Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Can't get rid of malware, spyware animation [Solved]


  • This topic is locked This topic is locked

#16
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts
Hmmm. We havent actually tun any fixes yet, the tools are just to generate reports.
Dont worry we will sort it for you Once we have a complete set of logs to work through :)
  • 0

Advertisements


#17
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Hi.

I know we haven't  fixed or done anything but coincidentally my computer got worst after those tools.

I was able to clean the fake java using Malware Bites or Trend Micro and now all seem a mess.

Anyway, here is the "extras.txt" file you asked.

----------------------------------------

 

OTL Extras logfile created on: 15/11/2014 04:42:44 - Run 1
OTL by OldTimer - Version 3.2.69.0     Folder = C:\Users\Suzie\Downloads
 Starter Edition Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation
Internet Explorer (Version = 9.11.9600.17420)
Locale: 00000416 | Country: Brasil | Language: PTB | Date Format: dd/MM/yyyy
 
1,93 Gb Total Physical Memory | 1,23 Gb Available Physical Memory | 63,42% Memory free
3,87 Gb Paging File | 2,60 Gb Available in Paging File | 67,24% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 298,09 Gb Total Space | 115,06 Gb Free Space | 38,60% Space Free | Partition Type: NTFS
Drive F: | 30,03 Gb Total Space | 0,24 Gb Free Space | 0,79% Space Free | Partition Type: FAT32
 
Computer Name: SUZIE-MEGA | User Name: Suzie | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
 
========== Extra Registry (SafeList) ==========
 
 
========== File Associations ==========
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- C:\Windows\System32\control.exe (Microsoft Corporation)
.hlp [@ = hlpfile] -- C:\Windows\winhlp32.exe (Microsoft Corporation)
 
========== Shell Spawning ==========
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- %SystemRoot%\System32\control.exe "%1",%* (Microsoft Corporation)
exefile [open] -- "%1" %*
helpfile [open] -- Reg Error: Key error.
hlpfile [open] -- %SystemRoot%\winhlp32.exe %1 (Microsoft Corporation)
htmlfile [edit] -- Reg Error: Key error.
inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [explore] -- Reg Error: Value error.
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
 
========== Security Center Settings ==========
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"cval" = 1
"FirewallDisableNotify" = 0
"AntiVirusDisableNotify" = 0
"UpdatesDisableNotify" = 0
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"VistaSp1" = Reg Error: Unknown registry data type -- File not found
"AntiVirusOverride" = 0
"AntiSpywareOverride" = 0
"FirewallOverride" = 0
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Vol]
 
========== System Restore Settings ==========
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR" = 0
 
========== Firewall Settings ==========
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"EnableFirewall" = 1
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1
 
========== Authorized Applications List ==========
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
 
 
========== Vista Active Open Ports Exception List ==========
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{1FE79A80-0F79-4669-86C7-CE74ABFD72FD}" = lport=2869 | protocol=6 | dir=in | app=system | 
"{32B4136E-2E52-4F75-9F4C-6B553B24C112}" = lport=1900 | protocol=17 | dir=in | name=windows live communications platform (ssdp) | 
"{4789ABC3-4A6F-49F6-BCDB-A5B731D0BDC1}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=svchost.exe | 
"{ED8E2AC2-1BF7-4B5E-A3E8-18C2AA12D86A}" = lport=2869 | protocol=6 | dir=in | name=windows live communications platform (upnp) | 
"{FD286051-8A00-4D2D-BD9C-7C9D0E7A763E}" = lport=6004 | protocol=17 | dir=in | app=c:\program files\microsoft office 15\root\office15\outlook.exe | 
 
========== Vista Active Application Exception List ==========
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{006F2EF3-CFCC-4362-8C02-04DC566FAFDC}" = protocol=17 | dir=in | app=c:\program files\vuze\azureus.exe | 
"{2194AB5C-C666-499C-BAC1-8E4019E5BAA5}" = protocol=6 | dir=in | app=c:\program files\teamviewer\version9\teamviewer_service.exe | 
"{22F63D85-1F90-4A18-8687-E758E5390DBC}" = dir=in | app=c:\program files\windows live\contacts\wlcomm.exe | 
"{294E4021-1001-478B-9403-E825BA8D8C8E}" = dir=in | app=c:\program files\itunes\itunes.exe | 
"{2A954979-8830-492E-86F6-2C0971D3FEEF}" = protocol=6 | dir=in | app=c:\program files\bonjour\mdnsresponder.exe | 
"{2E68C7F2-9557-4E33-A6F5-BB9E11870304}" = dir=in | app=c:\program files\windows live\mesh\moe.exe | 
"{A7A2536C-D089-4A84-A155-3F1B683A9FF7}" = protocol=6 | dir=in | app=c:\program files\teamviewer\version9\teamviewer.exe | 
"{A955475F-192E-455E-9A38-A9DE772A2F5C}" = protocol=6 | dir=in | app=c:\program files\vuze\azureus.exe | 
"{D0FDDF81-5D19-4104-BD10-6393D672FCD3}" = dir=in | app=c:\program files\windows live\sync\windowslivesync.exe | 
"{D8F53514-F9A9-49E5-A7E0-498126D0664F}" = protocol=17 | dir=in | app=c:\program files\bonjour\mdnsresponder.exe | 
"{DAC2258E-FC9F-4E3E-B784-393921320061}" = protocol=17 | dir=in | app=c:\program files\teamviewer\version9\teamviewer_service.exe | 
"{DC1674FC-6001-42FC-9C83-73C1F2F21B52}" = dir=in | app=c:\users\suzie\appdata\local\microsoft\skydrive\skydrive.exe | 
"{E08B1F18-CFE1-4C57-96EE-6E5458E0635E}" = protocol=17 | dir=in | app=c:\program files\teamviewer\version9\teamviewer.exe | 
"TCP Query User{2EBA95FF-6E81-4F56-A853-29171DFD000B}C:\program files\windows live\messenger\msnmsgr.exe" = protocol=6 | dir=in | app=c:\program files\windows live\messenger\msnmsgr.exe | 
"TCP Query User{8C44995E-8F47-4270-819D-BD5304578889}C:\program files\leawo\video converter\loadingscreen.exe" = protocol=6 | dir=in | app=c:\program files\leawo\video converter\loadingscreen.exe | 
"TCP Query User{97AF948F-9CE3-48CB-8B0A-6B1DFA71EF0A}C:\program files\vuze\azureus.exe" = protocol=6 | dir=in | app=c:\program files\vuze\azureus.exe | 
"TCP Query User{C7D8D0CE-62AF-40C1-B9F0-3CD4A05CCFAD}C:\program files\divx\divx media server\divxmediaserver.exe" = protocol=6 | dir=in | app=c:\program files\divx\divx media server\divxmediaserver.exe | 
"TCP Query User{D5A04D55-5DBF-48AD-8890-17D04C4FBE53}C:\program files\java\jre7\bin\javaw.exe" = protocol=6 | dir=in | app=c:\program files\java\jre7\bin\javaw.exe | 
"TCP Query User{F8A02A93-4EB8-4728-95CB-6ECB3FC92016}C:\program files\divx\divx media server\divxmediaserver.exe" = protocol=6 | dir=in | app=c:\program files\divx\divx media server\divxmediaserver.exe | 
"TCP Query User{FCF0A9BF-46CA-4930-A2CA-27A08873FAE3}C:\program files\emule\emule.exe" = protocol=6 | dir=in | app=c:\program files\emule\emule.exe | 
"UDP Query User{08CBA78A-7BD8-44C2-A479-FEB722C781BB}C:\program files\leawo\video converter\loadingscreen.exe" = protocol=17 | dir=in | app=c:\program files\leawo\video converter\loadingscreen.exe | 
"UDP Query User{16184AB5-5C06-4517-9143-20EC9683EF5A}C:\program files\vuze\azureus.exe" = protocol=17 | dir=in | app=c:\program files\vuze\azureus.exe | 
"UDP Query User{26F66AF4-E250-4625-83B7-E6102F2E5825}C:\program files\windows live\messenger\msnmsgr.exe" = protocol=17 | dir=in | app=c:\program files\windows live\messenger\msnmsgr.exe | 
"UDP Query User{2E48B097-4C6A-47A0-8158-8CCEBC5E0397}C:\program files\emule\emule.exe" = protocol=17 | dir=in | app=c:\program files\emule\emule.exe | 
"UDP Query User{757BEC3D-8382-4874-92D4-16A7CB497159}C:\program files\divx\divx media server\divxmediaserver.exe" = protocol=17 | dir=in | app=c:\program files\divx\divx media server\divxmediaserver.exe | 
"UDP Query User{C5266E54-761E-4B65-ACC3-E4DE54B10934}C:\program files\java\jre7\bin\javaw.exe" = protocol=17 | dir=in | app=c:\program files\java\jre7\bin\javaw.exe | 
"UDP Query User{DCD1E398-6BFF-4A7F-B235-36443F705ACF}C:\program files\divx\divx media server\divxmediaserver.exe" = protocol=17 | dir=in | app=c:\program files\divx\divx media server\divxmediaserver.exe | 
 
========== HKEY_LOCAL_MACHINE Uninstall List ==========
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{06810DC6-3501-40FE-BCB3-1A7BE6398A36}" = uPlayer
"{0B0F231F-CE6A-483D-AA23-77B364F75917}" = Windows Live Installer
"{196467F1-C11F-4F76-858B-5812ADC83B94}" = MSXML 4.0 SP3 Parser
"{19A4A990-5343-4FF7-B3B5-6F046C091EDF}" = Windows Live Remote Client
"{1F6AB0E7-8CDD-4B93-8A23-AA9EB2FEFCE4}" = Junk Mail filter update
"{200FEC62-3C34-4D60-9CE8-EC372E01C08F}" = Windows Live SOXE Definitions
"{227E8782-B2F4-4E97-B0EE-49DE9CC1C0C0}" = Windows Live Remote Service
"{235EBB33-3DA1-46DF-AADE-9955123409CB}" = Apple Mobile Device Support
"{26A24AE4-039D-4CA4-87B4-2F03217071FF}" = Java 7 Update 71
"{28C2DED6-325B-4CC7-983A-1777C8F7FBAB}" = RealUpgrade 1.1
"{2DF215E0-BD3C-4C98-8616-AFEF09747285}" = Windows Live Sync
"{3075404F-5657-4f31-A064-FEF98661BDD4}" = Trend Micro Password Manager
"{31495D38-0A7A-3D27-845B-9210E6ED8CFE}" = Microsoft .NET Framework 4.5.1 (PTB)
"{331ED3CF-3A1B-467C-9A62-899E2D3B20C4}_is1" = Leawo Video Converter versão  6.0.0.0
"{3336F667-9049-4D46-98B6-4C743EEBC5B1}" = Windows Live Photo Gallery
"{39B3184E-0BFB-40FA-ADDC-E7E2D535CDA9}" = Controle ActiveX do Windows Live Mesh para Conexões Remotas
"{3D2CBC2C-65D4-4463-87AB-BB2C859C1F3E}" = QuickTime 7
"{41B72CAF-036B-4E0A-8D22-F5DF7C970434}" = Windows Live Remote Client Resources
"{43B43577-2514-4CE0-B14A-7E85C17C0453}" = Windows Live Essentials
"{44334193-827E-47B4-AB2A-E49F2A102E21}" = VCRT for DirectPass x86
"{4664ED39-C80A-48F7-93CD-EBDCAFAB6CC5}" = Windows Live Writer Resources
"{4903D172-DCCB-392F-93A3-34CA9D47FE3D}" = Microsoft .NET Framework 4.5.1
"{4A03706F-666A-4037-7777-5F2748764D10}" = Java Auto Updater
"{4CBABDFD-49F8-47FD-BE7D-ECDE7270525A}" = Windows Live PIMT Platform
"{4F94119D-1B71-400e-9F04-B4E5CEAE71F8}_is1" = Sothink Movie DVD Maker
"{5CADEAC5-0A9C-4680-B850-6A9085ADD23B}" = Windows Live UX Platform Language Pack
"{5D928931-D1D2-4A93-A82D-BF60D0E7CFA5}" = iTunes
"{61AD15B2-50DB-4686-A739-14FE180D4429}" = Windows Live ID Sign-in Assistant
"{644063FA-ABA3-42AC-A8AC-3EDC0706018B}" = Windows Live Mesh
"{682B3E4F-696A-42DE-A41C-4C07EA1678B4}" = Windows Live SOXE
"{698BBAD8-B116-495D-B879-0F07A533E57F}" = Samsung Story Album Viewer
"{758C8301-2696-4855-AF45-534B1200980A}" = Samsung Kies
"{7770E71B-2D43-4800-9CB3-5B6CAAEBEBEA}" = RealNetworks - Microsoft Visual C++ 2008 Runtime
"{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}" = Apple Software Update
"{79155F2B-9895-49D7-8612-D92580E0DE5B}" = Bonjour
"{7E265513-8CDA-4631-B696-F40D983F3B07}_is1" = CDBurnerXP
"{83CAF0DE-8D3B-4C37-A631-2B8F16EC3031}" = Suporte para Aplicativos Apple
"{859B9BCA-5376-4566-9F88-C6C9DAA7A925}" = Microsoft Security Client PT-BR Language Pack
"{8833FFB6-5B0C-4764-81AA-06DFEED9A476}" = Realtek 8136 8168 8169 Ethernet Driver
"{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}" = Microsoft Silverlight
"{8C6D6116-B724-4810-8F2D-D047E6B7D68E}" = Mesh Runtime
"{8DD46C6A-0056-4FEC-B70A-28BB16A1F11F}" = MSVCRT
"{8EF54987-EE4A-4096-90CB-8B21214B50E8}" = Microsoft Antimalware Service PT-BR Language Pack
"{90140000-006D-0416-0000-0000000FF1CE}" = Microsoft Office com Clique para Executar 2010
"{90140011-0066-0416-0000-0000000FF1CE}" = Microsoft Office Starter 2010 - Português (Brasil)
"{90150000-007E-0000-0000-0000000FF1CE}" = Office 15 Click-to-Run Licensing Component
"{90150000-008C-0000-0000-0000000FF1CE}" = Office 15 Click-to-Run Extensibility Component
"{90150000-008C-0416-0000-0000000FF1CE}" = Office 15 Click-to-Run Localization Component
"{92EA4134-10D1-418A-91E1-5A0453131A38}" = Windows Live Movie Maker
"{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033" = Microsoft .NET Framework 4.5.1
"{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1046" = Microsoft .NET Framework 4.5.1 (Português do Brasil)
"{933B4015-4618-4716-A828-5289FC03165F}" = VC80CRTRedist - 8.0.50727.6195
"{95120000-00B9-0409-0000-0000000FF1CE}" = Microsoft Application Error Reporting
"{95140000-00AF-0416-0000-0000000FF1CE}" = Visualizador do Microsoft PowerPoint
"{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
"{9AF0B106-56F1-461B-A270-95BC1682E282}" = Broadcom Gigabit NetLink Controller
"{9BE518E6-ECC6-35A9-88E4-87755C07200F}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
"{9D56775A-93F3-44A3-8092-840E3826DE30}" = Windows Live Mail
"{9DA3F03B-2CEE-4344-838E-117861E61FAF}" = Windows Live Mail
"{9E325417-AE9C-4EE1-A158-13DF451A5987}" = Broadcom Gigabit Integrated Controller
"{A199DB88-E22D-4CE7-90AC-B8BE396D7BF4}" = Windows Live Movie Maker
"{A726AE06-AAA3-43D1-87E3-70F510314F04}" = Windows Live Writer
"{A9BDCA6B-3653-467B-AC83-94367DA3BFE3}" = Windows Live Photo Common
"{AAAFC670-569B-4A2F-82B4-42945E0DE3EF}" = Windows Live Writer
"{AAECF7BA-E83B-4A10-87EA-DE0B333F8734}" = RealNetworks - Microsoft Visual C++ 2010 Runtime
"{AB05F2C8-F608-403b-95E1-FD8ADFACD31E}" = Windows 7 Upgrade Advisor
"{ABBD4BA8-6703-40D2-AB1E-5BB1F7DB49A4}" = Trend Micro Maximum Security
"{ABBD4BA9-6703-40D2-AB1E-5BB1F7DB49A4}" = Trend Micro Titanium
"{AC6EE263-E4DD-4150-9014-689B1D4A3315}" = iCloud
"{AC76BA86-7AD7-1046-7B44-A95000000001}" = Adobe Reader 9.5.4 - Português
"{AF844339-2F8A-4593-81B3-9F4C54038C4E}" = Windows Live MIME IFilter
"{B33B61FE-701F-425F-98AB-2B85725CBF68}" = Windows Live Photo Common
"{B3BE54A4-8DFE-4593-8E66-56AB7133B812}" = Windows Live Writer
"{C8E8D2E3-EF6A-4B1D-A09E-7B27EBE2F3CE}" = RealDownloader
"{C950420B-4182-49EA-850A-A6A2ABF06C6B}" = Marvell Miniport Driver
"{CE95A79E-E4FC-4FFF-8A75-29F04B942FF2}" = Windows Live UX Platform
"{D0795B21-0CDA-4a92-AB9E-6E92D8111E44}" = SAMSUNG USB Driver for Mobile Phones
"{D40C0608-033D-43A7-B4D7-B0EE493F938C}" = Microsoft Antimalware Service PT-BR Language Pack
"{D45240D3-B6B3-4FF9-B243-54ECE3E10066}" = Windows Live Communications Platform
"{D54A52A8-DF24-4CE8-850B-074CA47DFA74}" = Windows Live Messenger
"{DECDCB7C-58CC-4865-91AF-627F9798FE48}" = Windows Live Mesh
"{E09C4DB7-630C-4F06-A631-8EA7239923AF}" = D3DX10
"{E6617B44-D556-49AC-B2A3-01451E115043}" = Windows Live Remote Service Resources
"{EB4DF488-AAEF-406F-A341-CB2AAA315B90}" = Windows Live Messenger
"{F059D68A-2911-4ea7-BA2B-3FBF2DD9D1CB}" = Trend Micro DirectPass
"{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}" = Microsoft SQL Server 2005 Compact Edition [ENU]
"{F59AC46C-10C3-4023-882C-4212A92283B3}_is1" = Lagarith Lossless Codec (1.3.27)
"{F7A46527-DF1F-4B0F-9637-98547E189442}" = Windows Live Galeria de Fotos
"{FD45B178-B1C1-4D2A-B8C8-CD7B4F687F1C}" = VCRT for DirectPass x86
"{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022
"8461-7759-5462-8226" = Vuze
"Adobe Flash Player ActiveX" = Adobe Flash Player 15 ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 15 Plugin
"AviSynth" = AviSynth 2.5
"DivX Setup" = Instalação do DivX
"DVD Flick_is1" = DVD Flick 1.3.0.7
"ECC16E3C-16D1-4DC2-9D8A-6AC06B3005A5" = Receitanet
"eMule" = eMule
"Free Easy Burner_is1" = Free Easy Burner V 5.1
"HaaliMkx" = Haali Media Splitter
"InstallShield_{698BBAD8-B116-495D-B879-0F07A533E57F}" = Samsung Story Album Viewer
"InstallShield_{758C8301-2696-4855-AF45-534B1200980A}" = Samsung Kies
"IRPF2013" = IRPF2013 - Declaração de Ajuste Anual, Final de Espólio e Saída Definitiva do País
"IRPF2014" = IRPF2014 - Declaração de Ajuste Anual, Final de Espólio e Saída Definitiva do País
"KLiteCodecPack_is1" = K-Lite Codec Pack 10.1.0 Full
"LAME_is1" = LAME v3.99.3 (for Windows)
"Malwarebytes Anti-Malware_is1" = Malwarebytes Anti-Malware version 2.0.3.1025
"Nike+ Connect" = Nike+ Connect
"O365HomePremRetail - pt-br" = Microsoft Office 365 - pt-br
"Office14.Click2Run" = Microsoft Office com Clique para Executar 2010
"RealPlayer 16.0" = RealPlayer
"SubtitleWorkshop" = Subtitle Workshop 2.51
"TeamViewer 9" = TeamViewer 9
"vsfilter_is1" = DirectVobSub 2.40.4209
"WinLiveSuite" = Windows Live Essentials
"WinRAR archiver" = WinRAR 4.20 (32-bit)
"WinX DVD Author_is1" = WinX DVD Author 6.2
"Xvid Video Codec 1.3.2" = Xvid Video Codec
 
========== HKEY_CURRENT_USER Uninstall List ==========
 
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"DSite" = Update for Ultimate Codec
"Google Chrome" = Google Chrome
"MyFreeCodec" = MyFreeCodec
"Nike+ Connect" = Nike+ Connect
"SkyDriveSetup.exe" = Microsoft SkyDrive
"Ultimate Codec Packages" = Ultimate Codec Packages
 
========== Last 20 Event Log Errors ==========
 
[ Application Events ]
Error - 29/07/2014 23:30:12 | Computer Name = Suzie-Mega | Source = SideBySide | ID = 16842785
Description = Falha na geração de contexto de ativação para "C:\Windows\Installer\{C8E8D2E3-EF6A-4B1D-A09E-7B27EBE2F3CE}\recordingmanager.exe".
   Assembly dependente rpshellextension.1.0,language="&#x2a;",type="win32",version="1.0.0.0"
 não pôde ser localizado.  Use o arquivo sxstrace.exe para obter um diagnóstico detalhado.
 
Error - 30/07/2014 22:43:48 | Computer Name = Suzie-Mega | Source = Office 2013 Licensing Service | ID = 0
Description = 
 
Error - 30/07/2014 23:28:28 | Computer Name = Suzie-Mega | Source = SideBySide | ID = 16842785
Description = Falha na geração de contexto de ativação para "C:\Windows\Installer\{C8E8D2E3-EF6A-4B1D-A09E-7B27EBE2F3CE}\recordingmanager.exe".
   Assembly dependente rpshellextension.1.0,language="&#x2a;",type="win32",version="1.0.0.0"
 não pôde ser localizado.  Use o arquivo sxstrace.exe para obter um diagnóstico detalhado.
 
Error - 31/07/2014 22:43:49 | Computer Name = Suzie-Mega | Source = Office 2013 Licensing Service | ID = 0
Description = 
 
Error - 01/08/2014 22:43:50 | Computer Name = Suzie-Mega | Source = Office 2013 Licensing Service | ID = 0
Description = 
 
Error - 01/08/2014 22:50:31 | Computer Name = Suzie-Mega | Source = SideBySide | ID = 16842785
Description = Falha na geração de contexto de ativação para "C:\Windows\Installer\{C8E8D2E3-EF6A-4B1D-A09E-7B27EBE2F3CE}\recordingmanager.exe".
   Assembly dependente rpshellextension.1.0,language="&#x2a;",type="win32",version="1.0.0.0"
 não pôde ser localizado.  Use o arquivo sxstrace.exe para obter um diagnóstico detalhado.
 
Error - 02/08/2014 22:43:50 | Computer Name = Suzie-Mega | Source = Office 2013 Licensing Service | ID = 0
Description = 
 
Error - 03/08/2014 22:43:50 | Computer Name = Suzie-Mega | Source = Office 2013 Licensing Service | ID = 0
Description = 
 
Error - 04/08/2014 22:27:41 | Computer Name = Suzie-Mega | Source = SideBySide | ID = 16842785
Description = Falha na geração de contexto de ativação para "C:\Windows\Installer\{C8E8D2E3-EF6A-4B1D-A09E-7B27EBE2F3CE}\recordingmanager.exe".
   Assembly dependente rpshellextension.1.0,language="&#x2a;",type="win32",version="1.0.0.0"
 não pôde ser localizado.  Use o arquivo sxstrace.exe para obter um diagnóstico detalhado.
 
Error - 04/08/2014 22:43:53 | Computer Name = Suzie-Mega | Source = Office 2013 Licensing Service | ID = 0
Description = 
 
[ System Events ]
Error - 13/11/2014 17:42:46 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço LogMeIn Kernel Information Provider
 devido ao seguinte erro:   %%3
 
Error - 13/11/2014 17:43:10 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7026
Description = Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema 
ou de inicialização:   pofilterdrv  {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
Error - 13/11/2014 20:20:46 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço Baidu Antivirus Service devido 
ao seguinte erro:   %%2
 
Error - 13/11/2014 20:20:46 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço Baidu Hips Service devido ao seguinte
 erro:   %%2
 
Error - 13/11/2014 20:20:46 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço LogMeIn Kernel Information Provider
 devido ao seguinte erro:   %%3
 
Error - 13/11/2014 20:20:53 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7026
Description = Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema 
ou de inicialização:   pofilterdrv  {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
Error - 14/11/2014 19:44:17 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço Baidu Antivirus Service devido 
ao seguinte erro:   %%2
 
Error - 14/11/2014 19:44:17 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço Baidu Hips Service devido ao seguinte
 erro:   %%2
 
Error - 14/11/2014 19:44:17 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7000
Description = Não foi possível iniciar o serviço LogMeIn Kernel Information Provider
 devido ao seguinte erro:   %%3
 
Error - 14/11/2014 19:44:26 | Computer Name = Suzie-Mega | Source = Service Control Manager | ID = 7026
Description = Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema 
ou de inicialização:   pofilterdrv  {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
 
< End of report >

  • 0

#18
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts

Hi. Thanks for the log.

Lets get started :D
 

noentry32.png P2P WARNING!

It appears that there is at least one Peer to Peer(P2P) program on your computer:

Emule
Vuze

Whilst some P2P programs themselves may be harmless, we at GeeksToGo do not recommend their use due to the extremely high likelyhood of obtaining an infection from files that have been downloaded. This may range from annoying adware to malicious trojans stealing your passwords and other personal information.

There is also the risk of inadvertently sharing information that wasn't intended due to incorrectly configured software.

It is highly likely that this is the source of the issue that brought you here today. And if not, probably what will bring you back at a later date.

Here are some useful links regarding the dangers of P2P software.

Step 1

Optional Uninstalls

Open Programs and Features by clicking the Start button, clicking Control Panel, clicking Programs, and then clicking Programs and Features.


The following are optional to uninstall but it is HIGHLY recommended that you do.

  • eMule
  • Vuze

Step 2

OTL fix

Ensure OTL is located on your desktop. If it is not, then please download from http://oldtimer.geekstogo.com/OTL.exe and save it to your desktop.

If you are using Windows Vista/7/8 then right click it and select Run As Administrator. If you are using XP then please double click on OTL.exe to start it.

Copy the text in the following box (do not include the word Quote). To do this, highlight everything
inside the quote box (except the word Quote) , right click and click Copy.



:Commands
[CreateRestorePoint]

:OTL
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\Baidu Security\Baidu Antivirus\BdCameraProtect.sys -- (BdCameraProtect)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\Baidu Security\Baidu Antivirus\BdApiUtil.sys -- (BdApiUtil)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\Baidu Security\Baidu Antivirus\BdCameraProtect.sys -- (BdCameraProtect)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\Baidu Security\Baidu Antivirus\BdApiUtil.sys -- (BdApiUtil)
SRV - File not found [Auto | Stopped] -- C:\Program Files\Baidu Security\Baidu Antivirus\BHipsSvc.exe -- (BHipsSvc)
SRV - File not found [Auto | Stopped] -- C:\Program Files\Baidu Security\Baidu Antivirus\BavSvc.exe -- (BavSvc)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Users\Suzie\AppData\Local\Temp\[email protected]\FileKill_x86.sys -- (Baidu PC Faster FileShredder)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\BprotectEx.sys -- (BprotectEx)
DRV - File not found [File_System | On_Demand | Stopped] -- C:\Windows\System32\drivers\BHipsEx.sys -- (BHipsEx)
DRV - File not found [Kernel | System | Stopped] -- C:\Windows\system32\drivers\jimyljzl.sys -- (jimyljzl)
DRV - File not found [Kernel | System | Stopped] -- system32\drivers\pofilterdrv.sys -- (pofilterdrv)
DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\Baidu Security\PC Faster\4.0.0.0\PCFApiUtil.sys -- (PCFApiUtil)
DRV - [2014/05/24 02:35:07 | 000,128,832 | ---- | M] (Baidu, Inc.) [File_System | On_Demand | Stopped] -- C:\Windows\System32\drivers\BdSandbox.sys -- (BdSandbox)
DRV - [2014/05/24 02:35:06 | 000,070,240 | ---- | M] (Baidu, Inc.) [Kernel | System | Running] -- C:\Windows\System32\drivers\Bndef.sys -- (Bndef)
DRV - [2014/05/24 02:35:05 | 000,070,464 | ---- | M] (Baidu, Inc.) [Kernel | System | Running] -- C:\Windows\System32\drivers\Bnbasex.sys -- (Bnbase)
DRV - [2014/05/24 02:35:00 | 000,028,992 | ---- | M] (Baidu, Inc.) [File_System | System | Running] -- C:\Windows\System32\drivers\Bfmon.sys -- (Bfmon)
DRV - [2014/05/24 02:34:58 | 000,047,424 | ---- | M] (Baidu, Inc.) [File_System | System | Running] -- C:\Windows\System32\drivers\Bfilter.sys -- (Bfilter)
DRV - [2014/05/24 02:34:57 | 000,084,576 | ---- | M] (Baidu, Inc.) [Kernel | Boot | Running] -- C:\Windows\System32\drivers\Bhbase.sys -- (Bhbase)
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{52db1893-8a90-4192-aede-08e00b8f8473}: "URL" = http://dts.search.as...q={searchTerms}
O4 - HKLM..\RunOnce: [0c4bccd4-4949-4885-9fae-6b0d2abe2e18] REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\olmajmomenlhgihenlbjcfbopoghpckg /f /v update_url /d https://clients2.goo...ice/update2/crx File not found
O4 - HKLM..\RunOnce: [1546dae9-e4e5-45b7-a593-752377b25f53] REG DELETE HKEY_CLASSES_ROOT\CLSID\{C96A30C3-E55D-42E5-BE76-487E17873F1F} /v LocalizedString /f File not found
O4 - HKLM..\RunOnce: [2a90dc2c-7493-40c6-841a-42d3bf3a1556] REG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\idkknaphebegndgimgdpfnconcickdfn /f File not found
O4 - HKLM..\RunOnce: [3b2718df-efa3-47f1-98b5-fc0f5ecda8e2] REG DELETE HKEY_CLASSES_ROOT\CLSID\{C96A30C3-E55D-42E5-BE76-487E17873F1F} /v LocalizedString /f File not found
04 - HKLM..\RunOnce: [b1fa265d-fc05-4b30-8729-41219952da7f] REG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\idkknaphebegndgimgdpfnconcickdfn /f File not found
O4 - HKLM..\RunOnce: [c636c66f-558d-4a38-ab4c-c295d47cf4ba] REG DELETE HKEY_CLASSES_ROOT\CLSID\{3F019D1C-7EAA-4F25-A765-FBA635BD0AFF} /v LocalizedString /f File not found
O4 - HKLM..\RunOnce: [cad5936b-b2ab-4e6f-9eac-c8ca951a3a27] REG DELETE HKEY_CLASSES_ROOT\CLSID\{9B4B91FC-EC4D-4018-9575-96FA5A3C03C5} /v LocalizedString /f File not found
O4 - HKLM..\RunOnce: [d3301056-ee70-44d2-adf3-545261c6541e] REG DELETE HKEY_CLASSES_ROOT\CLSID\{3F019D1C-7EAA-4F25-A765-FBA635BD0AFF} /v LocalizedString /f File not found
O4 - HKLM..\RunOnce: [f6f1ec00-b07c-4ba0-bebd-1199b380e7c4] REG DELETE HKEY_CLASSES_ROOT\CLSID\{9B4B91FC-EC4D-4018-9575-96FA5A3C03C5} /v LocalizedString /f File not found
O4 - HKLM..\RunOnce: [f8b6a34b-79c9-435f-85f2-2290e70669e1] REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\olmajmomenlhgihenlbjcfbopoghpckg /f /v update_url /d https://clients2.goo...ice/update2/crx File not found
@Alternate Data Stream - 208 bytes -> C:\Windows\System32\drivers:GbpKmAp.lst
@Alternate Data Stream - 144 bytes -> C:\ProgramData\Temp:CB0AACC9

:file
C:\Users\Suzie\Downloads\DownloadFileSetup_248z5.exe

:folder
C:\Program Files\Baidu Security

:commands
[emptytemp]

Next, right click in the box named Custom Scans/Fixes and select paste.

otl-run-fix.jpg

This will insert the code into OTL.

Now click Run Fix

OTL will generate a report when it has finished. Please paste the contents of this report in your next post.

Step 3

jrt.pngJunkware Removal Tool
Please download Junkware Removal Tool to your desktop. << Important
Ensure that any security software is temporarily disabled for the duration of the scan. Don't forget to re-enable it afterwards.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by right-clicking jrt.png and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

Items I need to see in your next post:

  • Did you perform any uninstalls? How did they go?
  • OTL Log
  • JRT Log

  • 0

#19
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

All right, I'm back after a short while.

Thanks for all your help so far.

Here is what you instructed me to do and it was done.

1. Uninstalled Vuze and Emule without any issue or problem.

2.Ran OTL tool

3.Ran Junkware Removal Tool

Log files follow:

------------------------

 

All processes killed
========== COMMANDS ==========
Restore point Set: OTL Restore Point
========== OTL ==========
Service BdCameraProtect stopped successfully!
Service BdCameraProtect deleted successfully!
File C:\Program Files\Baidu Security\Baidu Antivirus\BdCameraProtect.sys not found.
Service BdApiUtil stopped successfully!
Service BdApiUtil deleted successfully!
File C:\Program Files\Baidu Security\Baidu Antivirus\BdApiUtil.sys not found.
Error: No service named BdCameraProtect was found to stop!
Service\Driver key BdCameraProtect not found.
File C:\Program Files\Baidu Security\Baidu Antivirus\BdCameraProtect.sys not found.
Error: No service named BdApiUtil was found to stop!
Service\Driver key BdApiUtil not found.
File C:\Program Files\Baidu Security\Baidu Antivirus\BdApiUtil.sys not found.
Service BHipsSvc stopped successfully!
Service BHipsSvc deleted successfully!
File C:\Program Files\Baidu Security\Baidu Antivirus\BHipsSvc.exe not found.
Service BavSvc stopped successfully!
Service BavSvc deleted successfully!
File C:\Program Files\Baidu Security\Baidu Antivirus\BavSvc.exe not found.
Service Baidu PC Faster FileShredder stopped successfully!
Service Baidu PC Faster FileShredder deleted successfully!
File C:\Users\Suzie\AppData\Local\Temp\[email protected]\FileKill_x86.sys not found.
Service BprotectEx stopped successfully!
Service BprotectEx deleted successfully!
File C:\Windows\System32\drivers\BprotectEx.sys not found.
Service BHipsEx stopped successfully!
Service BHipsEx deleted successfully!
File C:\Windows\System32\drivers\BHipsEx.sys not found.
Service jimyljzl stopped successfully!
Service jimyljzl deleted successfully!
File C:\Windows\system32\drivers\jimyljzl.sys not found.
Service pofilterdrv stopped successfully!
Service pofilterdrv deleted successfully!
File system32\drivers\pofilterdrv.sys not found.
Service PCFApiUtil stopped successfully!
Service PCFApiUtil deleted successfully!
File C:\Program Files\Baidu Security\PC Faster\4.0.0.0\PCFApiUtil.sys not found.
Service BdSandbox stopped successfully!
Service BdSandbox deleted successfully!
C:\Windows\System32\drivers\BdSandbox.sys moved successfully.
Service Bndef stopped successfully!
Service Bndef deleted successfully!
C:\Windows\System32\drivers\Bndef.sys moved successfully.
Service Bnbase stopped successfully!
Service Bnbase deleted successfully!
C:\Windows\System32\drivers\Bnbasex.sys moved successfully.
Service Bfmon stopped successfully!
Service Bfmon deleted successfully!
C:\Windows\System32\drivers\Bfmon.sys moved successfully.
Service Bfilter stopped successfully!
Service Bfilter deleted successfully!
C:\Windows\System32\drivers\Bfilter.sys moved successfully.
Error: Unable to stop service Bhbase!
Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Bhbase deleted successfully.
C:\Windows\System32\drivers\Bhbase.sys moved successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{52db1893-8a90-4192-aede-08e00b8f8473}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52db1893-8a90-4192-aede-08e00b8f8473}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\0c4bccd4-4949-4885-9fae-6b0d2abe2e18 not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\1546dae9-e4e5-45b7-a593-752377b25f53 not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\2a90dc2c-7493-40c6-841a-42d3bf3a1556 not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\3b2718df-efa3-47f1-98b5-fc0f5ecda8e2 not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\c636c66f-558d-4a38-ab4c-c295d47cf4ba not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\cad5936b-b2ab-4e6f-9eac-c8ca951a3a27 not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\d3301056-ee70-44d2-adf3-545261c6541e not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\f6f1ec00-b07c-4ba0-bebd-1199b380e7c4 not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\\f8b6a34b-79c9-435f-85f2-2290e70669e1 not found.
ADS C:\Windows\System32\drivers:GbpKmAp.lst deleted successfully.
ADS C:\ProgramData\Temp:CB0AACC9 deleted successfully.
Error: Unable to interpret <:file> in the current context!
Error: Unable to interpret <C:\Users\Suzie\Downloads\DownloadFileSetup_248z5.exe> in the current context!
Error: Unable to interpret <:folder> in the current context!
Error: Unable to interpret <C:\Program Files\Baidu Security> in the current context!
========== COMMANDS ==========
 
[EMPTYTEMP]
 
User: Administrador
->Temp folder emptied: 0 bytes
 
User: All Users
 
User: Convidado
->Temp folder emptied: 0 bytes
 
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
 
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
 
User: Public
->Temp folder emptied: 0 bytes
 
User: Suzie
->Temp folder emptied: 145829689 bytes
->Temporary Internet Files folder emptied: 144076247 bytes
->Java cache emptied: 597445 bytes
->Google Chrome cache emptied: 144278653 bytes
->Flash cache emptied: 595 bytes
 
User: Todos os Usuários
 
User: Usuário Padrão
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
 
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 17 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 4115515 bytes
RecycleBin emptied: 2262044030 bytes
 
Total Files Cleaned = 2.576,00 mb
 
 
OTL by OldTimer - Version 3.2.69.0 log created on 11182014_052313
 
Files\Folders moved on Reboot...
File\Folder C:\Windows\temp\officeclicktorun.exe_c2ruidll(201411172148246A0).log not found!
File\Folder C:\Windows\temp\officeclicktorun.exe_streamserver(201411172148246A0).log not found!
C:\Windows\temp\SUZIE-MEGA-20141117-2148.log moved successfully.
 
PendingFileRenameOperations files...
 
Registry entries deleted on Reboot...
------------------------
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.3.9 (11.15.2014:2)
OS: Windows 7 Starter x86
Ran by Suzie on 18/11/2014 at 17:47:17,74
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\TaskScheduler_RASAPI32
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\TaskScheduler_RASMANCS
 
 
 
~~~ Files
 
Successfully deleted: [File] C:\Windows\System32\Tasks\Baidu Antivirus Update
Successfully deleted: [File] "C:\Windows\wininit.ini"
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] C:\ProgramData\FiNdBeostDeal
Successfully deleted: [Folder] C:\ProgramData\SaaveNeewaaAoppZu
Successfully deleted: [Folder] "C:\ProgramData\baidu"
Successfully deleted: [Folder] "C:\ProgramData\baidu security"
Successfully deleted: [Folder] "C:\ProgramData\pc optimizer pro"
Successfully deleted: [Folder] "C:\ProgramData\tarma installer"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\baidu"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\baidu security"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\dsite"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\funmoods"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\getrighttogo"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\isafe"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\systweak"
Successfully deleted: [Folder] "C:\Users\Suzie\AppData\Roaming\updaterex"
Successfully deleted: [Folder] "C:\Users\Suzie\appdata\locallow\delta"
Successfully deleted: [Folder] "C:\Program Files\globalupdate"
Successfully deleted: [Folder] "C:\Program Files\myfree codec"
Successfully deleted: [Folder] "C:\Program Files\predm"
Successfully deleted: [Folder] "C:\ProgramData\ask"
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 18/11/2014 at 17:49:09,17
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
After all those tools, the "[bleep] animation" still showing on that specific web page. I can take a screenshot for you to see if you'd like, just let me know.
Please let me know what else I need to do to get rid of it, so far all this "cleaning" hasn't work in removing it.
 
Thanks a lot.

  • 0

#20
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts

Hi, there is still lots do do but because FRST would not run, we have to clean some malware to get it to work before we can look deeper.
Don't worry we will get there.

Let's try FRST now that some work has been done.

Step 1

Initial FRST Scan

Please download Farbar Recovery Scan Tool and save it to your Desktop. There will be 2 versions offered, if you know which version is the one you need, download that one, if not, download both, only one will work on your computer, that is the one you need.

  • Right click frst.png to run as administrator. When the tool opens click Yes to the disclaimer.
  • Ensure that the following are ticked as in the image below

    Drivers MD5
    shortcut.txt
    Addition.txt
    frst-addition.png
  • Press Scan button.
  • It will produce a log called FRST.txt in the same directory the tool is run from.
  • Please copy and paste log back here.
  • This will also generate another log (Addition.txt - also located in the same directory as FRST.exe/FRST64.exe). Please also paste that along with the FRST.txt into your reply.

Items I need to see in your next post:


  • FRST and Addition Log

  • 0

#21
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Hi,

 

Once again, this tool WILL NOT RUN.

As I previously said, it only flickers in the screen, eve on Safe Mode.

Any other ideas? 

 

Thanks.


  • 0

#22
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Back again...

After trying several times, and stopping a few programs, it worked finally.

Logs follow:

Thanks. 

 

-------------------

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 10-11-2014
Ran by Suzie (administrator) on SUZIE-MEGA on 20-11-2014 15:55:30
Running from C:\Users\Suzie\Desktop
Loaded Profile: Suzie (Available profiles: Suzie)
Platform: Microsoft Windows 7 Starter  Service Pack 1 (X86) OS Language: Português (Brasil)
Internet Explorer Version 11
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: http://www.geekstogo...very-scan-tool/
 
==================== Processes (Whitelisted) =================
 
(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)
 
(GAS Tecnologia) C:\Program Files\GbPlugin\gbpsv.exe
(Apple Inc.) C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Microsoft Corporation) C:\Program Files\Microsoft Office 15\ClientX86\officeclicktorun.exe
(Trend Micro Inc.) C:\Program Files\Trend Micro\Titanium\plugin\Pt\PtSvcHost.exe
(Trend Micro Inc.) C:\Program Files\Trend Micro\Titanium\plugin\Pt\PtWatchDog.exe
(Trend Micro Inc.) C:\Program Files\Trend Micro\TMIDS\PwmSvc.exe
() C:\Program Files\RealNetworks\RealDownloader\rndlresolversvc.exe
(Microsoft Corporation) C:\Program Files\Microsoft Application Virtualization Client\sftvsa.exe
(Microsoft Corp.) C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVC.EXE
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(DivX, LLC) C:\Program Files\DivX\DivX Media Server\DivXMediaServer.exe
(Nike) C:\Program Files\Nike\Nike+ Connect\Nike+ Connect daemon.exe
(Oracle Corporation) C:\Program Files\Common Files\Java\Java Update\jusched.exe
() C:\Program Files\DivX\DivX Update\DivXUpdate.exe
() C:\Program Files\Unlocker\UnlockerAssistant.exe
(Microsoft Corporation) C:\Program Files\Microsoft Application Virtualization Client\sftlist.exe
(Microsoft Corp.) C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVCM.EXE
(Trend Micro Inc.) C:\Program Files\Trend Micro\Titanium\plugin\Pt\PtSessionAgent.exe
(Microsoft Corporation) C:\Program Files\Windows Sidebar\sidebar.exe
(Samsung) C:\Program Files\Samsung\Kies\Kies.exe
(Nike) C:\Users\Suzie\AppData\Local\Nike\Nike+ Connect\Nike+ Connect daemon.exe
(Apple Inc.) C:\Program Files\Common Files\Apple\Internet Services\iCloudServices.exe
(Microsoft Corporation) C:\Program Files\Windows Live\Messenger\msnmsgr.exe
(Microsoft Corporation) C:\Program Files\Microsoft Office 15\root\office15\ONENOTEM.EXE
(Microsoft Corporation) C:\Program Files\Common Files\microsoft shared\Virtualization Handler\CVHSVC.EXE
(Microsoft Corporation) C:\Program Files\Windows Live\Contacts\wlcomm.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(TeamViewer GmbH) C:\Program Files\TeamViewer\Version9\TeamViewer_Service.exe
(TeamViewer GmbH) C:\Program Files\TeamViewer\Version9\TeamViewer.exe
(TeamViewer GmbH) C:\Program Files\TeamViewer\Version9\tv_w32.exe
(Apple Inc.) C:\Program Files\iTunes\iTunesHelper.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Apple Inc.) C:\Program Files\Common Files\Apple\Mobile Device Support\SyncServer.exe
(Apple Inc.) C:\Program Files\Common Files\Apple\Internet Services\ApplePhotoStreams.exe
(Trend Micro Inc.) C:\Program Files\Trend Micro\UniClient\UiFrmwrk\uiWatchDog.exe
(TeamViewer GmbH) C:\Program Files\TeamViewer\Version9\TeamViewer_Desktop.exe
 
 
==================== Registry (Whitelisted) ==================
 
(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)
 
HKLM\...\Run: [APSDaemon] => C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe [60712 2014-10-11] (Apple Inc.)
HKLM\...\Run: [DivXMediaServer] => C:\Program Files\DivX\DivX Media Server\DivXMediaServer.exe [448856 2014-08-19] (DivX, LLC)
HKLM\...\Run: [Nike+ Connect] => C:\Program Files\Nike\Nike+ Connect\Nike+ Connect daemon.exe [71680 2014-04-09] (Nike)
HKLM\...\Run: [SunJavaUpdateSched] => C:\Program Files\Common Files\Java\Java Update\jusched.exe [271744 2014-09-26] (Oracle Corporation)
HKLM\...\Run: [DivXUpdate] => C:\Program Files\DivX\DivX Update\DivXUpdate.exe [1861968 2014-01-10] ()
HKLM\...\Run: [UnlockerAssistant] => C:\Program Files\Unlocker\UnlockerAssistant.exe [17408 2010-07-04] ()
HKLM\...\Run: [QuickTime Task] => C:\Program Files\QuickTime\QTTask.exe [421888 2014-10-02] (Apple Inc.)
HKLM\...\Run: [Trend Micro Client Framework] => C:\Program Files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe [165976 2014-07-20] (Trend Micro Inc.)
HKLM\...\Run: [PwmConsole.exe] => C:\Program Files\Trend Micro\TMIDS\PwmConsole.exe [1983920 2014-11-03] (Trend Micro Inc.)
HKLM\...\Run: [Platinum] => C:\Program Files\Trend Micro\Titanium\plugin\Pt\PtSessionAgent.exe [1078832 2014-10-09] (Trend Micro Inc.)
Winlogon\Notify\ GbPluginBb: C:\Program Files\GbPlugin\gbieh.dll (Banco do Brasil)
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\Run: [KiesPreload] => C:\Program Files\Samsung\Kies\Kies.exe [1564528 2013-12-11] (Samsung)
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\Run: [Nike+ Connect] => C:\Users\Suzie\AppData\Local\Nike\Nike+ Connect\Nike+ Connect daemon.exe [71680 2014-04-09] (Nike)
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\Run: [iCloudServices] => C:\Program Files\Common Files\Apple\Internet Services\iCloudServices.exe [43816 2014-10-17] (Apple Inc.)
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\Run: [msnmsgr] => C:\Program Files\Windows Live\Messenger\msnmsgr.exe [4240760 2010-09-23] (Microsoft Corporation)
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\RunOnce: [Application Restart #4] => C:\Users\Suzie\AppData\Local\Google\Chrome\Application\chrome.exe [860488 2014-05-13] (Google Inc.)
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\Policies\Explorer: [NoLowDiskSpaceChecks] 1
HKU\S-1-5-18\...\RunOnce: [SPReview] => C:\Windows\System32\SPReview\SPReview.exe [280576 2013-05-25] (Microsoft Corporation)
Startup: C:\Users\Suzie\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Enviar para o OneNote.lnk
ShortcutTarget: Enviar para o OneNote.lnk -> C:\Program Files\Microsoft Office 15\root\office15\ONENOTEM.EXE (Microsoft Corporation)
BootExecute: autocheck autochk * sdnclean.exe
GroupPolicy: Group Policy on Chrome detected <======= ATTENTION
CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION
 
==================== Internet (Whitelisted) ====================
 
(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)
 
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft...=ie&ar=iesearch
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKCU - DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = 
BHO: Adobe PDF Link Helper -> {18DF081C-E8AD-4283-A596-FA578C2EBDC3} -> C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated)
BHO: RealNetworks Download and Record Plugin for Internet Explorer -> {3049C3E9-B461-4BC5-8870-4C09146192CA} -> C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\IE\rndlbrowserrecordplugin.dll (RealDownloader)
BHO: Trend Micro Password Manager BHO -> {3F019D1C-7EAA-4F25-A765-FBA635BD0AFF} -> C:\Program Files\Trend Micro\TMIDS\PwmIEBHO32.dll (Trend Micro Inc.)
BHO: Trend Micro Security Toolbar Helper -> {43C6D902-A1C5-45c9-91F6-FD9E90337E18} -> C:\Program Files\Trend Micro\Titanium\UIFramework\ToolbarIE.dll (Trend Micro Inc.)
BHO: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO: TmIEPlugInBHO Class -> {959A5673-7971-48e6-AF54-58F745AC4ABC} -> C:\Program Files\Trend Micro\AMSP\module\20013\3.5.1186\2.0.1039\TmopIEPlg.dll (Trend Micro Inc.)
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office 15\root\Office15\URLREDIR.DLL (Microsoft Corporation)
BHO: TmBpIeBHO Class -> {BBACBAFD-FA5E-4079-8B33-00EB9F13D4AC} -> C:\Program Files\Trend Micro\AMSP\module\20002\9.0.1069\9.0.1069\TmBpIe32.dll (Trend Micro Inc.)
BHO: GbIehObj Class -> {C41A1C0E-EA6C-11D4-B1B8-444553540000} -> C:\PROGRAM FILES\GBPLUGIN\gbieh.dll (Banco do Brasil)
BHO: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Toolbar: HKLM - Trend Micro Password Manager ToolBar - {9B4B91FC-EC4D-4018-9575-96FA5A3C03C5} - C:\Program Files\Trend Micro\TMIDS\PwmIEBHO32.dll (Trend Micro Inc.)
Toolbar: HKLM - Trend Micro Security Toolbar - {CCAC5586-44D7-4c43-B64A-F042461A97D2} - C:\Program Files\Trend Micro\Titanium\UIFramework\ToolbarIE.dll (Trend Micro Inc.)
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.m...ash/swflash.cab
Handler: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files\Microsoft Office 15\root\Office15\MSOSB.DLL (Microsoft Corporation)
Handler: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} - C:\Program Files\Trend Micro\AMSP\module\20002\9.0.1069\9.0.1069\TmBpIe32.dll (Trend Micro Inc.)
Handler: tmop - {69FD7CE3-4604-4fe6-967C-49B9735CEE70} - C:\Program Files\Trend Micro\AMSP\module\20013\3.5.1186\2.0.1039\TmopIEPlg.dll (Trend Micro Inc.)
Handler: tmtb - {04EAF3FB-4BAC-4B5A-A37D-A1CF210A5A42} - C:\Program Files\Trend Micro\Titanium\UIFramework\ToolbarIE.dll (Trend Micro Inc.)
Handler: tmtbim - {0B37915C-8B98-4B9E-80D4-464D2C830D10} - C:\Program Files\Trend Micro\Titanium\UIFramework\ProToolbarIMRatingActiveX.dll (Trend Micro Inc.)
ShellExecuteHooks: GbPluginObj Class - {E37CB5F0-51F5-4395-A808-5FA49E399F83} - C:\PROGRAM FILES\GbPlugin\gbieh.dll [1754664 2014-07-31] (Banco do Brasil)
Winsock: Catalog5 07 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
 
FireFox:
========
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF32_15_0_0_223.dll ()
FF Plugin: @Apple.com/iTunes,version=1.0 -> C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll ()
FF Plugin: @divx.com/DivX VOD Helper,version=1.0.0 -> C:\Program Files\DivX\DivX OVS Helper\npovshelper.dll (DivX, LLC.)
FF Plugin: @divx.com/DivX Web Player Plug-In,version=1.0.0 -> C:\Program Files\DivX\DivX Web Player\npdivx32.dll (DivX, LLC)
FF Plugin: @java.com/DTPlugin,version=10.71.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.71.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files\Microsoft Silverlight\5.1.30514.0\npctrl.dll ( Microsoft Corporation)
FF Plugin: @microsoft.com/SharePoint,version=14.0 -> C:\Program Files\Microsoft Office 15\root\Office15\NPSPWRAP.DLL (Microsoft Corporation)
FF Plugin: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin: @real.com/nppl3260;version=16.0.3.51 -> c:\program files\real\realplayer\Netscape6\nppl3260.dll (RealNetworks, Inc.)
FF Plugin: @real.com/nprndlchromebrowserrecordext;version=1.3.3 -> C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\MozillaPlugins\nprndlchromebrowserrecordext.dll (RealNetworks, Inc.)
FF Plugin: @real.com/nprndlhtml5videoshim;version=1.3.3 -> C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\MozillaPlugins\nprndlhtml5videoshim.dll (RealNetworks, Inc.)
FF Plugin: @real.com/nprndlpepperflashvideoshim;version=1.3.3 -> C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\MozillaPlugins\nprndlpepperflashvideoshim.dll (RealNetworks, Inc.)
FF Plugin: @real.com/nprpplugin;version=16.0.3.51 -> c:\program files\real\realplayer\Netscape6\nprpplugin.dll (RealPlayer)
FF Plugin: @realnetworks.com/npdlplugin;version=1 -> C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\npdlplugin.dll (RealDownloader)
FF Plugin: Adobe Reader -> C:\Program Files\Adobe\Reader 9.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF HKLM\...\Firefox\Extensions: [{ABDE892B-13A8-4d1b-88E6-365A6E755758}] - C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\Firefox\Ext
FF Extension: RealDownloader - C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\Firefox\Ext [2013-09-04]
FF HKLM\...\Firefox\Extensions: [{DF153AFF-6948-45d7-AC98-4FC4AF8A08E2}] - C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\Firefox\Ext
FF HKLM\...\Firefox\Extensions: [[email protected]] - C:\Program Files\Trend Micro\AMSP\module\20002\9.0.1069\9.0.1069\firefoxextension
FF Extension: Trend Micro BEP Firefox Extension - C:\Program Files\Trend Micro\AMSP\module\20002\9.0.1069\9.0.1069\firefoxextension [2014-11-20]
FF HKLM\...\Firefox\Extensions: [{BBB77B49-9FF4-4d5c-8FE2-92B1D6CD696C}] - C:\Program Files\Trend Micro\AMSP\module\20013\FxExt\firefoxextension
FF Extension: Trend Micro Osprey Firefox Extension - C:\Program Files\Trend Micro\AMSP\module\20013\FxExt\firefoxextension [2014-11-20]
FF HKLM\...\Firefox\Extensions: [{22181a4d-af90-4ca3-a569-faed9118d6bc}] - C:\Program Files\Trend Micro\Titanium\UIFramework\Toolbar\firefoxextension
FF Extension: Trend Micro Toolbar - C:\Program Files\Trend Micro\Titanium\UIFramework\Toolbar\firefoxextension [2014-11-09]
FF HKLM\...\Firefox\Extensions: [{8197dd50-b252-4b08-a1be-1277f22357bb}] - C:\Program Files\Trend Micro\TMIDS\PwmFirefoxExt
FF Extension: Trend Micro Password Manager Firefox Extension - C:\Program Files\Trend Micro\TMIDS\PwmFirefoxExt [2014-11-09]
 
Chrome: 
=======
CHR dev: Chrome dev build detected! <======= ATTENTION
CHR Profile: C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Google Docs) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2014-10-03]
CHR Extension: (Google Drive) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2014-10-03]
CHR Extension: (YouTube) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2014-10-03]
CHR Extension: (Pesquisa do Google) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2014-10-03]
CHR Extension: (Dictionary.com Extension) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\epkhgmlgiomobdlofllfmoejgjdojknn [2014-07-30]
CHR Extension: (Digital Clock) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdkjifoifglkpcdffkenpinlbjgephlo [2014-07-30]
CHR Extension: (Legendas Brasil Utilidades) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\ggfkikjepbfnilidoicegfpoppcpblog [2014-07-30]
CHR Extension: (Dictionary by Dictionary.com) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\gikhgcaliglmioibbockkmjknfnepbdh [2014-07-30]
CHR Extension: (Translator by Dictionary.com) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\glacllipodbjfijgkcdifnlhmoddlkon [2014-07-30]
CHR Extension: (LastPass: Free Password Manager) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\hdokiejnpimakedhajhdlcegeplioahd [2014-07-30]
CHR Extension: (WayTaxi - Seu Táxi online!) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\heapppgcdapgfodlejhjaaokicffghkb [2014-07-30]
CHR Extension: (The Weather Channel for Chrome) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\iflpcokdamgefbghpdipcibmhlkdopop [2014-07-30]
CHR Extension: (Séries Lider Manager) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\ikolalhgedleklomhpmobinimeknppon [2014-07-30]
CHR Extension: (Foxtab Speed Dial (Beta)) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\kcendgajlhoaiiccpijilcpmgphfflnj [2014-10-02]
CHR Extension: (Quick Note) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\mijlebbfndhelmdpmllgcfadlkankhok [2014-07-30]
CHR Extension: (GBBD Banco do Brasil) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\mkeabchhfifpaaoefpockjhaphjmoapp [2014-07-30]
CHR Extension: (Google Wallet) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-08-22]
CHR Extension: (Trend Micro Toolbar) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\ohhcpmplhhiiaoiddkfboafbhiknefdf [2014-11-09]
CHR Extension: (Trend Micro Password Manager) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\olmajmomenlhgihenlbjcfbopoghpckg [2014-11-09]
CHR Extension: (Gmail) - C:\Users\Suzie\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2014-10-03]
CHR HKLM\...\Chrome\Extension: [feiklnfjnigeedgfpdjgmmdahlbbpmdf] - C:\Program Files\Baidu Security\Baidu Antivirus\browserext\BdChromePlugin.crx []
CHR HKLM\...\Chrome\Extension: [idhngdhcfkoamngbedgpaokgjbnpdiji] - C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\Chrome\Ext\realdownloader.crx [2013-08-14]
CHR HKLM\...\Chrome\Extension: [kcendgajlhoaiiccpijilcpmgphfflnj] - C:\Users\Suzie\AppData\Local\newhb.crx [2013-08-01]
 
========================== Services (Whitelisted) =================
 
(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)
 
R2 ClickToRunSvc; C:\Program Files\Microsoft Office 15\ClientX86\OfficeClickToRun.exe [1669296 2014-09-25] (Microsoft Corporation)
R2 GbpSv; C:\Program Files\GbPlugin\gbpsv.exe [546104 2014-07-21] (GAS Tecnologia)
S2 MBAMScheduler; C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe [1871160 2014-10-01] (Malwarebytes Corporation)
S2 MBAMService; C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe [968504 2014-10-01] (Malwarebytes Corporation)
R2 Platinum Host Service; C:\Program Files\Trend Micro\Titanium\plugin\Pt\PtSvcHost.exe [963632 2014-10-09] (Trend Micro Inc.)
R2 PwmSvc; C:\Program Files\Trend Micro\TMIDS\PwmSvc.exe [262784 2014-11-03] (Trend Micro Inc.)
R2 RealNetworks Downloader Resolver Service; C:\Program Files\RealNetworks\RealDownloader\rndlresolversvc.exe [39056 2013-08-14] ()
S2 Amsp; "C:\Program Files\Trend Micro\AMSP\coreServiceShell.exe" coreFrameworkHost.exe -m=rb -dt=60000 -ad -bt=0 [X]
 
==================== Drivers (Whitelisted) ====================
 
(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)
 
R0 GbpKm; C:\Windows\System32\drivers\gbpkm.sys [47192 2014-03-14] (GAS Tecnologia)
R3 InputFilter_Hid_FlexDef2b; C:\Windows\System32\DRIVERS\InputFilter_FlexDef2b.sys [14848 2010-06-19] (Siliten)
S3 kbfilter; C:\Windows\System32\DRIVERS\kbfilter.sys [61728 2014-11-03] (Trend Micro Inc.)
S3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [23256 2014-10-01] (Malwarebytes Corporation)
S3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [51928 2014-10-01] (Malwarebytes Corporation)
R3 MonitorFunction; C:\Windows\System32\DRIVERS\TVMonitor.sys [13304 2013-10-17] (TeamViewer GmbH)
R1 Ndisrd; C:\Windows\System32\DRIVERS\gbpndisrdn.sys [29400 2014-02-27] (GAS Tecnologia)
S3 radpms; C:\Windows\System32\DRIVERS\radpms.sys [13408 2012-11-29] (LogMeIn, Inc.)
S3 ssudserd; C:\Windows\System32\DRIVERS\ssudserd.sys [182680 2013-08-21] (DEVGURU Co., LTD.(www.devguru.co.kr))
R3 teamviewervpn; C:\Windows\System32\DRIVERS\teamviewervpn.sys [25088 2013-10-17] (TeamViewer GmbH)
R1 tmactmon; C:\Windows\System32\DRIVERS\tmactmon.sys [108072 2014-07-14] (Trend Micro Inc.)
R0 tmcomm; C:\Windows\System32\DRIVERS\tmcomm.sys [302760 2014-07-14] (Trend Micro Inc.)
R0 TMEBC; C:\Windows\System32\DRIVERS\TMEBC32.sys [40736 2013-07-01] (Trend Micro Inc.)
R3 tmeevw; C:\Windows\System32\DRIVERS\tmeevw.sys [90936 2014-05-29] (Trend Micro Inc.)
R1 tmevtmgr; C:\Windows\System32\DRIVERS\tmevtmgr.sys [89032 2014-07-14] (Trend Micro Inc.)
R3 tmnciesc; C:\Windows\System32\DRIVERS\tmnciesc.sys [306232 2014-04-08] (Trend Micro Inc.)
R2 tmusa; C:\Windows\System32\DRIVERS\tmusa.sys [86840 2014-06-30] (Trend Micro Inc.)
U5 AppMgmt; C:\Windows\system32\svchost.exe [20992 2009-07-13] (Microsoft Corporation)
S3 catchme; \??\C:\Users\Suzie\AppData\Local\Temp\catchme.sys [X]
S3 FXDrv32; \??\D:\FXDrv32.sys [X]
S3 IntcAzAudAddService; system32\drivers\RTKVHDA.sys [X]
S2 LMIInfo; \??\C:\Program Files\LogMeIn\x86\RaInfo.sys [X]
S4 LMIRfsClientNP; No ImagePath
S3 NdisrdMP; system32\DRIVERS\gbpndisrd.sys [X]
U2 TMAgent; No ImagePath
S1 {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw; system32\drivers\{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw.sys [X]
 
========================== Drivers MD5 =======================
 
C:\Windows\system32\drivers\1394ohci.sys ==> MD5 is legit
C:\Windows\System32\drivers\ACPI.sys ==> MD5 is legit
C:\Windows\system32\drivers\acpipmi.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\adp94xx.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\adpahci.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\adpu320.sys ==> MD5 is legit
C:\Windows\system32\drivers\afd.sys D0B388DA1D111A34366E04EB4A5DD156
C:\Windows\system32\drivers\agp440.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\djsvs.sys ==> MD5 is legit
C:\Windows\system32\drivers\aliide.sys ==> MD5 is legit
C:\Windows\system32\drivers\amdagp.sys ==> MD5 is legit
C:\Windows\system32\drivers\amdide.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\amdk8.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\amdppm.sys ==> MD5 is legit
C:\Windows\system32\drivers\amdsata.sys D320BF87125326F996D4904FE24300FC
C:\Windows\system32\DRIVERS\amdsbs.sys ==> MD5 is legit
C:\Windows\System32\drivers\amdxata.sys 46387FB17B086D16DEA267D5BE23A2F2
C:\Windows\system32\drivers\appid.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\arc.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\arcsas.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\asyncmac.sys ==> MD5 is legit
C:\Windows\System32\drivers\atapi.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\bxvbdx.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\b57nd60x.sys ==> MD5 is legit
C:\Windows\system32\Drivers\Beep.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\blbdrive.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\bowser.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\BrFiltLo.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\BrFiltUp.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\bridge.sys 77361D72A04F18809D0EFB6CCEB74D4B
C:\Windows\System32\Drivers\Brserid.sys ==> MD5 is legit
C:\Windows\System32\Drivers\BrSerWdm.sys ==> MD5 is legit
C:\Windows\System32\Drivers\BrUsbMdm.sys ==> MD5 is legit
C:\Windows\System32\Drivers\BrUsbSer.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\bthmodem.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\cdfs.sys ==> MD5 is legit
C:\Windows\system32\drivers\cdrom.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\circlass.sys ==> MD5 is legit
C:\Windows\System32\CLFS.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\CmBatt.sys ==> MD5 is legit
C:\Windows\system32\drivers\cmdide.sys ==> MD5 is legit
C:\Windows\System32\Drivers\cng.sys 85449EEBE8F8EBD6481EFBF0F352B4EB
C:\Windows\system32\DRIVERS\compbatt.sys ==> MD5 is legit
C:\Windows\system32\drivers\CompositeBus.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\crcdisk.sys ==> MD5 is legit
C:\Windows\System32\Drivers\dfsc.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\ssudbus.sys D720E872772D004E304FCE0CE54E1F8A
C:\Windows\System32\drivers\discache.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\disk.sys ==> MD5 is legit
C:\Windows\system32\drivers\drmkaud.sys ==> MD5 is legit
C:\Windows\System32\drivers\dxgkrnl.sys 3583A5A8CC2E682BFFBD4630D0FEC08B
C:\Windows\system32\DRIVERS\evbdx.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\elxstor.sys ==> MD5 is legit
C:\Windows\system32\drivers\errdev.sys ==> MD5 is legit
C:\Windows\system32\Drivers\exfat.sys ==> MD5 is legit
C:\Windows\system32\Drivers\fastfat.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\fdc.sys ==> MD5 is legit
C:\Windows\System32\drivers\fileinfo.sys ==> MD5 is legit
C:\Windows\System32\drivers\filetrace.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\flpydisk.sys ==> MD5 is legitB
C:\Windows\System32\drivers\fltmgr.sys ==> MD5 is legit
C:\Windows\System32\drivers\FsDepends.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\fssfltr.sys D909075FA72C090F27AA926C32CB4612
C:\Windows\system32\Drivers\Fs_Rec.sys 7DAE5EBCC80E45D3253F4923DC424D05
C:\Windows\System32\DRIVERS\fvevol.sys E306A24D9694C724FA2491278BF50FDB
C:\Windows\system32\DRIVERS\gagp30kx.sys ==> MD5 is legit
C:\Windows\System32\drivers\gbpkm.sys 0F5E9488E39E62F692741330624D31BC
C:\Windows\System32\DRIVERS\GEARAspiWDM.sys 185ADA973B5020655CEE342059A86CBB
C:\Windows\system32\drivers\hcw85cir.sys ==> MD5 is legit
C:\Windows\System32\drivers\HdAudio.sys A5EF29D5315111C80A5C1ABAD14C8972
C:\Windows\system32\drivers\HDAudBus.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\HidBatt.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\hidbth.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\hidir.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\hidusb.sys ==> MD5 is legit
C:\Windows\system32\drivers\HpSAMD.sys ==> MD5 is legit
C:\Windows\System32\drivers\HTTP.sys ==> MD5 is legit
C:\Windows\System32\drivers\hwpolicy.sys ==> MD5 is legit
C:\Windows\system32\drivers\i8042prt.sys ==> MD5 is legit
C:\Windows\system32\drivers\iaStorV.sys 5CD5F9A5444E6CDCB0AC89BD62D8B76E
C:\Windows\System32\DRIVERS\igdkmd32.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\iirsp.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\InputFilter_FlexDef2b.sys D6782400E92C62ED2BF3AF8ED4753738
C:\Windows\System32\drivers\intelide.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\intelppm.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\ipfltdrv.sys ==> MD5 is legit
C:\Windows\system32\drivers\IPMIDrv.sys ==> MD5 is legit
C:\Windows\System32\drivers\ipnat.sys ==> MD5 is legit
C:\Windows\System32\drivers\irenum.sys ==> MD5 is legit
C:\Windows\system32\drivers\isapnp.sys ==> MD5 is legit
C:\Windows\system32\drivers\msiscsi.sys EB34CE31FABD4DC4343FD2AD16D2CAF9
C:\Windows\System32\DRIVERS\kbdclass.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\kbdhid.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\kbfilter.sys DFB5E0B537078EEA034B1E7E36EF2615
C:\Windows\System32\Drivers\ksecdd.sys 4120DA10AA42A9996F4575DB9E3E6E6E
C:\Windows\System32\Drivers\ksecpkg.sys 1E1845606C5A4579F7F3D95796CC1ED1
C:\Windows\System32\DRIVERS\lltdio.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\lmimirr.sys 4477689E2D8AE6B78BA34C9AF4CC1ED1
C:\Windows\system32\drivers\LMIRfsDriver.sys 3FAA563DDF853320F90259D455A01D79
C:\Windows\system32\DRIVERS\lsi_fc.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\lsi_sas.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\lsi_sas2.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\lsi_scsi.sys ==> MD5 is legit
C:\Windows\system32\drivers\luafv.sys ==> MD5 is legit
C:\Windows\system32\drivers\mbam.sys D2DED3C333A5D9CB3F4C244B0F0DD877
C:\Windows\system32\drivers\mwac.sys 7A6526C8BD114DB7CA8930AB22D52A0B
C:\Windows\system32\DRIVERS\megasas.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\MegaSR.sys ==> MD5 is legit
C:\Windows\System32\drivers\modem.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\monitor.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\TVMonitor.sys 111A023266532C621EE69AE96E47081E
C:\Windows\system32\drivers\mouclass.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\mouhid.sys ==> MD5 is legit
C:\Windows\System32\drivers\mountmgr.sys ==> MD5 is legit
C:\Windows\system32\drivers\mpio.sys ==> MD5 is legit
C:\Windows\System32\drivers\mpsdrv.sys ==> MD5 is legit
C:\Windows\system32\drivers\mrxdav.sys 21F4B24ACFC79A483515BD986DD9043F
C:\Windows\System32\DRIVERS\mrxsmb.sys 5D16C921E3671636C0EBA3BBAAC5FD25
C:\Windows\System32\DRIVERS\mrxsmb10.sys 6D17A4791ACA19328C685D256349FEFC
C:\Windows\System32\DRIVERS\mrxsmb20.sys B81F204D146000BE76651A50670A5E9E
C:\Windows\system32\drivers\msahci.sys ==> MD5 is legit
C:\Windows\system32\drivers\msdsm.sys ==> MD5 is legit
C:\Windows\system32\Drivers\Msfs.sys ==> MD5 is legit
C:\Windows\System32\drivers\mshidkmdf.sys ==> MD5 is legit
C:\Windows\System32\drivers\msisadrv.sys ==> MD5 is legit
C:\Windows\System32\drivers\MSKSSRV.sys ==> MD5 is legit
C:\Windows\System32\drivers\MSPCLOCK.sys ==> MD5 is legit
C:\Windows\System32\drivers\MSPQM.sys ==> MD5 is legit
C:\Windows\system32\Drivers\MsRPC.sys ==> MD5 is legit
C:\Windows\system32\drivers\mssmbios.sys ==> MD5 is legit
C:\Windows\System32\drivers\MSTEE.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\MTConfig.sys ==> MD5 is legit
C:\Windows\System32\Drivers\mup.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\nwifi.sys ==> MD5 is legit
C:\Windows\System32\drivers\ndis.sys 8C9C922D71F1CD4DEF73F186416B7896
C:\Windows\System32\DRIVERS\ndiscap.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\gbpndisrdn.sys A5C914C5CBCFF645434535234BFCEACA
C:\Windows\System32\DRIVERS\ndistapi.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\ndisuio.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\ndiswan.sys ==> MD5 is legit
C:\Windows\system32\Drivers\NDProxy.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\netaapl.sys 9213AA35BCA94EB79D366DA254E4BDF5
C:\Windows\System32\DRIVERS\netbios.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\netbt.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\nfrd960.sys ==> MD5 is legit
C:\Windows\system32\Drivers\Npfs.sys ==> MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys ==> MD5 is legit
C:\Windows\system32\Drivers\Ntfs.sys C8DFF8D07755A66C7A4A738930F0FEAC
C:\Windows\system32\Drivers\Null.sys ==> MD5 is legit
C:\Windows\system32\drivers\nvraid.sys B3E25EE28883877076E0E1FF877D02E0
C:\Windows\system32\drivers\nvstor.sys 4380E59A170D88C4F1022EFF6719A8A4
C:\Windows\system32\drivers\nv_agp.sys ==> MD5 is legit
C:\Windows\system32\drivers\ohci1394.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\parport.sys ==> MD5 is legit
C:\Windows\System32\drivers\partmgr.sys 3F34A1B4C5F6475F320C275E63AFCE9B
C:\Windows\system32\DRIVERS\parvdm.sys ==> MD5 is legit
C:\Windows\System32\drivers\pci.sys ==> MD5 is legit
C:\Windows\system32\drivers\pciide.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\pcmcia.sys ==> MD5 is legit
C:\Windows\System32\drivers\pcw.sys ==> MD5 is legit
C:\Windows\System32\drivers\peauth.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\raspptp.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\processr.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\pacer.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\ql2300.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\ql40xx.sys ==> MD5 is legit
C:\Windows\system32\drivers\qwavedrv.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\radpms.sys B953369C5EF43615F1BFA9CEA69FC9AA
C:\Windows\System32\DRIVERS\rasacd.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\AgileVpn.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\rasl2tp.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\raspppoe.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\rassstp.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\rdbss.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\rdpbus.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\RDPCDD.sys ==> MD5 is legit
C:\Windows\System32\drivers\rdpencdd.sys ==> MD5 is legit
C:\Windows\System32\drivers\rdprefmp.sys ==> MD5 is legit
C:\Windows\System32\drivers\rdpvideominiport.sys 65375DF758CA1872AB7EBBBA457FD5E6
C:\Windows\system32\Drivers\RDPWD.sys CD9214A6AE17D188D17C3CF8CB9CC693
C:\Windows\System32\drivers\rdyboost.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\rspndr.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\Rt86win7.sys 3983CEA05BB855351D75F5482B6C42CE
C:\Windows\system32\drivers\sbp2port.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\scfilter.sys ==> MD5 is legit
C:\Windows\system32\Drivers\secdrv.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\serenum.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\serial.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\sermouse.sys ==> MD5 is legit
C:\Windows\system32\drivers\sffdisk.sys ==> MD5 is legit
C:\Windows\system32\drivers\sffp_mmc.sys ==> MD5 is legit
C:\Windows\system32\drivers\sffp_sd.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\sfloppy.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\Sftfslh.sys EC5C79BD81F0C55DF53F4818D4F1C2C8
C:\Windows\System32\DRIVERS\Sftplaylh.sys A224670FB892A205E4D99E06C0B85C7C
C:\Windows\System32\DRIVERS\Sftredirlh.sys 9D354D425FB55CDF0EDC7F67FBC5B04E
C:\Windows\System32\DRIVERS\Sftvollh.sys F369D6B89AA610174A4E90C8513B7C7A
C:\Windows\system32\drivers\sisagp.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\SiSRaid2.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\sisraid4.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\smb.sys ==> MD5 is legit
C:\Windows\system32\Drivers\spldr.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\srv.sys E4C2764065D66EA1D2D3EBC28FE99C46
C:\Windows\System32\DRIVERS\srv2.sys 03F0545BD8D4C77FA0AE1CEEDFCC71AB
C:\Windows\System32\DRIVERS\srvnet.sys BE6BD660CAA6F291AE06A718A4FA8ABC
C:\Windows\System32\DRIVERS\ssudmdm.sys A1CC726323FB41FFD29F436A77237E41
C:\Windows\System32\DRIVERS\ssudserd.sys 6507F48723F8469F783F2EE9D7DCC2DD
C:\Windows\system32\DRIVERS\stexstor.sys ==> MD5 is legit
C:\Windows\system32\drivers\swenum.sys ==> MD5 is legit
C:\Windows\System32\drivers\tcpip.sys 5579DD18546999F5D0EC39D018726C6B
C:\Windows\System32\DRIVERS\tcpip.sys 5579DD18546999F5D0EC39D018726C6B
C:\Windows\System32\drivers\tcpipreg.sys 3EEBD3BD93DA46A26E89893C7AB2FF3B
C:\Windows\System32\drivers\tdpipe.sys ==> MD5 is legit
C:\Windows\System32\drivers\tdtcp.sys 2C2C5AFE7EE4F620D69C23C0617651A8
C:\Windows\System32\DRIVERS\tdx.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\teamviewervpn.sys 9101FFFCFCCD1A30E870A5B8A9091B10
C:\Windows\system32\drivers\termdd.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\tmactmon.sys 52908E2F2A77D911EBBB1B2A4DDF078C
C:\Windows\System32\DRIVERS\tmcomm.sys E28CE623E3E5FA1D2FE16C721EFAD4C2
C:\Windows\System32\DRIVERS\TMEBC32.sys 35D33B2E928DFEBB175E599BC1F9CE7F
C:\Windows\System32\DRIVERS\tmeevw.sys A7F1748B1C399EEA35956E9448803D20
C:\Windows\System32\DRIVERS\tmevtmgr.sys DD336EB93A1266272ADB3F2B27371FB0
C:\Windows\System32\DRIVERS\tmnciesc.sys 4D5A33124DCB40FB3C85F61C5D6772DA
C:\Windows\System32\DRIVERS\tmusa.sys 881CDFAFB5E1C9C713764D03D24FDDF1
C:\Windows\System32\DRIVERS\tssecsrv.sys 6C5139E4283249518F7743D7043775B3
C:\Windows\System32\drivers\tsusbflt.sys C6A5FBD4977305E1FA23E02C042DB463
C:\Windows\System32\DRIVERS\tunnel.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\uagp35.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\udfs.sys ==> MD5 is legit
C:\Windows\system32\drivers\uliagpkx.sys ==> MD5 is legit
C:\Windows\system32\drivers\umbus.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\umpass.sys ==> MD5 is legit
C:\Windows\System32\Drivers\usbaapl.sys EC1C23779BB41A8B2AB2AA6FCE308BDE
C:\Windows\System32\DRIVERS\usbccgp.sys 0803FBA9FE829D61AE26EC0BCC910C46
C:\Windows\system32\drivers\usbcir.sys 2352AB5F9F8F097BF9D41D5A4718A041
C:\Windows\System32\DRIVERS\usbehci.sys D40855F89B69305140BBD7E9A3BA2DA6
C:\Windows\System32\DRIVERS\usbhub.sys EDF2DF71C4F1E13A6AC75F5224DE655A
C:\Windows\system32\drivers\usbohci.sys 9828C8D14CC2676421778F0DE638CF97
C:\Windows\System32\DRIVERS\usbprint.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\USBSTOR.SYS F991AB9CC6B908DB552166768176896A
C:\Windows\System32\DRIVERS\usbuhci.sys 800AABFD625EEFF899F7E5496BDE37AB
C:\Windows\System32\drivers\vdrvroot.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\vgapnp.sys ==> MD5 is legit
C:\Windows\System32\drivers\vga.sys ==> MD5 is legit
C:\Windows\system32\drivers\vhdmp.sys ==> MD5 is legit
C:\Windows\system32\drivers\viaagp.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\viac7.sys ==> MD5 is legit
C:\Windows\system32\drivers\viaide.sys ==> MD5 is legit
C:\Windows\System32\drivers\volmgr.sys ==> MD5 is legit
C:\Windows\System32\drivers\volmgrx.sys ==> MD5 is legit
C:\Windows\System32\drivers\volsnap.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\vsmraid.sys ==> MD5 is legit
C:\Windows\System32\drivers\vwifibus.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\wacompen.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\wanarp.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\wanarp.sys ==> MD5 is legit
C:\Windows\system32\DRIVERS\wd.sys ==> MD5 is legit
C:\Windows\System32\drivers\Wdf01000.sys 25944D2CC49E0A6C581D02A74B7D6645
C:\Windows\System32\DRIVERS\wfplwf.sys ==> MD5 is legit
C:\Windows\System32\drivers\wimmount.sys ==> MD5 is legit
C:\Windows\System32\DRIVERS\WinUsb.sys A67E5F9A400F3BD1BE3D80613B45F708
C:\Windows\system32\drivers\wmiacpi.sys ==> MD5 is legit
C:\Windows\system32\drivers\ws2ifsl.sys ==> MD5 is legit
C:\Windows\System32\drivers\WudfPf.sys 06E6F32C8D0A3F66D956F57B43A2E070
C:\Windows\System32\DRIVERS\WUDFRd.sys 867C301E8B790040AE9CF6486E8041DF
 
==================== NetSvcs (Whitelisted) ===================
 
 
(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)
 
 
==================== One Month Created Files and Folders ========
 
(If an entry is included in the fixlist, the file\folder will be moved.)
 
2014-11-20 15:55 - 2014-11-20 15:55 - 00038438 _____ () C:\Users\Suzie\Desktop\FRST.txt
2014-11-20 15:53 - 2014-11-20 15:55 - 00000000 ____D () C:\FRST
2014-11-20 02:34 - 2014-08-27 08:31 - 00127208 _____ () C:\Users\Suzie\Desktop\The Fault in Our Stars 2014 BRRip XviD AC3-SANTi .srt
2014-11-19 01:24 - 2014-11-19 01:24 - 00166944 ____H () C:\Windows\system32\mlfcache.dat
2014-11-18 23:21 - 2014-11-11 00:44 - 00550912 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll
2014-11-18 23:21 - 2014-11-11 00:44 - 00186880 _____ (Microsoft Corporation) C:\Windows\system32\pku2u.dll
2014-11-18 17:47 - 2014-11-18 17:47 - 00000000 ____D () C:\Windows\ERUNT
2014-11-18 05:11 - 2014-11-18 05:11 - 00000000 ____D () C:\_OTL
2014-11-18 05:06 - 2014-11-18 05:06 - 00602112 _____ (OldTimer Tools) C:\Users\Suzie\Downloads\OTL (1).exe
2014-11-18 01:23 - 2014-11-18 01:23 - 05500780 _____ () C:\Users\Suzie\Downloads\Fiat500X-blue_pill.mp4
2014-11-15 05:18 - 2014-11-20 15:53 - 00000000 ____D () C:\Users\Suzie\Desktop\Nova pasta
2014-11-15 04:53 - 2014-11-15 04:53 - 00046600 _____ () C:\Users\Suzie\Downloads\Extras.Txt
2014-11-15 04:50 - 2014-11-15 04:50 - 00141156 _____ () C:\Users\Suzie\Downloads\OTL.Txt
2014-11-15 04:13 - 2014-11-15 04:13 - 05198336 _____ (AVAST Software) C:\Users\Suzie\Downloads\aswmbr.exe
2014-11-14 22:00 - 2014-11-14 22:00 - 00231362 _____ () C:\Users\Suzie\Downloads\TheFaultInOurStars.2014.BRRIP.BDRIP.rar
2014-11-13 20:03 - 2014-11-13 20:03 - 02116608 _____ (Farbar) C:\Users\Suzie\Downloads\FRST64.exe
2014-11-13 13:38 - 2014-11-13 13:39 - 01944824 _____ (Bleeping Computer, LLC) C:\Users\Suzie\Downloads\rkill.exe
2014-11-13 04:16 - 2014-11-13 04:16 - 01107968 _____ (Farbar) C:\Users\Suzie\Downloads\FRST.exe
2014-11-13 04:10 - 2014-11-13 04:08 - 01107968 _____ (Farbar) C:\Users\Suzie\Desktop\FRST.exe
2014-11-12 01:54 - 2014-10-17 23:33 - 00571904 _____ (Microsoft Corporation) C:\Windows\system32\oleaut32.dll
2014-11-12 01:54 - 2014-08-11 23:36 - 00701440 _____ (Microsoft Corporation) C:\Windows\system32\IMJP10K.DLL
2014-11-12 01:53 - 2014-11-07 17:23 - 00341168 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll
2014-11-12 01:53 - 2014-11-06 01:28 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-11-12 01:53 - 2014-11-06 01:28 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-11-12 01:53 - 2014-11-06 01:13 - 00501248 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-11-12 01:53 - 2014-11-06 01:13 - 00062464 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-11-12 01:53 - 2014-11-06 01:12 - 00047616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-11-12 01:53 - 2014-11-06 01:10 - 19781632 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-11-12 01:53 - 2014-11-06 01:10 - 00064000 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll
2014-11-12 01:53 - 2014-11-06 01:05 - 02277376 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-11-12 01:53 - 2014-11-06 01:04 - 00047104 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-11-12 01:53 - 2014-11-06 01:03 - 00030720 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-11-12 01:53 - 2014-11-06 01:00 - 00478208 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-11-12 01:53 - 2014-11-06 00:59 - 00115712 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-11-12 01:53 - 2014-11-06 00:59 - 00102912 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-11-12 01:53 - 2014-11-06 00:58 - 00620032 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-11-12 01:53 - 2014-11-06 00:51 - 00667648 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-11-12 01:53 - 2014-11-06 00:48 - 00418304 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-11-12 01:53 - 2014-11-06 00:42 - 00060416 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2014-11-12 01:53 - 2014-11-06 00:37 - 00168960 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-11-12 01:53 - 2014-11-06 00:36 - 00076288 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-11-12 01:53 - 2014-11-06 00:34 - 00285696 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-11-12 01:53 - 2014-11-06 00:22 - 00688640 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-11-12 01:53 - 2014-11-06 00:22 - 00683008 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-11-12 01:53 - 2014-11-06 00:21 - 04298240 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-11-12 01:53 - 2014-11-06 00:21 - 02051072 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-11-12 01:53 - 2014-11-06 00:20 - 01155072 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2014-11-12 01:53 - 2014-11-06 00:03 - 12819456 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-11-12 01:53 - 2014-11-05 23:52 - 01892864 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-11-12 01:53 - 2014-11-05 23:48 - 01310208 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-11-12 01:53 - 2014-11-05 23:47 - 00708096 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-11-12 01:53 - 2014-10-24 23:32 - 00067584 _____ (Microsoft Corporation) C:\Windows\system32\packager.dll
2014-11-12 01:53 - 2014-10-13 23:56 - 00136632 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecpkg.sys
2014-11-12 01:53 - 2014-10-13 23:50 - 02363904 _____ (Microsoft Corporation) C:\Windows\system32\msi.dll
2014-11-12 01:53 - 2014-10-13 23:50 - 01059840 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll
2014-11-12 01:53 - 2014-10-13 23:50 - 00523776 _____ (Microsoft Corporation) C:\Windows\system32\termsrv.dll
2014-11-12 01:53 - 2014-10-13 23:47 - 00146432 _____ (Microsoft Corporation) C:\Windows\system32\msaudite.dll
2014-11-12 01:53 - 2014-10-13 23:46 - 00681984 _____ (Microsoft Corporation) C:\Windows\system32\adtschema.dll
2014-11-12 01:53 - 2014-10-09 22:45 - 02379264 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-11-12 01:53 - 2014-10-02 23:44 - 00475136 _____ (Microsoft Corporation) C:\Windows\system32\audiosrv.dll
2014-11-12 01:53 - 2014-10-02 23:44 - 00442880 _____ (Microsoft Corporation) C:\Windows\system32\AUDIOKSE.dll
2014-11-12 01:53 - 2014-10-02 23:44 - 00374784 _____ (Microsoft Corporation) C:\Windows\system32\AudioEng.dll
2014-11-12 01:53 - 2014-10-02 23:44 - 00275968 _____ (Microsoft Corporation) C:\Windows\system32\EncDump.dll
2014-11-12 01:53 - 2014-10-02 23:44 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\AudioSes.dll
2014-11-12 01:53 - 2014-09-19 07:23 - 00259584 _____ (Microsoft Corporation) C:\Windows\system32\msv1_0.dll
2014-11-12 01:53 - 2014-09-19 07:23 - 00248832 _____ (Microsoft Corporation) C:\Windows\system32\schannel.dll
2014-11-12 01:53 - 2014-09-19 07:23 - 00221184 _____ (Microsoft Corporation) C:\Windows\system32\ncrypt.dll
2014-11-12 01:53 - 2014-09-19 07:23 - 00172032 _____ (Microsoft Corporation) C:\Windows\system32\wdigest.dll
2014-11-12 01:53 - 2014-09-19 07:23 - 00065536 _____ (Microsoft Corporation) C:\Windows\system32\TSpkg.dll
2014-11-12 01:53 - 2014-09-19 07:23 - 00017408 _____ (Microsoft Corporation) C:\Windows\system32\credssp.dll
2014-11-12 01:53 - 2014-08-21 04:26 - 01237504 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-11-12 01:53 - 2014-08-21 04:23 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\msxml3r.dll
2014-11-11 06:10 - 2014-11-11 07:21 - 00000000 ____D () C:\Program Files\Spybot - Search & Destroy
2014-11-11 06:07 - 2014-11-11 06:08 - 16409960 _____ (Safer Networking Limited ) C:\Users\Suzie\Downloads\spybotsd162.exe
2014-11-11 05:52 - 2014-11-11 05:52 - 00347816 _____ (Microsoft Corporation) C:\Users\Suzie\Downloads\MicrosoftFixit.WinSecurity.FISC.133911948825641.1.2.Run.exe
2014-11-11 04:02 - 2014-11-20 15:31 - 00114904 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-11-11 04:01 - 2014-11-11 04:01 - 00000000 ____D () C:\Users\Todos os Usuários\Malwarebytes
2014-11-11 04:01 - 2014-11-11 04:01 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-11-11 04:01 - 2014-11-11 04:01 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-11-11 04:01 - 2014-11-11 04:01 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-11-11 04:01 - 2014-10-01 11:11 - 00075480 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-11-11 04:01 - 2014-10-01 11:11 - 00051928 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-11-11 04:01 - 2014-10-01 11:11 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-11-09 03:20 - 2014-11-09 03:20 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Trend Micro Password Manager
2014-11-09 02:45 - 2014-11-09 02:45 - 00000000 ____D () C:\Users\Suzie\AppData\Roaming\Trend Micro
2014-11-09 02:28 - 2014-11-03 04:39 - 00061728 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\kbfilter.sys
2014-11-09 02:28 - 2014-11-03 04:39 - 00061728 _____ (Trend Micro Inc.) C:\kbfilter.sys
2014-11-09 02:28 - 2014-11-03 04:39 - 00007707 _____ () C:\kbfilter.cat
2014-11-09 02:28 - 2014-11-03 04:39 - 00000098 _____ () C:\install.bat
2014-11-09 02:28 - 2014-11-03 04:39 - 00000081 _____ () C:\uninstall.bat
2014-11-09 02:24 - 2014-11-09 02:43 - 00214576 _____ (Trend Micro Inc.) C:\Windows\RegBootClean.exe
2014-11-09 02:16 - 2014-11-09 02:16 - 00000000 ___HD () C:\TMRescueDisk
2014-11-09 02:13 - 2014-11-09 02:13 - 00001445 _____ () C:\Users\Suzie\Desktop\Trend Micro Maximum Security.lnk
2014-11-09 02:13 - 2014-11-09 02:13 - 00000000 ____D () C:\Users\Suzie\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Trend Micro Maximum Security
2014-11-09 02:12 - 2014-07-14 05:39 - 00302760 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\tmcomm.sys
2014-11-09 02:12 - 2014-07-14 05:39 - 00108072 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\tmactmon.sys
2014-11-09 02:12 - 2014-07-14 05:39 - 00089032 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\tmevtmgr.sys
2014-11-09 02:12 - 2014-06-30 09:06 - 00086840 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\tmusa.sys
2014-11-09 02:12 - 2014-05-29 08:37 - 00090936 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\tmeevw.sys
2014-11-09 02:12 - 2014-04-08 02:09 - 00306232 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\tmnciesc.sys
2014-11-09 02:12 - 2013-07-01 11:08 - 00040736 _____ (Trend Micro Inc.) C:\Windows\system32\Drivers\TMEBC32.sys
2014-11-09 02:10 - 2014-11-09 02:10 - 00000059 _____ () C:\Windows\system32\SupportTool.exe.bat
2014-11-09 02:09 - 2014-11-09 03:03 - 00000000 ____D () C:\Users\Todos os Usuários\Trend Micro
2014-11-09 02:09 - 2014-11-09 03:03 - 00000000 ____D () C:\ProgramData\Trend Micro
2014-11-09 02:09 - 2014-11-09 02:13 - 00000000 ____D () C:\Program Files\Trend Micro
2014-11-09 02:08 - 2014-11-09 02:08 - 00000036 _____ () C:\Users\Suzie\AppData\Local\housecall.guid.cache
2014-11-09 02:06 - 2014-11-09 02:15 - 00000000 ____D () C:\Users\Suzie\AppData\Local\Trend Micro
2014-11-09 02:02 - 2014-11-09 02:02 - 00003872 _____ () C:\Windows\FSGKIAIN.log
2014-11-09 02:02 - 2014-11-09 02:02 - 00001698 _____ () C:\Windows\FSLDIN.LOG
2014-11-09 02:02 - 2014-11-09 02:02 - 00000768 _____ () C:\Windows\daasunin.LOG
2014-11-09 02:01 - 2014-11-09 02:02 - 25268045 _____ () C:\Windows\FSISU.log
2014-11-09 02:01 - 2014-11-09 02:02 - 00224561 _____ () C:\Windows\FSUNINST.log
2014-11-09 02:01 - 2014-11-09 02:02 - 00214832 _____ () C:\Windows\FSDEPH.log
2014-11-09 02:01 - 2014-11-09 02:02 - 00021569 _____ () C:\Windows\uninstaller.log
2014-11-09 02:01 - 2014-11-09 02:01 - 00029642 _____ () C:\Windows\fsavunin.log
2014-11-09 02:01 - 2014-11-09 02:01 - 00000070 _____ () C:\Windows\fsavunin_2.log
2014-11-08 03:02 - 2014-11-08 03:02 - 00019206 _____ () C:\ComboFix.txt
2014-11-08 01:47 - 2014-11-08 02:18 - 00012568 _____ (Sysinternals - www.sysinternals.com) C:\Windows\system32\Drivers\PROCEXP113.SYS
2014-11-08 01:47 - 2011-06-26 04:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-11-08 01:47 - 2010-11-07 15:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-11-08 01:47 - 2009-04-20 02:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-11-08 01:47 - 2000-08-30 22:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-11-08 01:47 - 2000-08-30 22:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-11-08 01:47 - 2000-08-30 22:00 - 00098816 _____ () C:\Windows\sed.exe
2014-11-08 01:47 - 2000-08-30 22:00 - 00080412 _____ () C:\Windows\grep.exe
2014-11-08 01:47 - 2000-08-30 22:00 - 00068096 _____ () C:\Windows\zip.exe
2014-11-08 01:46 - 2014-11-08 03:02 - 00000000 ____D () C:\Qoobox
2014-11-08 01:46 - 2014-11-08 02:16 - 00000000 ____D () C:\Windows\erdnt
2014-11-08 01:42 - 2014-11-08 01:42 - 00810304 _____ ( ) C:\Users\Suzie\Downloads\adobe_flash_setup.exe
2014-11-08 01:41 - 2014-11-08 01:42 - 05593178 ____R (Swearware) C:\Users\Suzie\Downloads\ComboFix.exe
2014-11-07 11:50 - 2014-11-07 11:50 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iCloud
2014-11-06 21:51 - 2014-11-19 22:10 - 00001456 _____ () C:\Windows\setupact.log
2014-11-06 21:51 - 2014-11-18 19:35 - 05666206 _____ () C:\Windows\PFRO.log
2014-11-06 21:51 - 2014-11-06 21:51 - 00000000 _____ () C:\Windows\setuperr.log
2014-10-31 16:02 - 2014-10-31 16:02 - 00001819 _____ () C:\Users\Public\Desktop\QuickTime Player.lnk
2014-10-31 16:02 - 2014-10-31 16:02 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\QuickTime
2014-10-31 16:01 - 2014-10-31 16:02 - 00000000 ____D () C:\Program Files\QuickTime
2014-10-27 11:51 - 2014-10-27 11:51 - 00006144 _____ () C:\Users\Suzie\Downloads\Novembro_4_2014Novembro999993551784_250.cdc
2014-10-27 11:49 - 2014-10-27 11:49 - 00010240 _____ () C:\Users\Suzie\Downloads\Outubro_4_2014Outubro999993551784_250 (1).cdc
2014-10-27 11:48 - 2014-10-27 11:48 - 00010240 _____ () C:\Users\Suzie\Downloads\Outubro_4_2014Outubro999993551784_250.cdc
2014-10-26 02:25 - 2009-06-10 19:39 - 00000824 _____ () C:\Windows\system32\Drivers\etc\hosts.20141026-022541.backup
2014-10-24 23:10 - 2014-10-24 23:10 - 00000000 ____D () C:\Program Files\Enigma Software Group
2014-10-24 10:48 - 2014-10-24 11:01 - 02998656 _____ (Enigma Software Group USA, LLC.) C:\Users\Suzie\Downloads\SpyHunter-Installer.exe
2014-10-22 01:54 - 2014-11-11 07:21 - 00000000 ____D () C:\Users\Todos os Usuários\Spybot - Search & Destroy
2014-10-22 01:54 - 2014-11-11 07:21 - 00000000 ____D () C:\ProgramData\Spybot - Search & Destroy
2014-10-22 01:54 - 2014-11-09 03:17 - 00000000 ____D () C:\Program Files\Spybot - Search & Destroy 2
2014-10-22 01:48 - 2014-10-22 01:50 - 46525608 _____ (Safer-Networking Ltd. ) C:\Users\Suzie\Downloads\spybot-2.4.exe
2014-10-22 01:21 - 2014-10-22 01:22 - 01962496 _____ () C:\Users\Suzie\Downloads\adwcleaner_4.001.exe
 
==================== One Month Modified Files and Folders =======
 
(If an entry is included in the fixlist, the file\folder will be moved.)
 
2014-11-20 15:43 - 2013-06-02 12:26 - 00000902 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-11-20 03:00 - 2013-04-13 20:29 - 01773216 _____ () C:\Windows\WindowsUpdate.log
2014-11-20 01:39 - 2014-01-12 15:23 - 00000000 ____D () C:\Users\Suzie\AppData\Local\CrashDumps
2014-11-19 22:19 - 2009-07-14 02:34 - 00009696 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-11-19 22:19 - 2009-07-14 02:34 - 00009696 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-11-19 22:10 - 2009-07-14 02:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-11-18 05:08 - 2014-06-26 17:31 - 00000000 ____D () C:\Users\Todos os Usuários\eMule
2014-11-18 05:08 - 2014-06-26 17:31 - 00000000 ____D () C:\ProgramData\eMule
2014-11-18 05:08 - 2014-06-26 17:23 - 00000000 ____D () C:\Users\Suzie\AppData\Local\eMule
2014-11-18 05:08 - 2013-06-02 21:04 - 00000000 ____D () C:\Program Files\Vuze
2014-11-17 06:34 - 2014-06-08 20:06 - 00000286 __RSH () C:\Users\Todos os Usuários\ntuser.pol
2014-11-17 06:34 - 2014-06-08 20:06 - 00000286 __RSH () C:\ProgramData\ntuser.pol
2014-11-17 06:28 - 2013-06-02 21:04 - 00000000 ____D () C:\Users\Suzie\AppData\Roaming\Azureus
2014-11-14 23:27 - 2013-12-01 13:31 - 00006144 _____ () C:\Users\Suzie\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2014-11-14 22:36 - 2013-05-29 12:02 - 00000000 ____D () C:\Users\Suzie\Documents\Meus arquivos recebidos
2014-11-14 22:36 - 2013-04-13 20:31 - 01636426 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-11-14 22:36 - 2009-07-14 06:31 - 00706016 _____ () C:\Windows\system32\prfh0416.dat
2014-11-14 22:36 - 2009-07-14 06:31 - 00147598 _____ () C:\Windows\system32\prfc0416.dat
2014-11-14 21:45 - 2013-04-13 21:02 - 00000000 ____D () C:\Users\Suzie\Tracing
2014-11-12 04:01 - 2009-07-14 00:37 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-11-12 03:53 - 2009-07-14 02:53 - 00032608 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-11-12 03:52 - 2009-07-14 02:33 - 00436304 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-11-12 03:50 - 2009-07-14 00:37 - 00000000 ____D () C:\Windows\system32\pt-BR
2014-11-12 03:44 - 2013-04-13 20:53 - 00701104 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-11-12 03:44 - 2013-04-13 20:53 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-11-12 03:17 - 2013-07-29 23:14 - 00000000 ____D () C:\Windows\system32\MRT
2014-11-12 03:04 - 2013-04-14 03:06 - 100445232 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-11-11 09:54 - 2013-04-14 19:42 - 00000000 ____D () C:\Users\Suzie\AppData\Roaming\SoftGrid Client
2014-11-11 07:23 - 2009-07-14 00:37 - 00000000 ____D () C:\Windows\tracing
2014-11-11 04:23 - 2013-06-13 12:08 - 00000000 ____D () C:\Windows\Sun
2014-11-11 04:21 - 2014-06-08 20:50 - 00000000 ____D () C:\Users\Todos os Usuários\SSavEE  Onn
2014-11-11 04:21 - 2014-06-08 20:50 - 00000000 ____D () C:\ProgramData\SSavEE  Onn
2014-11-11 04:21 - 2014-06-08 20:35 - 00000000 ____D () C:\Users\Todos os Usuários\savve onn
2014-11-11 04:21 - 2014-06-08 20:35 - 00000000 ____D () C:\ProgramData\savve onn
2014-11-11 04:21 - 2014-06-08 20:07 - 00000000 ____D () C:\Users\Todos os Usuários\Supersoftware App
2014-11-11 04:21 - 2014-06-08 20:07 - 00000000 ____D () C:\ProgramData\Supersoftware App
2014-11-11 04:21 - 2014-06-08 20:06 - 00000000 ____D () C:\Users\Todos os Usuários\sAovve ooNN
2014-11-11 04:21 - 2014-06-08 20:06 - 00000000 ____D () C:\ProgramData\sAovve ooNN
2014-11-11 04:21 - 2014-02-14 00:51 - 00000000 ____D () C:\Users\Suzie\AppData\Roaming\DigitalSites
2014-11-09 02:30 - 2013-07-27 02:53 - 00000000 ____D () C:\Users\Suzie\AppData\Roaming\Ultimate Codec Packages
2014-11-09 02:04 - 2014-08-26 00:06 - 00000000 ____D () C:\Users\Todos os Usuários\F-Secure
2014-11-09 02:04 - 2014-08-26 00:06 - 00000000 ____D () C:\ProgramData\F-Secure
2014-11-08 03:00 - 2009-07-14 00:04 - 00000215 ____N () C:\Windows\system.ini
2014-11-08 02:18 - 2009-07-14 00:37 - 00000000 __RHD () C:\Users\Default
2014-11-08 02:18 - 2009-07-14 00:37 - 00000000 ___RD () C:\Users\Public
2014-11-08 02:10 - 2009-07-14 00:03 - 61865984 _____ () C:\Windows\system32\config\SOFTWARE.bak
2014-11-08 02:10 - 2009-07-14 00:03 - 17563648 _____ () C:\Windows\system32\config\SYSTEM.bak
2014-11-08 02:10 - 2009-07-14 00:03 - 05767168 _____ () C:\Windows\system32\config\DEFAULT.bak
2014-11-08 02:10 - 2009-07-14 00:03 - 00020480 _____ () C:\Windows\system32\config\SECURITY.bak
2014-11-08 02:10 - 2009-07-14 00:03 - 00020480 _____ () C:\Windows\system32\config\SAM.bak
2014-11-08 01:57 - 2014-05-17 09:52 - 00000000 ____D () C:\Users\Todos os Usuários\Temp
2014-11-08 01:57 - 2014-05-17 09:52 - 00000000 ____D () C:\ProgramData\Temp
2014-11-08 00:56 - 2013-07-27 03:51 - 00000310 _____ () C:\Users\Suzie\AppData\Roaming\WB.CFG
2014-10-28 06:35 - 2013-04-13 20:24 - 00229000 ____N (Microsoft Corporation) C:\Windows\system32\MpSigStub.exe
2014-10-25 00:39 - 2013-04-13 20:33 - 00001393 _____ () C:\Users\Suzie\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
2014-10-24 23:12 - 2013-04-13 20:28 - 00000000 ____D () C:\Users\Suzie
2014-10-24 22:44 - 2014-10-18 14:37 - 00000000 ____D () C:\Program Files\Unlocker
2014-10-23 00:55 - 2013-10-14 22:26 - 00000000 ____D () C:\Program Files\Microsoft Office 15
 
Files to move or delete:
====================
C:\ProgramData\FileSplitUpLoad.dll
C:\Users\Todos os Usuários\FileSplitUpLoad.dll
 
 
==================== Bamital & volsnap Check =================
 
(There is no automatic fix for files that do not pass verification.)
 
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed
 
 
LastRegBack: 2014-11-18 05:52
 
==================== End Of Log ============================
 

 

 

Additional scan result of Farbar Recovery Scan Tool (x86) Version: 10-11-2014
Ran by Suzie at 2014-11-20 15:56:22
Running from C:\Users\Suzie\Desktop
Boot Mode: Normal
==========================================================
 
 
==================== Security Center ========================
 
(If an entry is included in the fixlist, it will be removed.)
 
AV: Trend Micro Maximum Security (Disabled - Up to date) {F2F88E6A-3C7A-545F-268A-5D0BDD38EE06}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Trend Micro Maximum Security (Disabled - Up to date) {49996F8E-1A40-5BD1-1C3A-6679A6BFA4BB}
 
==================== Installed Programs ======================
 
(Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)
 
Adobe Flash Player 15 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 15.0.0.223 - Adobe Systems Incorporated)
Adobe Flash Player 15 Plugin (HKLM\...\Adobe Flash Player Plugin) (Version: 15.0.0.223 - Adobe Systems Incorporated)
Adobe Reader 9.5.4 - Português (HKLM\...\{AC76BA86-7AD7-1046-7B44-A95000000001}) (Version: 9.5.4 - Adobe Systems Incorporated)
Apple Mobile Device Support (HKLM\...\{235EBB33-3DA1-46DF-AADE-9955123409CB}) (Version: 8.0.5.6 - Apple Inc.)
Apple Software Update (HKLM\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
AviSynth 2.5 (HKLM\...\AviSynth) (Version:  - )
Bonjour (HKLM\...\{79155F2B-9895-49D7-8612-D92580E0DE5B}) (Version: 3.0.0.10 - Apple Inc.)
Broadcom Gigabit Integrated Controller (HKLM\...\{9E325417-AE9C-4EE1-A158-13DF451A5987}) (Version: 11.44.04 - Broadcom Corporation)
Broadcom Gigabit NetLink Controller (HKLM\...\{9AF0B106-56F1-461B-A270-95BC1682E282}) (Version: 11.34.02 - Broadcom Corporation)
CDBurnerXP (HKLM\...\{7E265513-8CDA-4631-B696-F40D983F3B07}_is1) (Version: 4.5.2.4214 - CDBurnerXP)
Controle ActiveX do Windows Live Mesh para Conexões Remotas (HKLM\...\{39B3184E-0BFB-40FA-ADDC-E7E2D535CDA9}) (Version: 15.4.5722.2 - Microsoft Corporation)
D3DX10 (Version: 15.4.2368.0902 - Microsoft) Hidden
DirectVobSub 2.40.4209 (HKLM\...\vsfilter_is1) (Version: 2.40.4209 - MPC-HC Team)
DVD Flick 1.3.0.7 (HKLM\...\DVD Flick_is1) (Version: 1.3.0.7 - Dennis Meuwissen)
Free Easy Burner V 5.1 (HKLM\...\Free Easy Burner_is1) (Version: 5.1.0.0 - Koyote soft)
Haali Media Splitter (HKLM\...\HaaliMkx) (Version:  - )
iCloud (HKLM\...\{AC6EE263-E4DD-4150-9014-689B1D4A3315}) (Version: 4.0.5.20 - Apple Inc.)
Instalação do DivX (HKLM\...\DivX Setup) (Version: 2.6.3.88 - DivX, LLC)
IRPF2013 - Declaração de Ajuste Anual, Final de Espólio e Saída Definitiva do País (HKLM\...\IRPF2013) (Version: 1.1 - Receita Federal do Brasil)
IRPF2014 - Declaração de Ajuste Anual, Final de Espólio e Saída Definitiva do País (HKLM\...\IRPF2014) (Version: 1.2 - Receita Federal do Brasil)
iTunes (HKLM\...\{5D928931-D1D2-4A93-A82D-BF60D0E7CFA5}) (Version: 12.0.1.26 - Apple Inc.)
Java 7 Update 71 (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F03217071FF}) (Version: 7.0.710 - Oracle)
Junk Mail filter update (Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
K-Lite Codec Pack 10.1.0 Full (HKLM\...\KLiteCodecPack_is1) (Version: 10.1.0 - )
Lagarith Lossless Codec (1.3.27) (HKLM\...\{F59AC46C-10C3-4023-882C-4212A92283B3}_is1) (Version:  - )
LAME v3.99.3 (for Windows) (HKLM\...\LAME_is1) (Version:  - )
Leawo Video Converter versão  6.0.0.0 (HKLM\...\{331ED3CF-3A1B-467C-9A62-899E2D3B20C4}_is1) (Version: 6.0.0.0 - Leawo Software Co.,Ltd.)
Malwarebytes Anti-Malware version 2.0.3.1025 (HKLM\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.3.1025 - Malwarebytes Corporation)
Marvell Miniport Driver (HKLM\...\{C950420B-4182-49EA-850A-A6A2ABF06C6B}) (Version: 9.12.4.3 - Marvell)
Mesh Runtime (Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (Português do Brasil) (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1046) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft Office 365 - pt-br (HKLM\...\O365HomePremRetail - pt-br) (Version: 15.0.4659.1001 - Microsoft Corporation)
Microsoft Office com Clique para Executar 2010 (HKLM\...\Office14.Click2Run) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Office Starter 2010 - Português (Brasil) (HKLM\...\{90140011-0066-0416-0000-0000000FF1CE}) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (HKLM\...\{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}) (Version: 9.0.21022 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
MSVCRT (Version: 15.4.2862.0708 - Microsoft) Hidden
MSXML 4.0 SP3 Parser (HKLM\...\{196467F1-C11F-4F76-858B-5812ADC83B94}) (Version: 4.30.2100.0 - Microsoft Corporation)
MSXML 4.0 SP3 Parser (KB2758694) (HKLM\...\{1D95BA90-F4F8-47EC-A882-441C99D30C1E}) (Version: 4.30.2117.0 - Microsoft Corporation)
Nike+ Connect (HKLM\...\Nike+ Connect) (Version: 6.3.18 - Nike)
Office 15 Click-to-Run Extensibility Component (Version: 15.0.4659.1001 - Microsoft Corporation) Hidden
Office 15 Click-to-Run Licensing Component (Version: 15.0.4659.1001 - Microsoft Corporation) Hidden
Office 15 Click-to-Run Localization Component (Version: 15.0.4659.1001 - Microsoft Corporation) Hidden
QuickTime 7 (HKLM\...\{3D2CBC2C-65D4-4463-87AB-BB2C859C1F3E}) (Version: 7.76.80.95 - Apple Inc.)
RealDownloader (Version: 1.3.3 - RealNetworks, Inc.) Hidden
RealNetworks - Microsoft Visual C++ 2008 Runtime (Version: 9.0 - RealNetworks, Inc) Hidden
RealNetworks - Microsoft Visual C++ 2010 Runtime (Version: 10.0 - RealNetworks, Inc) Hidden
RealPlayer (HKLM\...\RealPlayer 16.0) (Version: 16.0.3 - RealNetworks)
Realtek 8136 8168 8169 Ethernet Driver (HKLM\...\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}) (Version: 1.00.0005 - Realtek)
RealUpgrade 1.1 (Version: 1.1.0 - RealNetworks, Inc.) Hidden
Receitanet (HKLM\...\ECC16E3C-16D1-4DC2-9D8A-6AC06B3005A5) (Version: 1.04 - Serpro - Serviço Federal de Processamento de Dados)
Samsung Kies (HKLM\...\InstallShield_{758C8301-2696-4855-AF45-534B1200980A}) (Version: 2.5.3.13043_14 - Samsung Electronics Co., Ltd.)
Samsung Kies (Version: 2.5.3.13043_14 - Samsung Electronics Co., Ltd.) Hidden
Samsung Story Album Viewer (HKLM\...\InstallShield_{698BBAD8-B116-495D-B879-0F07A533E57F}) (Version: 1.0.0.13054_1 - Samsung Electronics Co., Ltd.)
Samsung Story Album Viewer (Version: 1.0.0.13054_1 - Samsung Electronics Co., Ltd.) Hidden
SAMSUNG USB Driver for Mobile Phones (HKLM\...\{D0795B21-0CDA-4a92-AB9E-6E92D8111E44}) (Version: 1.5.29.0 - SAMSUNG Electronics Co., Ltd.)
Sothink Movie DVD Maker (HKLM\...\{4F94119D-1B71-400e-9F04-B4E5CEAE71F8}_is1) (Version: 3.8 - SourceTec Software Co., LTD)
Subtitle Workshop 2.51 (HKLM\...\SubtitleWorkshop) (Version:  - )
Suporte para Aplicativos Apple (HKLM\...\{83CAF0DE-8D3B-4C37-A631-2B8F16EC3031}) (Version: 3.1 - Apple Inc.)
TeamViewer 9 (HKLM\...\TeamViewer 9) (Version: 9.0.32494 - TeamViewer)
Trend Micro DirectPass (Version: 1.9.0.1094 - Trend Micro Inc.) Hidden
Trend Micro Maximum Security (HKLM\...\{ABBD4BA8-6703-40D2-AB1E-5BB1F7DB49A4}) (Version: 8.0 - Trend Micro Inc.)
Trend Micro Password Manager (HKLM\...\{3075404F-5657-4f31-A064-FEF98661BDD4}) (Version: 1.9.0.1129 - Trend Micro Inc.)
Trend Micro Titanium (Version: 8.0 - Trend Micro Inc.) Hidden
uPlayer (HKLM\...\{06810DC6-3501-40FE-BCB3-1A7BE6398A36}) (Version: 1.0.0 - Full Spectrum Interactive)
VC80CRTRedist - 8.0.50727.6195 (Version: 1.2.0 - DivX, Inc) Hidden
VCRT for DirectPass x86 (Version: 1.0.0.1000 - Trend Micro, Inc.) Hidden
Visualizador do Microsoft PowerPoint (HKLM\...\{95140000-00AF-0416-0000-0000000FF1CE}) (Version: 14.0.7015.1000 - Microsoft Corporation)
Windows 7 Upgrade Advisor (HKLM\...\{AB05F2C8-F608-403b-95E1-FD8ADFACD31E}) (Version: 2.0.5000.0 - Microsoft Corporation)
Windows Live Essentials (HKLM\...\WinLiveSuite) (Version: 15.4.3502.0922 - Microsoft Corporation)
Windows Live Sync (HKLM\...\{2DF215E0-BD3C-4C98-8616-AFEF09747285}) (Version: 14.0.8117.416 - Microsoft Corporation)
WinRAR 4.20 (32-bit) (HKLM\...\WinRAR archiver) (Version: 4.20.0 - win.rar GmbH)
WinX DVD Author 6.2 (HKLM\...\WinX DVD Author_is1) (Version:  - DigiartySoft, Inc.)
Xvid Video Codec (HKLM\...\Xvid Video Codec 1.3.2) (Version: 1.3.2 - Xvid Team)
 
==================== Custom CLSID (selected items): ==========================
 
(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)
 
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{0783EB25-59F8-4F02-B6B0-F1D4349F0000}\InprocServer32 -> C:\Users\Suzie\AppData\Local\GAS Tecnologia\GBBD\npsf_bb.dll (GAS Tecnologia)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{0783EB25-59F8-4F02-B6B1-F1D4349F0000}\InprocServer32 -> C:\Users\Suzie\AppData\Local\GAS Tecnologia\GBBD\npsf_bb.dll (GAS Tecnologia)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{5C65F4B0-3651-4514-B207-D10CB699B14B}\localserver32 -> C:\Users\Suzie\AppData\Local\Google\Chrome\Application\35.0.1916.114\delegate_execute.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\localserver32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\SkyDrive.exe (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\InprocServer32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\localserver32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\SkyDrive.exe (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\SkyDriveShell.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-3823719251-145347726-1436220222-1000_Classes\CLSID\{F8071786-1FD0-4A66-81A1-3CBE29274458}\InprocServer32 -> C:\Users\Suzie\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112\FileSyncApi.dll (Microsoft Corporation)
 
==================== Restore Points  =========================
 
01-11-2014 03:33:35 Cleaner (Spybot - Search & Destroy 2.4, administrator privileges
05-11-2014 01:44:06 Windows Update
08-11-2014 01:54:16 Windows Update
09-11-2014 04:02:58 Removed Protect
12-11-2014 05:00:38 Windows Update
18-11-2014 07:23:31 OTL Restore Point - 18/11/2014 05:23:27
19-11-2014 05:00:20 Windows Update
 
==================== Hosts content: ==========================
 
(If needed Hosts: directive could be included in the fixlist to reset Hosts.)
 
2009-07-14 00:04 - 2014-11-08 02:12 - 00000027 ____N C:\Windows\system32\Drivers\etc\hosts
127.0.0.1       localhost
 
==================== Scheduled Tasks (whitelisted) =============
 
(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)
 
Task: {08D8BC48-0F2B-4FFB-AE8E-4F71A6AEEBDE} - System32\Tasks\Microsoft\Office\Office Automatic Updates => C:\Program Files\Microsoft Office 15\ClientX86\OfficeC2RClient.exe [2014-09-25] (Microsoft Corporation)
Task: {0ADA600F-99C1-4C85-9F1B-AAF02FC4CD65} - System32\Tasks\{938CDBC3-E329-4009-B0B2-CF88C19984C6} => C:\Users\Suzie\Downloads\adwcleaner_4.000.exe [2014-10-17] ()
Task: {1184ED36-2FF9-4C47-87E7-392C397E52F8} - System32\Tasks\RealPlayerRealUpgradeLogonTaskS-1-5-21-3823719251-145347726-1436220222-1000 => C:\Program Files\Real\RealUpgrade\RealUpgrade.exe [2013-08-14] (RealNetworks, Inc.)
Task: {3578D402-FD45-402C-8B43-CC4536DE49F3} - \Dealply No Task File <==== ATTENTION
Task: {4CC52E05-B26A-4413-B618-B8E425DF9466} - System32\Tasks\{442743F5-A015-430A-9892-FB870522CC99} => C:\Users\Suzie\Desktop\FRST.exe [2014-11-13] (Farbar)
Task: {5D0BD87E-180D-4A52-B43B-05C8C485702F} - System32\Tasks\{5CE1113A-2AA8-48FD-95BD-AB8C393BBB58} => C:\Program Files\K-Lite Codec Pack\Media Player Classic\mpc-hc.exe [2013-10-25] (MPC-HC Team)
Task: {81176541-CD51-453E-94B7-DAF010D3C6A8} - System32\Tasks\{01772589-0850-4154-BD84-C564A5A7C835} => C:\Users\Suzie\Desktop\FRST.exe [2014-11-13] (Farbar)
Task: {838EF3B7-3172-4327-9E0A-FC88B0698FB8} - System32\Tasks\{BBB2ABB8-F466-4A18-A7CE-79418FBBF480} => C:\Users\Suzie\Desktop\FRST.exe [2014-11-13] (Farbar)
Task: {87BE71AA-8735-41A0-8FA8-CFA51C0FD4FE} - System32\Tasks\{E151CCBB-88AA-40DC-9A39-0F4B96C34712} => C:\Users\Suzie\Desktop\FRST.exe [2014-11-13] (Farbar)
Task: {9231FE06-8CF0-4A13-9A5B-61673681B144} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2014-11-12] (Adobe Systems Incorporated)
Task: {A68A7AEC-A47F-411E-9C68-7AFEA87E4A0F} - \DealPlyUpdate No Task File <==== ATTENTION
Task: {B27EFBFE-D250-4C14-B7B6-FFBA2EA1B4FA} - \Baidu Antivirus Update No Task File <==== ATTENTION
Task: {D7C38E33-C106-4654-A38B-77EA24581AD8} - System32\Tasks\Microsoft\Office\Office Subscription Maintenance => C:\Program Files\Microsoft Office 15\root\vfs\ProgramFilesCommonx86\Microsoft Shared\OFFICE15\OLicenseHeartbeat.exe [2014-09-25] (Microsoft Corporation)
Task: {E1BD78E8-0C53-49FB-A675-AA7A2ED8300E} - System32\Tasks\{14F9E1CB-1DC7-40B0-B8B0-D11746BFB08C} => C:\Users\Suzie\Desktop\FRST.exe [2014-11-13] (Farbar)
Task: {E6C02761-4C3A-4E78-A509-6EFAFC88AE11} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2011-06-01] (Apple Inc.)
Task: {ED008639-1AE7-4DC2-BACC-D474E7216517} - System32\Tasks\RealPlayerRealUpgradeScheduledTaskS-1-5-21-3823719251-145347726-1436220222-1000 => C:\Program Files\Real\RealUpgrade\RealUpgrade.exe [2013-08-14] (RealNetworks, Inc.)
Task: {FB7569DC-99D9-4CDB-B69F-71F8A3979FA3} - System32\Tasks\LaunchSignup => C:\Program Files\MyPC Backup\Signup Wizard.exe <==== ATTENTION
 
(If an entry is included in the fixlist, the task (.job) file will be moved. The file which is running by the task will not be moved.)
 
Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
 
==================== Loaded Modules (whitelisted) =============
 
2014-07-08 01:49 - 2014-09-11 04:06 - 00019216 _____ () C:\Windows\system32\spool\PRTPROCS\W32X86\TeamViewer_PrintProcessor.dll
2014-01-20 13:17 - 2014-01-20 13:17 - 00073544 _____ () C:\Program Files\Common Files\Apple\Apple Application Support\zlib1.dll
2014-10-11 13:05 - 2014-10-11 13:05 - 01044776 _____ () C:\Program Files\Common Files\Apple\Apple Application Support\libxml2.dll
2014-03-18 22:26 - 2014-05-20 03:11 - 00080040 _____ () C:\Program Files\Microsoft Office 15\ClientX86\ApiClient.dll
2014-11-09 03:51 - 2014-10-09 12:50 - 00080720 _____ () C:\Program Files\Trend Micro\Titanium\plugin\Pt\boost_thread-vc110-mt-1_52.dll
2014-11-09 03:51 - 2014-10-09 12:50 - 00025104 _____ () C:\Program Files\Trend Micro\Titanium\plugin\Pt\boost_system-vc110-mt-1_52.dll
2014-11-09 03:51 - 2014-10-09 12:50 - 00049296 _____ () C:\Program Files\Trend Micro\Titanium\plugin\Pt\boost_date_time-vc110-mt-1_52.dll
2010-07-04 19:32 - 2010-07-04 19:32 - 00004608 _____ () C:\Program Files\Unlocker\UnlockerHook.dll
2013-08-14 16:19 - 2013-08-14 16:19 - 00039056 _____ () C:\Program Files\RealNetworks\RealDownloader\rndlresolversvc.exe
2014-01-10 03:26 - 2014-01-10 03:26 - 01861968 _____ () C:\Program Files\DivX\DivX Update\DivXUpdate.exe
2014-01-10 03:28 - 2014-01-10 03:28 - 00100688 _____ () C:\Program Files\DivX\DivX Update\DivXUpdateCheck.dll
2010-07-04 17:51 - 2010-07-04 17:51 - 00017408 _____ () C:\Program Files\Unlocker\UnlockerAssistant.exe
2014-10-17 00:36 - 2014-10-17 00:36 - 00186368 _____ () C:\Windows\assembly\NativeImages_v4.0.30319_32\Kies.Commonc65c5a95#\05139c8c59a94faa7592e7d20a46d2c3\Kies.Common.DeviceServiceLib.Interface.ni.dll
2014-10-17 00:37 - 2014-10-17 00:37 - 14971904 _____ () C:\Windows\assembly\NativeImages_v4.0.30319_32\Kies.Theme\6af4e6849c5245d553c7f3ad01d0a01c\Kies.Theme.ni.dll
2014-10-17 00:36 - 2014-10-17 00:36 - 01842688 _____ () C:\Windows\assembly\NativeImages_v4.0.30319_32\Kies.UI\68d88b510a9cf63ee392b2f8723d4e2e\Kies.UI.ni.dll
2014-10-17 00:36 - 2014-10-17 00:36 - 00081920 _____ () C:\Windows\assembly\NativeImages_v4.0.30319_32\Kies.MVVM\781622d2d2f65de56982ebb61ee0eab2\Kies.MVVM.ni.dll
2014-10-17 00:37 - 2014-10-17 00:37 - 00236032 _____ () C:\Windows\assembly\NativeImages_v4.0.30319_32\ASF_cSharpAPI\6815ff93472d008087880a6462931188\ASF_cSharpAPI.ni.dll
2010-09-23 00:49 - 2010-09-23 00:49 - 00018792 _____ () C:\Program Files\Windows Live\Shared\pt-br\wliduxloc.dll.mui
2010-09-23 01:37 - 2010-09-23 01:37 - 00010616 _____ () C:\Program Files\Windows Live\Messenger\pt-br\ShareAnythingControllang.dll.mui
2010-09-23 01:47 - 2010-09-23 01:47 - 00074616 _____ () C:\Program Files\Windows Live\Messenger\ShareAnythingControlRes.dll
2010-09-23 00:49 - 2010-09-23 00:49 - 00024936 _____ () C:\Program Files\Windows Live\Shared\pt-br\uxctlloc.dll.mui
2014-09-26 00:39 - 2014-09-26 00:40 - 00316576 _____ () C:\Program Files\Microsoft Office 15\root\office15\AppVIsvStream32.dll
 
==================== Alternate Data Streams (whitelisted) =========
 
(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)
 
AlternateDataStreams: C:\Windows\system32\drivers:GbpKmAp.lst
 
==================== Safe Mode (whitelisted) ===================
 
(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)
 
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\BavSvc => "Service"=""
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\BavSvc => "Service"=""
 
==================== EXE Association (whitelisted) =============
 
(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)
 
 
==================== MSCONFIG/TASK MANAGER disabled items =========
 
(Currently there is no automatic fix for this section.)
 
MSCONFIG\startupreg: Adobe ARM => "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
MSCONFIG\startupreg: Adobe Reader Speed Launcher => "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
MSCONFIG\startupreg: APSDaemon => "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
MSCONFIG\startupreg: iTunesHelper => "C:\Program Files\iTunes\iTunesHelper.exe"
MSCONFIG\startupreg: KiesPreload => C:\Program Files\Samsung\Kies\Kies.exe /preload
MSCONFIG\startupreg: KiesTrayAgent => C:\Program Files\Samsung\Kies\KiesTrayAgent.exe
MSCONFIG\startupreg: Nike+ Connect => "C:\Program Files\Nike\Nike+ Connect\Nike+ Connect daemon.exe"
 
========================= Accounts: ==========================
 
Administrador (S-1-5-21-3823719251-145347726-1436220222-500 - Administrator - Disabled)
Convidado (S-1-5-21-3823719251-145347726-1436220222-501 - Limited - Disabled)
Suzie (S-1-5-21-3823719251-145347726-1436220222-1000 - Administrator - Enabled) => C:\Users\Suzie
 
==================== Faulty Device Manager Devices =============
 
Name: LogMeIn Kernel Information Provider
Description: LogMeIn Kernel Information Provider
Class Guid: {8ECC055D-047F-11D1-A537-0000F8753ED1}
Manufacturer: 
Service: LMIInfo
Problem: : This device is not present, is not working properly, or does not have all its drivers installed. (Code 24)
Resolution: The device is installed incorrectly. The problem could be a hardware failure, or a new driver might be needed.
Devices stay in this state if they have been prepared for removal.
After you remove the device, this error disappears.Remove the device, and this error should be resolved.
 
Name: {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
Description: {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
Class Guid: {8ECC055D-047F-11D1-A537-0000F8753ED1}
Manufacturer: 
Service: {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
Problem: : This device is not present, is not working properly, or does not have all its drivers installed. (Code 24)
Resolution: The device is installed incorrectly. The problem could be a hardware failure, or a new driver might be needed.
Devices stay in this state if they have been prepared for removal.
After you remove the device, this error disappears.Remove the device, and this error should be resolved.
 
Name: Adaptador de Túnel Teredo da Microsoft
Description: Adaptador de Túnel Teredo da Microsoft
Class Guid: {4d36e972-e325-11ce-bfc1-08002be10318}
Manufacturer: Microsoft
Service: tunnel
Problem: : This device cannot start. (Code10)
Resolution: Device failed to start. Click "Update Driver" to update the drivers for this device.
On the "General Properties" tab of the device, click "Troubleshoot" to start the troubleshooting wizard.
 
 
==================== Event log errors: =========================
 
Application errors:
==================
Error: (11/20/2014 01:39:36 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: Nome de aplicativo com falha: DivX Player.exe, versão: 11.3.3.62, carimbo de hora: 0x53f2d28a
Nome do módulo de falhas: DSE_Control.dll, versão: 1.3.3.13, carimbo de hora: 0x53eacb35
Código de exceção: 0xc0000005
Deslocamento com falha: 0x00015636
Identificação do processo com falha: 0x1fec
Hora de início do aplicativo com falha: 0xDivX Player.exe0
Caminho do aplicativo com falha: DivX Player.exe1
FCaminho do módulo de falhas: DivX Player.exe2
Identificação do Relatório: DivX Player.exe3
 
Error: (11/19/2014 11:43:51 PM) (Source: Office 2013 Licensing Service) (EventID: 0) (User: )
Description: Subscription licensing service failed: -1073415161
 
Error: (11/18/2014 11:44:10 PM) (Source: Office 2013 Licensing Service) (EventID: 0) (User: )
Description: Subscription licensing service failed: -1073415161
 
 
System errors:
=============
Error: (11/20/2014 00:56:49 PM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: O serviço Trend Micro Solution Platform foi encerrado inesperadamente.  Isso aconteceu 1 vez(es).
 
Error: (11/19/2014 10:10:46 PM) (Source: Service Control Manager) (EventID: 7026) (User: )
Description: Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema ou de inicialização: 
{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
Error: (11/19/2014 10:10:25 PM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Não foi possível iniciar o serviço LogMeIn Kernel Information Provider devido ao seguinte erro: 
%%3
 
Error: (11/19/2014 03:18:23 AM) (Source: Service Control Manager) (EventID: 7026) (User: )
Description: Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema ou de inicialização: 
{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
Error: (11/19/2014 03:18:13 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Não foi possível iniciar o serviço LogMeIn Kernel Information Provider devido ao seguinte erro: 
%%3
 
Error: (11/18/2014 11:45:59 PM) (Source: Service Control Manager) (EventID: 7026) (User: )
Description: Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema ou de inicialização: 
{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
Error: (11/18/2014 11:45:45 PM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Não foi possível iniciar o serviço LogMeIn Kernel Information Provider devido ao seguinte erro: 
%%3
 
Error: (11/18/2014 07:36:06 PM) (Source: Service Control Manager) (EventID: 7026) (User: )
Description: Falha ao carregar o(s) seguinte(s) driver(s) de início do sistema ou de inicialização: 
{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw
 
Error: (11/18/2014 07:35:55 PM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Não foi possível iniciar o serviço LogMeIn Kernel Information Provider devido ao seguinte erro: 
%%3
 
 
Microsoft Office Sessions:
=========================
Error: (11/20/2014 01:39:36 AM) (Source: Application Error) (EventID: 1000) (User: )
Description: DivX Player.exe11.3.3.6253f2d28aDSE_Control.dll1.3.3.1353eacb35c0000005000156361fec01d0047382ccaf2cC:\Program Files\DivX\DivX Player\DivX Player.exeC:\Program Files\DivX\Codecs\DSE_Control.dlld91208e8-7066-11e4-8814-0ceee6fa5e88
 
Error: (11/19/2014 11:43:51 PM) (Source: Office 2013 Licensing Service) (EventID: 0) (User: )
Description: Subscription licensing service failed: -1073415161
 
Error: (11/18/2014 11:44:10 PM) (Source: Office 2013 Licensing Service) (EventID: 0) (User: )
Description: Subscription licensing service failed: -1073415161
 
 
CodeIntegrity Errors:
===================================
  Date: 2014-08-29 11:17:27.388
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:27.076
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:26.795
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:26.483
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:26.187
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:25.890
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:25.563
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-29 11:17:25.235
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-27 13:25:48.372
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2014-08-27 13:25:48.088
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files\GbPlugin\gbpinj.dll because the set of per-page image hashes could not be found on the system.
 
 
==================== Memory info =========================== 
 
Processor: Intel® Celeron® CPU E3400 @ 2.60GHz
Percentage of memory in use: 41%
Total physical RAM: 1981.24 MB
Available physical RAM: 1158.2 MB
Total Pagefile: 3962.48 MB
Available Pagefile: 2762.88 MB
Total Virtual: 2047.88 MB
Available Virtual: 1885.77 MB
 
==================== Drives ================================
 
Drive c: (Win7) (Fixed) (Total:298.09 GB) (Free:109.65 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 298.1 GB) (Disk ID: E779C85C)
Partition 1: (Active) - (Size=298.1 GB) - (Type=07 NTFS)
 
==================== End Of Log ============================

  • 0

#23
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Hi,

I should have added in the previous message that it appears that the "[bleep] ad"  has vanished after using the last tool(FRST Scan).

If that is the case,  that it fixed and  gone, which was basically my main concern, is there anything else, any other tool you would suggest ?

 

Thanks again


  • 0

#24
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts

Hi,there is still quite a bit lurking, I am preparing an FRST fixlist and submitting it to my mentor as we speak.

There will be some remainders to finish off with before you are really clean.

I will post instructions as soon as possible.


  • 0

#25
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts

Step 1
FRST Fix

If FRST.exe.exe is not on your desktop, please download Farbar Recovery Scan Tool and save it to your desktop.

  • Download the attached [attachment=73833:fixlist.txt]and save it to your desktop <<< very important - it must be in the same location as FRST.exe/FRST64.exe
  • Right click frst.png and run as administrator. When the tool opens click Yes to the disclaimer.
  • Press the Fix button.
  • It will produce a log called fixlog.txt on your Desktop.
  • Please copy and paste the contents of that log back here.

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system.

Step 2


Please run a free online scan with the ESET Online Scanner

<< Please disable any existing anti virus product before performing the following. >>


  • Click Run Eset Online Scanner

Runscan.png


Note: You will need to use Internet Explorer or Firefox (You will be prompted to install a helper program if you use firefox)for this scan.
Important: Please disable your existing AV software for the duration of the scan

  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start[
  • Make sure that the option Enable detection of potentially unwanted applications is checked
  • Next click on Advanced Settings and select:

eset-selections.png

  • Make sure that the option Remove found threats is NOT checked
  • Scan archives
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth Technology

eset-selections.png

  • Click Start, the virus database will update, this may take a while depending on your internet connection.
  • Once updated, the online scan will begin. (This scan can take several hours, so please be patient)
  • Once the scan is completed, click Finish
  • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic

Items I need to see in your next post:

  • FRST Fixlog
  • ESET Log

  • 0

Advertisements


#26
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Hi.

Once again, it's very odd and I cannot run FRST tool.

It happened today but after closing many programs in the background I cloud run and post the log, but now not a chance.

I'm on safe mode and nothing happens, it keeps flickering on my screen and I have no idea why it happens.

Any suggestions ?

Should I run only the online scanner tool ?

 

Thanks a lot.


  • 0

#27
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts

Hi there, lets try running from safe mode with command prompt to see if it will run properly from there.

Firstly, double check that your fixlist is on your desktop, then continue with the below.

Safe Mode With Command Prompt

  • Remove all floppy disks, CDs, and DVDs from your computer, and then restart your computer.
    Click the Start button 4f6cbd09-148c-4dd8-b1f2-48f232a2fd33_818, click the arrow next to the Shut Down button eb058ccf-b21e-4dfe-9bb7-1ad6c83b705c_47., and then click Restart.
  • Press and hold the F8 key as your computer restarts. You need to press F8 before the Windows logo appears. If the Windows logo appears, you'll need to try again by waiting until the Windows logon prompt appears, and then shutting down and restarting your computer.
  • On the Advanced Boot Options screen, use the arrow keys to highlight the safe mode option: Safe Mode with Command Prompt
  • Log on to your computer with a user account that has administrator rights.

Once logged on, type:
cd C:\Users\Suzie\Desktop
then type frst

Then click the fix button on FRST and let it reboot as normal once finished

If it was successful, please post the fixlog created.


  • 0

#28
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Thanks.

I guess it worked, bellow is the log file.

I will be looking forward to hearing what is next:

----------------------

 

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 20-11-2014
Ran by Suzie at 2014-11-22 00:51:48 Run:1
Running from C:\Users\Suzie\Desktop
Loaded Profile: Suzie (Available profiles: Suzie)
Boot Mode: Safe Mode (minimal)
 
==============================================
 
Content of fixlist:
*****************
start
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\...\RunOnce: [Application Restart #4] => C:\Users\Suzie\AppData\Local\Google\Chrome\Application\chrome.exe [860488 2014-05-13] (Google Inc.)
BootExecute: autocheck autochk * sdnclean.exe
GroupPolicy: Group Policy on Chrome detected <======= ATTENTION
CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKCU - DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = 
CHR HKLM\...\Chrome\Extension: [kcendgajlhoaiiccpijilcpmgphfflnj] - C:\Users\Suzie\AppData\Local\newhb.crx [2013-08-01]
C:\Users\Suzie\AppData\Local\newhb.crx
S3 catchme; \??\C:\Users\Suzie\AppData\Local\Temp\catchme.sys [X]
S1 {f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw; system32\drivers\{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw.sys [X]
2014-11-18 05:08 - 2014-06-26 17:31 - 00000000 ____D () C:\Users\Todos os Usuários\eMule
2014-11-18 05:08 - 2014-06-26 17:31 - 00000000 ____D () C:\ProgramData\eMule
2014-11-18 05:08 - 2014-06-26 17:23 - 00000000 ____D () C:\Users\Suzie\AppData\Local\eMule
2014-11-18 05:08 - 2013-06-02 21:04 - 00000000 ____D () C:\Program Files\Vuze
C:\ProgramData\FileSplitUpLoad.dll
C:\Users\Todos os Usuários\FileSplitUpLoad.dll
Task: {A68A7AEC-A47F-411E-9C68-7AFEA87E4A0F} - \DealPlyUpdate No Task File <==== ATTENTION
Task: {B27EFBFE-D250-4C14-B7B6-FFBA2EA1B4FA} - \Baidu Antivirus Update No Task File <==== ATTENTION
Task: {FB7569DC-99D9-4CDB-B69F-71F8A3979FA3} - System32\Tasks\LaunchSignup => C:\Program Files\MyPC Backup\Signup Wizard.exe <==== ATTENTION
AlternateDataStreams: C:\Windows\system32\drivers:GbpKmAp.lst
C:\Program Files\MyPC Backup
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\BavSvc => "Service"=""
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\BavSvc => "Service"=""
closeprocesses:
emptytemp:
end
 
 
 
*****************
 
HKU\S-1-5-21-3823719251-145347726-1436220222-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\\Application Restart #4 => value deleted successfully.
HKLM\System\CurrentControlSet\Control\Session Manager\\BootExecute => Value was restored successfully.
C:\Windows\system32\GroupPolicy\Machine => Moved successfully.
C:\Windows\system32\GroupPolicy\GPT.ini => Moved successfully.
"HKLM\SOFTWARE\Policies\Google" => Key deleted successfully.
"HKU\S-1-5-21-3823719251-145347726-1436220222-1000\SOFTWARE\Policies\Microsoft\Internet Explorer" => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\SearchScopes: HKLM - DefaultScope value is missing. => Value not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = => Value not found.
\\SearchScopes: HKCU - DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = => Value not found.
"HKLM\SOFTWARE\Google\Chrome\Extensions\kcendgajlhoaiiccpijilcpmgphfflnj" => Key deleted successfully.
C:\Users\Suzie\AppData\Local\newhb.crx => Moved successfully.
"C:\Users\Suzie\AppData\Local\newhb.crx" => File/Directory not found.
catchme => Service deleted successfully.
{f9d2f209-1697-4837-85f2-d88e4c9f7c81}Gw => Service deleted successfully.
C:\Users\Todos os Usuários\eMule => Moved successfully.
"C:\ProgramData\eMule" => File/Directory not found.
C:\Users\Suzie\AppData\Local\eMule => Moved successfully.
C:\Program Files\Vuze => Moved successfully.
C:\ProgramData\FileSplitUpLoad.dll => Moved successfully.
"C:\Users\Todos os Usuários\FileSplitUpLoad.dll" => File/Directory not found.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{A68A7AEC-A47F-411E-9C68-7AFEA87E4A0F}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{A68A7AEC-A47F-411E-9C68-7AFEA87E4A0F}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\DealPlyUpdate" => Key not found.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{B27EFBFE-D250-4C14-B7B6-FFBA2EA1B4FA}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{B27EFBFE-D250-4C14-B7B6-FFBA2EA1B4FA}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Baidu Antivirus Update" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{FB7569DC-99D9-4CDB-B69F-71F8A3979FA3}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{FB7569DC-99D9-4CDB-B69F-71F8A3979FA3}" => Key deleted successfully.
C:\Windows\System32\Tasks\LaunchSignup => Moved successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\LaunchSignup" => Key deleted successfully.
C:\Windows\system32\drivers => ":GbpKmAp.lst" ADS removed successfully.
"C:\Program Files\MyPC Backup" => File/Directory not found.
"HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal\BavSvc" => Key deleted successfully.
"HKLM\System\CurrentControlSet\Control\SafeBoot\Network\BavSvc" => Key deleted successfully.
Processes closed successfully.
EmptyTemp: => Removed 299.4 MB temporary data.
 
 
The system needed a reboot. 
 
==== End of Fixlog ====

  • 0

#29
ruggie_uk

ruggie_uk

    Trusted Helper

  • Malware Removal
  • 2,083 posts
 Great news, is it running better now and the animation still gone?


Step 1

Run Malwarebytes' Anti-Malware
  • If an update is found, it will download and install the latest updates automatically:
    MBAM2_zps52e3211b.png
  • Now select the Settings tab, and check the box next to Scan for rootkits:
    MBAM3_zps83324155.png
  • Go back to the Dashboard tab, and click the Scan Now button:
    MBAM4_zpse3cd4a79.png
  • The scan may take some time to finish,so please be patient.
    MBAM5_zps36d7537b.png
  • When the scan is complete, it will show you the results. (This one is clean):
    MBAM65_zpsb0aa143c.png
  • If threats are detected, click the Apply Actions button.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note below) If the log doesn't open, select View detailed log in the Scan tab:
    MBAM7_zps782405f0.png
  • The log is automatically saved by MBAM and can be viewed by going to the History tab and clicking on Application Logs:
    MBAM9_zps1f87702b.png
  • Choose the latest Scan Log, and click on the View button:
    MBAM10_zps5a48f689.png
  • In the bottom of the Scanning History Log window that opens, you can click on Export > Save to Text file (*.txt). Save the report to your Desktop.
    MBAM8_zpsad402941.png
  • Copy & Paste the entire contents of the report log in your next reply.


    Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.

    *** In your next reply, I need you to Copy&Paste the contents of the MBAM log file.


    Step 2
    ESET Online Scanner

    Please run a free online scan with the ESET Online Scanner
    >


     
  • Click Run Eset Online Scanner


    Runscan.png


    Note: You will need to use Internet Explorer or Firefox (You will be prompted to install a helper program if you use firefox)for this scan.
    Important: Please disable your existing AV software for the duration of the scan. If you need instructions on how to disable it, please check out this site: http://www.bleepingc...lware-programs/

     
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start
  • Make sure that the option Enable detection of potentially unwanted applications is checked
  • Next click on Advanced Settings and select:

    eset-selections.png
     
  • Make sure that the option Remove found threats is NOT checked
  • Scan archives
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth Technology


    eset-selections.png

     
  • Click Start, the virus database will update, this may take a while depending on your internet connection.
  • Once updated, the online scan will begin. (This scan can take several hours, so please be patient)
  • Once the scan is completed, click Finish
  • Use Notepad to open the logfile located at C:\Program Files\Eset\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic
     

  • 0

#30
psychson

psychson

    Member

  • Topic Starter
  • Member
  • PipPip
  • 28 posts

Hi again,

 

It was too good to be true and the annoyances are back.

The triple X animation is back and I could not install anti-malware bytes, not even on Safe Mode.

I had installed as you probably had noticed by the logs but uninstalled  because it wasn't really working and also I already had Trend Micro.

I could not install back and for some odd reason I can't explain why it happens, but  just like the FRST tool, it flickers on my desktop and I cannot click to select language and install. It lets me execute to run and I briefly see the language selection to install and it vanishes.

So, I wasted a lot of time and had no luck installing, so I decided without asking you to run the online scan and it found a truck load of infected files, it said 157. Bellow is the log file.

Thanks again.

 

---------------------

 

 

ESETSmartInstaller@High as downloader log:
all ok
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=e6a7a6701cc3b342aeb39895096e86a5
# engine=21221
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-11-23 07:55:10
# local_time=2014-11-23 05:55:10 (-0300, Horário brasileiro de verão)
# country="Brazil"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1='Trend Micro Maximum Security'
# compatibility_mode=527 16777213 100 100 0 9928232 0 0
# compatibility_mode_1=''
# compatibility_mode=5893 16776574 100 94 301470 168277701 0 0
# scanned=134979
# found=152
# cleaned=0
# scan_time=4518
sh=57B1052F813CB6A4FE0AA8831C34D8379EBFBD62 ft=1 fh=c71c00114f738051 vn="a variant of Win32/Toolbar.SearchSuite.P potentially unwanted application" ac=I fn="C:\Program Files\Free Easy CD DVD Burner\Helper.dll"
sh=AB31762F3BCC3D8537559AD59EB26AE815AE0E22 ft=1 fh=149d43decce434dd vn="a variant of Win32/KoyoteLab.A potentially unwanted application" ac=I fn="C:\Program Files\Free Easy CD DVD Burner\Uninstall.exe"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Chromatic Browser\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Administrador\AppData\Local\Torch\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Chromatic Browser\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Convidado\AppData\Local\Torch\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Chromatic Browser\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\agiggkefmaebpjeigehhiebgilehnime\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\cglfidpilkgkpklipocipbllaopfmmpn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\cpkbediofcfpgloogmgidbfcnichbcfd\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\dhgpkiiipkgmckicafkhcihkcldbdeej\105\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\eiejkahcjdpncajpgcnmfkmgcilllfik\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\fbekhjiomplfbaflmegemkijfbmnbofi\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\gfkdilpgmhkfibaedcihdgoopjlfenfj\1.0\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\hinajlahfajkbldiafppjbhfejdjhlog\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\kdigmfkkifhjjpicmdcdgifajbhhabfn\2.14\content.js.vir"
sh=69C486F502D98134B649232EB28A685D66664242 ft=0 fh=0000000000000000 vn="JS/Chromex.Agent.L trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Suzie\AppData\Local\Torch\User Data\Default\Extensions\nfgeoondiknkhikbpoadekoncegefigi\2.14\content.js.vir"
sh=F9C7DD1A7E9E8C39E1DF7FA54B2DE6F87DFFEC22 ft=1 fh=64e71d91bb08dba9 vn="a variant of Win32/InstallCore.RB potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\adobe_flash_setup.exe"
sh=E2D5385BA70CBC1BB60DF0A619591C962C48EDD7 ft=1 fh=55875f055bdbd423 vn="a variant of Win32/4Shared.S potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\BaixandoFacil.com_24.S09E02.rmvb.exe"
sh=60C77FF66F63F585FCE95C78FF44B513E2AAB9F9 ft=1 fh=17494879e4339ab3 vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Users\Suzie\Downloads\ccsetup400.exe"
sh=6525F85F423A8ACB9DE261FCE7C1BFDCAF0651EC ft=1 fh=e751b5239200023c vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Users\Suzie\Downloads\ccsetup404.exe"
sh=9AA5E59F80A95BDFC48FBB4DC9F4B7212749E67D ft=1 fh=2fe225811afcde6b vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Users\Suzie\Downloads\ccsetup416.exe"
sh=5D3FC67F8F4C66C8A0FC530823614EDAB9DACB05 ft=1 fh=c10246effffb5faa vn="Win32/bmMedia.CI potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\DownloadFileSetup_248z5.exe"
sh=C9EAA98B1AD6C0705F1287239B558E0DB1CCA5AD ft=1 fh=980dcfc15f54c001 vn="Win32/VOPackage.E potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\Setup (2).exe"
sh=73C98F1721958026BEB496BFCF15FB9A28B3B7A0 ft=1 fh=9a28cb911a364095 vn="Win32/DownWare.L potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\Unlocker1.9.2.exe"
sh=BF1946C79F15EE9E6F62E7A807607AB07C9D4870 ft=1 fh=9454655d1b5e4403 vn="a variant of Win32/ELEX.Q potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\yet_another_cleaner.exe"
sh=C4BDCFFA3F837CE4E719EE6D4A2245FC50E1787C ft=1 fh=e1a60769c3dc28cd vn="a variant of Win32/ELEX.Q potentially unwanted application" ac=I fn="C:\Users\Suzie\Downloads\yet_another_cleaner_mat.exe"

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP