Jump to content

Help my PC is infected


Trekerj
 Share

Recommended Posts

Emsisoft has been great and removed 90% of my issues...the last 10% is aggravating. The Emergency Kit Scan has gone from reporting several malware instances to no malware reported (I've included the first and last file runs) as I've cleaned up the PC.

Although most of the sympthoms have gone away there are a few that have not; 1) Windows start up screen dims at reboot; 2) two copies of File Manager open on their own at reboot; and 3) my wireless internet connection keeps dropping (desk top PC two feet from wireless router); 4) searches on the Firefox browser come back with error messages about not being able to connect to the server.

Would appreciate your help, Thanks

Link to comment
Share on other sites

Download AdwCleaner and save it on your desktop.

  • Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
  • Double click on adwcleaner.exe to run the tool.
  • Click on the Scan button.
  • After the scan has finished, click on the Clean button.
  • Confirm each time with OK.
  • You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
  • Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
  • If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.
Download Junkware Removal Tool and save it on your desktop.
  • Shut down your anti-virus, anti-spyware, and firewall software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log is saved to your desktop and will automatically open.
  • Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
Copy the below code to Notepad; Save As fixlist.txt to your Desktop.
HKU\S-1-5-21-3536669321-2452747631-4105606700-1001\...\Policies\Explorer: [NoLowDiskSpaceChecks] 1
HKU\S-1-5-21-3536669321-2452747631-4105606700-1001\...\MountPoints2: {18619622-b57d-11e2-aa11-806e6f6e6963} - D:\Run.exe
HKU\S-1-5-21-3536669321-2452747631-4105606700-1003\...\MountPoints2: {18619622-b57d-11e2-aa11-806e6f6e6963} - D:\Run.exe
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKCU - {3BD44F0E-0596-4008-AEE0-45D47E3A8F0E} URL = 
C:\Users\Jack\AppData\Local\Temp\readSTILog.dll
Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Link to comment
Share on other sites

For kicks i ran the EXX and JRT utilities again and have gotten items that need to be quarintined. Why do these keep reappearing? I also continue to have the issue with the windows startup screen dimming half way through and the two explorer windows opening on their own each time I re-boot the PC.

On the plus side the re-boot and internet processes are much faster than they have been in a long time.

Ideas?

Link to comment
Share on other sites

Something is responsible for those changes that is not showing up in the other logs.

Changing tools.

Download RogueKiller from one of the following links and save it to your desktop:

  • Link 1
  • Link 2
    • Close all programs and disconnect any USB or external drives before running the tool.
    • Double-click RogueKiller.exe to run the tool (Vista or 7 users: Right-click and select Run As Administrator).
    • Once the Prescan has finished, click Scan.
    • Once the Status box shows "Scan Finished", just close the program. <--Don't fix anything!
    • Attach the RogueKiller report to your next reply.
      • The log can also be found on your desktop labeled (RKreport[X]_S_xxdatexx_xtimex)
      • The highest number of [X], is the most recent Scan
Link to comment
Share on other sites

Kevin thanks for sticking with this.

Attached is the log file from Rogue Killer.

FYI, during one of my reboots a Windows update ran, upon restarting the Windows start up stayed bright and the Explorer files did not open. On the next reboot the start up screen faded and Explorer panes opened on thier own.

Link to comment
Share on other sites

The RogueKiller log looks a little weird to me.  Some of the stuff should be fix the rest I am not so sure about.

 

Let's run ComboFix first.

 

Download ComboFix from Link

Save as Combo-Fix.exe during the download. ComboFix must be renamed before you download to your Desktop

!!! IMPORTANT !!! Save ComboFix to your Desktop

NOTE: ComboFix is an advanced utility, and is not like traditional automated tools. It will delete anything that it knows is bad without asking for confirmation, it will save backup copies in it's quarantine automatically, it will restart your computer, and it will produce a log that allows me to analyze and determine if there is anything left over. This log will not contain any personal information, or information about any of your documents, pictures, music, videos, etc. It only compiles information on which applications/drivers/etc were installed within the last 30 days, any applications that have certain properties that could be used for malicious purposes, and most of the load points on your system that can be abused by malicious software. If there is a false positive, and something gets deleted that should not, then I can write a script for ComboFix that will tell it to restore specific items that it deleted.

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
    See HERE for help
  • Double click on Combo-Fix & follow the prompts.


When finished, ComboFix will produce a log.

NOTE:
1. Do not mouseclick combofix's window while it's running. That may cause it to stall!
2. Remember to re-enable your anti-virus and anti-spyware before reconnecting to the Internet.
3. If you get a message that states "illegal operation attempted on a registry key that has been marked for deletion" restart your computer.

Attach logs for: (USE THE "MORE REPLY OPTIONS" BUTTON TO BE ABLE TO DO THIS)

  • ComboFix (C:\combofix.txt)


Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!

Link to comment
Share on other sites

Seems to be running well, better than it has in a long time. Still getting the fade on the Windows icon screen at reboot, but the self opening Explorer windows have gone away.

Attached is the log file from Combo Fix. I did shut down the anti-virus, but after I had started the Combo Fix program. Looks like ComboFix had a lot of files to delete.

Unless there is more cleaning that can be done, what do you suggest I do to ensure my external flash drives and my back up external drive are clean when I reconnect them?

Again thanks for you help, no way I could have done this on my own. I will definatly be a Emsisoft customer.

Link to comment
Share on other sites

Kevin I ran a scan from the free version of Emsisoft and it returned two files it noted as haveing torjans in them (is ther ea log file saved somewhere I can send you?) I did not quarantine the files. I did shut down the free software and ran a snan from EEK (log atttahced). the initally identified files it not report as issues. I then ran JRT, Rogue Killer and Combofix (again logs attached). Then I ran one last scan from the free vaersion of Emsisoft, it came back totally clean.

Any suggestions?

Link to comment
Share on other sites

Close all programs and disconnect any USB or external drives before running the tool.

  • Double-click RogueKiller.exe to run the tool again (Vista or 7 users: Right-click and select Run As Administrator).
  • Once the Prescan has finished, click Scan.
  • Once the Status box shows "Scan Finished".
    • Click the Registry Entries Tab and select the following items:
      [Hj.Name] (X64) HKEY_USERS\RK_Default_ON_F_8084\Software\Microsoft\Windows\CurrentVersion\RunOnce | mctadmin : C:\Windows\System32\mctadmin.exe  -> FOUND

      [Hj.Name] (X86) HKEY_USERS\RK_Default_ON_F_8084\Software\Microsoft\Windows\CurrentVersion\RunOnce | mctadmin : C:\Windows\System32\mctadmin.exe -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\etdrv -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\gdrv -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\GVTDrv64 -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\etdrv -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\gdrv -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\GVTDrv64 -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\etdrv -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\gdrv -> FOUND

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\GVTDrv64 -> FOUND

      [PUM.Proxy] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:8800;https=127.0.0.1:8800 -> FOUND

      [PUM.Proxy] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:8800;https=127.0.0.1:8800 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{034BADE0-EEBC-4BBA-BA74-CBD400BAF4ED} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{05FA01D7-8CF3-4B59-836A-B6FD8D3BE51D} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{0ED4B4AB-35D5-44F5-BEC4-C0F3A216DFE2} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{13AD1704-5D87-4B94-8A37-CB90C2DC7FF8} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{15E55C42-5480-4851-8382-3267C358FC6A} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{248289ED-7E97-4056-8D65-630AF38F4A49} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{2D9965B8-2313-43BF-8857-7C69D772B215} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{2F58D0E2-2519-4E3D-861D-4CFDA7235887} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{32AC8390-5FEB-44FD-AAF2-9DD7F5C0D6C3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{32AC8390-5FEB-44FD-AAF2-9DD7F5C0D6C3} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{3406758C-AC9B-49CF-BDB5-9395E1DB9D1C} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{5345C9BC-A1CB-4D4C-9901-6122F2B7D149} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{5B28D194-2A64-4AE2-AB36-A08C4D6ABF38} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{5CF6AF0B-7702-4586-8C95-706C73C1E954} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{64F94454-78DE-4B67-98FC-3C789A3C3B3E} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{70B78832-ED35-4B23-A439-BB5D5C88FAEB} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{765E0B1A-19DC-4310-94A8-8C11F0779F77} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{9092BBD3-604F-4971-9B2F-D246E8A5DC65} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{92548679-4616-4318-980A-67E790C13644} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{92548679-4616-4318-980A-67E790C13644} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{AC86FE74-A815-44BD-93EC-F9311013DF2B} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{B012CA57-A36B-40E1-8457-1BD3E01B2EE0} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{B28DEBF7-E1EA-4A5F-8296-B219CCBBD355} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{B671042A-68B4-42D0-99A2-9D114F79531C} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{C06B5D29-A746-4FAE-9FD1-9CE5B83D8F82} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{CA97B1E7-8643-4A5C-A7AA-EA3A96EC7D86} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{CCDF0E26-853F-421D-B90B-FE5978DAB9B8} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{D460F70A-4380-4991-A1BE-60E17290F37A} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DC2F8EE7-8932-47C1-ACDB-0DA6866DD0D7} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | DhcpNameServer : 192.168.1.1 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{E7D7081F-DA20-47D4-809C-053FC0BDF8B3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{F3BD47CE-01EF-43F2-9302-572FC15955F3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{F3F3C001-9919-4AE6-8517-6AD56CC7CE7D} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{034BADE0-EEBC-4BBA-BA74-CBD400BAF4ED} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{05FA01D7-8CF3-4B59-836A-B6FD8D3BE51D} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{0ED4B4AB-35D5-44F5-BEC4-C0F3A216DFE2} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{13AD1704-5D87-4B94-8A37-CB90C2DC7FF8} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{15E55C42-5480-4851-8382-3267C358FC6A} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{248289ED-7E97-4056-8D65-630AF38F4A49} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{2D9965B8-2313-43BF-8857-7C69D772B215} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{2F58D0E2-2519-4E3D-861D-4CFDA7235887} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{32AC8390-5FEB-44FD-AAF2-9DD7F5C0D6C3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{32AC8390-5FEB-44FD-AAF2-9DD7F5C0D6C3} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{3406758C-AC9B-49CF-BDB5-9395E1DB9D1C} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{5345C9BC-A1CB-4D4C-9901-6122F2B7D149} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{5B28D194-2A64-4AE2-AB36-A08C4D6ABF38} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{5CF6AF0B-7702-4586-8C95-706C73C1E954} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{64F94454-78DE-4B67-98FC-3C789A3C3B3E} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{70B78832-ED35-4B23-A439-BB5D5C88FAEB} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{765E0B1A-19DC-4310-94A8-8C11F0779F77} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{9092BBD3-604F-4971-9B2F-D246E8A5DC65} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{92548679-4616-4318-980A-67E790C13644} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{92548679-4616-4318-980A-67E790C13644} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{AC86FE74-A815-44BD-93EC-F9311013DF2B} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{B012CA57-A36B-40E1-8457-1BD3E01B2EE0} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{B28DEBF7-E1EA-4A5F-8296-B219CCBBD355} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{B671042A-68B4-42D0-99A2-9D114F79531C} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{C06B5D29-A746-4FAE-9FD1-9CE5B83D8F82} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{CA97B1E7-8643-4A5C-A7AA-EA3A96EC7D86} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{CCDF0E26-853F-421D-B90B-FE5978DAB9B8} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{D460F70A-4380-4991-A1BE-60E17290F37A} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DC2F8EE7-8932-47C1-ACDB-0DA6866DD0D7} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | DhcpNameServer : 192.168.1.1 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E7D7081F-DA20-47D4-809C-053FC0BDF8B3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{F3BD47CE-01EF-43F2-9302-572FC15955F3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{F3F3C001-9919-4AE6-8517-6AD56CC7CE7D} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{034BADE0-EEBC-4BBA-BA74-CBD400BAF4ED} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{05FA01D7-8CF3-4B59-836A-B6FD8D3BE51D} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{0ED4B4AB-35D5-44F5-BEC4-C0F3A216DFE2} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{13AD1704-5D87-4B94-8A37-CB90C2DC7FF8} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{15E55C42-5480-4851-8382-3267C358FC6A} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{248289ED-7E97-4056-8D65-630AF38F4A49} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{2D9965B8-2313-43BF-8857-7C69D772B215} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{2F58D0E2-2519-4E3D-861D-4CFDA7235887} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{32AC8390-5FEB-44FD-AAF2-9DD7F5C0D6C3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{32AC8390-5FEB-44FD-AAF2-9DD7F5C0D6C3} | DhcpNameServer : 192.168.1.1 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{3406758C-AC9B-49CF-BDB5-9395E1DB9D1C} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{5345C9BC-A1CB-4D4C-9901-6122F2B7D149} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{5B28D194-2A64-4AE2-AB36-A08C4D6ABF38} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{5CF6AF0B-7702-4586-8C95-706C73C1E954} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{64F94454-78DE-4B67-98FC-3C789A3C3B3E} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{70B78832-ED35-4B23-A439-BB5D5C88FAEB} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{765E0B1A-19DC-4310-94A8-8C11F0779F77} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{9092BBD3-604F-4971-9B2F-D246E8A5DC65} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{92548679-4616-4318-980A-67E790C13644} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{92548679-4616-4318-980A-67E790C13644} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{AC86FE74-A815-44BD-93EC-F9311013DF2B} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{B012CA57-A36B-40E1-8457-1BD3E01B2EE0} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{B28DEBF7-E1EA-4A5F-8296-B219CCBBD355} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{B671042A-68B4-42D0-99A2-9D114F79531C} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{C06B5D29-A746-4FAE-9FD1-9CE5B83D8F82} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{CA97B1E7-8643-4A5C-A7AA-EA3A96EC7D86} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{CCDF0E26-853F-421D-B90B-FE5978DAB9B8} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{D460F70A-4380-4991-A1BE-60E17290F37A} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{DC2F8EE7-8932-47C1-ACDB-0DA6866DD0D7} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | DhcpNameServer : 10.0.0.1 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{E7D7081F-DA20-47D4-809C-053FC0BDF8B3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{F3BD47CE-01EF-43F2-9302-572FC15955F3} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{F3F3C001-9919-4AE6-8517-6AD56CC7CE7D} | NameServer : 208.69.150.250,208.69.150.252 -> FOUND

      [PUM.Policies] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0 -> FOUND

      [PUM.Policies] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableTaskMgr : 0 -> FOUND

      [PUM.Policies] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0 -> FOUND

      [PUM.Policies] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableTaskMgr : 0 -> FOUND

      [PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0 -> FOUND

      [PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0 -> FOUND

      [PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | EnableLUA : 0 -> FOUND

      [PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | EnableLUA : 0 -> FOUND

      [PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> FOUND

      [PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> FOUND

      [PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyComputer : 2 -> FOUND

      [PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowControlPanel : 2 -> FOUND

      [PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowDownloads : 2 -> FOUND

      [PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowUser : 2 -> FOUND

      [PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyComputer : 2 -> FOUND

      [PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowControlPanel : 2 -> FOUND

      [PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowDownloads : 2 -> FOUND

      [PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowUser : 2 -> FOUND

      [PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> FOUND

      [PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> FOUND

      [PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> FOUND

      [PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> FOUND

      [PUM.HomePage] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome -> FOUND

      [PUM.HomePage] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome -> FOUND

      [PUM.HomePage] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome -> FOUND

      [PUM.HomePage] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome -> FOUND

      [PUM.SearchPage] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> FOUND

      [PUM.SearchPage] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> FOUND

      [PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> FOUND

      [PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3536669321-2452747631-4105606700-1001\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> FOUND

      [PUM.SearchPage] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> FOUND

      [PUM.SearchPage] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> FOUND

      ¤¤¤ Scheduled tasks : 2 ¤¤¤

      [Suspicious.Path] \\{AA5A21D0-00FE-4026-92FB-B19794219264} -- C:\Users\Jack\Desktop\OUTLOOK.EXE -> FOUND

      [Suspicious.Path] \\{C069DC24-D1B9-4A63-8049-AA87351D9FB8} -- C:\Users\Jack\Desktop\OUTLOOK.EXE -> FOUND

      ¤¤¤ Files : 157 ¤¤¤

      [Suspicious.Startup][File] UninstallString.bat -- C:\Users\Jack\AppData\Local\Amazon Cloud Drive\UninstallString.bat -> FOUND

      [Suspicious.Startup][File] AmazonCloudDriveW.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\AmazonCloudDriveW.exe -> FOUND

      [Suspicious.Startup][File] java-rmi.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\java-rmi.exe -> FOUND

      [Suspicious.Startup][File] java.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\java.exe -> FOUND

      [Suspicious.Startup][File] javacpl.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\javacpl.exe -> FOUND

      [Suspicious.Startup][File] javaws.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\javaws.exe -> FOUND

      [Suspicious.Startup][File] jbroker.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\jbroker.exe -> FOUND

      [Suspicious.Startup][File] jp2launcher.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\jp2launcher.exe -> FOUND

      [Suspicious.Startup][File] jqs.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\jqs.exe -> FOUND

      [Suspicious.Startup][File] jqsnotify.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\jqsnotify.exe -> FOUND

      [Suspicious.Startup][File] keytool.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\keytool.exe -> FOUND

      [Suspicious.Startup][File] kinit.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\kinit.exe -> FOUND

      [Suspicious.Startup][File] klist.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\klist.exe -> FOUND

      [Suspicious.Startup][File] ktab.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\ktab.exe -> FOUND

      [Suspicious.Startup][File] orbd.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\orbd.exe -> FOUND

      [Suspicious.Startup][File] pack200.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\pack200.exe -> FOUND

      [Suspicious.Startup][File] policytool.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\policytool.exe -> FOUND

      [Suspicious.Startup][File] rmid.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\rmid.exe -> FOUND

      [Suspicious.Startup][File] rmiregistry.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\rmiregistry.exe -> FOUND

      [Suspicious.Startup][File] servertool.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\servertool.exe -> FOUND

      [Suspicious.Startup][File] ssvagent.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\ssvagent.exe -> FOUND

      [Suspicious.Startup][File] tnameserv.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\tnameserv.exe -> FOUND

      [Suspicious.Startup][File] unpack200.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\bin\unpack200.exe -> FOUND

      [Suspicious.Startup][File] launcher.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz...exe_f2fa081ea2183235_0002.0004_none_af49860b15879bce\LocalServiceJre\lib\launcher.exe -> FOUND

      [Suspicious.Startup][File] AmazonCloudDrive.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\AmazonCloudDrive.exe -> FOUND

      [Suspicious.Startup][File] AmazonCloudDriveW.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\AmazonCloudDriveW.exe -> FOUND

      [Suspicious.Startup][File] java-rmi.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\java-rmi.exe -> FOUND

      [Suspicious.Startup][File] java.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\java.exe -> FOUND

      [Suspicious.Startup][File] javacpl.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\javacpl.exe -> FOUND

      [Suspicious.Startup][File] javaws.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\javaws.exe -> FOUND

      [Suspicious.Startup][File] jbroker.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\jbroker.exe -> FOUND

      [Suspicious.Startup][File] jp2launcher.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\jp2launcher.exe -> FOUND

      [Suspicious.Startup][File] jqs.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\jqs.exe -> FOUND

      [Suspicious.Startup][File] jqsnotify.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\jqsnotify.exe -> FOUND

      [Suspicious.Startup][File] keytool.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\keytool.exe -> FOUND

      [Suspicious.Startup][File] kinit.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\kinit.exe -> FOUND

      [Suspicious.Startup][File] klist.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\klist.exe -> FOUND

      [Suspicious.Startup][File] ktab.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\ktab.exe -> FOUND

      [Suspicious.Startup][File] orbd.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\orbd.exe -> FOUND

      [Suspicious.Startup][File] pack200.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\pack200.exe -> FOUND

      [Suspicious.Startup][File] policytool.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\policytool.exe -> FOUND

      [Suspicious.Startup][File] rmid.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\rmid.exe -> FOUND

      [Suspicious.Startup][File] rmiregistry.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\rmiregistry.exe -> FOUND

      [Suspicious.Startup][File] servertool.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\servertool.exe -> FOUND

      [Suspicious.Startup][File] ssvagent.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\ssvagent.exe -> FOUND

      [Suspicious.Startup][File] tnameserv.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\tnameserv.exe -> FOUND

      [Suspicious.Startup][File] unpack200.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\bin\unpack200.exe -> FOUND

      [Suspicious.Startup][File] launcher.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\LocalServiceJre\lib\launcher.exe -> FOUND

      [Suspicious.Startup][File] uninstall.exe -- C:\Users\Jack\AppData\Local\Apps\2.0\9QV7WHN4.E4N\V90YORME.Y2N\amaz..tion_f2fa081ea2183235_0002.0004_9f25fd1982bf3008\uninstall.exe -> FOUND

      [Suspicious.Startup][File] DefaultSetup.exe -- C:\Users\Jack\AppData\Local\Microsoft\DefaultSetup\DefaultSetup.exe -> FOUND

      [Suspicious.Startup][File] ask.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\ask.bat -> FOUND

      [Suspicious.Startup][File] chrome.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\chrome.bat -> FOUND

      [Suspicious.Startup][File] delfolders.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\delfolders.bat -> FOUND

      [Suspicious.Startup][File] delorphans.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\delorphans.bat -> FOUND

      [Suspicious.Startup][File] ERUNT.EXE -- C:\Users\Jack\AppData\Local\Temp\jrt\erunt\ERUNT.EXE -> FOUND

      [Suspicious.Startup][File] ev_clear.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\ev_clear.bat -> FOUND

      [Suspicious.Startup][File] firefox.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\firefox.bat -> FOUND

      [Suspicious.Startup][File] FWPolicy.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\FWPolicy.bat -> FOUND

      [Suspicious.Startup][File] get.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\get.bat -> FOUND

      [Suspicious.Startup][File] iexplore.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\iexplore.bat -> FOUND

      [Suspicious.Startup][File] JRT.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\JRT.bat -> FOUND

      [Suspicious.Startup][File] medfos.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\medfos.bat -> FOUND

      [Suspicious.Startup][File] misc.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\misc.bat -> FOUND

      [Suspicious.Startup][File] modules.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\modules.bat -> FOUND

      [Suspicious.Startup][File] prelim.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\prelim.bat -> FOUND

      [Suspicious.Startup][File] runvalues.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\runvalues.bat -> FOUND

      [Suspicious.Startup][File] searchlnk.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\searchlnk.bat -> FOUND

      [Suspicious.Startup][File] TDL4.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\TDL4.bat -> FOUND

      [Suspicious.Startup][File] lzma.exe -- C:\Users\Jack\AppData\LocalLow\Sun\Java\jre1.7.0_67\lzma.exe -> FOUND

      [Suspicious.Startup][File] bjnupdateplugin.exe -- C:\Users\Jack\AppData\Roaming\Blue Jeans\bjnplugin\2.4.143.8\bjnupdateplugin.exe -> FOUND

      [Suspicious.Startup][File] Dropbox.exe -- C:\Users\Jack\AppData\Roaming\Dropbox\bin\Dropbox.exe -> FOUND

      [Suspicious.Startup][File] DropboxUninstaller.exe -- C:\Users\Jack\AppData\Roaming\Dropbox\bin\DropboxUninstaller.exe -> FOUND

      [Suspicious.Startup][File] DropboxUpdateHelper.exe -- C:\Users\Jack\AppData\Roaming\Dropbox\bin\DropboxUpdateHelper.exe -> FOUND

      [Suspicious.Startup][File] amdocl_as64.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\amdocl_as64.exe -> FOUND

      [Suspicious.Startup][File] amdocl_ld64.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\amdocl_ld64.exe -> FOUND

      [Suspicious.Startup][File] atiapfxx.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\atiapfxx.exe -> FOUND

      [Suspicious.Startup][File] atibtmon.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\atibtmon.exe -> FOUND

      [Suspicious.Startup][File] atieclxx.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\atieclxx.exe -> FOUND

      [Suspicious.Startup][File] atiesrxx.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\atiesrxx.exe -> FOUND

      [Suspicious.Startup][File] ATIODCLI.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\ATIODCLI.exe -> FOUND

      [Suspicious.Startup][File] ATIODE.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\ATIODE.exe -> FOUND

      [Suspicious.Startup][File] clinfo.exe -- C:\Users\Jack\AppData\Roaming\IObit\Advanced SystemCare V6\Driver Manager\DriverBackup\2013-09-22 09-28-05\8\clinfo.exe -> FOUND

      [Suspicious.Startup][File] airappinstaller.exe -- C:\Users\Jack\AppData\Roaming\Macromedia\Flash Player\www.macromedia.com\bin\airappinstaller\airappinstaller.exe -> FOUND

      [Suspicious.Path][File] Dropbox.lnk -- C:\Users\Jack\AppData\Roaming\Microsoft\Windows\SendTo\Dropbox.lnk [[email protected]] C:\Users\Jack\Dropbox -> FOUND

      [Suspicious.Path][File] Uninstall Dropbox.lnk -- C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Dropbox\Uninstall Dropbox.lnk [[email protected]] C:\Users\Jack\AppData\Roaming\Dropbox\bin\DROPBO~2.EXE -> FOUND

      [Suspicious.Startup][File] Set-up.exe -- C:\Users\Jack\Desktop\Adobe Photoshop Elements 11\Setup\PhotoshopElements\ElementsSTIInstaller\Set-up.exe -> FOUND

      [Suspicious.Startup][File] Setup.exe -- C:\Users\Jack\Desktop\Adobe Photoshop Elements 11\Setup\PhotoshopElements\Setup.exe -> FOUND

      [Suspicious.Path][File] Cloud Drive.lnk -- C:\Users\Jack\Desktop\Cloud Drive.lnk [[email protected]] C:\Users\Jack\CLOUDD~1 -> FOUND

      [Suspicious.Startup][File] ComboFix.exe -- C:\Users\Jack\Desktop\ComboFix.exe -> FOUND

      [Suspicious.Path][File] Google Drive.lnk -- C:\Users\Jack\Desktop\Google Drive.lnk [[email protected]] C:\Users\Jack\GOOGLE~1 -> FOUND

      [Suspicious.Startup][File] JRT.exe -- C:\Users\Jack\Desktop\JRT.exe -> FOUND

      [Suspicious.Startup][File] Chess.exe -- C:\Users\Jack\Desktop\Microsoft Games\Chess\Chess.exe -> FOUND

      [Suspicious.Startup][File] FreeCell.exe -- C:\Users\Jack\Desktop\Microsoft Games\FreeCell\FreeCell.exe -> FOUND

      [Suspicious.Startup][File] Hearts.exe -- C:\Users\Jack\Desktop\Microsoft Games\Hearts\Hearts.exe -> FOUND

      [Suspicious.Startup][File] Mahjong.exe -- C:\Users\Jack\Desktop\Microsoft Games\Mahjong\Mahjong.exe -> FOUND

      [Suspicious.Startup][File] MineSweeper.exe -- C:\Users\Jack\Desktop\Microsoft Games\Minesweeper\MineSweeper.exe -> FOUND

      [Suspicious.Startup][File] bckgzm.exe -- C:\Users\Jack\Desktop\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe -> FOUND

      [Suspicious.Startup][File] chkrzm.exe -- C:\Users\Jack\Desktop\Microsoft Games\Multiplayer\Checkers\chkrzm.exe -> FOUND

      [Suspicious.Startup][File] shvlzm.exe -- C:\Users\Jack\Desktop\Microsoft Games\Multiplayer\Spades\shvlzm.exe -> FOUND

      [Suspicious.Startup][File] PurblePlace.exe -- C:\Users\Jack\Desktop\Microsoft Games\Purble Place\PurblePlace.exe -> FOUND

      [Suspicious.Startup][File] Solitaire.exe -- C:\Users\Jack\Desktop\Microsoft Games\Solitaire\Solitaire.exe -> FOUND

      [Suspicious.Startup][File] SpiderSolitaire.exe -- C:\Users\Jack\Desktop\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe -> FOUND

      [Suspicious.Startup][File] RogueKiller.exe -- C:\Users\Jack\Desktop\RogueKiller.exe -> FOUND

      [Suspicious.Startup][File] Solitaire.exe -- C:\Users\Jack\Desktop\Solitaire.exe -> FOUND

      [Suspicious.Startup][File] SpiderSolitaire.exe -- C:\Users\Jack\Desktop\SpiderSolitaire.exe -> FOUND

      [Suspicious.Startup][File] AutoInst.exe -- C:\Users\Jack\Documents\Install_Win7_7072_05222013\Install_Win7_7072_05222013\AutoInst.exe -> FOUND

      [Suspicious.Startup][File] setup.exe -- C:\Users\Jack\Documents\Install_Win7_7072_05222013\Install_Win7_7072_05222013\setup.exe -> FOUND

      [Suspicious.Startup][File] Silent_Install.bat -- C:\Users\Jack\Documents\Install_Win7_7072_05222013\Install_Win7_7072_05222013\Silent_Install.bat -> FOUND

      [Suspicious.Startup][File] Silent_Uninstall.bat -- C:\Users\Jack\Documents\Install_Win7_7072_05222013\Install_Win7_7072_05222013\Silent_Uninstall.bat -> FOUND

      [Suspicious.Startup][File] 13-1-legacy_vista_win7_win8_64_dd_ccc.exe -- C:\Users\Jack\Downloads\13-1-legacy_vista_win7_win8_64_dd_ccc.exe -> FOUND

      [Suspicious.Startup][File] 64bit_Vista_Win7_Win8_R271.exe -- C:\Users\Jack\Downloads\64bit_Vista_Win7_Win8_R271.exe -> FOUND

      [Suspicious.Startup][File] AmazonCloudDriveSetup (1).exe -- C:\Users\Jack\Downloads\AmazonCloudDriveSetup (1).exe -> FOUND

      [Suspicious.Startup][File] AmazonCloudDriveSetup.exe -- C:\Users\Jack\Downloads\AmazonCloudDriveSetup.exe -> FOUND

      [Suspicious.Startup][File] asc-ultimate-setup.exe -- C:\Users\Jack\Downloads\asc-ultimate-setup.exe -> FOUND

      [Suspicious.Startup][File] Dropbox 2.0.10.exe -- C:\Users\Jack\Downloads\Dropbox 2.0.10.exe -> FOUND

      [Suspicious.Startup][File] epson13337.exe -- C:\Users\Jack\Downloads\epson13337.exe -> FOUND

      [Suspicious.Startup][File] Firefox Setup 20.0.1 (1).exe -- C:\Users\Jack\Downloads\Firefox Setup 20.0.1 (1).exe -> FOUND

      [Suspicious.Startup][File] Firefox Setup 20.0.1 (2).exe -- C:\Users\Jack\Downloads\Firefox Setup 20.0.1 (2).exe -> FOUND

      [Suspicious.Startup][File] Firefox Setup 20.0.1.exe -- C:\Users\Jack\Downloads\Firefox Setup 20.0.1.exe -> FOUND

      [Suspicious.Startup][File] Firefox Setup Stub 21.0b6.exe -- C:\Users\Jack\Downloads\Firefox Setup Stub 21.0b6.exe -> FOUND

      [Suspicious.Startup][File] iTunes64Setup.exe -- C:\Users\Jack\Downloads\iTunes64Setup.exe -> FOUND

      [Suspicious.Startup][File] JuniperSetupClientInstaller(1).exe -- C:\Users\Jack\Downloads\JuniperSetupClientInstaller(1).exe -> FOUND

      [Suspicious.Startup][File] JuniperSetupClientInstaller(2).exe -- C:\Users\Jack\Downloads\JuniperSetupClientInstaller(2).exe -> FOUND

      [Suspicious.Startup][File] JuniperSetupClientInstaller(3).exe -- C:\Users\Jack\Downloads\JuniperSetupClientInstaller(3).exe -> FOUND

      [Suspicious.Startup][File] JuniperSetupClientInstaller(4).exe -- C:\Users\Jack\Downloads\JuniperSetupClientInstaller(4).exe -> FOUND

      [Suspicious.Startup][File] JuniperSetupClientInstaller(5).exe -- C:\Users\Jack\Downloads\JuniperSetupClientInstaller(5).exe -> FOUND

      [Suspicious.Startup][File] JuniperSetupClientInstaller.exe -- C:\Users\Jack\Downloads\JuniperSetupClientInstaller.exe -> FOUND

      [Suspicious.Startup][File] mb_driver_via-usb3(1).exe -- C:\Users\Jack\Downloads\mb_driver_via-usb3(1).exe -> FOUND

      [Suspicious.Startup][File] mb_driver_via-usb3.exe -- C:\Users\Jack\Downloads\mb_driver_via-usb3.exe -> FOUND

      [Suspicious.Startup][File] NGH1501_Setup_English.exe -- C:\Users\Jack\Downloads\NGH1501_Setup_English.exe -> FOUND

      [Suspicious.Startup][File] PSE11.exe -- C:\Users\Jack\Downloads\PSE11.exe -> FOUND

      [Suspicious.Startup][File] setup.exe -- C:\Users\Jack\Downloads\setup.exe -> FOUND

      [Suspicious.Startup][File] vcredist_x86.exe -- C:\Users\Jack\Downloads\vcredist_x86.exe -> FOUND

      [Suspicious.Startup][File] instmsia.exe -- C:\Users\Jack\Downloads\VIAUSB3\instmsia.exe -> FOUND

      [Suspicious.Startup][File] instmsiw.exe -- C:\Users\Jack\Downloads\VIAUSB3\instmsiw.exe -> FOUND

      [Suspicious.Startup][File] ModifyRegistry.exe -- C:\Users\Jack\Downloads\VIAUSB3\ModifyRegistry.exe -> FOUND

      [Suspicious.Startup][File] Setup.exe -- C:\Users\Jack\Downloads\VIAUSB3\Setup.exe -> FOUND

      [Suspicious.Startup][File] Usetup.exe -- C:\Users\Jack\Downloads\VIAUSB3\Usetup.exe -> FOUND

      [Suspicious.Startup][File] InsUAS.exe -- C:\Users\Jack\Downloads\VIAUSB3\xhc\InsUAS.exe -> FOUND

      [Suspicious.Startup][File] usb3Monitor.exe -- C:\Users\Jack\Downloads\VIAUSB3\xhc\Utility\usb3Monitor.exe -> FOUND

      [Suspicious.Startup][File] VLIUASPCtrl.exe -- C:\Users\Jack\Downloads\VIAUSB3\xhc\Utility\x64\VLIUASPCtrl.exe -> FOUND

      [Suspicious.Startup][File] VLIUASPCtrl.exe -- C:\Users\Jack\Downloads\VIAUSB3\xhc\Utility\x86\VLIUASPCtrl.exe -> FOUND

      [Suspicious.Startup][File] xHCX64Install.exe -- C:\Users\Jack\Downloads\VIAUSB3\xhc\xHCX64Install.exe -> FOUND

      [Suspicious.Startup][File] X16-32007(1).exe -- C:\Users\Jack\Downloads\X16-32007(1).exe -> FOUND

      [Suspicious.Startup][File] X16-32007(2).exe -- C:\Users\Jack\Downloads\X16-32007(2).exe -> FOUND

      [Suspicious.Startup][File] X16-32007.exe -- C:\Users\Jack\Downloads\X16-32007.exe -> FOUND

      [Suspicious.Path][File] Desktop.lnk -- C:\Users\Jack\Dropbox\Desktop.lnk [[email protected]] C:\Users\Jack\Desktop -> FOUND

      [Suspicious.Startup][File] EmsisoftAntiMalwareSetup.exe -- C:\Users\Jack\Dropbox\EmsisoftAntiMalwareSetup.exe -> FOUND

      [Suspicious.Startup][File] Firefox Setup 32.0b8.exe -- C:\Users\Jack\Dropbox\Firefox Setup 32.0b8.exe -> FOUND

      [Suspicious.Startup][File] Firefox Setup Stub 32.0b8.exe -- C:\Users\Jack\Dropbox\Firefox Setup Stub 32.0b8.exe -> FOUND

      [Suspicious.Startup][File] mbae-setup-1.03.1.1220.exe -- C:\Users\Jack\Dropbox\mbae-setup-1.03.1.1220.exe -> FOUND

      [Suspicious.Startup][File] meditationscreensaver1.exe -- C:\Users\Jack\Dropbox\Personal\meditationscreensaver1.exe -> FOUND

      [Suspicious.Path][File] Cloud Drive.lnk -- C:\Users\Jack\Links\Cloud Drive.lnk [[email protected]] C:\Users\Jack\CLOUDD~1 -> FOUND

      [Suspicious.Path][File] Desktop.lnk -- C:\Users\Jack\Links\Desktop.lnk [[email protected]] C:\Users\Jack\Desktop -> FOUND

      [Suspicious.Path][File] Downloads.lnk -- C:\Users\Jack\Links\Downloads.lnk [[email protected]] C:\Users\Jack\DOWNLO~1 -> FOUND

      [Suspicious.Path][File] Dropbox.lnk -- C:\Users\Jack\Links\Dropbox.lnk [[email protected]] C:\Users\Jack\Dropbox -> FOUND

      [Suspicious.Path][File] Google Drive.lnk -- C:\Users\Jack\Links\Google Drive.lnk [[email protected]] C:\Users\Jack\GOOGLE~1 -> FOUND

    • Click the Web browsers Tab and select the following items:
      [PUM.Proxy][FIREFX:Config] p6o86g0t.default : user_pref("network.proxy.type", 4); -> FOUND

      [PUM.HomePage][FIREFX:Config] p6o86g0t.default : user_pref("browser.startup.homepage", "http://my.yahoo.com/p/3.html"); -> FOUND

    • Click the Delete button.
  • Attach the RogueKiller report to your next reply.
    • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex)
    • The highest number of [X], is the most recent Delete
Link to comment
Share on other sites

Thanks Kevin

Checked and deleted the lines as instructed.

Attached are two files; 1) from the initiatal scan and then a second file that is from a scan after the re-boot.

Interestingly Rogue killer seems not to like its self and flagged and deleated the roguekiller.exe file.

Link to comment
Share on other sites

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

SearchScopes: HKCU - DefaultScope {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=338&systemid=406&apn_uid=5088638755004542&apn_dtid=BND406&o=APN10645&apn_ptnrs=AG6&q={searchTerms}
SearchScopes: HKCU - 79C8A369F652488CAFA9590C4D0B2F1E URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=338&systemid=406&apn_uid=5088638755004542&apn_dtid=BND406&o=APN10645&apn_ptnrs=AG6&q={searchTerms}
SearchScopes: HKCU - {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} URL = http://dts.search-results.com/sr?src=ieb&gct=ds&appid=338&systemid=406&apn_uid=5088638755004542&apn_dtid=BND406&o=APN10645&apn_ptnrs=AG6&q={searchTerms}
FF Keyword.URL: hxxp://dts.search-results.com/sr?src=ffb&gct=ds&appid=338&systemid=406&apn_dtid=BND406&apn_ptnrs=AG6&apn_uid=5088638755004542&o=APN10645&q=
Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Link to comment
Share on other sites

Thanks for steping in Thomas.

System is much better than it has been but still doesn't seem to 100%.

Windows Explorer locked up and I got an alert and block from Emsisoft that something had changed the checksum from Firefox, I rebooted and reopenned Firefox, no alert.

Attached are copies of the Addition and FRST logs from the requested run.

Link to comment
Share on other sites

Let's see if we can figure out what is causing explorer to lockup.

Download RogueKiller from one of the following links and save it to your desktop:

  • Link 1
  • Link 2
    • Close all programs and disconnect any USB or external drives before running the tool.
    • Double-click RogueKiller.exe to run the tool (Vista or 7 users: Right-click and select Run As Administrator).
    • Once the Prescan has finished, click Scan.
    • Once the Status box shows "Scan Finished", just close the program. <--Don't fix anything!
    • Attach the RogueKiller report to your next reply.
      • The log can also be found on your desktop labeled (RKreport[X]_S_xxdatexx_xtimex)
      • The highest number of [X], is the most recent Scan
Link to comment
Share on other sites

Thread Closed

Reason: Lack of Response

PM either Kevin, Elise, or GT500 to have this thread reopened.

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread.

Link to comment
Share on other sites

To answer Thomas' question yes I got the "explorer.exe has stopped working" error message.

Kvin per your request, atteched are two copies of the Rogue killer logs: the first is direclty after a reboot and the second is after I ununstalled IObot per Thomas' suggestion.

Link to comment
Share on other sites

You have EAM 5.1 installed we are now at version 9. Uninstall EAM 5.1 and update to EAM 9.

Close all programs and disconnect any USB or external drives before running the tool.

  • Double-click RogueKiller.exe to run the tool again (Vista or 7 users: Right-click and select Run As Administrator).
  • Once the Prescan has finished, click Scan.
  • Once the Status box shows "Scan Finished".
    • Click the Files Tab and select the following items:
      [Suspicious.Startup][File] ProjectOnUninstall.exe -- C:\Users\Jack\AppData\Local\Temp\900\ProjectOnUninstall.exe -> FOUND
      [Suspicious.Startup][File] Promote.exe -- C:\Users\Jack\AppData\Local\Temp\is-AKH38.tmp\Promote.exe -> FOUND
      [Suspicious.Startup][File] UninstallPromote.exe -- C:\Users\Jack\AppData\Local\Temp\is-PF2JL.tmp\UninstallPromote.exe -> FOUND
      [Suspicious.Startup][File] UninstallDisplaytemp.exe -- C:\Users\Jack\AppData\Roaming\IObit\IObit Uninstaller\UninstallDisplaytemp.exe -> FOUND
      [Suspicious.Startup][File] UninstallPromotetemp.exe -- C:\Users\Jack\AppData\Roaming\IObit\IObit Uninstaller\UninstallPromotetemp.exe -> FOUND
      [Suspicious.Path][File] ASC Ultimate License.lnk -- C:\Users\Jack\AppData\Roaming\Microsoft\Windows\Recent\ASC Ultimate License.lnk [[email protected]] C:\Users\Jack\Desktop\ASCULT~1.TXT -> FOUND
    • Click the Delete button.
  • Attach the RogueKiller report to your next reply.
    • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex)
    • The highest number of [X], is the most recent Delete
Link to comment
Share on other sites

Unless you are having problems, it is time to do the final steps.

Now to remove most of the tools that we have used in fixing your machine:

Press the Windows key + R and this will open the Run text box. Copy/paste the following text into the Run box as shown and click OK.

Combofix /Uninstall

(Note: There is a space between the ..X and the /U that needs to be there.)

CF.jpg

Uninstall AdwCleaner:

  • Close all open programs and Internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on the Uninstall button.
  • Confirm by clicking Yes.
Delete the following from your Desktop: (If they exist)

AdwCleaner.exe

CFscript.txt

Emsisoft Emergency Kit.lnk

FRST.exe

FRST64.exe

JRT.exe

JRT.txt

Anything else I had you use

Delete the following files: (If they exist)

C:\ComboFix.txt

Delete the following folders: (If they exist)

C:\AdwCleaner

C:\ComboFix

C:\EEK

C:\FRST

C:\Qoobox

Empty the Recycle Bin

Download to your Desktop:

- CCleaner Portable

  • UnZip CCleaner Portable to a folder on your Desktop named CCleaner
Run CCleaner
  • Open the CCleaner Folder on your Desktop and double click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit)
  • The following should be selected by default, if not, please select:

    4l5a4i.png

  • Click 16jox2o.png and choose 5x3nu8.gif
  • Uncheck 2wlsw11.gif
  • Then go back to 2jb4qyb.gif and click nf47ev.gif to run it.
  • Exit CCleaner.
Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore.

You can delete and uninstall any programs I had you download, that you do not wish to keep on the system.

Run Windows Update and update your Windows Operating System.

Install and run the Secunia Personal Software Inspector, this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated.

Articles to read:

How to Protect Your Computer From Malware

How to keep you and your Windows PC happy

Web, email, chat, password and kids safety

10 Sources of Malware Infections

That should take care of everything.

Safe Surfing!

Link to comment
Share on other sites

Thread Closed

Reason: Resolved

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...