 2014
Hi Nrnoble,
I wanted to reach out and ask if this issue has been resolved yet and if so, what was done to resolve it?
Malwarebytes Code 1812...what does it mean?
Hi. Got on the laptop this am and this message appeared:
"SDKDatabase Load Defaults failed with code: 1812"
I opened the Malwarebytes program and it had updated and scanned. There were no threats listed. Should I be concerned?
I have Windows 7.
Virus With Foreign Characters
Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by RoadRunner1, Jan 19, 2016.
RoadRunner1
RoadRunner1
Private E-2
Hi,
About two weeks ago a friend tried downloading a PS3 computer version. After that my browser homepage was hijacked with Chinese characters. I was able to reset my browser homepage and Super Anti Spyware detected some a PUP and Trojan that were removed. I have Kaspersky Anti Virus and the first things detected were Trojan-Downloader.Win32.Upatre.fniz & UDS: DangerousObjectMulti.Generic (all in Temp Folders). I still have some files with Chinese characters (C:/Windows/Installer) and I have not been able to run Malware Bytes Anti Malware regardless of how many times I've installed and removed it, not even in Safe Mode. The latest error message is 'SDK Database Load Defaults failed 1812'. It also says that the Threat Scan was completed successfully but when I save the results the log is blank and the requested log is not in the History tab. Other times it says that the Threat Scan was cancelled. At this point I'm at my wits end and would prefer disinfecting the computer without having to reinstall Windows 7. I have prior Hitman Pro and TDSS logs available, if needed. At this time I've attached the logs I ran today. Your assistance is greatly appreciated.
Attached Files:
HitmanPro_20160119_1153.log
File size:1.4 KB
Views:4
Malwarebytes_2016.01.19.txt
File size:49 bytes
Views:4
MGlogs.zip
File size:385.3 KB
Views:5
RogueKiller 2016.01.19.txt
File size:7.5 KB
Views:7
TDSSKiller.3.1.0.9_19.01.2016_12.28.19_log.txt
File size:321.5 KB
Views:4
RoadRunner1, Jan 19, 2016 #1
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
Hi there and welcome, RoadRunner1,
I am currently reviewing your logs and will get back to you with a response very soon.
Kestrel13!, Jan 19, 2016 #2
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
Fix items using RogueKiller.
Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
When it opens, press the Scan button
Now click the Registry tab and locate these detections:
[PUP] (X86) HKEY_LOCAL_MACHINE\Software\Tencent -> Found
[PUP] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\.QMDeskTopGCIcon | (default) : {B7667919-3765-4815-A66D-98A09BE662D6} -> Found
Place a checkmark next to each of these items, leave the others unchecked.
Now press the Delete button.
...and the same for this entry on the files tab please....
[PUP][Folder] C:\ProgramData\{c56332c3-6d26-0c13-c563-332c36d2cb0d} -> Found
When it is finished, there will be a log on your desktop called: RKreport[2].txt
Attach RKreport[2].txt to your next message. (How to attach)
Reboot the machine.
[IMG] Please download Junkware Removal Tool to your desktop.
Shut down your protection software now to avoid potential conflicts.
Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
Attach JRT.txt to your next message.
Download and run OTM.
Download OTM by Old Timer and save it to your Desktop.
Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
Paste the following code under the [IMG] area. Do not include the word Code.
Code:
:Files
C:\Users\Arbi\AppData\Local\Temp\{2B7C5F6C-85DB-49FE-AFC4-950A4F5C5589}\{9768AEEB-B562-4C84-AE03-2FCA799A173C}.exe
C:\Windows\system32\tasks\{33E77B4B-CC9E-404E-BE35-28F75CAB7B35}
C:\Windows\system32\tasks\{451EA596-14DA-4552-9C48-C78C51C8F055}
C:\Windows\system32\tasks\{51BBE6D2-A5D7-473B-B080-80D722EBE022}
C:\Windows\system32\tasks\{52BB2F22-45AF-4CBE-8580-EDC93546F401}
C:\Windows\system32\tasks\{54904343-6A20-4884-889D-35F9132B3A20}
C:\Windows\system32\tasks\{8387F66A-C4F6-40E4-8657-D3C02F177BEC}
C:\Windows\system32\tasks\{9D5C86E3-7EB9-4F5A-B0FE-9C1408E01DF9}
C:\Windows\system32\tasks\{B113D15B-B75F-4306-9C0C-67D5F5DC19F0}
C:\Windows\system32\tasks\{C9447259-6DF5-48FD-995A-B76D8A146FB3}
C:\Windows\system32\tasks\{CDFFDB50-E574-49E5-9131-874093416171}
C:\Windows\system32\tasks\{D1DB67BE-6436-4B8C-B594-3D1A64881EC4}
C:\Windows\system32\tasks\{F3F42272-D0DE-4FC8-8289-66937E1855C6}
:Commands
[emptytemp]
[Reboot]
Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
Push the large [IMG] button.
OTM may ask to reboot the machine. Please do so if asked.
Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.
NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.
Download>>> Cleano 1.31
Download it to your desktop, Right click the cleano.exe file and run as admin > and place check marks in the boxes as follows (click on link below to see image)
View attachment 148092
Click clean now and exit the program.
Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.
Note: Make sure you download the correct version for your PC. Only the correct version will work.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
When you rescan with Malware Bytes does it find anything?
How are things running now?
Kestrel13!, Jan 19, 2016 #3
RoadRunner1
RoadRunner1
Private E-2
Hi. Thanks for your reply. Please see the attached logs. Malware Bytes Anti Malware still does not complete a scan. I ran it right after Farbar Recovery and received the message 'SDK Database Load Default Error 1812'. I rebooted and then received an error messaging stating that the program had to close. Should I uninstall and try again?
Attached Files:
Addition.txt
File size:53.3 KB
Views:2
FRST.txt
File size:132.3 KB
Views:6
JRT.txt
File size:770 bytes
Views:3
OTM 01192016_212341.log
File size:57.9 KB
Views:2
RK Report 2016.01.19(2).txt
File size:9.4 KB
Views:3
RoadRunner1, Jan 19, 2016 #4
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
Sorry, forgot to ask you to do this as well.... Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
Also re run RogueKiller yet again (just a scan) and attach log please.
Kestrel13!, Jan 20, 2016 #5
RoadRunner1
RoadRunner1
Private E-2
NP. Here they are.
Attached Files:
MGlogs 2016.01.20.zip
File size:356.1 KB
Views:1
RK Report 2016.01.20 (1).txt
File size:7.8 KB
Views:1
RoadRunner1, Jan 20, 2016 #6
Kestrel13! likes this.
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
Uninstall Malware Bytes using >>> Revo Uninstaller. It might do a much more thorough job.
NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.
Download Fixlist.txt
Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
You should now have both fixlist.txt and FRST64.exe on your Desktop.
Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
Click the Fix button just once and wait.
Your computer should reboot after the fix runs.
Reconnect your internet connection after reboot so you can come back here to continue.
The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).
Then attach the below logs:
Fixlog.txt
MgLogs.zip
Explain how things are running.
Kestrel13!, Jan 20, 2016 #7
RoadRunner1
RoadRunner1
Private E-2
Sorry, but where do I download fixlist.txt?
RoadRunner1, Jan 20, 2016 #8
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
My apologies ;) Here you go.
Attached Files:
fixlist.txt
File size:1.6 KB
Views:5
Kestrel13!, Jan 21, 2016 #9
RoadRunner1
RoadRunner1
Private E-2
Thank you for your help thus far. Still at the same crossroad. I rebooted the computer after running the MG Tools' .bat file and proceeded to download Malware Bytes from this site. I ran it as administrator, with and without Kaspersky protection enabled and still get error message SDK Database Load Defaults failed with code 1812. Please see the attached logs.
Could you break down for me what malware is on my computer? How exposed my computer is? Why won't Malware Bytes run?
Attached Files:
Fixlog.txt
File size:3.9 KB
Views:3
MGlogs.zip
File size:352.9 KB
Views:2
RoadRunner1, Jan 21, 2016 #10
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
RoadRunner1 said: ↑
Why won't Malware Bytes run?
Try this https://www.malwarebytes.org/chameleon/ Let me know how you get on.
Malwarebytes Chameleon technologies gets Malwarebytes Anti-Malware installed and running when blocked by malicious programs.
Kestrel13!, Jan 21, 2016 #11
chaslang
chaslang
MajorGeeks Admin - Master Malware Expert
Staff Member
RoadRunner1 said: ↑
I ran it as administrator, with and without Kaspersky protection enabled and still get error message SDK Database Load Defaults failed with code 1812.
More than likely this is not a malware problem. See the below:
https://support.malwarebytes.org/cu...an-sdk-databaseload-defaults-error-?b_id=6400
chaslang, Jan 21, 2016 #12
Kestrel13! likes this.
RoadRunner1
RoadRunner1
Private E-2
I tried Chameleon and received the same error message. The scans never get past the Pre-Scan. I also followed the link to resolve the error and I don't have any scheduled scans. I however unchecked the indicated box under 'Updates'. Still the scan does not complete. It either says 'Threat Scan Completed Successfully' or 'Threat Scan Cancelled'.
Now, are you saying that the latest logs indicate that my computer is clean? There is no malware?
RoadRunner1, Jan 21, 2016 #13
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
Yes the logs are clean. Did you read the link Chaslang posted?
Kestrel13!, Jan 23, 2016 #14
RoadRunner1
RoadRunner1
Private E-2
Hi! Yes, I read Chaslang's post and I had already unchecked the 'Update' box prior to running Malware Bytes.
I reran the first attached scans again and found some concerning items in RougeKiller under Registry, Tasks, & especially FILES. Could you please look at the attachments? I only ran the scans, no changes were executed.
Also, what malware did I encounter?
Thank you for your assistance.
Attached Files:
HitmanPro_20160124_2109.log
File size:3.2 KB
Views:2
MGlogs.zip
File size:439.1 KB
Views:3
RogueKiller 2016.01.24.txt
File size:9.1 KB
Views:4
TDSSKiller.3.1.0.9_24.01.2016_20.55.42_log.txt
File size:320.3 KB
Views:0
RoadRunner1, Jan 24, 2016 #15
Kestrel13!
Kestrel13!
Super Malware Fighter - Major Dilemma
Staff Member
What RogueKiller is finding is related to Roxio I believe ;)
I wasn't really seeing any malware... just some junk really.
Those logs are also clean.
If you are not having any other malware problems, it is time to do our final steps:
We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
After doing the above, you should work thru the below link:
How to Protect yourself from malware!
No comments:
Post a Comment