Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Very Slow loading pages, looking for Help please


  • This topic is locked This topic is locked

#1
67mopar

67mopar

    Member

  • Member
  • PipPipPip
  • 202 posts
Vista home premium on lg laptop intel core two duo processor

Ive Run several programs spy bot , super antispyware and aml reg cleaner to name a few, they are coming up clean, so maybe there is something using my processer I cant find, so I ran OTL and hope someone more talented than I can find a red flag for me. Thanks in advance I appreciate this Dean .

I do visit cbs sports line (fantasy Football) regularly, but mostly craigslist, hotmail but something is maxing out my puter.

OTL logfile created on: 11/07/2011 6:59:57 AM - Run 1
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\dad\Downloads
Windows Vista Home Premium Edition Service Pack 2 (Version = 6.0.6002) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: MM/dd/yyyy

2.99 Gb Total Physical Memory | 1.13 Gb Available Physical Memory | 37.71% Memory free
6.19 Gb Paging File | 4.60 Gb Available in Paging File | 74.29% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 110.78 Gb Total Space | 47.21 Gb Free Space | 42.61% Space Free | Partition Type: NTFS

Computer Name: DAD-PC | User Name: dad | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2011/11/07 06:59:36 | 000,584,192 | ---- | M] (OldTimer Tools) -- C:\Users\dad\Downloads\OTL.exe
PRC - [2011/10/18 08:15:22 | 002,042,208 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG8\avgtray.exe
PRC - [2011/09/28 09:28:29 | 000,912,344 | ---- | M] (Mozilla Corporation) -- C:\Program Files\Mozilla Firefox\firefox.exe
PRC - [2009/04/11 01:28:05 | 000,735,232 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe
PRC - [2009/04/11 01:27:36 | 002,926,592 | ---- | M] (Microsoft Corporation) -- C:\Windows\explorer.exe
PRC - [2007/06/25 09:34:58 | 000,082,608 | ---- | M] (Lexmark International Inc.) -- C:\Program Files\Lexmark 3400 Series\ezprint.exe
PRC - [2007/06/25 09:34:56 | 000,291,504 | ---- | M] () -- C:\Program Files\Lexmark 3400 Series\lxcymon.exe
PRC - [2007/06/20 16:56:16 | 004,493,312 | ---- | M] (Realtek Semiconductor) -- C:\Windows\RtHDVCpl.exe
PRC - [2007/06/20 05:28:56 | 000,537,264 | ---- | M] ( ) -- C:\Windows\System32\lxcycoms.exe


========== Modules (No Company Name) ==========

MOD - [2011/10/27 08:14:37 | 000,008,192 | ---- | M] () -- C:\Program Files\Java\jre6\bin\jp2native.dll
MOD - [2011/10/14 09:12:37 | 008,522,400 | ---- | M] () -- C:\Windows\System32\Macromed\Flash\NPSWF32.dll
MOD - [2011/09/28 09:28:29 | 001,015,256 | ---- | M] () -- C:\Program Files\Mozilla Firefox\js3250.dll
MOD - [2007/06/25 09:34:56 | 000,291,504 | ---- | M] () -- C:\Program Files\Lexmark 3400 Series\lxcymon.exe
MOD - [2007/03/16 05:39:20 | 000,115,712 | ---- | M] () -- C:\Windows\System32\spool\drivers\w32x86\3\lxcyui5c.dll
MOD - [2007/03/16 05:38:00 | 000,162,304 | ---- | M] () -- C:\Windows\System32\spool\drivers\w32x86\3\lxcydr5c.dll
MOD - [2006/08/08 14:54:18 | 000,278,528 | ---- | M] () -- C:\Program Files\Lexmark 3400 Series\lxcyscw.dll
MOD - [2006/05/25 15:20:44 | 000,241,664 | ---- | M] () -- C:\Program Files\Lexmark 3400 Series\iptk.dll
MOD - [2006/02/13 08:04:20 | 000,143,360 | ---- | M] () -- C:\Program Files\Lexmark 3400 Series\lxcydrec.dll


========== Win32 Services (SafeList) ==========

SRV - File not found [Auto | Stopped] -- -- (0050841232311355mcinstcleanup) McAfee Application Installer Cleanup (0050841232311355)
SRV - [2011/09/21 16:44:23 | 000,116,608 | ---- | M] (SUPERAntiSpyware.com) [Disabled | Stopped] -- C:\Program Files\SUPERAntiSpyware\SASCORE.EXE -- (!SASCORE)
SRV - [2009/12/23 16:34:20 | 000,370,688 | ---- | M] (StarWind Software) [Disabled | Stopped] -- C:\Program Files\Alcohol Soft\Alcohol 52\StarWind\StarWindServiceAE.exe -- (StarWindServiceAE)
SRV - [2009/08/28 07:46:40 | 000,297,752 | ---- | M] (AVG Technologies CZ, s.r.o.) [Disabled | Stopped] -- C:\Program Files\AVG\AVG8\avgwdsvc.exe -- (avg8wd)
SRV - [2009/08/24 06:36:45 | 000,377,344 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- winhttp.dll -- (WinHttpAutoProxySvc)
SRV - [2009/01/26 15:31:10 | 001,153,368 | ---- | M] (Safer Networking Ltd.) [Disabled | Stopped] -- C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe -- (SBSDWSCService)
SRV - [2008/01/19 02:38:24 | 000,272,952 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Windows Defender\MpSvc.dll -- (WinDefend)
SRV - [2007/06/20 05:28:56 | 000,537,264 | ---- | M] ( ) [Auto | Running] -- C:\Windows\System32\lxcycoms.exe -- (lxcy_device)
SRV - [2007/02/12 16:43:44 | 000,065,536 | ---- | M] (O2Micro International) [Disabled | Stopped] -- C:\Program Files\O2Micro Oz128 Driver\o2flash.exe -- (o2flash)
SRV - [2007/01/04 16:38:08 | 000,024,652 | ---- | M] (Viewpoint Corporation) [Disabled | Stopped] -- C:\Program Files\Viewpoint\Common\ViewpointService.exe -- (Viewpoint Manager Service)


========== Driver Services (SafeList) ==========

DRV - [2011/09/21 16:44:21 | 000,067,664 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2011/09/21 16:44:21 | 000,012,880 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS -- (SASDIFSV)
DRV - [2011/04/02 08:10:08 | 000,436,792 | ---- | M] () [Kernel | Boot | Running] -- C:\Windows\System32\Drivers\sptd.sys -- (sptd)
DRV - [2010/04/29 09:14:28 | 000,012,872 | ---- | M] ( SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | On_Demand | Stopped] -- C:\Program Files\SUPERAntiSpyware\SASENUM.SYS -- (SASENUM)
DRV - [2009/10/30 00:39:44 | 000,384,576 | ---- | M] (BEHRINGER) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\BUSB2902.sys -- (BEHRINGER_2902)
DRV - [2009/10/30 00:39:44 | 000,039,488 | ---- | M] (BEHRINGER) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\busbwdm.sys -- (BUSB_AUDIO_WDM)
DRV - [2009/08/28 07:46:53 | 000,335,240 | ---- | M] (AVG Technologies CZ, s.r.o.) [Kernel | System | Running] -- C:\Windows\System32\Drivers\avgldx86.sys -- (AvgLdx86)
DRV - [2009/08/28 07:46:53 | 000,027,784 | ---- | M] (AVG Technologies CZ, s.r.o.) [File_System | System | Running] -- C:\Windows\System32\Drivers\avgmfx86.sys -- (AvgMfx86)
DRV - [2009/05/01 08:10:12 | 000,108,552 | ---- | M] (AVG Technologies CZ, s.r.o.) [Kernel | System | Running] -- C:\Windows\System32\Drivers\avgtdix.sys -- (AvgTdiX)
DRV - [2009/03/06 08:06:02 | 000,140,800 | ---- | M] (Realtek Corporation ) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Rtlh86.sys -- (RTL8169)
DRV - [2009/01/13 08:45:00 | 000,954,368 | ---- | M] (Atheros Communications, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\athr.sys -- (athr)
DRV - [2008/06/27 00:40:18 | 000,335,872 | ---- | M] (Realtek Semiconductor Corporation ) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\RTL8187.sys -- (RTL8187)
DRV - [2007/08/22 11:50:38 | 001,749,760 | ---- | M] () [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\snp2uvc.sys -- (SNP2UVC) USB2.0 PC Camera (SNP2UVC)
DRV - [2007/08/15 09:49:48 | 000,552,448 | ---- | M] (Ralink Technology Corp.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\netr28u.sys -- (netr28u)
DRV - [2007/04/03 10:04:28 | 000,039,680 | ---- | M] (O2Micro ) [Kernel | Boot | Running] -- C:\Windows\system32\DRIVERS\o2media.sys -- (O2MDRDR)
DRV - [2007/04/02 16:11:08 | 000,035,712 | ---- | M] (O2Micro ) [Kernel | Boot | Running] -- C:\Windows\system32\DRIVERS\o2sd.sys -- (O2SDRDR)
DRV - [2006/12/28 11:05:10 | 000,033,936 | ---- | M] (IVT Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\btcusb.sys -- (Btcsrusb)
DRV - [2006/11/28 17:11:00 | 001,161,888 | ---- | M] (Agere Systems) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\AGRSM.sys -- (AgereSoftModem)
DRV - [2006/11/22 13:41:04 | 000,018,320 | ---- | M] (IVT Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\BtNetDrv.sys -- (BT)
DRV - [2006/11/22 13:40:50 | 000,044,304 | ---- | M] (IVT Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\VcommMgr.sys -- (VcommMgr)
DRV - [2006/11/22 13:40:34 | 000,034,448 | ---- | M] (IVT Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\VComm.sys -- (VComm)
DRV - [2006/11/22 13:40:20 | 000,035,600 | ---- | M] (IVT Corporation.) [Kernel | Boot | Running] -- C:\Windows\System32\Drivers\BTHidMgr.sys -- (BTHidMgr)
DRV - [2006/11/22 13:40:02 | 000,020,880 | ---- | M] (IVT Corporation.) [Kernel | Boot | Running] -- C:\Windows\System32\Drivers\vbtenum.sys -- (BTHidEnum)
DRV - [2006/11/22 13:39:14 | 000,027,792 | ---- | M] (IVT Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\BlueletSCOAudio.sys -- (BlueletSCOAudio)
DRV - [2006/11/22 13:39:00 | 000,034,576 | ---- | M] (IVT Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\blueletaudio.sys -- (BlueletAudio)
DRV - [2006/11/02 02:30:54 | 001,781,760 | ---- | M] (Intel® Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\NETw3v32.sys -- (NETw3v32) Intel®
DRV - [2000/11/15 09:32:38 | 000,002,204 | ---- | M] () [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\UNINST2K.SYS -- (UNINST2K)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\..\URLSearchHook: {EA756889-2338-43DB-8F07-D1CA6FB9C90D} - No CLSID value found

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Restore = http://google.com/
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,StartPageCache = 2
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========

FF - prefs.js..browser.startup.homepage: "google.com"
FF - prefs.js..extensions.enabledItems: {3f963a5b-e555-4543-90e2-c3908898db71}:8.5.0.429
FF - prefs.js..extensions.enabledItems: {0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0}:1.0

FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WPF,version=3.5: c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@viewpoint.com/VMP: C:\Program Files\Viewpoint\Viewpoint Media Player\npViewpoint.dll ()
FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files\Adobe\Reader 9.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)

FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\{3f963a5b-e555-4543-90e2-c3908898db71}: C:\Program Files\AVG\AVG8\Firefox [2009/12/22 09:43:09 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 3.0.8\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2011/09/28 09:28:32 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 3.0.8\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2011/09/28 09:28:32 | 000,000,000 | ---D | M]
FF - HKEY_CURRENT_USER\software\mozilla\Firefox\Extensions\\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0}: C:\Users\dad\AppData\Local\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0} [2009/04/22 06:59:33 | 000,000,000 | ---D | M]

[2011/08/19 08:15:30 | 000,000,000 | ---D | M] (No name found) -- C:\Users\dad\AppData\Roaming\Mozilla\Extensions
[2011/11/05 19:15:22 | 000,000,000 | ---D | M] (No name found) -- C:\Users\dad\AppData\Roaming\Mozilla\Firefox\Profiles\bph0mqab.default\extensions
[2011/08/19 09:10:37 | 000,000,000 | ---D | M] (Microsoft .NET Framework Assistant) -- C:\Users\dad\AppData\Roaming\Mozilla\Firefox\Profiles\bph0mqab.default\extensions\{20a82645-c095-46ed-80e3-08825760534b}
[2009/03/07 17:30:29 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2009/12/22 09:43:09 | 000,000,000 | ---D | M] (AVG Safe Search) -- C:\PROGRAM FILES\AVG\AVG8\FIREFOX
[2009/04/22 06:59:33 | 000,000,000 | ---D | M] (XUL Cache) -- C:\USERS\DAD\APPDATA\LOCAL\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0}

O1 HOSTS File: ([2011/01/10 17:29:58 | 000,427,804 | R--- | M]) - C:\Windows\System32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O1 - Hosts: 127.0.0.1 www.007guard.com
O1 - Hosts: 127.0.0.1 007guard.com
O1 - Hosts: 127.0.0.1 008i.com
O1 - Hosts: 127.0.0.1 www.008k.com
O1 - Hosts: 127.0.0.1 008k.com
O1 - Hosts: 127.0.0.1 www.00hq.com
O1 - Hosts: 127.0.0.1 00hq.com
O1 - Hosts: 127.0.0.1 010402.com
O1 - Hosts: 127.0.0.1 www.032439.com
O1 - Hosts: 127.0.0.1 032439.com
O1 - Hosts: 127.0.0.1 www.0scan.com
O1 - Hosts: 127.0.0.1 0scan.com
O1 - Hosts: 127.0.0.1 1000gratisproben.com
O1 - Hosts: 127.0.0.1 www.1000gratisproben.com
O1 - Hosts: 127.0.0.1 1001namen.com
O1 - Hosts: 127.0.0.1 www.1001namen.com
O1 - Hosts: 127.0.0.1 100888290cs.com
O1 - Hosts: 127.0.0.1 www.100888290cs.com
O1 - Hosts: 127.0.0.1 www.100sexlinks.com
O1 - Hosts: 127.0.0.1 100sexlinks.com
O1 - Hosts: 127.0.0.1 10sek.com
O1 - Hosts: 127.0.0.1 www.10sek.com
O1 - Hosts: 127.0.0.1 www.1-2005-search.com
O1 - Hosts: 127.0.0.1 1-2005-search.com
O1 - Hosts: 14756 more lines...
O2 - BHO: (AVG Safe Search) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll (AVG Technologies CZ, s.r.o.)
O2 - BHO: (Spybot-S&D IE Protection) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O2 - BHO: (no name) - {A3BC75A2-1F87-4686-AA43-5347D756017C} - No CLSID value found.
O2 - BHO: (Reg Error: Value error.) - {ed0992b5-be65-4996-9e04-67cadeda6c65} - Reg Error: Value error. File not found
O3 - HKLM\..\Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
O3 - HKCU\..\Toolbar\ShellBrowser: (no name) - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {D0523BB4-21E7-11DD-9AB7-415B56D89593} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser: (AIM Toolbar) - {DE9C389F-3316-41A7-809B-AA305ED9D922} - Reg Error: Value error. File not found
O4 - HKLM..\Run: [AVG8_TRAY] C:\Program Files\AVG\AVG8\avgtray.exe (AVG Technologies CZ, s.r.o.)
O4 - HKLM..\Run: [EzPrint] C:\Program Files\Lexmark 3400 Series\ezprint.exe (Lexmark International Inc.)
O4 - HKLM..\Run: [LXCYCATS] C:\Windows\System32\spool\DRIVERS\W32X86\3\LXCYtime.DLL (Lexmark International Inc.)
O4 - HKLM..\Run: [lxcymon.exe] C:\Program Files\Lexmark 3400 Series\lxcymon.exe ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0 ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: BindDirectlyToPropertySetStorage = 0 ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ValidateAdminCodeSignatures = 0 ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: dontdisplaylastusername = 0 ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: scforceoption = 0 ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: FilterAdministratorToken = 0 ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableUIADesktopToggle = 0 ()
O7 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0 ()
O9 - Extra 'Tools' menuitem : Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O13 - gopher Prefix: missing
O16 - DPF: {01113300-3E00-11D2-8470-0060089874ED} https://activatemyfi...S Installer.cab (Support.com Configuration Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {FFB3A759-98B1-446F-BDA9-909C6EB18CC7} http://utilities.pcp.../pcpitstop2.dll (PCPitstop Exam)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 68.87.71.230 68.87.73.246
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{71072450-D442-48B7-81A4-9E5509574C1E}: DhcpNameServer = 68.87.71.230 68.87.73.246
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{F39DE851-4BDA-43D1-B2FD-0EE97FEF952E}: DhcpNameServer = 192.168.1.1
O18 - Protocol\Handler\linkscanner {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll (AVG Technologies CZ, s.r.o.)
O18 - Protocol\Filter\application/octet-stream {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/x-complus {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/x-msdownload {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - mscoree.dll (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) -C:\Windows\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) -C:\Windows\System32\userinit.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - (C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL) - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
O20 - Winlogon\Notify\igfxcui: DllName - (igfxdev.dll) - igfxdev.dll (Intel Corporation)
O24 - Desktop WallPaper: C:\Users\dad\AppData\Roaming\Microsoft\Windows Photo Gallery\Windows Photo Gallery Wallpaper.jpg
O24 - Desktop BackupWallPaper: C:\Users\dad\AppData\Roaming\Microsoft\Windows Photo Gallery\Windows Photo Gallery Wallpaper.jpg
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O29 - HKLM SecurityProviders - (credssp.dll) -credssp.dll (Microsoft Corporation)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2006/09/18 16:43:36 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = ComFile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2011/11/04 12:36:18 | 000,000,000 | ---D | C] -- C:\ProgramData\Ezprint
[2011/11/04 12:36:09 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Lexmark 3400 Series
[2011/11/04 12:36:09 | 000,000,000 | ---D | C] -- C:\Program Files\Lexmark 3400 Series
[2011/11/04 12:36:02 | 001,224,704 | ---- | C] ( ) -- C:\Windows\System32\lxcyserv.dll
[2011/11/04 12:36:02 | 000,995,328 | ---- | C] ( ) -- C:\Windows\System32\lxcyusb1.dll
[2011/11/04 12:36:02 | 000,983,107 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\lxcygf.dll
[2011/11/04 12:36:02 | 000,696,320 | ---- | C] ( ) -- C:\Windows\System32\lxcyhbn3.dll
[2011/11/04 12:36:02 | 000,684,032 | ---- | C] ( ) -- C:\Windows\System32\lxcycomc.dll
[2011/11/04 12:36:02 | 000,643,072 | ---- | C] ( ) -- C:\Windows\System32\lxcypmui.dll
[2011/11/04 12:36:02 | 000,585,728 | ---- | C] ( ) -- C:\Windows\System32\lxcylmpm.dll
[2011/11/04 12:36:02 | 000,537,264 | ---- | C] ( ) -- C:\Windows\System32\lxcycoms.exe
[2011/11/04 12:36:02 | 000,462,848 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcyutil.dll
[2011/11/04 12:36:02 | 000,421,888 | ---- | C] ( ) -- C:\Windows\System32\lxcycomm.dll
[2011/11/04 12:36:02 | 000,413,696 | ---- | C] ( ) -- C:\Windows\System32\lxcyinpa.dll
[2011/11/04 12:36:02 | 000,397,312 | ---- | C] ( ) -- C:\Windows\System32\lxcyiesc.dll
[2011/11/04 12:36:02 | 000,385,712 | ---- | C] ( ) -- C:\Windows\System32\lxcyih.exe
[2011/11/04 12:36:02 | 000,381,616 | ---- | C] ( ) -- C:\Windows\System32\lxcycfg.exe
[2011/11/04 12:36:02 | 000,323,584 | ---- | C] ( ) -- C:\Windows\System32\lxcyhcp.dll
[2011/11/04 12:36:02 | 000,200,704 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcyinsb.dll
[2011/11/04 12:36:02 | 000,176,128 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcyins.dll
[2011/11/04 12:36:02 | 000,163,840 | ---- | C] ( ) -- C:\Windows\System32\lxcyprox.dll
[2011/11/04 12:36:02 | 000,147,456 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcyjswr.dll
[2011/11/04 12:36:02 | 000,106,496 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcyinsr.dll
[2011/11/04 12:36:02 | 000,094,208 | ---- | C] ( ) -- C:\Windows\System32\lxcypplc.dll
[2011/11/04 12:36:02 | 000,086,016 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcycub.dll
[2011/11/04 12:36:02 | 000,077,824 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcycu.dll
[2011/11/04 12:36:02 | 000,036,864 | ---- | C] (Lexmark International, Inc.) -- C:\Windows\System32\lxcycur.dll
[2011/11/04 12:28:15 | 000,000,000 | ---D | C] -- C:\Windows\LastGood
[2011/10/27 08:16:00 | 000,000,000 | ---D | C] -- C:\ProgramData\Sun
[2011/10/27 08:16:00 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Java
[2011/10/27 08:14:54 | 000,472,808 | ---- | C] (Sun Microsystems, Inc.) -- C:\Windows\System32\deployJava1.dll
[2011/10/27 08:14:54 | 000,157,472 | ---- | C] (Sun Microsystems, Inc.) -- C:\Windows\System32\javaws.exe
[2011/10/27 08:14:54 | 000,145,184 | ---- | C] (Sun Microsystems, Inc.) -- C:\Windows\System32\javaw.exe
[2011/10/27 08:14:54 | 000,145,184 | ---- | C] (Sun Microsystems, Inc.) -- C:\Windows\System32\java.exe
[2011/10/27 08:14:33 | 000,000,000 | ---D | C] -- C:\Program Files\Java
[2011/10/27 05:30:30 | 000,000,000 | ---D | C] -- C:\Users\dad\Desktop\MuseScore _ Free music composition & notation software_files
[2011/10/19 08:00:22 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner
[2011/10/14 02:09:28 | 002,382,848 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\mshtml.tlb
[2011/10/14 02:09:26 | 000,176,640 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\ieui.dll
[2011/10/14 02:09:25 | 001,798,144 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\jscript9.dll
[2011/10/14 02:09:25 | 000,065,024 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\jsproxy.dll
[2011/10/14 02:09:24 | 000,231,936 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\url.dll
[2011/10/13 16:41:05 | 000,293,376 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\psisdecd.dll
[2011/10/13 16:41:05 | 000,217,088 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\psisrndr.ax
[2011/10/13 16:41:05 | 000,069,632 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\Mpeg2Data.ax
[2011/10/13 16:41:05 | 000,057,856 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\MSDvbNP.ax
[2011/10/13 16:41:04 | 002,043,392 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\win32k.sys
[2011/10/13 16:39:36 | 000,555,520 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\UIAutomationCore.dll
[2011/10/13 16:39:36 | 000,004,096 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\oleaccrc.dll
[2007/07/04 09:28:52 | 000,176,128 | ---- | C] ( ) -- C:\Windows\System32\csnp2uvc.dll

========== Files - Modified Within 30 Days ==========

[2011/11/07 05:38:22 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2011/11/06 23:08:40 | 000,003,296 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
[2011/11/06 23:08:39 | 000,003,296 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
[2011/11/06 12:00:00 | 000,000,418 | ---- | M] () -- C:\Windows\tasks\ErrorFix Scan.job
[2011/11/04 12:38:03 | 000,027,355 | ---- | M] () -- C:\Windows\System32\LexFiles.ulf
[2011/11/04 12:32:22 | 000,325,444 | ---- | M] () -- C:\Windows\System32\perfh009.dat
[2011/11/04 12:32:22 | 000,210,294 | ---- | M] () -- C:\Windows\System32\perfc009.dat
[2011/11/04 12:27:38 | 3212,087,296 | -HS- | M] () -- C:\hiberfil.sys
[2011/11/04 09:26:50 | 000,377,240 | ---- | M] () -- C:\Windows\System32\FNTCACHE.DAT
[2011/10/27 08:14:37 | 000,472,808 | ---- | M] (Sun Microsystems, Inc.) -- C:\Windows\System32\deployJava1.dll
[2011/10/27 08:14:37 | 000,157,472 | ---- | M] (Sun Microsystems, Inc.) -- C:\Windows\System32\javaws.exe
[2011/10/27 08:14:37 | 000,145,184 | ---- | M] (Sun Microsystems, Inc.) -- C:\Windows\System32\javaw.exe
[2011/10/27 08:14:37 | 000,145,184 | ---- | M] (Sun Microsystems, Inc.) -- C:\Windows\System32\java.exe
[2011/10/27 05:30:35 | 000,019,811 | ---- | M] () -- C:\Users\dad\Desktop\MuseScore _ Free music composition & notation software.htm
[2011/10/19 08:16:52 | 084,840,206 | ---- | M] () -- C:\Windows\System32\drivers\Avg\incavi.avm
[2011/10/19 08:00:22 | 000,000,804 | ---- | M] () -- C:\Users\Public\Desktop\CCleaner.lnk
[2011/10/14 09:14:12 | 000,000,902 | ---- | M] () -- C:\Users\Public\Desktop\SUPERAntiSpyware Free Edition.lnk
[2011/10/14 09:12:37 | 000,414,368 | ---- | M] (Adobe Systems Incorporated) -- C:\Windows\System32\FlashPlayerCPLApp.cpl
[2011/10/13 07:32:06 | 000,288,391 | ---- | M] () -- C:\Users\dad\Desktop\catalog-9145-20110913150840.pdf

========== Files Created - No Company Name ==========

[2099/01/01 12:00:00 | 000,011,168 | -H-- | C] () -- C:\ProgramData\buheretu
[2011/11/04 12:36:02 | 000,581,173 | ---- | C] () -- C:\Windows\System32\lxcyhelp.chm
[2011/11/04 12:36:02 | 000,274,432 | ---- | C] () -- C:\Windows\System32\lxcyinst.dll
[2011/11/04 12:36:02 | 000,001,834 | ---- | C] () -- C:\Windows\System32\lxcy.loc
[2011/10/27 05:30:30 | 000,019,811 | ---- | C] () -- C:\Users\dad\Desktop\MuseScore _ Free music composition & notation software.htm
[2011/10/19 08:00:22 | 000,000,804 | ---- | C] () -- C:\Users\Public\Desktop\CCleaner.lnk
[2011/10/13 07:32:00 | 000,288,391 | ---- | C] () -- C:\Users\dad\Desktop\catalog-9145-20110913150840.pdf
[2011/02/26 11:26:47 | 000,085,504 | ---- | C] () -- C:\Windows\System32\ff_vfw.dll
[2010/07/22 13:16:05 | 000,000,067 | ---- | C] () -- C:\Windows\GPlrLanc.dat
[2009/09/23 17:32:47 | 000,117,248 | ---- | C] () -- C:\Windows\System32\EhStorAuthn.dll
[2009/09/23 17:32:47 | 000,107,612 | ---- | C] () -- C:\Windows\System32\StructuredQuerySchema.bin
[2009/04/10 19:50:56 | 000,000,408 | ---- | C] () -- C:\Users\dad\AppData\Local\Yjikan.dat
[2009/04/10 19:50:56 | 000,000,000 | ---- | C] () -- C:\Users\dad\AppData\Local\Dpugumezim.bin
[2009/03/07 19:15:21 | 000,040,960 | ---- | C] () -- C:\Windows\System32\LXPRMON.DLL
[2009/03/07 19:15:21 | 000,032,768 | ---- | C] () -- C:\Windows\System32\LXPMONUI.DLL
[2009/03/07 18:51:23 | 000,098,304 | ---- | C] () -- C:\Windows\System32\MGHwCtrl.dll
[2009/03/07 18:51:23 | 000,032,768 | ---- | C] () -- C:\Windows\System32\MGFPCtrl.dll
[2009/03/07 18:51:23 | 000,024,576 | ---- | C] () -- C:\Windows\System32\MGPwrShm.dll
[2009/03/05 05:54:58 | 000,073,728 | ---- | C] () -- C:\Windows\System32\RtNicProp32.dll
[2009/01/23 20:11:43 | 000,018,904 | ---- | C] () -- C:\Windows\System32\StructuredQuerySchemaTrivial.bin
[2009/01/15 14:35:19 | 000,000,442 | ---- | C] () -- C:\Windows\PowerReg.dat
[2009/01/15 14:31:07 | 000,021,504 | ---- | C] () -- C:\Windows\System32\DOCOBJ.DLL
[2008/11/14 07:30:46 | 000,000,376 | ---- | C] () -- C:\Windows\ODBC.INI
[2008/10/22 19:31:33 | 000,004,608 | ---- | C] () -- C:\Windows\DelShell.exe
[2008/10/22 19:31:33 | 000,001,214 | ---- | C] () -- C:\Windows\Sdcache.ini
[2008/10/22 19:31:32 | 000,002,204 | ---- | C] () -- C:\Windows\System32\drivers\UNINST2K.SYS
[2008/10/22 19:31:26 | 000,002,679 | ---- | C] () -- C:\Windows\System32\SDUSBPDR.INI
[2008/09/16 09:47:49 | 000,000,680 | ---- | C] () -- C:\Users\dad\AppData\Local\d3d9caps.dat
[2008/09/16 09:26:45 | 000,023,552 | ---- | C] () -- C:\Users\dad\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2008/02/11 19:55:18 | 000,147,456 | ---- | C] () -- C:\Windows\System32\igfxCoIn_v1437.dll
[2008/02/11 19:34:48 | 002,215,364 | ---- | C] () -- C:\Windows\System32\igklg400.bin
[2008/02/11 19:34:48 | 001,971,732 | ---- | C] () -- C:\Windows\System32\igklg450.bin
[2008/02/11 19:34:48 | 000,029,932 | ---- | C] () -- C:\Windows\System32\igmedcompkrn.bin
[2007/08/22 11:50:38 | 001,749,760 | ---- | C] () -- C:\Windows\System32\drivers\snp2uvc.sys
[2007/06/16 11:26:21 | 000,045,056 | ---- | C] () -- C:\Windows\UncompAVIToWMV2.exe
[2007/06/16 11:18:44 | 000,000,012 | ---- | C] () -- C:\Windows\bthservsdp.dat
[2007/05/09 07:16:40 | 000,028,160 | ---- | C] () -- C:\Windows\System32\drivers\sncduvc.sys
[2007/05/08 16:03:32 | 000,011,948 | ---- | C] () -- C:\Windows\lg_up.ini
[2007/05/08 16:03:06 | 000,000,951 | ---- | C] () -- C:\Windows\lgcenter.ini
[2007/05/08 06:05:35 | 001,060,424 | ---- | C] () -- C:\Windows\System32\WdfCoInstaller01000.dll
[2007/05/08 06:05:32 | 000,910,304 | ---- | C] () -- C:\Windows\System32\igmedkrn.dll
[2007/05/08 06:05:32 | 000,204,800 | ---- | C] () -- C:\Windows\System32\igfxCoIn_v1244.dll
[2007/05/08 05:59:47 | 000,000,195 | ---- | C] () -- C:\Windows\lgps.ini
[2007/02/22 17:32:00 | 000,344,064 | ---- | C] () -- C:\Windows\System32\lxcycoin.dll
[2006/11/02 07:57:28 | 000,067,584 | --S- | C] () -- C:\Windows\bootstat.dat
[2006/11/02 07:47:37 | 000,377,240 | ---- | C] () -- C:\Windows\System32\FNTCACHE.DAT
[2006/11/02 07:35:32 | 000,005,632 | ---- | C] () -- C:\Windows\System32\sysprepMCE.dll
[2006/11/02 05:33:01 | 000,325,444 | ---- | C] () -- C:\Windows\System32\perfh009.dat
[2006/11/02 05:33:01 | 000,287,440 | ---- | C] () -- C:\Windows\System32\perfi009.dat
[2006/11/02 05:33:01 | 000,210,294 | ---- | C] () -- C:\Windows\System32\perfc009.dat
[2006/11/02 05:33:01 | 000,030,674 | ---- | C] () -- C:\Windows\System32\perfd009.dat
[2006/11/02 05:23:21 | 000,215,943 | ---- | C] () -- C:\Windows\System32\dssec.dat
[2006/11/02 03:58:30 | 000,043,131 | ---- | C] () -- C:\Windows\mib.bin
[2006/11/02 03:19:00 | 000,000,741 | ---- | C] () -- C:\Windows\System32\NOISE.DAT
[2006/11/02 02:40:29 | 000,013,750 | ---- | C] () -- C:\Windows\System32\pacerprf.ini
[2006/11/02 02:25:31 | 000,673,088 | ---- | C] () -- C:\Windows\System32\mlang.dat
[2006/05/19 03:39:58 | 000,015,497 | ---- | C] () -- C:\Windows\snp2uvc.ini
[2006/03/23 03:33:20 | 000,040,960 | ---- | C] () -- C:\Windows\System32\lxcyvs.dll
[2006/03/06 12:52:58 | 000,065,536 | ---- | C] () -- C:\Windows\System32\lxcycaps.dll
[2006/03/06 12:51:28 | 000,692,224 | ---- | C] () -- C:\Windows\System32\lxcydrs.dll
[2006/01/25 17:11:04 | 000,061,440 | ---- | C] () -- C:\Windows\System32\lxcycnv4.dll
[1999/01/22 13:46:58 | 000,065,536 | ---- | C] () -- C:\Windows\System32\MSRTEDIT.DLL
[1998/01/12 03:00:00 | 000,040,448 | ---- | C] () -- C:\Windows\System32\REGOBJ.DLL

========== Alternate Data Streams ==========

@Alternate Data Stream - 115 bytes -> C:\ProgramData\TEMP:6724CB45
@Alternate Data Stream - 104 bytes -> C:\ProgramData\TEMP:DFC5A2B2

EXTRAS Log

OTL Extras logfile created on: 11/07/2011 6:59:57 AM - Run 1
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\dad\Downloads
Windows Vista Home Premium Edition Service Pack 2 (Version = 6.0.6002) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: MM/dd/yyyy

2.99 Gb Total Physical Memory | 1.13 Gb Available Physical Memory | 37.71% Memory free
6.19 Gb Paging File | 4.60 Gb Available in Paging File | 74.29% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 110.78 Gb Total Space | 47.21 Gb Free Space | 42.61% Space Free | Partition Type: NTFS

Computer Name: DAD-PC | User Name: dad | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
.hlp [@ = hlpfile] -- C:\Windows\winhlp32.exe (Microsoft Corporation)
.html [@ = Reg Error: Value error.] -- Reg Error: Key error. File not found

[HKEY_CURRENT_USER\SOFTWARE\Classes\<extension>]
.html [@ = FirefoxHTML] -- C:\Program Files\Mozilla Firefox\firefox.exe (Mozilla Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
exefile [open] -- "%1" %*
helpfile [open] -- Reg Error: Key error.
hlpfile [open] -- %SystemRoot%\winhlp32.exe %1 (Microsoft Corporation)
htmlfile [edit] -- "C:\Program Files\Microsoft Office\Office\msohtmed.exe" %1 (Microsoft Corporation)
htmlfile [print] -- "C:\Program Files\Microsoft Office\Office\msohtmed.exe" /p %1 (Microsoft Corporation)
http [open] -- Reg Error: Value error.
https [open] -- Reg Error: Value error.
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Directory [Winamp.Bookmark] -- "C:\Program Files\Winamp\winamp.exe" /BOOKMARK "%1" (Nullsoft, Inc.)
Directory [Winamp.Enqueue] -- "C:\Program Files\Winamp\winamp.exe" /ADD "%1" (Nullsoft, Inc.)
Directory [Winamp.Play] -- "C:\Program Files\Winamp\winamp.exe" "%1" (Nullsoft, Inc.)
Folder [open] -- %SystemRoot%\Explorer.exe /separate,/idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /separate,/e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"cval" = 1
"FirewallDisableNotify" = 0 -- ()
"UPDATESDISABLENOTIFY" = 0 -- ()

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"AntiVirusOverride" = 1
"AntiSpywareOverride" = 0 -- ()
"FirewallOverride" = 0 -- ()
"VistaSp1" = Reg Error: Unknown registry data type -- File not found
"VistaSp2" = Reg Error: Unknown registry data type -- File not found

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Vol]

========== System Restore Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR" = 0

========== Firewall Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile]

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"EnableFirewall" = 1
"DisableNotifications" = 0 -- ()

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1
"DisableNotifications" = 0 -- ()

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
"EnableFirewall" = 1
"DisableNotifications" = 0 -- ()

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]


========== Vista Active Open Ports Exception List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{023D56C9-F4E3-419F-89BC-CA06ABB38B2E}" = lport=445 | protocol=6 | dir=in | app=system |
"{03BDE59D-7D50-4AFC-86DF-7CBFAA11706D}" = lport=137 | protocol=17 | dir=in | app=system |
"{1314D835-A6BE-44B9-94CF-6502645F7614}" = rport=445 | protocol=6 | dir=out | app=system |
"{349ADF90-A20F-481E-9234-E9C2DB667A8E}" = lport=138 | protocol=17 | dir=in | app=system |
"{36F24785-4336-4184-8512-6DCE1C021D8C}" = lport=rpc | protocol=6 | dir=in | svc=spooler | app=%systemroot%\system32\spoolsv.exe |
"{4C7E5A07-79C9-4FAE-B1C1-5E4E695F523E}" = lport=rpc-epmap | protocol=6 | dir=in | svc=rpcss | [email protected],-28539 |
"{56C9CBD2-149E-4AAC-BEB7-200D36354248}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=svchost.exe |
"{5939D1AF-F375-4C31-95FF-F48934E2F3D0}" = lport=1900 | protocol=17 | dir=in | name=windows live communications platform (ssdp) |
"{61E7365A-CFDE-4A7D-8906-F1BFBD4C8F9E}" = lport=2869 | protocol=6 | dir=in | app=system |
"{7016D08B-7F47-4EF7-AF60-9E50E931DF1A}" = lport=2869 | protocol=6 | dir=in | name=windows live communications platform (upnp) |
"{896B4593-8AF7-4995-BA79-6F076C0C7854}" = rport=138 | protocol=17 | dir=out | app=system |
"{D06F8D68-6B68-4553-8852-02B1272C5F1D}" = lport=139 | protocol=6 | dir=in | app=system |
"{DD16DCB1-436B-409C-8B19-0F6CE69A7ED6}" = rport=137 | protocol=17 | dir=out | app=system |
"{E282B21E-5825-40E3-9C03-902FED72F9F2}" = rport=139 | protocol=6 | dir=out | app=system |

========== Vista Active Application Exception List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{207D8DDD-4ACF-4F77-B707-35A7D9103E45}" = protocol=1 | dir=out | [email protected],-28544 |
"{3E23BB9E-81E4-473C-94ED-00868BBF0C9D}" = protocol=6 | dir=in | app=c:\windows\system32\lxcycoms.exe |
"{79AC70F9-A6A7-4A02-8800-1D56EDD85B56}" = protocol=17 | dir=in | app=c:\program files\lexmark 3400 series\lxcymon.exe |
"{7CB8280A-BD55-4375-ABC1-C1F5CBC6ACE5}" = protocol=17 | dir=in | app=c:\windows\system32\lxcycoms.exe |
"{845A58C0-98D2-4E11-8DBE-CCB98FEF8D8D}" = protocol=6 | dir=in | app=c:\program files\lexmark 3400 series\lxcyaiox.exe |
"{889DA711-718F-4AA6-859C-2EC1EBEAB3E0}" = protocol=1 | dir=in | [email protected],-28543 |
"{9762F7AF-5239-4BA2-966C-52809AEB2F51}" = protocol=17 | dir=in | app=c:\program files\lexmark 3400 series\lxcyaiox.exe |
"{A26C99A7-41AE-41DD-8CDA-7161C3AB0526}" = dir=in | app=c:\program files\windows live\contacts\wlcomm.exe |
"{AD33DF4A-2D8D-42C5-A658-CD8C80053849}" = protocol=58 | dir=out | [email protected],-28546 |
"{CDDECADB-DA45-4240-AA89-6F12AE89A3BF}" = dir=in | app=c:\program files\windows live\messenger\msnmsgr.exe |
"{DB7257D9-FE78-40EB-9652-8EE6F3759C11}" = protocol=6 | dir=in | app=c:\program files\lexmark 3400 series\lxcymon.exe |
"{DF0CAED7-AE52-42A6-8C5F-50C5110897FD}" = protocol=58 | dir=in | [email protected],-28545 |
"TCP Query User{85B34B50-D21C-4D1A-ABCA-AC7CE0A52BE3}C:\program files\ares\ares.exe" = protocol=6 | dir=in | app=c:\program files\ares\ares.exe |
"TCP Query User{A1108EED-1112-4065-8443-AC9DA49ABCD7}C:\program files\ares\ares.exe" = protocol=6 | dir=in | app=c:\program files\ares\ares.exe |
"UDP Query User{FCB842B1-310A-4A4E-8558-3439C52F1D39}C:\program files\ares\ares.exe" = protocol=17 | dir=in | app=c:\program files\ares\ares.exe |
"UDP Query User{FD63667A-9D93-4874-B643-52FACAE2B9C2}C:\program files\ares\ares.exe" = protocol=17 | dir=in | app=c:\program files\ares\ares.exe |

========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{00000409-78E1-11D2-B60F-006097C998E7}" = Microsoft Office 2000 Premium
"{00040409-78E1-11D2-B60F-006097C998E7}" = Microsoft Office 2000 Disc 2
"{00203668-8170-44A0-BE44-B632FA4D780F}" = Adobe AIR
"{0B0F231F-CE6A-483D-AA23-77B364F75917}" = Windows Live Installer
"{200FEC62-3C34-4D60-9CE8-EC372E01C08F}" = Windows Live SOXE Definitions
"{26A24AE4-039D-4CA4-87B4-2F83216029FF}" = Java™ 6 Update 29
"{315F5FFC-1A5C-4A2A-B8E7-1C5B1174C198}_is1" = AML Free Registry Cleaner 4.21
"{3C3901C5-3455-3E0A-A214-0B093A5070A6}" = Microsoft .NET Framework 4 Client Profile
"{48C10E3C-A04F-4ED0-82AF-609CC5DE0F5D}" = O2Micro Flash Memory Card Reader Driver Installer(x86)
"{4A03706F-666A-4037-7777-5F2748764D10}" = Java Auto Updater
"{4CBABDFD-49F8-47FD-BE7D-ECDE7270525A}" = Windows Live PIMT Platform
"{5721A8EA-A30F-4F66-9046-3F40C43AE1DC}" = Driver Detective
"{5DD4FCBD-A3C1-4155-9E17-4161C70AAABA}" = Segoe UI
"{61AD15B2-50DB-4686-A739-14FE180D4429}" = Windows Live ID Sign-in Assistant
"{682B3E4F-696A-42DE-A41C-4C07EA1678B4}" = Windows Live SOXE
"{6A05FEDF-662E-46BF-8A25-010E3F1C9C69}" = Windows Live UX Platform Language Pack
"{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}" = Microsoft Visual C++ 2005 Redistributable
"{770657D0-A123-3C07-8E44-1C83EC895118}" = Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
"{77DCDCE3-2DED-62F3-8154-05E745472D07}" = Acrobat.com
"{785F267D-DC33-4404-83ED-7B0CD5E63474}" = Bluesoleil3.1.0.2 Release 070119
"{78764173-3805-4916-B3CE-B433702B8870}" = O2Micro Flash Memory Card Reader Driver Installer(x86)
"{80956555-A512-4190-9CAD-B000C36D6B6B}" = Windows Live Messenger
"{81717D01-32F6-449C-85E1-41AFD678E545}" = LG Intelligent Update
"{8833FFB6-5B0C-4764-81AA-06DFEED9A476}" = Realtek 8169 PCI, 8168 and 8101E PCIe Ethernet Network Card Driver for Windows Vista
"{8DD46C6A-0056-4FEC-B70A-28BB16A1F11F}" = MSVCRT
"{9455E8B0-4D73-4A9D-BFA3-D2C213BFD28F}" = LG Smart Cam
"{95120000-00B9-0409-0000-0000000FF1CE}" = Microsoft Application Error Reporting
"{A9BDCA6B-3653-467B-AC83-94367DA3BFE3}" = Windows Live Photo Common
"{AB67580-257C-45FF-B8F4-C8C30682091A}_is1" = SIW version 2009-03-17
"{AC76BA86-7AD7-1033-7B44-A94000000001}" = Adobe Reader 9.4.6
"{AC76BA86-7AD7-5464-3428-900000000004}" = Spelling Dictionaries Support For Adobe Reader 9
"{ACF60000-22B9-4CE9-98D6-2CCF359BAC07}" = ABBYY FineReader 6.0 Sprint
"{B3DAF54F-DB25-4586-9EF1-96D24BB14088}" = Windows Movie Maker 2.6
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}" = SUPERAntiSpyware Free Edition
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{CE95A79E-E4FC-4FFF-8A75-29F04B942FF2}" = Windows Live UX Platform
"{D436F577-1695-4D2F-8B44-AC76C99E0002}" = Windows Live Photo Common
"{D45240D3-B6B3-4FF9-B243-54ECE3E10066}" = Windows Live Communications Platform
"{E09C4DB7-630C-4F06-A631-8EA7239923AF}" = D3DX10
"{EB4DF488-AAEF-406F-A341-CB2AAA315B90}" = Windows Live Messenger
"{ED9C5D25-55DF-48D8-9328-2AC0D75DE5D8}" = System Control Manager
"{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
"{F44DA61E-720D-4E79-871F-F6E628B33242}" = OpenOffice.org 3.0
"{FE044230-9CA5-43F7-9B58-5AC5A28A1F33}" = Windows Live Essentials
"Adobe AIR" = Adobe AIR
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 11 Plugin
"Agere Systems Soft Modem" = Agere Systems HDA Modem
"AIM Toolbar" = AIM Toolbar 5.0
"Audacity_is1" = Audacity 1.2.6
"AVG8Uninstall" = AVG 8.5
"AVS Update Manager_is1" = AVS Update Manager 1.0
"AVS4YOU Video Converter 7_is1" = AVS Video Converter 7
"CCleaner" = CCleaner
"CleanUp!" = CleanUp!
"com.adobe.mauby.4875E02D9FB21EE389F73B8D1702B320485DF8CE.1" = Acrobat.com
"EzManual" = EzManual
"HDMI" = Intel® Graphics Media Accelerator Driver
"HijackThis" = HijackThis 2.0.2
"InstaCodecs_is1" = InstaCodecs
"Lexmark 3400 Series" = Lexmark 3400 Series
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"Microsoft .NET Framework 4 Client Profile" = Microsoft .NET Framework 4 Client Profile
"Microsoft PhotoDraw 2000" = Microsoft PhotoDraw 2000
"Native Instruments Guitar Rig 2" = Native Instruments Guitar Rig 2
"SynTPDeinstKey" = Synaptics Pointing Device Driver
"USB_AUDIO_DEusb-audio.deBehringer2902" = BEHRINGER USB AUDIO DRIVER
"Winamp" = Winamp
"WinLiveSuite" = Windows Live Essentials

========== HKEY_CURRENT_USER Uninstall List ==========

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"f031ef6ac137efc5" = Dell Driver Download Manager
"Winamp Detect" = Winamp Detector Plug-in

========== Last 10 Event Log Errors ==========

Error reading Event Logs: The Event Service is not operating properly or the Event Logs are corrupt!

< End of report >


< End of report >

Edited by 67mopar, 07 November 2011 - 06:40 AM.

  • 0

Advertisements


#2
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me Agent ST for short), it's a pleasure to meet you. :yes:

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:


  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • In Windows Vista and Windows 7, all tools need to be started by right clicking and selecting Run as Administrator!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together :)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.

____________________________________________________

Remove Program
We need to remove a program. To do this please do the following:
  • Click Start
  • Go to Control Panel
  • Go to Programs
  • Click on Uninstall a Program
  • Find and click Uninstall/Change for the following (if present):
  • AIM Toolbar 5.0<== If you don't use it, then I suggest removing it.
  • AML Free Registry Cleaner 4.21 <== I'm not a big fan of registry cleaners, they tend to do more harm then good. If you don't use it, then I suggest removing it.


OTL Fix

We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.
    :Services
    :Processes
    KILLALLPROCESSES
    :OTL
    SRV - File not found [Auto | Stopped] -- -- (0050841232311355mcinstcleanup) McAfee Application Installer Cleanup (0050841232311355)
    IE - HKLM\..\URLSearchHook: {EA756889-2338-43DB-8F07-D1CA6FB9C90D} - No CLSID value found
    [2009/04/22 06:59:33 | 000,000,000 | ---D | M] (XUL Cache) -- C:\USERS\DAD\APPDATA\LOCAL\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0}
    O2 - BHO: (no name) - {A3BC75A2-1F87-4686-AA43-5347D756017C} - No CLSID value found.
    O2 - BHO: (Reg Error: Value error.) - {ed0992b5-be65-4996-9e04-67cadeda6c65} - Reg Error: Value error. File not found
    O3 - HKLM\..\Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
    O3 - HKCU\..\Toolbar\ShellBrowser: (no name) - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No CLSID value found.
    O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No CLSID value found.
    O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - No CLSID value found.
    O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
    O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {D0523BB4-21E7-11DD-9AB7-415B56D89593} - No CLSID value found.
    O3 - HKCU\..\Toolbar\WebBrowser: (AIM Toolbar) - {DE9C389F-3316-41A7-809B-AA305ED9D922} - Reg Error: Value error. File not found
    O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
    O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
    O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_29)
    [2099/01/01 12:00:00 | 000,011,168 | -H-- | C] () -- C:\ProgramData\buheretu
    [2009/04/10 19:50:56 | 000,000,408 | ---- | C] () -- C:\Users\dad\AppData\Local\Yjikan.dat
    [2009/04/10 19:50:56 | 000,000,000 | ---- | C] () -- C:\Users\dad\AppData\Local\Dpugumezim.bin
    @Alternate Data Stream - 115 bytes -> C:\ProgramData\TEMP:6724CB45
    @Alternate Data Stream - 104 bytes -> C:\ProgramData\TEMP:DFC5A2B2
    
    :Reg
    
    :Files
    echo,Y|cacls "%WinDir%\system32\drivers\etc\hosts" /G everyone:f /c
    ipconfig /flushdns /c
    :Commands
    [purity]
    [resethosts]
    [CreateRestorePoint]
    [EMPTYFLASH]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click the OK button.
  • A report will open. Copy and Paste that report in your next reply.
  • If the machine reboots, the log will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.


NEXT:



Scanning with GMER

Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.


Posted Image
Download GMER Rootkit Scanner from here or here.
  • Extract the contents of the zipped file to desktop.
  • Double click GMER.exe. If asked to allow gmer.sys driver to load, please consent .
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO.

    Posted Image
    Click the image to enlarge it
  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "Gmer.txt" or it will save as a .log file which cannot be uploaded to your post.
  • Save it where you can easily find it, such as your desktop, and attach it in your reply.

Notes:
**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries


-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.



NEXT:



What issues are you currently experiencing with your computer??
  • 0

#3
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts
I cant see the aim toolbar on my list, I uninstalled the aml software, but it said i would have to remove some components manually, If I could find the aim toolbar I would delete it not a big fan of aol. waiting to hear from you to advise before I run the OTL fix, Thank you, Dean
  • 0

#4
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
Hi!

Please don't worry about the AIM Toolbar for now. Please proceed with the OTL fix, followed by the GMER scan.
  • 0

#5
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts

Hi!

Please don't worry about the AIM Toolbar for now. Please proceed with the OTL fix, followed by the GMER scan.

========== SERVICES/DRIVERS ==========
========== PROCESSES ==========
All processes killed
========== OTL ==========
Error: No service named 0050841232311355mcinstcleanup) McAfee Application Installer Cleanup (0050841232311355 was found to stop!
Service\Driver key 0050841232311355mcinstcleanup) McAfee Application Installer Cleanup (0050841232311355 not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\\{EA756889-2338-43DB-8F07-D1CA6FB9C90D} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EA756889-2338-43DB-8F07-D1CA6FB9C90D}\ not found.
C:\USERS\DAD\APPDATA\LOCAL\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0}\chrome\content folder moved successfully.
C:\USERS\DAD\APPDATA\LOCAL\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0}\chrome folder moved successfully.
C:\USERS\DAD\APPDATA\LOCAL\{0CECA608-4C6E-4D5F-8B0C-B26C7711BDB0} folder moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3BC75A2-1F87-4686-AA43-5347D756017C}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ed0992b5-be65-4996-9e04-67cadeda6c65}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{ed0992b5-be65-4996-9e04-67cadeda6c65}\ deleted successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\\{1017A80C-6F09-4548-A84D-EDD6AC9525F0} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1017A80C-6F09-4548-A84D-EDD6AC9525F0}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{1017A80C-6F09-4548-A84D-EDD6AC9525F0} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1017A80C-6F09-4548-A84D-EDD6AC9525F0}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{A057A204-BACC-4D26-9990-79A187E2698E} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A057A204-BACC-4D26-9990-79A187E2698E}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{D0523BB4-21E7-11DD-9AB7-415B56D89593} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D0523BB4-21E7-11DD-9AB7-415B56D89593}\ not found.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{DE9C389F-3316-41A7-809B-AA305ED9D922} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DE9C389F-3316-41A7-809B-AA305ED9D922}\ deleted successfully.
Starting removal of ActiveX control {8AD9C840-044E-11D1-B3E9-00805F499D93}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Starting removal of ActiveX control {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ not found.
Starting removal of ActiveX control {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
C:\ProgramData\buheretu moved successfully.
C:\Users\dad\AppData\Local\Yjikan.dat moved successfully.
C:\Users\dad\AppData\Local\Dpugumezim.bin moved successfully.
ADS C:\ProgramData\TEMP:6724CB45 deleted successfully.
ADS C:\ProgramData\TEMP:DFC5A2B2 deleted successfully.
========== REGISTRY ==========
========== FILES ==========
< echo,Y|cacls "%WinDir%\system32\drivers\etc\hosts" /G everyone:f /c >
Are you sure (Y/N)?processed file: C:\Windows\system32\drivers\etc\hosts
C:\Users\dad\Downloads\cmd.bat deleted successfully.
C:\Users\dad\Downloads\cmd.txt deleted successfully.
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Users\dad\Downloads\cmd.bat deleted successfully.
C:\Users\dad\Downloads\cmd.txt deleted successfully.
========== COMMANDS ==========
  • 0

#6
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
:)
  • 0

#7
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts
here is the gmer file, thanks it took a while it crashed but I got it.

Attached Files

  • Attached File  gmer.txt   15.59KB   172 downloads

  • 0

#8
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
Hi!

Thanks for the GMER log.

Lets see what MalwareBytes' Anti-Malware turns up.


Scanning with MalwareBytes' Anti-Malware

Please download Malwarebytes' Anti-Malware (v1.51.0.1200) and save it to your desktop.
Download Link 1
Download Link 2Malwarebytes' may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes' when done.
Note: If Malwarebytes' encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes' from removing all the malware.
  • 0

#9
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts
I clicked full scan malware bytes by accident should I let it go?
  • 0

#10
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
Let it run through the scan and finish, then run a new scan clicking the Quick Scan option. Please post both logs in your next reply.
  • 0

Advertisements


#11
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts
having a hard time trying to save the log, and or copy and paste it but lets just say its full of trojans, I have to go till the a.m., should I hit fix errors , will wait for advise, thank you so much even after the olt removal I see a differance and from whats up on the malware log I feel pretty good it found the problem, I have a short porch tom a.m. but I will be back thanks again have a good night/morn or whatever yur time zone is THANKS!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  • 0

#12
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts
Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8110

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

11/08/2011 5:49:54 AM
mbam-log-2011-11-08 (05-49-54).txt

Scan type: Full scan (C:\|)
Objects scanned: 290252
Time elapsed: 49 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 5
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 5
Files Infected: 229

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\tm (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
c:\Users\dad\AppData\Roaming\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Logs (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410 (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Results (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Files Infected:
c:\Users\dad\downloads\videocodecplugin.exe (Spyware.GamePlayLabs) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\microsoft\Windows\start menu\Programs\Startup\ChkDisk.lnk (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Windows\Tasks\errorfix scan.job (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Logs\2009-04-02 14-47-470.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Logs\2009-04-02 15-30-480.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\filelist.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-1.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-10.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-100.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-101.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-102.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-103.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-104.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-105.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-106.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-107.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-108.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-109.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-11.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-110.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-111.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-112.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-113.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-26.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-27.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-28.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-29.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-3.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-30.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-31.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-32.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-33.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-34.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-35.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-36.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-37.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-38.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-39.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-4.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-40.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-41.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-42.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-44.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-45.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-46.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-47.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-48.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-49.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-5.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-50.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-51.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-52.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-53.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-54.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-55.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-56.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-57.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-58.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-59.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-6.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-60.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-62.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-63.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-64.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-65.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-66.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-67.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-68.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-69.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-7.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-70.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-71.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-72.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-73.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-74.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-75.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-76.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-77.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-78.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-79.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-80.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-81.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-82.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-83.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-84.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-85.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-86.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-87.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-88.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-89.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-9.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-90.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-91.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-92.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-93.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-94.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-95.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-96.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-97.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-98.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-99.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-114.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-132.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-150.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-169.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-187.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-25.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-43.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-61.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-8.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-115.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-116.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-117.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-118.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-119.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-12.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-120.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-121.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-122.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-123.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-124.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-125.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-126.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-127.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-128.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-129.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-13.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-130.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-131.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-133.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-134.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-135.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-136.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-137.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-138.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-139.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-14.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-140.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-141.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-142.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-143.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-144.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-145.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-146.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-147.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-148.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-149.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-15.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-151.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-152.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-153.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-154.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-155.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-156.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-157.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-158.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-159.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-16.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-160.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-161.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-162.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-163.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-164.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-165.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-166.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-167.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-168.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-17.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-170.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-171.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-172.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-173.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-174.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-175.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-176.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-177.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-178.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-179.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-18.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-180.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-181.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-182.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-183.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-184.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-185.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-186.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-188.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-189.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-19.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-190.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-191.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-192.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-193.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-194.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-195.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-196.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-197.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-198.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-199.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-2.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-20.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-200.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-201.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-202.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-203.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-204.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-205.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-206.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-207.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-208.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-209.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-21.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-210.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-211.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-212.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-213.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-214.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-215.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-216.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-217.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-218.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-22.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-23.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\quarantinew\2009-04-02 14-53-410\regb-24.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Results\Evidence.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Results\Junk.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Results\Registry.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\Users\dad\AppData\Roaming\ErrorFix\Results\Update.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
  • 0

#13
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
Good Afternoon!

It looks like MalwareBytes' Anti-Malware found some issues.

Were you by any chance able to run another scan with MBAM and choosing to scan via the Quick Scan option? If so, can you please post that log file for me to review?
  • 0

#14
67mopar

67mopar

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 202 posts
perfect timing just came in looks like its pretty clean and running pretty good is there anything else you see that would be a issue? Thank you so much!!!!Dean

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8110

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

11/08/2011 7:11:45 AM
mbam-log-2011-11-08 (07-11-45).txt

Scan type: Full scan (C:\|)
Objects scanned: 289835
Time elapsed: 55 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
  • 0

#15
SweetTech

SweetTech

    Sir SpamAlot

  • Retired Staff
  • 7,671 posts
Hi Dean!

I'd like to have you run an online virus scanner to see what that picks up, as well as another tool to scan for outdated software.


ESET Online Scanner
I'd like us to scan your machine with ESET Online Scan

Note: It is recommended to disable on-board anti-virus program and anti-spyware programs while performing scans so there are no conflicts and it will speed up scan time.
Please don't go surfing while your resident protection is disabled!
Once the scan is finished remember to re-enable your anti-virus along with your anti-spyware programs.



  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Make sure that the option "Remove found threats" is Unchecked
  • When the Computer scan settings display shows, click the Advanced option, the place a check next to the following (if it is not already checked):
    • Enable Anti-Stealth technology
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin
    scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as
    ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NEXT:


Security Check
Download Security Check by screen317 from here or here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP