1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved infected MSI CR650

Discussion in 'Malware and Virus Removal Archive' started by GRAHAM WESTON, 2014/02/13.

  1. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    [Resolved] infected MSI CR650

    I am looking at an MSI cr650 for a friend, it has numerous problems. I ran the Maleware byts scan this morning, and the dds scan tonight, txt's as follows. It also appears to have aproblem with the D partition of the hard drive, which i have posted in the hardware forum.

    Malwarebytes Anti-Malware (Trial) 1.75.0.1300
    www.malwarebytes.org

    Database version: v2014.02.12.06

    Windows 7 Service Pack 1 x64 NTFS
    Internet Explorer 11.0.9600.16428
    Laptop :: LAPTOP-MSI [administrator]

    Protection: Enabled

    13/02/2014 1:45:03 AM
    mbam-log-2014-02-13 (01-45-03).txt

    Scan type: Full scan (C:\|D:\|Q:\|)
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 352850
    Time elapsed: 1 hour(s), 4 minute(s), 30 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 2
    HKCR\Typelib\{DCABB943-792E-44C4-9029-ECBEE6265AF9} (PUP.Optional.OutBrowse) -> Quarantined and deleted successfully.
    HKCR\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534} (PUP.Optional.OutBrowse) -> Quarantined and deleted successfully.

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 1428
    C:\Users\Laptop\Favorites\Downloads\SocialNetworksSetup.exe (PUP.Optional.Inbox) -> No action taken.
    C:\Users\Laptop\AppData\Local\Temp\DM1392216086.exe (PUP.Optional.OutBrowse) -> Quarantined and deleted successfully.
    C:\$Recycle.Bin\S-1-5-21-3605120656-3930247630-567234770-1001\$R1NCA45.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\$Recycle.Bin\S-1-5-21-3605120656-3930247630-567234770-1001\$RBHIN71.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\$Recycle.Bin\S-1-5-21-3605120656-3930247630-567234770-1001\$RBPEX0J.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\$Recycle.Bin\S-1-5-21-3605120656-3930247630-567234770-1001\$ROXV2O0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\$Recycle.Bin\S-1-5-21-3605120656-3930247630-567234770-1001\$RWYA7NM.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\AdwCleaner\Quarantine\C\ProgramData\eSafe\eGdpSvc.exe.vir (PUP.Optional.Wsys.A) -> Quarantined and deleted successfully.
    C:\AdwCleaner\Quarantine\C\Users\Laptop\AppData\Local\Temp\eIntaller\70489913E28E459387D79A4D7D390CAE\70489913E28E459387D79A4D7D390CAE.exe.vir (Malware.Gen) -> Quarantined and deleted successfully.
    C:\AdwCleaner\Quarantine\C\Users\Laptop\AppData\Local\Temp\eIntaller\70489913E28E459387D79A4D7D390CAE\eGdpSvc.exe.vir (PUP.Optional.Wsys.A) -> Quarantined and deleted successfully.
    C:\AdwCleaner\Quarantine\C\Users\Laptop\AppData\Local\Temp\eIntaller\70489913E28E459387D79A4D7D390CAE\eXQ.exe.vir (PUP.Optional.Wilsys.A) -> Quarantined and deleted successfully.
    C:\CabLogs\CabLogs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\PerfLogs\Data Laptop.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\PerfLogs\PerfLogs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Optus Wireless Broadband.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\config\config.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Driver\Driver.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Driver\WinVista\WinVista.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Driver\WinVista64\WinVista64.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Driver\WinXp\WinXp.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Log\Log.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\AboutPlugin\AboutPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\AddrBookPlugin\AddrBookPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\AddrBookUIPlugin\AddrBookUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\ADSLPlugin\ADSLPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\CallLogUIPlugin\CallLogUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\CallUIPlugin\CallUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\CBSSettingPlugin\CBSSettingPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\DeviceMgrUIPlugin\DeviceMgrUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\DiagnosisPlugin\DiagnosisPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\DialUpPlugin\DialUpPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\DialupUIPlugin\DialupUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\DVBPlayer\DVBPlayer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\GpsPlugin\GpsPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\LocaleMgrPlugin\LocaleMgrPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\NDISPlugin\NDISPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\NetConnectPlugin\NetConnectPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\NetInfoRecordUIPlugin\NetInfoRecordUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\NetInfoUIExPlugin\NetInfoUIExPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\NetSettingPlugin\NetSettingPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\QuickLinkUIPlugin\QuickLinkUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\SettingUIPlugin\SettingUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\SMSUIPlugin\SMSUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\StatusBarMgrPlugin\StatusBarMgrPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\STKPlugin\STKPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\UpdateUI\UpdateUI.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\Upgrade\Upgrade.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\USSDUIPlugin\USSDUIPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\VPNPlugin\VPNPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\WLANPlugin\WLANPlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\plugins\XFramePlugin\XFramePlugin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\Skin\Skin.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\userdata\userdata.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\userdata\AddrBook\AddrBook.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\userdata\AddrGroupRelation\AddrGroupRelation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\userdata\Group\Group.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\userdata\SMS\SMS.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Program Files (x86)\Optus Wireless Broadband\usermanual\usermanual.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\AMD\Fuel\Profiles\Profiles.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon Inkjet iP100 series\Canon Inkjet iP100 series.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon Inkjet iP100 series\Canon Inkjet iP100 series\0002\0002.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon Inkjet iP100 series\Picture\Picture.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\Canon MG3100 series Printer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\Canon MG3100 series Printer\0002\0002.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\Drvlog\Drvlog.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\Drvlog\Canon MG3100 series Printer\Canon MG3100 series Printer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0401\0401.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0404\0404.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0405\0405.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0406\0406.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0407\0407.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0408\0408.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0409\0409.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\040b\040b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\040c\040c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\040e\040e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0410\0410.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0411\0411.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0412\0412.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0413\0413.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0414\0414.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0415\0415.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0419\0419.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\041D\041D.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\041E\041E.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\041F\041F.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0421\0421.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0804\0804.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0816\0816.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\LanguageModules\0c0a\0c0a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\Picture\Picture.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\UserProfile\Guest\Guest.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\UserProfile\Laptop\Laptop.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\CanonBJ\IJPrinter\CNMwindows\Canon MG3100 series Printer\UserProfile\SYSTEM\SYSTEM.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\FLEXnet\Connect\11\11.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\FLEXnet\Connect\11\ui\ui.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\FLEXnet\Connect\11\ui\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\FLEXnet\Connect\11\ui\lang\lang.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\FLEXnet\Connect\Database\Database.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\MachineKeys.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\eHome\logs\logs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\eHome\mcepg2-0\mcepg2-0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\eHome\RecoveryTasks\RecoveryTasks.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\RAC\PublishedData\PublishedData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\DRM\DRM.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_031276c5\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_031276c5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_0aee52c1\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_0aee52c1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_10c3db12\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_10c3db12`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_128059c4\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_128059c4`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_170be87e\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_170be87e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_1b50a0b9\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_1b50a0b9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_2516601d\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_2516601d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_288509ed\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_288509ed`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_cab_0aeda1af\AppCrash_atieclxx.exe_57932349774e63658e5543e8e2e1cfefc88f1151_cab_0aeda1af`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_svchost.exe_SENS_bb7adb273d2838ff93e6dba9bcc88d3e7044_0fa62490\AppCrash_svchost.exe_SENS_bb7adb273d2838ff93e6dba9bcc88d3e7044_0fa62490`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_05696c9d\Kernel_0_0_cab_05696c9d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dec5521\Kernel_0_0_cab_0dec5521.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0e4240cd\Kernel_0_0_cab_0e4240cd.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_2013_02_20.exe_5ce397af98c9447189d67fab60d767a812982e27_0fac0246\NonCritical_2013_02_20.exe_5ce397af98c9447189d67fab60d767a812982e27_0fac0246`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_fijian remixes.e_dabd575b56737310929fbe452ebc266612a02393_0027db68\NonCritical_fijian remixes.e_dabd575b56737310929fbe452ebc266612a02393_0027db68`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0a5dabca\Kernel_0_0_cab_0a5dabca.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Norton\00000082\00000114\000004e8\000004e8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\NortonInstaller\Logs\2013-10-04-05h40m30s\2013-10-04-05h40m30s.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Nuance\PDF Reader\6\6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Nuance\PDF Reader\Ereg\Ereg.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\ScanSoft\PDF Reader 6.0\Backup\Backup.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\login.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\css\platform\platform.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\css\retina\retina.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\fonts\fonts.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\images\black-on-white\black-on-white.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\images\normal\normal.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\images\retina\retina.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\images\white-on-black\white-on-black.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\Skype\Apps\login\languages\languages.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\{FCE1A4E5-8BE1-4D81-AAEA-DB3348828B1C}\OFFLINE\mDown.dll\mDown.dll`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\{FCE1A4E5-8BE1-4D81-AAEA-DB3348828B1C}\OFFLINE\mIDEFunc.dll\mIDEFunc.dll`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\ProgramData\{FCE1A4E5-8BE1-4D81-AAEA-DB3348828B1C}\OFFLINE\mMSI.dll\mMSI.dll`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\Bing Bar Settings_ac63306dfaef4dd89310251954aea031.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\7.1.384`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\debugconsole\debugconsole.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.1.384\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\Chat_cf57b0088a3b4f61a0bfaad0ba784240.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\7.1.361`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\7.1.361\providers\providers.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Chat_cf57b0088a3b4f61a0bfaad0ba784240\VersionIndependent\upsellState\upsellState.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\Error Application_6685fcaddd1644138dfc117bdf47c3e6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.1.391\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.1.391\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\FacebookLike_08e57417866d4faa981702780b0d36c4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\Facebook_76c7b5062c4e4be69d843ace834517ec.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\7.1.403`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.1.403\service\service.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\fbsharedservices_bb9c6e8b961d477e9ec95f9698bde610\fbsharedservices_bb9c6e8b961d477e9ec95f9698bde610.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\fbsharedservices_bb9c6e8b961d477e9ec95f9698bde610\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\fbsharedservices_bb9c6e8b961d477e9ec95f9698bde610\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\fbsharedservices_bb9c6e8b961d477e9ec95f9698bde610\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Featured_ce53daa069a4a3ad2e3d7d81081f340d\Featured_ce53daa069a4a3ad2e3d7d81081f340d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Featured_ce53daa069a4a3ad2e3d7d81081f340d\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Featured_ce53daa069a4a3ad2e3d7d81081f340d\7.1.391\cache\cache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Featured_ce53daa069a4a3ad2e3d7d81081f340d\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Featured_ce53daa069a4a3ad2e3d7d81081f340d\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Featured_ce53daa069a4a3ad2e3d7d81081f340d\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\GeoService Application_9fe4b7bf745a416c9858724091e7b720.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\Jewel_ba5643622e3a457cb0746595f638d9f6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\icons\icons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\Mail_15642ee020d2449d86382022aa6f2548.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\7.1.398`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\debugconsole\debugconsole.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.1.398\providers\providers.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\Maps_e4b69397ea59436c9d8611b45fdb79f9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Messenger_43f4adec83fe47edb0519d615ac57b2a\Messenger_43f4adec83fe47edb0519d615ac57b2a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Messenger_43f4adec83fe47edb0519d615ac57b2a\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Messenger_43f4adec83fe47edb0519d615ac57b2a\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Messenger_43f4adec83fe47edb0519d615ac57b2a\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Messenger_43f4adec83fe47edb0519d615ac57b2a\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\News_8c172f78520647fbab760cbf38f51e67.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\7.1.400`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.1.400\loc\en-au\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Prefetch_23b6673e9bcb43958801f7dfe7c5a2e3\Prefetch_23b6673e9bcb43958801f7dfe7c5a2e3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Prefetch_23b6673e9bcb43958801f7dfe7c5a2e3\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Prefetch_23b6673e9bcb43958801f7dfe7c5a2e3\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\Search_6f21d9007fa34bc78d94309126de58f5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.1.382\7.1.382`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.1.382\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.1.382\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.1.382\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.1.382\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
     
  2. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    6f21d9007fa34bc78d94309126de58f5\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\iotdState\iotdState.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\newsState\newsState.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\textGhostingStates\textGhostingStates.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.1.391\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.1.391\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\Translator_f5cbd3ef4c144434b17913278004e270.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\videos_6064022068cb4bd18a6a06908597e0d8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\7.1.406`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\debugconsole\debugconsole.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\images\icons\icons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.1.406\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\Weather_63630244a02f4e4cb6cb9b09b2f886f3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\7.1.391`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\images\icons\icons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.1.391\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\System\System.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\System\Flights\Flights.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\BingBar\System\Flights\prod-en-au_prod_0\prod-en-au_prod_0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\WebSlices~.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds Cache\1SRBRAVY\1SRBRAVY.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds Cache\1WHQ8ZYN\1WHQ8ZYN.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds Cache\5E6J3CAY\5E6J3CAY.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds Cache\5P8W9Z82\5P8W9Z82.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds Cache\NVHONX1G\NVHONX1G.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Feeds Cache\YWLQLHXQ\YWLQLHXQ.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Internet Explorer\IECompatData\IECompatData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\Active.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\Last Active.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Media Player\Sync Playlists\en-AU\02F595A9\02F595A9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\Burn\Burn\Burn.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{E2856B15-A196-4C82-BDA1-C75D273DF989}\{E2856B15-A196-4C82-BDA1-C75D273DF989}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\History\History.IE5\History.IE5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\History\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\History\Low\History.IE5\History.IE5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012012121720121224\MSHist012012121720121224.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012012122720121228\MSHist012012122720121228.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Guest\AppData\Local\Local.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_09c3bedb\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_09c3bedb`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_0adb141c\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_0adb141c`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_0e26b8ff\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_0e26b8ff`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_17377d2b\AppCrash_s-bar.exe_c44d9820a254f4e2fe30d380a1e4d44ae4d2b49_17377d2b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows Mail\Backup\new\new.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows Mail\Stationery\Stationery.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\Microsoft\Windows Media\12.0\12.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\MSI\S-Bar.exe_Url_hnr3bnn3vamhc4vi24dchjomtmr2wqlj\20.11.7112.0\20.11.7112.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\VirtualStore\Program Files (x86)\etax2012\help\cgt\cgt.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\VirtualStore\Program Files (x86)\etax2012\help\etax\etax.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\VirtualStore\Program Files (x86)\Nuance\PDF Reader\bin\Navigators\ENU\ENU.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\VirtualStore\ProgramData\ScanSoft\PDF Reader 6.0\PDF Reader 6.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Local\VirtualStore\ProgramData\ScanSoft\PDF Reader 6.0\Backup\Backup.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\DataMngr\DataMngr.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\mediabarbs\mediabarbs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\Content.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\MetaData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\DOMStore.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\MU64UFQL\MU64UFQL.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\S06RMUP2\S06RMUP2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\LocalLow\Microsoft\Internet Explorer\Services\Services.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\FD3NELHV\skype.com\#ui\#ui.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\sys.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Document Building Blocks\1033\14\14.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\TaskBar.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\_hiddenPbk.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Protect\S-1-5-21-3605120656-3930247630-567234770-501\S-1-5-21-3605120656-3930247630-567234770-501.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Cookies\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\IECompatCache\IECompatCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\IETldCache\IETldCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\IETldCache\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Libraries\Libraries.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\PrivacIE\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Recent\Recent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\AutomaticDestinations.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CustomDestinations.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\SendTo\SendTo.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Start Menu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Programs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessories.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Accessibility.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\System Tools.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Administrative Tools.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Maintenance.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Templates\Templates.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Themes\Themes.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\Favorites\Links\Links.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\Saved Games\Microsoft Games\Microsoft Games.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Guest\Saved Games\Microsoft Games\Purble Place\Purble Place.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\ATI\ACE\Profiles\Profiles.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\BearShare\Data\BackUp\BackUp.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Canon Easy-PhotoPrint EX\Settings\CommonData\CommonData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Canon Easy-PhotoPrint EX\Settings\LayoutData\LayoutData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2012100309.000\2012100309.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2012102007.000\2012102007.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2013011408.000\2013011408.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2013070303.000\2013070303.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2013070304.000\2013070304.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2013092908.000\2013092908.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\460911090\2013092908.001\2013092908.001`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Diagnostics\733862231\2013100311.000\2013100311.000`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Update\1.2.205.0\1.2.205.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\Common.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac4timvd-6nrrgz0ajsk37mpb-dvwewy95tlhkvk5k2tl3btzosgh6-ot-av7zxmm78\fb#3aac4timvd-6nrrgz0ajsk37mpb-dvwewy95tlhkvk5k2tl3btzosgh6-ot-av7zxmm78.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac5buq4oy_x_usuefzprv2t4c6wyl2lx8blgnv2lp20ppwi_q3qxejujyltxbo2eka8\fb#3aac5buq4oy_x_usuefzprv2t4c6wyl2lx8blgnv2lp20ppwi_q3qxejujyltxbo2eka8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac5helkasx8t9bcdqm5cluqfq0kk16a7ctdv0lfdust0z_ab-9lunpsw2ia9clznxnu\fb#3aac5helkasx8t9bcdqm5cluqfq0kk16a7ctdv0lfdust0z_ab-9lunpsw2ia9clznxnu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac5swehcm1rgwqhpw9pouex6lzihoks00nvrcdpucekgqj-t-ayjhumvv60_w-vgxxa\fb#3aac5swehcm1rgwqhpw9pouex6lzihoks00nvrcdpucekgqj-t-ayjhumvv60_w-vgxxa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac6kptzr2oe_gheaofqflnxdhqtwrsf6_z36sslz4g2wu3kx50rewsk5hspdcii6tie\fb#3aac6kptzr2oe_gheaofqflnxdhqtwrsf6_z36sslz4g2wu3kx50rewsk5hspdcii6tie.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac6nvptgid2jg6akdx6q8bxssm1rqzxghbiitphu1xnodqeljewsmy6fojgcwlco_qq\fb#3aac6nvptgid2jg6akdx6q8bxssm1rqzxghbiitphu1xnodqeljewsmy6fojgcwlco_qq.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Common\fb#3aac7awqyphcopda-h64aqyhbuldrb4yz8w_yscxhbiozq4niz1x_0ay_5_0pk597njlk\fb#3aac7awqyphcopda-h64aqyhbuldrb4yz8w_yscxhbiozq4niz1x_0ay_5_0pk597njlk.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Facebook\Video\Skype\Skype.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Assistance\Client\1.0\en-US\en-US.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\Bing Bar Settings_ac63306dfaef4dd89310251954aea031.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\Error Application_6685fcaddd1644138dfc117bdf47c3e6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.610\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\FacebookLike_08e57417866d4faa981702780b0d36c4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\7.0.857`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.857\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\Facebook_76c7b5062c4e4be69d843ace834517ec.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\7.0.861`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.861\service\service.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\GeoService Application_9fe4b7bf745a416c9858724091e7b720.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\Jewel_ba5643622e3a457cb0746595f638d9f6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\icons\icons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Jewel_ba5643622e3a457cb0746595f638d9f6\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\Mail_15642ee020d2449d86382022aa6f2548.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\jscrollpane\jscrollpane.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.610\providers\providers.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\Maps_e4b69397ea59436c9d8611b45fdb79f9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\images\notifications\notifications.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\News_8c172f78520647fbab760cbf38f51e67.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\News_8c172f78520647fbab760cbf38f51e67\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\Search_6f21d9007fa34bc78d94309126de58f5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.610\mocks\mocks.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\Translator_f5cbd3ef4c144434b17913278004e270.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.615\7.0.615`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.615\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.615\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.615\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\videos_6064022068cb4bd18a6a06908597e0d8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\Weather_63630244a02f4e4cb6cb9b09b2f886f3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\7.0.610`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\css\css.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\footer\footer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\images\buttons\buttons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\images\icons\icons.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\js\js.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.610\loc\en-au\en-au.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\VersionIndependent\VersionIndependent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\System\System.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\System\Flights\Flights.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\BingBar\System\Flights\prod-en-au_prod_0\prod-en-au_prod_0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\0bccd876-b9ad-4da1-a269-a47c10a1a5a0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\DeviceInformation\DeviceInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\DeviceStage\Device\Device.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\DeviceStage\Device\en-US\en-US.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\DeviceStage\Task\{FF45A7AF-0B02-4a20-90F7-200F01AD5BE5}\{FF45A7AF-0B02-4a20-90F7-200F01AD5BE5}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\DeviceStage\Task\{FF45A7AF-0B02-4a20-90F7-200F01AD5BE5}\en-US\en-US.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\SoftwareInformation\SoftwareInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\0bccd876-b9ad-4da1-a269-a47c10a1a5a0\WindowsInformation\WindowsInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\280486b2-ca16-4dce-a65c-d5725e06aa7c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\DeviceInformation\DeviceInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\DeviceStage\Device\Device.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\DeviceStage\Device\en-us\en-us.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\DeviceStage\Task\{105A31F8-4C84-47d8-998A-EBBC2FCCC746}\{105A31F8-4C84-47d8-998A-EBBC2FCCC746}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\DeviceStage\Task\{105A31F8-4C84-47d8-998A-EBBC2FCCC746}\en-us\en-us.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\280486b2-ca16-4dce-a65c-d5725e06aa7c\WindowsInformation\WindowsInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\6187b155-c788-407e-9ece-4e8e35ee9a56.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\DeviceInformation\DeviceInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\DeviceStage\Device\Device.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\DeviceStage\Device\en-US\en-US.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\DeviceStage\Task\{FF45A7AF-0B02-4a20-90F7-200F01AD5BE5}\{FF45A7AF-0B02-4a20-90F7-200F01AD5BE5}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\DeviceStage\Task\{FF45A7AF-0B02-4a20-90F7-200F01AD5BE5}\en-US\en-US.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\6187b155-c788-407e-9ece-4e8e35ee9a56\WindowsInformation\WindowsInformation.exe (Malware.Gen) -> Quarantined and deleted successfully.
     

  3. to hide this advert.

  4. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    C:\Users\Laptop\AppData\Local\Microsoft\Device Stage\Device\PropStore\PropStore.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\WebSlices~.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds Cache\20A3D6TB\20A3D6TB.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds Cache\5CWSE2U2\5CWSE2U2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds Cache\9G3XFYDH\9G3XFYDH.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds Cache\O7TCMK95\O7TCMK95.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds Cache\T1RR5QE6\T1RR5QE6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Feeds Cache\YTO3FI35\YTO3FI35.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\DomainSuggestions.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\DOMStore\DOMStore.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\DOMStore\5PWAF67N\5PWAF67N.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\DOMStore\8J377R98\8J377R98.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\DOMStore\B3WPZC2N\B3WPZC2N.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\IECompatData\IECompatData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\Active.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\Last Active.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\Microsoft.Website.5337F48D.D7DCE6C9\Microsoft.Website.5337F48D.D7DCE6C9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Internet Explorer\Tiles\pin9728060290\pin9728060290.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\LocalMLS.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Media Player\Cache117912560\Cache117912560.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Media Player\MediaGuide\MediaGuide.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Media Player\Sync Playlists\en-AU\001097BC\001097BC.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Office\ONetConfig\ONetConfig.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Office\UnsavedFiles\UnsavedFiles.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\AppCache\105A3ZX7\105A3ZX7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Burn\Burn\10 Dec 2010 - Emalus Graduation .scr (Worm.Autorun) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Burn\Burn\Burn.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Burn\Burn1\Burn1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Explorer\ThumbCacheToDelete\ThumbCacheToDelete.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{084434BC-021F-4086-815C-B4D716386B93}\{084434BC-021F-4086-815C-B4D716386B93}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF}\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{E2856B15-A196-4C82-BDA1-C75D273DF989}\{E2856B15-A196-4C82-BDA1-C75D273DF989}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{F284254F-0243-46A7-A328-DD99F72267E8}\{F284254F-0243-46A7-A328-DD99F72267E8}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\{488D7D33-8709-4124-B064-60A1FE3E987A}\PlayTasks\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\{488D7D33-8709-4124-B064-60A1FE3E987A}\SupportTasks\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\{4AFE805B-9A30-41A7-BEAB-0D1D4B8C6787}\PlayTasks\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\{4AFE805B-9A30-41A7-BEAB-0D1D4B8C6787}\SupportTasks\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\{F1C7C293-484A-42F1-BC0C-ED003703B400}\PlayTasks\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\GameExplorer\{F1C7C293-484A-42F1-BC0C-ED003703B400}\SupportTasks\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\History\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2U7H82RY\2U7H82RY.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\HG1FL9GW\HG1FL9GW.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\HJG9U3XI\HJG9U3XI.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MTINREAV\MTINREAV.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\NWWZLBJX\NWWZLBJX.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RDTL1G1W\RDTL1G1W.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Y08RNA6H\Y08RNA6H.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Z4JX60XC\Z4JX60XC.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\programdata\microsoft\application virtualization client\softgrid client\icon cache\icon cache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\AppData\Local\Local.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\AppData\Local\Microsoft\Windows\Explorer\Explorer.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\AppData\Local\Temp\Temp.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\NCMQ96KB\s.ytimg.com\s.ytimg.com`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\AppData\Roaming\Microsoft\Installer\{B0F1B02F-47A6-411D-A38B-E44CC7F53CCC}\{B0F1B02F-47A6-411D-A38B-E44CC7F53CCC}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\AppData\Roaming\Microsoft\Windows\Libraries\Libraries.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Laptop\Desktop\Desktop.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ERC\ERC.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ERC\ResponseCache\ResponseCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ERC\TemplateCache\TemplateCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_CNSEMAIN.EXE_b6688559dcf28bde29ea75a85e6142393f5222b_4ec7acd5\AppCrash_CNSEMAIN.EXE_b6688559dcf28bde29ea75a85e6142393f5222b_4ec7acd5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_CNSEUPDT.EXE_86f621b89da647ea5ed141874c63a3cc4f8c5084_00a289c5\AppCrash_CNSEUPDT.EXE_86f621b89da647ea5ed141874c63a3cc4f8c5084_00a289c5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_CNSEUPDT.EXE_86f621b89da647ea5ed141874c63a3cc4f8c5084_10676ad3\AppCrash_CNSEUPDT.EXE_86f621b89da647ea5ed141874c63a3cc4f8c5084_10676ad3`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_29c9294a23a487f6041e61929aa92c9fa15fe_0514eef5\AppCrash_iexplore.exe_29c9294a23a487f6041e61929aa92c9fa15fe_0514eef5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_3e9c4f81dc0d6e96ec974f828bc747a3ad542db_070b2c11\AppCrash_iexplore.exe_3e9c4f81dc0d6e96ec974f828bc747a3ad542db_070b2c11`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_4af484ae7f69e8ea628056b17d7acdcae7110e0_3e78a754\AppCrash_iexplore.exe_4af484ae7f69e8ea628056b17d7acdcae7110e0_3e78a754`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_581731c081725f7ec15d4d1d378c6a68e95655c0_12bca818\AppCrash_iexplore.exe_581731c081725f7ec15d4d1d378c6a68e95655c0_12bca818`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_5d122261cd4798af21758a1ff68cadfbdcf3815f_08481d25\AppCrash_iexplore.exe_5d122261cd4798af21758a1ff68cadfbdcf3815f_08481d25`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_8ab3301bb991ce571efd28fc7a72f1c4c156c4_00edf9c6\AppCrash_iexplore.exe_8ab3301bb991ce571efd28fc7a72f1c4c156c4_00edf9c6`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_99e3e7e266887bb6972552767fc4026f62fa3_306e42ae\AppCrash_iexplore.exe_99e3e7e266887bb6972552767fc4026f62fa3_306e42ae`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_9a10b63a3eaabd657fd2d9b67a37b2a4b83d63e_3753ff1a\AppCrash_iexplore.exe_9a10b63a3eaabd657fd2d9b67a37b2a4b83d63e_3753ff1a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a7a46dc2c95b54705c66b5669cb88aa3d76586_14486831\AppCrash_iexplore.exe_a7a46dc2c95b54705c66b5669cb88aa3d76586_14486831`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_b66fb811bad38cdf746ed83b481d9b1d4bd1a85_27de673f\AppCrash_iexplore.exe_b66fb811bad38cdf746ed83b481d9b1d4bd1a85_27de673f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bbc015dc6a211c3698cfced4cc84ca122536841_11a4372c\AppCrash_iexplore.exe_bbc015dc6a211c3698cfced4cc84ca122536841_11a4372c`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_cdf565ca51576d72110452b92bde51b8d82fb4c_10eeb804\AppCrash_iexplore.exe_cdf565ca51576d72110452b92bde51b8d82fb4c_10eeb804`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_ce1615f7a6a1dd2ca42c43d88a52a2d9c1f099_136aa493\AppCrash_iexplore.exe_ce1615f7a6a1dd2ca42c43d88a52a2d9c1f099_136aa493`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_eb7170911c28e1179c9c35a5cf7f573eb1acd929_05cc98b0\AppCrash_iexplore.exe_eb7170911c28e1179c9c35a5cf7f573eb1acd929_05cc98b0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_eec76cebf71d529f52c21b283d14b91c691d_0f099d67\AppCrash_iexplore.exe_eec76cebf71d529f52c21b283d14b91c691d_0f099d67`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_fc21dfdc6304d1a9a6fe0a346172c86eb1f935_002d10cb\AppCrash_iexplore.exe_fc21dfdc6304d1a9a6fe0a346172c86eb1f935_002d10cb`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_PDFReader.exe_78a9feb5a53d56fe584d59a482645daf12c9b4_1088aa3d\AppCrash_PDFReader.exe_78a9feb5a53d56fe584d59a482645daf12c9b4_1088aa3d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_PDFReader.exe_a0e8ed8741369e93eb3cd08b6641120c8ab622e_6c72cc9e\AppCrash_PDFReader.exe_a0e8ed8741369e93eb3cd08b6641120c8ab622e_6c72cc9e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_1e835e1b2860dcf21e91c51c607c72367ca7c4d1_0379be8b\AppCrash_Skype.exe_1e835e1b2860dcf21e91c51c607c72367ca7c4d1_0379be8b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_2137d4144d26cce1bbcca6bf4bacfcfe3bcbe0ac_0fa85814\AppCrash_Skype.exe_2137d4144d26cce1bbcca6bf4bacfcfe3bcbe0ac_0fa85814`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_34ccda8ec07416d5c629ccefeb6987163938bec4_13c3d00b\AppCrash_Skype.exe_34ccda8ec07416d5c629ccefeb6987163938bec4_13c3d00b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_49f23d6b6be867d5b0a8d6bf71652e804b96a21d_e06c750d\AppCrash_Skype.exe_49f23d6b6be867d5b0a8d6bf71652e804b96a21d_e06c750d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_6752341987e0104a573d26907e9ecc7e94d58f71_00fae2f5\AppCrash_Skype.exe_6752341987e0104a573d26907e9ecc7e94d58f71_00fae2f5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_a562546f4d7e459cfdd3a217ff543b8aaa1dcb2_19c66cde\AppCrash_Skype.exe_a562546f4d7e459cfdd3a217ff543b8aaa1dcb2_19c66cde`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Skype.exe_df8c4852e5a6aa27ec3ed58f903e4750449b96ac_0c463941\AppCrash_Skype.exe_df8c4852e5a6aa27ec3ed58f903e4750449b96ac_0c463941`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_winlogon.exe_9f9acaa435e25e6a89186a31aaced4159caf33_0842bc0d\AppCrash_winlogon.exe_9f9acaa435e25e6a89186a31aaced4159caf33_0842bc0d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_winlogon.exe_9f9acaa435e25e6a89186a31aaced4159caf33_0866beac\AppCrash_winlogon.exe_9f9acaa435e25e6a89186a31aaced4159caf33_0866beac`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_winlogon.exe_9f9acaa435e25e6a89186a31aaced4159caf33_108effc1\AppCrash_winlogon.exe_9f9acaa435e25e6a89186a31aaced4159caf33_108effc1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_winlogon.exe_be5be528662fe2a2edd36c9e7ade19c7f62dce7_11b3fe4d\AppCrash_winlogon.exe_be5be528662fe2a2edd36c9e7ade19c7f62dce7_11b3fe4d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_wmplayer.exe_7b6892229c3f2dafb1b2a71ccda33bc32457f24_0a263929\AppCrash_wmplayer.exe_7b6892229c3f2dafb1b2a71ccda33bc32457f24_0a263929`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_ARA.exe_ec8d77dccaa481443adbd94422d4cfcbd45e97_03256029\AppHang_ARA.exe_ec8d77dccaa481443adbd94422d4cfcbd45e97_03256029`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_BearShare.exe_4588b32169eeda88b3c4b091e499b779f52af4e_0ed56082\AppHang_BearShare.exe_4588b32169eeda88b3c4b091e499b779f52af4e_0ed56082`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_iexplore.exe_2471919071cd87612675b69d1d3b99ced3e9125_65a07a3c\AppHang_iexplore.exe_2471919071cd87612675b69d1d3b99ced3e9125_65a07a3c`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_iexplore.exe_3eecd649445f6639ff9ea2e2bc8a5f7b1cb3764_17e7e967\AppHang_iexplore.exe_3eecd649445f6639ff9ea2e2bc8a5f7b1cb3764_17e7e967`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_iexplore.exe_473374ae673d627c8c12adff3f54440a7ef4de_0e02e69c\AppHang_iexplore.exe_473374ae673d627c8c12adff3f54440a7ef4de_0e02e69c`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_iexplore.exe_7bd614734701095a5d6f3b3f3be045c542b43_21e346ef\AppHang_iexplore.exe_7bd614734701095a5d6f3b3f3be045c542b43_21e346ef`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_iexplore.exe_a57fbcf8cd31752f6f0ca5999961ee6153eee3e_161cdb52\AppHang_iexplore.exe_a57fbcf8cd31752f6f0ca5999961ee6153eee3e_161cdb52`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_Skype.exe_6bb8ec9bb41dcb831553af30bbd12a3695bddd_06ee6882\AppHang_Skype.exe_6bb8ec9bb41dcb831553af30bbd12a3695bddd_06ee6882`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_wmplayer.exe_9657805765ec098388cb5774adeb62e8823d7d_08218036\AppHang_wmplayer.exe_9657805765ec098388cb5774adeb62e8823d7d_08218036`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppHang_{F3364BA0-65B9-1_03f722b1c3a9f7342b324b90c4342939636d4_36a04ec8\AppHang_{F3364BA0-65B9-1_03f722b1c3a9f7342b324b90c4342939636d4_36a04ec8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1045491cb6ed8d7fdb4df9a1f342a36d4a06288_174abc44\Critical_iexplore.exe_1045491cb6ed8d7fdb4df9a1f342a36d4a06288_174abc44`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1045491cb6ed8d7fdb4df9a1f342a36d4a06288_1e0e6367\Critical_iexplore.exe_1045491cb6ed8d7fdb4df9a1f342a36d4a06288_1e0e6367`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_10f110f854b325407e9d9063ed1fff2762777727_0829dce5\Critical_iexplore.exe_10f110f854b325407e9d9063ed1fff2762777727_0829dce5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1472d7be68c64c138ebee3b1332c91e14a04e41_24d15769\Critical_iexplore.exe_1472d7be68c64c138ebee3b1332c91e14a04e41_24d15769`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_174bb77c21d5bffc534e7f1d42ef56c337bfe03_14aa54f9\Critical_iexplore.exe_174bb77c21d5bffc534e7f1d42ef56c337bfe03_14aa54f9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_179375a71fa6294fa0fc13c372b26c5b81e5c35d_102b00f4\Critical_iexplore.exe_179375a71fa6294fa0fc13c372b26c5b81e5c35d_102b00f4`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_19981990abbbc9cc6a379277df53ec38e6fee85a_0314b742\Critical_iexplore.exe_19981990abbbc9cc6a379277df53ec38e6fee85a_0314b742`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1aca505c85f1b9eacb4758a521b63aadcbc25ed_16a09726\Critical_iexplore.exe_1aca505c85f1b9eacb4758a521b63aadcbc25ed_16a09726`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1c35a92cbc146fab860784cf345ff5651c056_2f99e7ff\Critical_iexplore.exe_1c35a92cbc146fab860784cf345ff5651c056_2f99e7ff`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1f3067e1fc77a8b181a3676d9b26d5b9ccd51f_163d6508\Critical_iexplore.exe_1f3067e1fc77a8b181a3676d9b26d5b9ccd51f_163d6508`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_2181c4d43f2353d07d6a356b86ffd6591efdd36_28b0b416\Critical_iexplore.exe_2181c4d43f2353d07d6a356b86ffd6591efdd36_28b0b416`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_241d8593406f91bc6ac262935e6a936226fce60_359f798a\Critical_iexplore.exe_241d8593406f91bc6ac262935e6a936226fce60_359f798a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_24afb9924f039aed6a3fb8062f35027a217af6f_256cb795\Critical_iexplore.exe_24afb9924f039aed6a3fb8062f35027a217af6f_256cb795`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_25905dfcea774dd23a2315114e8457a89133115_15585107\Critical_iexplore.exe_25905dfcea774dd23a2315114e8457a89133115_15585107`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_268fce2c745d253c5df09eb9095d454eaf56eb_264e5ccc\Critical_iexplore.exe_268fce2c745d253c5df09eb9095d454eaf56eb_264e5ccc`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_26d9127b33288357f983112f359128114438e3_0e388fc0\Critical_iexplore.exe_26d9127b33288357f983112f359128114438e3_0e388fc0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_26fef7450d9ce2a6e70ac94c3386289a9317c_024ac3b3\Critical_iexplore.exe_26fef7450d9ce2a6e70ac94c3386289a9317c_024ac3b3`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_2bc13e4c5e53b4d2b5f35f4809cb1d92b131c_20f2573a\Critical_iexplore.exe_2bc13e4c5e53b4d2b5f35f4809cb1d92b131c_20f2573a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_2bf5abdd91b8a350229b5c6b21ac913f16684_1526255b\Critical_iexplore.exe_2bf5abdd91b8a350229b5c6b21ac913f16684_1526255b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_2dfa5c272fdb516d9b589ec3a64ba378dcd6e2_3769ab34\Critical_iexplore.exe_2dfa5c272fdb516d9b589ec3a64ba378dcd6e2_3769ab34`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_2f559bcba5dfb79860aa963a9bd2dc9cc2f2f1cc_02fc7596\Critical_iexplore.exe_2f559bcba5dfb79860aa963a9bd2dc9cc2f2f1cc_02fc7596`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_30c223d772aefc40a526ea6cfc3934b2051a4ca_001961ed\Critical_iexplore.exe_30c223d772aefc40a526ea6cfc3934b2051a4ca_001961ed`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_3187ed21f6b5cb3bfebd7fb1e2c5b68716f944e_04b96da0\Critical_iexplore.exe_3187ed21f6b5cb3bfebd7fb1e2c5b68716f944e_04b96da0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_0529d6cf\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_0529d6cf`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_0bcf3b08\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_0bcf3b08`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_1bfd2735\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_1bfd2735`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_3066121d\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_3066121d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_3755e89e\Critical_iexplore.exe_34e233e3e4940b2d8ca176980711090374f69c4_3755e89e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_36c7406d90a35dd0866c144bcd1c16b7ca5cdce_04b91f55\Critical_iexplore.exe_36c7406d90a35dd0866c144bcd1c16b7ca5cdce_04b91f55`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_37423ad04d1bc5a1329e7dce5c43a58c1b168d_1101158f\Critical_iexplore.exe_37423ad04d1bc5a1329e7dce5c43a58c1b168d_1101158f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_3863b77932d4bd51a5eb66caf9ff0dc3366e7dd_14fb7988\Critical_iexplore.exe_3863b77932d4bd51a5eb66caf9ff0dc3366e7dd_14fb7988`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_387784e41c617bae41fc12312ceb253c949c8429_1251a80f\Critical_iexplore.exe_387784e41c617bae41fc12312ceb253c949c8429_1251a80f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_3901a7ecdaa431deff411da6a9fb21f8495ce_03e6845b\Critical_iexplore.exe_3901a7ecdaa431deff411da6a9fb21f8495ce_03e6845b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_3963de1ead15808e0b6ff9f97da12887780d250_0fc6571d\Critical_iexplore.exe_3963de1ead15808e0b6ff9f97da12887780d250_0fc6571d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_39c0f6e9ff615b5c4435c6dc0be80ce1c4d19b_1938e346\Critical_iexplore.exe_39c0f6e9ff615b5c4435c6dc0be80ce1c4d19b_1938e346`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_39f7b9b4acd5e4814ee17a4d2cdb521eb479cf26_163bf0f1\Critical_iexplore.exe_39f7b9b4acd5e4814ee17a4d2cdb521eb479cf26_163bf0f1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_3cbe4413749190f590e124de1593ddadfdeec3e_33fa2488\Critical_iexplore.exe_3cbe4413749190f590e124de1593ddadfdeec3e_33fa2488`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_3cc85ef1a0cca39853fdf7e779c617ea37435_350a1587\Critical_iexplore.exe_3cc85ef1a0cca39853fdf7e779c617ea37435_350a1587`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_40408e2ebc2681354764ceecefafa3f648a9193b_0542c0f6\Critical_iexplore.exe_40408e2ebc2681354764ceecefafa3f648a9193b_0542c0f6`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_43710cea99f131d5e1ee14153b382777d485d4_0b54c52b\Critical_iexplore.exe_43710cea99f131d5e1ee14153b382777d485d4_0b54c52b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_43a46b9a098af1b3c4c3140d885ea26e919bac_00b46b0b\Critical_iexplore.exe_43a46b9a098af1b3c4c3140d885ea26e919bac_00b46b0b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_478e94fe5b69a6c0ae674f4ffae2d3e37a0fb4c_15909a30\Critical_iexplore.exe_478e94fe5b69a6c0ae674f4ffae2d3e37a0fb4c_15909a30`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_4830d69dd08b294dc7a764c58fdb392adad0caf1_009d84ae\Critical_iexplore.exe_4830d69dd08b294dc7a764c58fdb392adad0caf1_009d84ae`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_4830d69dd08b294dc7a764c58fdb392adad0caf1_0f87bb44\Critical_iexplore.exe_4830d69dd08b294dc7a764c58fdb392adad0caf1_0f87bb44`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_4c712c9c68bbad2b9ce09417a1d655265321b5e_12aaa7ef\Critical_iexplore.exe_4c712c9c68bbad2b9ce09417a1d655265321b5e_12aaa7ef`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_51b393eb92a74e5334693e8f313bcb68671be14_119b2903\Critical_iexplore.exe_51b393eb92a74e5334693e8f313bcb68671be14_119b2903`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_52ce723ed4c7f97c928b567b1661ae8095fb5d42_0f421dab\Critical_iexplore.exe_52ce723ed4c7f97c928b567b1661ae8095fb5d42_0f421dab`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_544344bf66d5aac92a9ce3d64189baded30bf6b_11ad1736\Critical_iexplore.exe_544344bf66d5aac92a9ce3d64189baded30bf6b_11ad1736`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_5561f4b4bd7a99313d6039f93e8e49c1bda10c0_03306ad3\Critical_iexplore.exe_5561f4b4bd7a99313d6039f93e8e49c1bda10c0_03306ad3`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_5beb85d4a3b3fcae7572abe70b65e83c85ff864_1cbdeda5\Critical_iexplore.exe_5beb85d4a3b3fcae7572abe70b65e83c85ff864_1cbdeda5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_605ea924e280172d5a61d45b9a88f835a96bb8_11c10c31\Critical_iexplore.exe_605ea924e280172d5a61d45b9a88f835a96bb8_11c10c31`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_607b714b5e42deff81cc2b672b2d9534a097c1_3a8e64f0\Critical_iexplore.exe_607b714b5e42deff81cc2b672b2d9534a097c1_3a8e64f0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_63e4773c857ddf64be8734514557f598764cfe_11af76a1\Critical_iexplore.exe_63e4773c857ddf64be8734514557f598764cfe_11af76a1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_665b6d184afc14c4586d543af1814be4d72d7fa8_150b2a5a\Critical_iexplore.exe_665b6d184afc14c4586d543af1814be4d72d7fa8_150b2a5a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6bc6698188c1bd89bffcc7418a665444f9597d_14f3fed2\Critical_iexplore.exe_6bc6698188c1bd89bffcc7418a665444f9597d_14f3fed2`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6cb5d59d8155ffbf8f1933e1f7a23e624d25a_01c2e934\Critical_iexplore.exe_6cb5d59d8155ffbf8f1933e1f7a23e624d25a_01c2e934`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6cdfbef8b91955639cdff49a69ed09c77514e29_086edec1\Critical_iexplore.exe_6cdfbef8b91955639cdff49a69ed09c77514e29_086edec1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6cef4bcbabaffd16b2ebc53430222122e6e3eeb_04d3e0af\Critical_iexplore.exe_6cef4bcbabaffd16b2ebc53430222122e6e3eeb_04d3e0af`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6d2253148dbb371366bfec107e7efe3a2cc1880_14459b45\Critical_iexplore.exe_6d2253148dbb371366bfec107e7efe3a2cc1880_14459b45`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6ea3465b70a71f8c53f16b2684f93d4d8fa71b71_0d81fbce\Critical_iexplore.exe_6ea3465b70a71f8c53f16b2684f93d4d8fa71b71_0d81fbce`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6f30aeb618852fc4188b4437d55b7ab6dbf97692_19a425de\Critical_iexplore.exe_6f30aeb618852fc4188b4437d55b7ab6dbf97692_19a425de`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6fefaa607eae694ec163a8aa3318da5ab8846_17f2895a\Critical_iexplore.exe_6fefaa607eae694ec163a8aa3318da5ab8846_17f2895a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_712a92b3244da153b1787aea8c72e15482a11e66_10e8642f\Critical_iexplore.exe_712a92b3244da153b1787aea8c72e15482a11e66_10e8642f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_712ea374b13392df5f771995c04766a6af9c292_13df3977\Critical_iexplore.exe_712ea374b13392df5f771995c04766a6af9c292_13df3977`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_732a1a63f1419e33c9fc5929536ab3178b368aa_071c8483\Critical_iexplore.exe_732a1a63f1419e33c9fc5929536ab3178b368aa_071c8483`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_74a34da06248aecab8c4c0a976ff7ddc5d1de06c_07e24305\Critical_iexplore.exe_74a34da06248aecab8c4c0a976ff7ddc5d1de06c_07e24305`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_761db26b3599d4449eb1391576d8c61532cfb524_33d15903\Critical_iexplore.exe_761db26b3599d4449eb1391576d8c61532cfb524_33d15903`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_79bf139d859c86b33d8782632c19beab21d547_13a29734\Critical_iexplore.exe_79bf139d859c86b33d8782632c19beab21d547_13a29734`.exe (Malware.Gen) -> Quarantined and deleted successfully.
     
  5. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_7b8223c05932ffe9f2d517f931d6b5a33ac16979_85939c51\Critical_iexplore.exe_7b8223c05932ffe9f2d517f931d6b5a33ac16979_85939c51`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_7c8c49ecf5d597ad7a635b1b686873be97c6f0_37d761d8\Critical_iexplore.exe_7c8c49ecf5d597ad7a635b1b686873be97c6f0_37d761d8`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_7c93e42f9a8d33ca4f5bd863a643db98eeede2_118a963d\Critical_iexplore.exe_7c93e42f9a8d33ca4f5bd863a643db98eeede2_118a963d`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_7eddef13efa7249aba233374916d717b06bfc6f_141e077a\Critical_iexplore.exe_7eddef13efa7249aba233374916d717b06bfc6f_141e077a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_7f3648bca6bc94ca18e9848aed9d4fd09f50492d_2ac665b7\Critical_iexplore.exe_7f3648bca6bc94ca18e9848aed9d4fd09f50492d_2ac665b7`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_7feb7052c865f83eddab46594a3786d127a3d726_1b8f58bf\Critical_iexplore.exe_7feb7052c865f83eddab46594a3786d127a3d726_1b8f58bf`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_80b4bc69483cc5e2c069c53885e9b51bf3ee6bd0_11da2255\Critical_iexplore.exe_80b4bc69483cc5e2c069c53885e9b51bf3ee6bd0_11da2255`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_81268775584ec325df0365f16313fdc5d38b48a_02f2807e\Critical_iexplore.exe_81268775584ec325df0365f16313fdc5d38b48a_02f2807e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_83531b2be646dc519caf6454ab1cd888e56f5db_1297f16f\Critical_iexplore.exe_83531b2be646dc519caf6454ab1cd888e56f5db_1297f16f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_857c8abed411622d6f58d19aed4930d13e2152b_1f9f97fd\Critical_iexplore.exe_857c8abed411622d6f58d19aed4930d13e2152b_1f9f97fd`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_85a9fd6a6497608fe61fcc0a9ab9a687c599d46_03060aa5\Critical_iexplore.exe_85a9fd6a6497608fe61fcc0a9ab9a687c599d46_03060aa5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_87841ce989cecfdf37a6d29995b308a901e12_072f41f9\Critical_iexplore.exe_87841ce989cecfdf37a6d29995b308a901e12_072f41f9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_88daaee522d34fe82c9d5d9f2bde26668c026a1_252014d3\Critical_iexplore.exe_88daaee522d34fe82c9d5d9f2bde26668c026a1_252014d3`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_88e8e89555c4b25b3be1173aa389138f7677f520_15202f2a\Critical_iexplore.exe_88e8e89555c4b25b3be1173aa389138f7677f520_15202f2a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_89a7e7284431debc7c375d53f0d57cc9ef6de6f1_376be97b\Critical_iexplore.exe_89a7e7284431debc7c375d53f0d57cc9ef6de6f1_376be97b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_8a451d61429d907557432adb4d8b25a0c95fb425_066af619\Critical_iexplore.exe_8a451d61429d907557432adb4d8b25a0c95fb425_066af619`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_8b50ad999ceedbab3176a6dfaf98bdb978129_0112909f\Critical_iexplore.exe_8b50ad999ceedbab3176a6dfaf98bdb978129_0112909f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_8c3c87ca361bec170d8c03f37f23f82f914d52_009f0f2b\Critical_iexplore.exe_8c3c87ca361bec170d8c03f37f23f82f914d52_009f0f2b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_8da474d91ff4198629eef6ca6f6fb34e90b5ad17_14c5f354\Critical_iexplore.exe_8da474d91ff4198629eef6ca6f6fb34e90b5ad17_14c5f354`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_8ea3f391f7b4ebfc6a163ca49be161592d71fba_1da4d7c6\Critical_iexplore.exe_8ea3f391f7b4ebfc6a163ca49be161592d71fba_1da4d7c6`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_8f3703125b3d424ab51c343a43b87b6554392d4_19bf4aff\Critical_iexplore.exe_8f3703125b3d424ab51c343a43b87b6554392d4_19bf4aff`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_913a2b1baf2213dc1e6464319ccad83dffba0c_0c2ed059\Critical_iexplore.exe_913a2b1baf2213dc1e6464319ccad83dffba0c_0c2ed059`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_91623399939c58a03ed8c77d4c3dc2443fde5c36_145c1ed8\Critical_iexplore.exe_91623399939c58a03ed8c77d4c3dc2443fde5c36_145c1ed8`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_9183d432e4b6fefb427fd5d5ad84a0af83b9f017_03fe9cf9\Critical_iexplore.exe_9183d432e4b6fefb427fd5d5ad84a0af83b9f017_03fe9cf9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_919fa79f81262ba2921ecca9aedfc918df6a19_dd56ebae\Critical_iexplore.exe_919fa79f81262ba2921ecca9aedfc918df6a19_dd56ebae`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_9262b7ff823e91adfa333bc1b19b920eb2f45e5_17260bfa\Critical_iexplore.exe_9262b7ff823e91adfa333bc1b19b920eb2f45e5_17260bfa`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_926c84262ee9606538e59c227e6a434c4a45c8a3_1b38e9e5\Critical_iexplore.exe_926c84262ee9606538e59c227e6a434c4a45c8a3_1b38e9e5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_94ed3c8fd77511116aaad0beee6cfb61c250a6a8_149ca459\Critical_iexplore.exe_94ed3c8fd77511116aaad0beee6cfb61c250a6a8_149ca459`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_94f33d34138af1a7ad82d7715a80d01ae4c553d_04d0f180\Critical_iexplore.exe_94f33d34138af1a7ad82d7715a80d01ae4c553d_04d0f180`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_954a2793211112acc23be99923aefaa49b85_170a21d9\Critical_iexplore.exe_954a2793211112acc23be99923aefaa49b85_170a21d9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_9a878fc4da5b7d8ffd6b17fee7dcf93fb48f2c48_10a608bd\Critical_iexplore.exe_9a878fc4da5b7d8ffd6b17fee7dcf93fb48f2c48_10a608bd`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_9b21844f4ef9dcac6577926e1cdbfd62ffe75d8c_047a349c\Critical_iexplore.exe_9b21844f4ef9dcac6577926e1cdbfd62ffe75d8c_047a349c`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_9ceb7334d12d7d233a73be2e4349282b73ced475_0e4cca42\Critical_iexplore.exe_9ceb7334d12d7d233a73be2e4349282b73ced475_0e4cca42`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_9f462c5ca4a193c7f1f9885f1f0f5f16477c1ce_1af62c0f\Critical_iexplore.exe_9f462c5ca4a193c7f1f9885f1f0f5f16477c1ce_1af62c0f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_a1f759e7934dd587a4f1c1f9222c12eae2d397a_27e9ab9e\Critical_iexplore.exe_a1f759e7934dd587a4f1c1f9222c12eae2d397a_27e9ab9e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_a4cefd5cd530f7ce33926396b3d3160d39a5e4a_159f7193\Critical_iexplore.exe_a4cefd5cd530f7ce33926396b3d3160d39a5e4a_159f7193`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_a4cefd5cd530f7ce33926396b3d3160d39a5e4a_1827da49\Critical_iexplore.exe_a4cefd5cd530f7ce33926396b3d3160d39a5e4a_1827da49`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_a7ced2a241c7a8bc099e756e5e33017e967fc54_13a2c2e5\Critical_iexplore.exe_a7ced2a241c7a8bc099e756e5e33017e967fc54_13a2c2e5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_acba929cf72295c52a3699915a9996b42622dd4c_0a4d4ab6\Critical_iexplore.exe_acba929cf72295c52a3699915a9996b42622dd4c_0a4d4ab6`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_af867bd5691fd08f34655e3a65342c58f2639563_3f68c480\Critical_iexplore.exe_af867bd5691fd08f34655e3a65342c58f2639563_3f68c480`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_afb56b67ba414dbb3050a77382d696a4ee63a1c6_0e2a7d89\Critical_iexplore.exe_afb56b67ba414dbb3050a77382d696a4ee63a1c6_0e2a7d89`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_afe2895e56c8cedefb64dfaf43e57e4781299b_07713cc8\Critical_iexplore.exe_afe2895e56c8cedefb64dfaf43e57e4781299b_07713cc8`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_b06120bb1737c58bf3fbd82f932e20fca67ad4_1beceb8e\Critical_iexplore.exe_b06120bb1737c58bf3fbd82f932e20fca67ad4_1beceb8e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_b23349db5a3751f31e013429d1322986510e5a0_064d4025\Critical_iexplore.exe_b23349db5a3751f31e013429d1322986510e5a0_064d4025`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_b43239aaaa6bb4987b428f298eff81fb91916742_0890ac8a\Critical_iexplore.exe_b43239aaaa6bb4987b428f298eff81fb91916742_0890ac8a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_b610c889c750cbc16ce497c131e73c1524a7a9_032ec72f\Critical_iexplore.exe_b610c889c750cbc16ce497c131e73c1524a7a9_032ec72f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_b98ae576e4c95ad2a6c516c8ee317b1a863a4572_1b550da6\Critical_iexplore.exe_b98ae576e4c95ad2a6c516c8ee317b1a863a4572_1b550da6`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ba6b461c60a724893ad416a41bc54ae05ef930e9_09be4ace\Critical_iexplore.exe_ba6b461c60a724893ad416a41bc54ae05ef930e9_09be4ace`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bd86d85b37ce2fc3aa8d6c91a39fe6ec1a8c113_2eaf3514\Critical_iexplore.exe_bd86d85b37ce2fc3aa8d6c91a39fe6ec1a8c113_2eaf3514`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bee41b25bd5f9a71c519b52ddae908d3c7b40b9_10bd3a12\Critical_iexplore.exe_bee41b25bd5f9a71c519b52ddae908d3c7b40b9_10bd3a12`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_c2897e3a0de36cfc38c8aa7318c7e1840badd72_23f80f72\Critical_iexplore.exe_c2897e3a0de36cfc38c8aa7318c7e1840badd72_23f80f72`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_c4139c96f5eb467189add4e2c7b8a5272ccf3585_110c6179\Critical_iexplore.exe_c4139c96f5eb467189add4e2c7b8a5272ccf3585_110c6179`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_c6f72220a0a0cc846990d8d536c08dbd029973b_31bd05ba\Critical_iexplore.exe_c6f72220a0a0cc846990d8d536c08dbd029973b_31bd05ba`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cb91d8b5d8fcf5e1dfef5b23999f86ad83769812_19152580\Critical_iexplore.exe_cb91d8b5d8fcf5e1dfef5b23999f86ad83769812_19152580`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cbb0e89f1bfc753f1984da6280854365df645a20_16210262\Critical_iexplore.exe_cbb0e89f1bfc753f1984da6280854365df645a20_16210262`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cbe356e242467f56d35547d227109d1da29f6ab2_12a40228\Critical_iexplore.exe_cbe356e242467f56d35547d227109d1da29f6ab2_12a40228`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cc7d53f0d8e8569b43817ef5836f6d5fbdd2d3b6_13a2cfb1\Critical_iexplore.exe_cc7d53f0d8e8569b43817ef5836f6d5fbdd2d3b6_13a2cfb1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cc7d53f0d8e8569b43817ef5836f6d5fbdd2d3b6_1c523620\Critical_iexplore.exe_cc7d53f0d8e8569b43817ef5836f6d5fbdd2d3b6_1c523620`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cea0bc9228a3ba3edf269ce8e9a92b6fb06254_120131ae\Critical_iexplore.exe_cea0bc9228a3ba3edf269ce8e9a92b6fb06254_120131ae`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_cf80aaa1499b511c2eb0a9fc2937ccfab8d1218b_1abc1b1e\Critical_iexplore.exe_cf80aaa1499b511c2eb0a9fc2937ccfab8d1218b_1abc1b1e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d0996976345eda87b39f6707326e8c816073_1ad9a3e1\Critical_iexplore.exe_d0996976345eda87b39f6707326e8c816073_1ad9a3e1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d09b1c719a1d9892bad5b4619f2f4d4a20acb92a_3e85098b\Critical_iexplore.exe_d09b1c719a1d9892bad5b4619f2f4d4a20acb92a_3e85098b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d0a46a4df2459b0ca8f43fc67bd44e5cd7d7d_18b3b7d2\Critical_iexplore.exe_d0a46a4df2459b0ca8f43fc67bd44e5cd7d7d_18b3b7d2`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d1a4999a6f71448e21cb62d6dbdd7b464dfa664_10c6dc3a\Critical_iexplore.exe_d1a4999a6f71448e21cb62d6dbdd7b464dfa664_10c6dc3a`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d21e8b8a48b5936ff01eab5c694f557e212124fd_00c5630f\Critical_iexplore.exe_d21e8b8a48b5936ff01eab5c694f557e212124fd_00c5630f`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d242f45133c2c2819a9a3e13e4bf664965ef78_19d7553e\Critical_iexplore.exe_d242f45133c2c2819a9a3e13e4bf664965ef78_19d7553e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d551b40e9f6077ce5b40c6e32eb391a762a7a_03baeae4\Critical_iexplore.exe_d551b40e9f6077ce5b40c6e32eb391a762a7a_03baeae4`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d551b40e9f6077ce5b40c6e32eb391a762a7a_13a2dd19\Critical_iexplore.exe_d551b40e9f6077ce5b40c6e32eb391a762a7a_13a2dd19`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_db156a47eb46f64a3b3eb7d2572828ac0298022_11430109\Critical_iexplore.exe_db156a47eb46f64a3b3eb7d2572828ac0298022_11430109`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_dc901db583e8d38eefb04cdd4bc9ff14e7c88ab3_02a3bb84\Critical_iexplore.exe_dc901db583e8d38eefb04cdd4bc9ff14e7c88ab3_02a3bb84`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_dc901db583e8d38eefb04cdd4bc9ff14e7c88ab3_0482f1d8\Critical_iexplore.exe_dc901db583e8d38eefb04cdd4bc9ff14e7c88ab3_0482f1d8`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_dc901db583e8d38eefb04cdd4bc9ff14e7c88ab3_171c4f96\Critical_iexplore.exe_dc901db583e8d38eefb04cdd4bc9ff14e7c88ab3_171c4f96`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e0537ebef5ac9387d30d68f794119ee7c9ee5_1722a83b\Critical_iexplore.exe_e0537ebef5ac9387d30d68f794119ee7c9ee5_1722a83b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e06fac213b30cb44afd57fa11689bbfe0da42be_30c688c3\Critical_iexplore.exe_e06fac213b30cb44afd57fa11689bbfe0da42be_30c688c3`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e0ed74c08c6f89279462d72b86bba52e1ef22d_3d5072a8\Critical_iexplore.exe_e0ed74c08c6f89279462d72b86bba52e1ef22d_3d5072a8`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e18d7316d3a828dfed673697ee6da34299f2cbb2_14ae06de\Critical_iexplore.exe_e18d7316d3a828dfed673697ee6da34299f2cbb2_14ae06de`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e4124fa993b49702fb0c1e65d2ae3537d75fa50_03591edf\Critical_iexplore.exe_e4124fa993b49702fb0c1e65d2ae3537d75fa50_03591edf`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e6954ad51181d96cf9ef46b3a787374da116b1_00a0414e\Critical_iexplore.exe_e6954ad51181d96cf9ef46b3a787374da116b1_00a0414e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e7b1191655a185734179ae8c2c4bcc811e748ebf_051cbbe9\Critical_iexplore.exe_e7b1191655a185734179ae8c2c4bcc811e748ebf_051cbbe9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_e7c3bd7882ad7a166479ab0fdb73d69578e1d7_0d3123f4\Critical_iexplore.exe_e7c3bd7882ad7a166479ab0fdb73d69578e1d7_0d3123f4`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ebd763b4d8112351724797bbd9ee187dd3f028_118d7108\Critical_iexplore.exe_ebd763b4d8112351724797bbd9ee187dd3f028_118d7108`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ede832ccccde6e7cd41c72466c37461e7b7684_07629a7e\Critical_iexplore.exe_ede832ccccde6e7cd41c72466c37461e7b7684_07629a7e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f2bb8f19da7b2117b2684b23c5df5d856996be8_01d81ca6\Critical_iexplore.exe_f2bb8f19da7b2117b2684b23c5df5d856996be8_01d81ca6`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f4ce835c1973f01848bc3a346670d69e05db8b7_0fd5a916\Critical_iexplore.exe_f4ce835c1973f01848bc3a346670d69e05db8b7_0fd5a916`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f5644e3e824fdface06b78147984372cb8267a_01c84d0b\Critical_iexplore.exe_f5644e3e824fdface06b78147984372cb8267a_01c84d0b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f580d6defb17756a4896d3fde4bf770f17e405e_1569dda2\Critical_iexplore.exe_f580d6defb17756a4896d3fde4bf770f17e405e_1569dda2`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f749f29795a563f8ab07cc528ab2f4aa1b16b9_19342dc5\Critical_iexplore.exe_f749f29795a563f8ab07cc528ab2f4aa1b16b9_19342dc5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f8467935cf40c78eebad6f9378f54bedd3ae75e_141eb8c1\Critical_iexplore.exe_f8467935cf40c78eebad6f9378f54bedd3ae75e_141eb8c1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_f8ecc1e9ada7b8b08669f55a997a71cb65aad14e_0590bf21\Critical_iexplore.exe_f8ecc1e9ada7b8b08669f55a997a71cb65aad14e_0590bf21`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_fb2343831419edf79eec2b187292740e1ad98e_25c62474\Critical_iexplore.exe_fb2343831419edf79eec2b187292740e1ad98e_25c62474`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_fd15e16afd1efed3fb8b77dbc1fe1246e84d17d_1efc14f5\Critical_iexplore.exe_fd15e16afd1efed3fb8b77dbc1fe1246e84d17d_1efc14f5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_fdf49cb66133e22c5856b87e2be4e673a7d40b2_0d6412e5\Critical_iexplore.exe_fdf49cb66133e22c5856b87e2be4e673a7d40b2_0d6412e5`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff69c223e2dd7a67f98de66c3f57707d4be7c_0823e257\Critical_iexplore.exe_ff69c223e2dd7a67f98de66c3f57707d4be7c_0823e257`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff69c223e2dd7a67f98de66c3f57707d4be7c_13a2f5b7\Critical_iexplore.exe_ff69c223e2dd7a67f98de66c3f57707d4be7c_13a2f5b7`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff69c223e2dd7a67f98de66c3f57707d4be7c_13a307ff\Critical_iexplore.exe_ff69c223e2dd7a67f98de66c3f57707d4be7c_13a307ff`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff7ff618ab3f12752622abf6eb28d189f6f87fe_122cc56b\Critical_iexplore.exe_ff7ff618ab3f12752622abf6eb28d189f6f87fe_122cc56b`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_S-Bar.exe_208c30c0144718ac582212fd4f4eff28473e296_075f4e1e\Critical_S-Bar.exe_208c30c0144718ac582212fd4f4eff28473e296_075f4e1e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_S-Bar.exe_e4e528d08dc9c6d2a6c7248e4f2dbcec85335a3_3ce26cb1\Critical_S-Bar.exe_e4e528d08dc9c6d2a6c7248e4f2dbcec85335a3_3ce26cb1`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_Skype.exe_ca0b4ed45d6bf9df943fd49bf3e8cbe4e8cc95_01e73ad9\Critical_Skype.exe_ca0b4ed45d6bf9df943fd49bf3e8cbe4e8cc95_01e73ad9`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_111a70dea94dbc64fe4b1d16780adf62099c57a_00752b53\NonCritical_iexplore.exe_111a70dea94dbc64fe4b1d16780adf62099c57a_00752b53`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_86d18a4dacb877dcaa8868e95d20adf419e3d7_650fb359\NonCritical_iexplore.exe_86d18a4dacb877dcaa8868e95d20adf419e3d7_650fb359`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_06057812\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_06057812`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_09fdaa7e\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_09fdaa7e`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_0c3b8076\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_0c3b8076`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_0e939081\NonCritical_iexplore.exe_c92cde88ad9424ce942217142c67336a45dae17_0e939081`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_267e8fd0aabf68f645d5417e9280f68a9d9251e8_0821a498\NonCritical_Microsoft Window_267e8fd0aabf68f645d5417e9280f68a9d9251e8_0821a498.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_90951f4c2216df96465b87b76f7b6b9e8bc4d2b8_13a317c8\NonCritical_Microsoft Window_90951f4c2216df96465b87b76f7b6b9e8bc4d2b8_13a317c8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_9f75ca8131a4499464605485772762a9545577c_108f4d26\NonCritical_Microsoft Window_9f75ca8131a4499464605485772762a9545577c_108f4d26.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_10d138db\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_10d138db.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_2049b871dc2f9d9553daf69a4d346e54cfa72b9_23c384a7\NonCritical_x64_2049b871dc2f9d9553daf69a4d346e54cfa72b9_23c384a7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_23db3368d8bb27df4078f2f5e9cf8a2fed535182_38864ff0\NonCritical_x64_23db3368d8bb27df4078f2f5e9cf8a2fed535182_38864ff0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_35eed7a653f15687daf3bb25544d6bee334d_1c8bfb86\NonCritical_x64_35eed7a653f15687daf3bb25544d6bee334d_1c8bfb86.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_45cff6fd5e932a9675e66c2663fc98dd98e5246_0c754634\NonCritical_x64_45cff6fd5e932a9675e66c2663fc98dd98e5246_0c754634.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_549ffa212c5166cf4e0b61af268de1c43e67f8_10e7c928\NonCritical_x64_549ffa212c5166cf4e0b61af268de1c43e67f8_10e7c928.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_54baa783fd39f3efd8adfe56d424a1ba84a4e63_237b84d5\NonCritical_x64_54baa783fd39f3efd8adfe56d424a1ba84a4e63_237b84d5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_54baa783fd39f3efd8adfe56d424a1ba84a4e63_303b84b6\NonCritical_x64_54baa783fd39f3efd8adfe56d424a1ba84a4e63_303b84b6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_6c3a88df13a1f5a5568e11bf8b8ad0de7ea98ade_13a324a4\NonCritical_x64_6c3a88df13a1f5a5568e11bf8b8ad0de7ea98ade_13a324a4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_8dd2a6bea57836935d86a299b4735d5c6f632592_1a704d2f\NonCritical_x64_8dd2a6bea57836935d86a299b4735d5c6f632592_1a704d2f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_8dd2a6bea57836935d86a299b4735d5c6f632592_3931e6a3\NonCritical_x64_8dd2a6bea57836935d86a299b4735d5c6f632592_3931e6a3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_9092b7cb6b644ef97c5af9f13a12937e2ddc5c_033c77be\NonCritical_x64_9092b7cb6b644ef97c5af9f13a12937e2ddc5c_033c77be.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_a1b4dc6afd3072982a657775c8887e3dbfe1c67b_116955ec\NonCritical_x64_a1b4dc6afd3072982a657775c8887e3dbfe1c67b_116955ec.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_ad99baf52645d26fca69e8d920a9da7771f7145d_16bc5923\NonCritical_x64_ad99baf52645d26fca69e8d920a9da7771f7145d_16bc5923.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_bdc4503d7c283efaf6f1bc7a577f4ba82bed13cb_13a330f3\NonCritical_x64_bdc4503d7c283efaf6f1bc7a577f4ba82bed13cb_13a330f3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_d82add355a902c5f743a5be0e08cf267729bdcd_0c01a035\NonCritical_x64_d82add355a902c5f743a5be0e08cf267729bdcd_0c01a035.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportQueue\Critical_iexplore.exe_804aaef512a0b37cdb89f421c03b3966fad81991_cab_12a3d951\Critical_iexplore.exe_804aaef512a0b37cdb89f421c03b3966fad81991_cab_12a3d951`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_23db3368d8bb27df4078f2f5e9cf8a2fed535182_cab_1e3e67fa\NonCritical_x64_23db3368d8bb27df4078f2f5e9cf8a2fed535182_cab_1e3e67fa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Live\Bici\Bici.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Live\Installer\Catalog\Catalog.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Live\SqmApi\SqmApi.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\SqmApi.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Mail\Backup\new\new.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Mail\Stationery\Stationery.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows Media\12.0\12.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\WLSetup\CabLogs\CabLogs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\WLSetup\Logs\Logs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\MSI\S-Bar.exe_Url_hnr3bnn3vamhc4vi24dchjomtmr2wqlj\20.11.7112.0\20.11.7112.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\ish465163\css\sdk-ui\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\ish540496\css\sdk-ui\images\images.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\AIM68Q67\AIM68Q67.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\F3XRVV6H\F3XRVV6H.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\IU0D0CMS\IU0D0CMS.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\P802EUC3\P802EUC3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\S83BNFFH\S83BNFFH.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\U29Q6KDB\U29Q6KDB.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\US2XYX13\US2XYX13.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\Y9HCUUFB\Y9HCUUFB.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\VirtualStore\Program Files (x86)\etax2012\etax2012.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\VirtualStore\Program Files (x86)\etax2012\help\cgt\cgt.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\VirtualStore\Program Files (x86)\etax2012\help\etax\etax.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\VirtualStore\Program Files (x86)\Nuance\PDF Reader\bin\Navigators\ENU\ENU.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\VirtualStore\ProgramData\ScanSoft\PDF Reader 6.0\PDF Reader 6.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Local\VirtualStore\ProgramData\ScanSoft\PDF Reader 6.0\Backup\Backup.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\mediabarbs\mediabarbs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\Content.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\MetaData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\DOMStore.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\6013RLTU\6013RLTU.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\ACPU2GOT\ACPU2GOT.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\M6U79STZ\M6U79STZ.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\S2OY2CER\S2OY2CER.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\WGTI3K3P\WGTI3K3P.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\ZTEHXN2K\ZTEHXN2K.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\32mlcs0\32mlcs0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Internet Explorer\Services\Services.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\OfficeStarter.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\0\0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\1\http^3a^2f^2fads1.msads.net^2fads^2fAFS^2fXSLs^2fBanner_Image\http^3a^2f^2fads1.msads.net^2fads^2fAFS^2fXSLs^2fBanner_Image`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\1\http^3a^2f^2fads1.msn.com^2fads^2f95672\http^3a^2f^2fads1.msn.com^2fads^2f95672`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\1\http^3a^2f^2fads1.msn.com^2fads^2fAFS^2fXSLs^2fBanner_Image\http^3a^2f^2fads1.msn.com^2fads^2fAFS^2fXSLs^2fBanner_Image`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\1\http^3a^2f^2fads2.msads.net^2fCIS^2f109^2f000^2f000^2f000^2f037\http^3a^2f^2fads2.msads.net^2fCIS^2f109^2f000^2f000^2f000^2f037`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\1\http^3a^2f^2fh1.msn.com^2fads^2fAFS^2fXSLs^2fBanner_Image\http^3a^2f^2fh1.msn.com^2fads^2fAFS^2fXSLs^2fBanner_Image`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\1\http^3a^2f^2fh2.msn.com^2fCIS^2f26^2f000^2f000^2f000^2f041\http^3a^2f^2fh2.msn.com^2fCIS^2f26^2f000^2f000^2f000^2f041`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\2\2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\3\3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\OfficeStarter\3\Laptop-MSI\Laptop-MSI.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Silverlight\Silverlight.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Silverlight\is\zsheged4.fo3\ejivapyy.orh\1\g\o0ix4jipd532wjp4nlfmf502ppt24jbn1dxr0mpntl03zkcp1laaafba\o0ix4jipd532wjp4nlfmf502ppt24jbn1dxr0mpntl03zkcp1laaafba.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Silverlight\is\zsheged4.fo3\ejivapyy.orh\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Silverlight\is\zsheged4.fo3\ejivapyy.orh\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Windows\AppCache\AppCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
     
  6. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    C:\Users\Laptop\AppData\LocalLow\Microsoft\Windows\AppCache\SNHF2XT3\SNHF2XT3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Adobe\Flash Player\AssetCache\QA8RZT9X\QA8RZT9X.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Canon\MP Navigator EX V50\history\ml\ml.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Canon\MP Navigator EX V50\history\sc\sc.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Canon\MP Navigator EX V50\index\index.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Canon\MP Navigator EX V50\temp\scan\scan.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Canon\Solution Menu EX\RssData\RssData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\FLEXnet\Connect\Database\Database.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\CLView\1033\1033.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3605120656-3930247630-567234770-1001\S-1-5-21-3605120656-3930247630-567234770-1001.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Document Building Blocks\1033\14\14.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Installer\{B0F1B02F-47A6-411D-A38B-E44CC7F53CCC}\{B0F1B02F-47A6-411D-A38B-E44CC7F53CCC}.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Quick Launch.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\7e4dca80246863e3\7e4dca80246863e3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu\StartMenu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\TaskBar.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\6RTGMATX\6RTGMATX.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\RTQ50MU1\RTQ50MU1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\USQLWXA1\USQLWXA1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Network\Connections\Pbk\Pbk.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\_hiddenPbk.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Office\Recent\Recent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Protect\S-1-5-21-3605120656-3930247630-567234770-1001\S-1-5-21-3605120656-3930247630-567234770-1001.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Spelling\en-AU\en-AU.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\1033.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Templates\LiveContent\Managed\SmartArt Graphics\1033\1033.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Templates\LiveContent\Managed\Word Document Building Blocks\1033\1033.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Cookies\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\DefaultPack\DefaultPack.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\DNTException\DNTException.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IECompatCache\IECompatCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IECompatUACache\IECompatUACache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\IEDownloadHistory.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IETldCache\IETldCache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\IETldCache\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Libraries\Libraries.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\PrivacIE\PrivacIE.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\PrivacIE\Low\Low.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Recent\Recent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\AutomaticDestinations.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CustomDestinations.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\SendTo\SendTo.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Start Menu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Programs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessories.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Accessibility.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\System Tools.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Administrative Tools.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AMD VISION Engine Control Center\Presets\Presets.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\e-tax 2012\e-tax 2012.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Maintenance.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Templates\Templates.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Themes\Themes.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Microsoft\Word\~$esa%20Letter%20of%20Sponsorship2303371733848795843\~$esa%20Letter%20of%20Sponsorship2303371733848795843.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\01\01.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\02\02.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\03\03.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\04\04.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\05\05.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\06\06.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\07\07.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\08\08.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\09\09.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\0a\0a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\0b\0b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\0c\0c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\0d\0d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\0e\0e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\0f\0f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\10\10.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\11\11.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\12\12.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\13\13.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\14\14.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\15\15.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\16\16.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\17\17.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\18\18.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\19\19.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\1a\1a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\1c\1c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\1d\1d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\1e\1e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\1f\1f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\20\20.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\21\21.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\22\22.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\23\23.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\24\24.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\25\25.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\26\26.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\27\27.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\28\28.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\2a\2a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\2c\2c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\2d\2d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\2e\2e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\2f\2f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\30\30.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\31\31.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\32\32.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\33\33.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\34\34.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\35\35.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\36\36.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\37\37.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\38\38.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\39\39.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\3a\3a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\3b\3b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\3c\3c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\3d\3d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\3e\3e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\3f\3f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\40\40.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\41\41.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\42\42.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\43\43.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\44\44.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\45\45.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\46\46.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\47\47.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\48\48.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\49\49.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\4a\4a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\4b\4b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\4c\4c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\4d\4d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\4e\4e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\4f\4f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\50\50.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\51\51.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\52\52.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\53\53.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\54\54.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\55\55.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\56\56.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\57\57.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\58\58.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\5a\5a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\5b\5b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\5c\5c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\5d\5d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\5e\5e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\5f\5f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\60\60.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\61\61.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\62\62.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\63\63.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\64\64.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\65\65.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\66\66.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\67\67.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\69\69.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\6b\6b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\6c\6c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\6d\6d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\6e\6e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\6f\6f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\70\70.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\71\71.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\72\72.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\74\74.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\75\75.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\76\76.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\77\77.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\78\78.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\79\79.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\7a\7a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\7d\7d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\7e\7e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\7f\7f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\80\80.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\81\81.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\82\82.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\83\83.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\84\84.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\85\85.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\86\86.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\87\87.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\88\88.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\89\89.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\8a\8a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\8b\8b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\8c\8c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\8d\8d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\8e\8e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\8f\8f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\90\90.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\91\91.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\92\92.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\93\93.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\94\94.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\95\95.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\96\96.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\97\97.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\98\98.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\99\99.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\9a\9a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\9b\9b.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\9c\9c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\9d\9d.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\9e\9e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a0\a0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a1\a1.exe (Malware.Gen) -> Quarantined and deleted successfully.
     
  7. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a2\a2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a3\a3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a4\a4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a5\a5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a6\a6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a7\a7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a8\a8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\a9\a9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ab\ab.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ac\ac.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ad\ad.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ae\ae.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\af\af.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b0\b0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b1\b1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b2\b2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b5\b5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b6\b6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b7\b7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b8\b8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\b9\b9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ba\ba.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\bb\bb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\bc\bc.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\bd\bd.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\be\be.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c1\c1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c2\c2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c3\c3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c5\c5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c6\c6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c7\c7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c8\c8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\c9\c9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ca\ca.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\cb\cb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\cd\cd.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ce\ce.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\cf\cf.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d1\d1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d2\d2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d3\d3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d4\d4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d5\d5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d7\d7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d8\d8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\d9\d9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\da\da.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\db\db.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\dc\dc.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\dd\dd.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\de\de.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\df\df.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e0\e0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e1\e1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e2\e2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e3\e3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e4\e4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e5\e5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e7\e7.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e8\e8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\e9\e9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ea\ea.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\eb\eb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ec\ec.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ed\ed.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ee\ee.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ef\ef.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f0\f0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f1\f1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f2\f2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f3\f3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f4\f4.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f5\f5.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f6\f6.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f8\f8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\f9\f9.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\fb\fb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\fc\fc.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\fd\fd.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\fe\fe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\chatsync\ff\ff.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\ecache\ecache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\httpfe\httpfe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\qikdb\qikdb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\settings\settings.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\simcache\simcache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\akesa.niudamu\voicemail\voicemail.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\27\27.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\36\36.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\4c\4c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\ac\ac.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\d8\d8.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\e2\e2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\ee\ee.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\chatsync\fe\fe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\arthur.kulture\httpfe\httpfe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\dkula_74\chatsync\09\09.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\dkula_74\chatsync\5f\5f.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\dkula_74\chatsync\62\62.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\dkula_74\chatsync\84\84.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\dkula_74\chatsync\9e\9e.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\dkula_74\httpfe\httpfe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\17\17.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\37\37.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\7a\7a.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\82\82.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\86\86.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\b0\b0.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\chatsync\ec\ec.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\ecache\ecache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\httpfe\httpfe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\metaData\metaData.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\settings\settings.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\lniudamu\simcache\simcache.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\thelma579\chatsync\65\65.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\thelma579\httpfe\httpfe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\56\56.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\95\95.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\97\97.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\9c\9c.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\bb\bb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\bd\bd.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\c2\c2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\fa\fa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\chatsync\fb\fb.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Skype\zinna74\httpfe\httpfe.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Zeon\DocuCom\PDF Plus\Log\Log.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\AppData\Roaming\Zeon\DocuCom\PDF Plus\Preferences\Preferences.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\Avast\Avast.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\Avast\mysetup.exe (PUP.Optional.Freemium.A) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\BUAKALA LETTERHEAD\BUAKALA LETTERHEAD.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\BUAKALA LETTERHEAD - Copy\BUAKALA LETTERHEAD - Copy.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\BUAKALA LETTERHEAD - Copy\BUAKALA LETTERHEAD - Copy - Copy\BUAKALA LETTERHEAD - Copy - Copy.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\fijian remixes\fijian remixes.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\fijian remixes\DCIM\100NIKON\100NIKON.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\fiji remix.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\elviez\elviez.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\HillSong\HillSong.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\HillSong\Harvest Music\Harvest Music.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\HillSong\HoMECOMING FRIENDS\RockY MOUNTAIN\RockY MOUNTAIN.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Jimis Mix\Jimis Mix.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Kabu Ciri Yawa E Bolatagane\Papiloni Vol 2\Papiloni Vol 2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Kabu Ni Delai Kade\Yesteryears\Yesteryears.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Lagani Rabukawaqa\Lagani Rabukawaqa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\latest songs october\latest songs october.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\LAUTANO 2\LAUTANO 2.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\LAUTANO 2\FM radio clips\FM radio clips.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\mel music\mel music.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Mix Fijian PoP\Mix Fijian PoP.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\rescue bros\rescue bros.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Southern Swingers\NewMix_September10\NewMix_September10.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Southern Swingers\Volume 3\Volume 3.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\The Best\The Best.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\The Best Of\The Best Of.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\Thirteen Years Of Herbs\Thirteen Years Of Herbs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\VOQA NI UA KEI DAVETA TABU Vol 2\fIJIAN rEMIX\fIJIAN rEMIX.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\music\VOQA NI UA KEI DAVETA TABU Vol 2\Unknown Album\Unknown Album.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\New folder\Herbs\fone music\fone music.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\New folder\Herbs\fone music\Aaron Neville\Aaron Neville.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\New folder\Herbs\fone music\Aaron Neville\In My Soul\In My Soul.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\Vanuatu Photos\10 Dec 2010 - Emalus Graduation .scr (Worm.Autorun) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Desktop\Vanuatu Photos\Vanuatu Photos.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Documents\Mail_20130219\Mail_20130219.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Favorites\BigPond\BigPond.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Favorites\Downloads\Downloads.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Favorites\Links\Links.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Music\2013_02_20\2013_02_20.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Music\2013_07_22\2013_07_22.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Music\BearShare\Unknown 1\Unknown 1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Music\Playlists\Playlists.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-04-28 meresiana elu\2012-04-28 meresiana elu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-04-29 tropical nite\2012-04-29 tropical nite.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-01 akesa\2012-05-01 akesa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-01 seisia bamaga\2012-05-01 seisia bamaga.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-01 seisia bamaga\2012-06-08 nice hair\2012-06-08 nice hair.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-01 seisia bamaga\2012-06-08 nice hair\2012-06-02 wharf trip\2012-06-02 wharf trip.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-05 prado brown\2012-05-05 prado brown.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-14 friday island\2012-05-14 friday island.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-14 friday island\2012-05-05 footies\2012-05-05 footies.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-22 nice hair\2012-05-22 nice hair.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-22 nice hair\Sample Pictures\Sample Pictures.exe (Malware.Gen) -> Quarantined and deleted successfully.
     
  8. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    C:\Users\Laptop\Pictures\2012-05-26\2012-05-26.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-26\2012-04-30 fiji music\2012-04-30 fiji music.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-05-31 nanada niu\2012-05-31 nanada niu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-03 irene\2012-06-03 irene.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-03 jenny\2012-06-03 jenny.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-03 ldschurch\2012-06-03 ldschurch.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-07 waiwi meta\2012-06-07 waiwi meta.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-10 penaia\2012-06-10 penaia.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-13 tafe qld\2012-06-13 tafe qld.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-18 clarice\2012-06-18 clarice.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-18 waiwi party\2012-06-18 waiwi party.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-22 party staff\2012-06-22 party staff.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-06-24 torres hotel\2012-06-24 torres hotel.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-07-10 rosehill\2012-07-10 rosehill.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-07-13\2012-07-13.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-07-22 reggae nite\2012-07-22 reggae nite.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-07-26 naidoc\2012-07-26 naidoc.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-08-05 vale nei kesa\2012-08-05 vale nei kesa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-08-11 talei elu\2012-08-11 talei elu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-08-17 SAVAGE\2012-08-17 SAVAGE.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-08-18 pizza\2012-08-18 pizza.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-08-24 SENIOR WEEK\2012-08-24 SENIOR WEEK.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-08-25 taxiday\2012-08-25 taxiday.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-02 anglican\2012-09-02 anglican.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-06 torres trip\2012-09-06 torres trip.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-14 coffee\2012-09-14 coffee.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-15\2012-09-15.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-16 fellowship\2012-09-16 fellowship.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-18 crayfish\2012-09-18 crayfish.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-19 cultrula festival\2012-09-19 cultrula festival.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-22 torres hotel\2012-09-22 torres hotel.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-24 DANCING QUEEN\2012-09-24 DANCING QUEEN.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-24 mrs elu\2012-09-24 mrs elu.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-09-29 serutabua\2012-09-29 serutabua.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-10-01 prado\2012-10-01 prado.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-10-01 townson\2012-10-01 townson.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-10-18 fiji trip\2012-10-18 fiji trip.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-10-21 navy cadtes\2012-10-21 navy cadtes.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-10-23 MADDY\2012-10-23 MADDY.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-10-30 hargrave photos\2012-10-30 hargrave photos.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-11-03 qld govt\2012-11-03 qld govt.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-11-11 shoes\2012-11-11 shoes.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-11-11 sweet look\2012-11-11 sweet look.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-11-29 jardine\2012-11-29 jardine.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-12-02 Thurday Island\2012-12-02 Thurday Island.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-12-09 last nite\2012-12-09 last nite.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-12-15 joks pickering\2012-12-15 joks pickering.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-12-20\2012-12-20.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2012-12-30 bowen mango\2012-12-30 bowen mango.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-05 george\2013-01-05 george.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-09 seruwaia\2013-01-09 seruwaia.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-10\2013-01-10.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-10\MP Navigator EX\2012_10_18\2012_10_18.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-10\MP Navigator EX\2012_10_20\2012_10_20.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-10\MP Navigator EX\Mail_20121018\Mail_20121018.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-10\MP Navigator EX\Mail_20121020\Mail_20121020.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-11 babysitter\2013-01-11 babysitter.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-11 taunate\2013-01-11 taunate.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-12 partynite geelong\2013-01-12 partynite geelong.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-15 swimming\2013-01-15 swimming.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-21 immigration\2013-01-21 immigration.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-22 mereani\2013-01-22 mereani.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-01-31 new staff\2013-01-31 new staff.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-01 NEW PHOTO\2013-02-01 NEW PHOTO.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-03 church time\2013-02-03 church time.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-03 nadaseruwaia\2013-02-03 nadaseruwaia.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-04 pool\2013-02-04 pool.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-10 waia\2013-02-10 waia.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-13 badges\2013-02-13 badges.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-15 traviilion\2013-02-15 traviilion.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-21 frontlunch\2013-02-21 frontlunch.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-23 tagi state\2013-02-23 tagi state.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-24 again\2013-02-24 again.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-24 dye\2013-02-24 dye.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-24 gilrs\2013-02-24 gilrs.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-02-27 brown hair\2013-02-27 brown hair.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-01 akesa\2013-03-01 akesa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-01 kesa\2013-03-01 kesa.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-02 bedspread\2013-03-02 bedspread.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-04 push\2013-03-04 push.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-08 federal\2013-03-08 federal.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-11 desserts\2013-03-11 desserts.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-15 unchained melody\2013-03-15 unchained melody.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-17 green\2013-03-17 green.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-03-31 green\2013-03-31 green.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-05-03 mariana\2013-05-03 mariana.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-06-14 churches\2013-06-14 churches.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\2013-06-20\photos for burning\photos for burning.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\MP Navigator EX\2013_02_19\2013_02_19.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\MP Navigator EX\2013_02_20\2013_02_20.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\MP Navigator EX\2013_07_22\2013_07_22.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\MP Navigator EX\Mail_20130219\Mail_20130219.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Pictures\Sunshine Coast 2013\Sunshine Coast 2013.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Saved Games\Microsoft Games\Microsoft Games.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Saved Games\Microsoft Games\Chess Titans\Chess Titans.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Laptop\Saved Games\Microsoft Games\Solitaire\Solitaire.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\msi\EasyFace\EasyFace.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\msi\EasyFace\FR\FR.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Music\New folder\Music\Music.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Music\New folder\Music\2013_02_20\2013_02_20.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Music\New folder\Music\2013_07_22\2013_07_22.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Music\New folder\Music\BearShare\Unknown 1\Unknown 1.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Music\New folder\Music\Playlists\Playlists.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Music\Sample Music\Sample Music.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Pictures\demo photo\demo photo.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Recorded TV\Sample Media\Sample Media.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Recorded TV\TempRec\TempRec.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Symantec\SymSilent\SymSilent.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Symantec\SymSilent\ccLog\ccLog.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Users\Public\Videos\Sample Videos\Sample Videos.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\Utility.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\BingBar\7.0.610.0\7.0.610.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\Magix Music_Maker_16(Trial)\UK\UK.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\Magix Photo_Manager_9_7.0.3.1xx(0x95e4b0e7)\UK\UK.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\Magix Video_easy_SE\UK\UK.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\NuancePDFReader6.00.0041\English\English.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\NuancePDFReader6.00.0041\SChinese\SChinese.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\NuancePDFReader6.00.0041\TChinese\TChinese.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\pics\pics.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\USB3.0`.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\Files.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0401\0401.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0404\0404.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0405\0405.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0406\0406.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0407\0407.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0408\0408.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0409\0409.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\040A\040A.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\040B\040B.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\040C\040C.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\040D\040D.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\040E\040E.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0410\0410.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0411\0411.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0412\0412.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0413\0413.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0414\0414.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0415\0415.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0416\0416.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0419\0419.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\041B\041B.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\041D\041D.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\041E\041E.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\041F\041F.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0424\0424.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0804\0804.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0816\0816.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0C04\0C04.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\0C0A\0C0A.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\2C0A\2C0A.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\x64\x64.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Utility\USB3.0\Files\x86\x86.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Windows\debug\WIA\WIA.exe (Malware.Gen) -> Quarantined and deleted successfully.
    C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}.exe (Malware.Gen) -> Quarantined and deleted successfully.

    (end)
     
  9. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    dds attach txt


    .
    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT
    .
    DDS (Ver_2012-11-20.01)
    .
    Microsoft Windows 7 Home Premium
    Boot Device: \Device\HarddiskVolume2
    Install Date: 27/04/2012 9:11:27 AM
    System Uptime: 13/02/2014 7:53:57 PM (1 hours ago)
    .
    Motherboard: Micro-Star International Co., Ltd. | | MS-16GN
    Processor: AMD E-240 Processor | CPU 1 | 750/100mhz
    .
    ==== Disk Partitions =========================
    .
    C: is FIXED (NTFS) - 134 GiB total, 86.119 GiB free.
    D: is FIXED (NTFS) - 90 GiB total, 0.019 GiB free.
    E: is CDROM ()
    .
    ==== Disabled Device Manager Items =============
    .
    Class GUID: {8ECC055D-047F-11D1-A537-0000F8753ED1}
    Description: Malwarebytes Anti-Exploit
    Device ID: ROOT\LEGACY_ESPROTECTIONDRIVER\0000
    Manufacturer:
    Name: Malwarebytes Anti-Exploit
    PNP Device ID: ROOT\LEGACY_ESPROTECTIONDRIVER\0000
    Service: ESProtectionDriver
    .
    ==== System Restore Points ===================
    .
    No restore point in system.
    .
    ==== Installed Programs ======================
    .
    ??????? Windows Live Mesh ActiveX ??(????)
    ??????? Windows Live Mesh ActiveX ???
    Adobe Flash Player 12 ActiveX
    AMD APP SDK Runtime
    AMD Fuel
    AMD Media Foundation Decoders
    AMD VISION Engine Control Center
    Atheros Client Installation Program
    ATI Catalyst Install Manager
    avast! Free Antivirus
    BearShare
    BurnRecovery
    Canon Easy-PhotoPrint EX
    Canon Easy-WebPrint EX
    Canon Inkjet Printer/Scanner/Fax Extended Survey Program
    Canon MG3100 series MP Drivers
    Canon MG3100 series On-screen Manual
    Canon MP Navigator EX 5.0
    Canon My Printer
    Canon Solution Menu EX
    Catalyst Control Center InstallProxy
    Catalyst Control Center Localization All
    Catalyst Control Center Profiles Mobile
    ccc-utility64
    CCC Help Chinese Standard
    CCC Help Chinese Traditional
    CCC Help Czech
    CCC Help Danish
    CCC Help Dutch
    CCC Help English
    CCC Help Finnish
    CCC Help French
    CCC Help German
    CCC Help Greek
    CCC Help Hungarian
    CCC Help Italian
    CCC Help Japanese
    CCC Help Korean
    CCC Help Norwegian
    CCC Help Polish
    CCC Help Portuguese
    CCC Help Russian
    CCC Help Spanish
    CCC Help Swedish
    CCC Help Thai
    CCC Help Turkish
    Chicken Invaders 2
    Cinema ProII Setup
    Cisco EAP-FAST Module
    Cisco LEAP Module
    Cisco PEAP Module
    D3DX10
    e-tax 2012
    EasyFace2
    EasyViewer
    ETDWare PS/2-X64 8.0.5.4_WHQL
    Facebook Video Calling 2.0.0.447
    Google Chrome
    Google Toolbar for Internet Explorer
    Google Update Helper
    Home Sweet Home
    i-Charger
    Junk Mail filter update
    Mahjong Escape Ancient China
    Malwarebytes Anti-Malware version 1.75.0.1300
    Mesh Runtime
    Microsoft .NET Framework 4 Client Profile
    Microsoft Application Error Reporting
    Microsoft Office 2010
    Microsoft Office Click-to-Run 2010
    Microsoft Office Starter 2010 - English
    Microsoft Silverlight
    Microsoft SQL Server 2005 Compact Edition [ENU]
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
    Microsoft Visual C++ 2010 x64 Redistributable - 10.0.30319
    Mobile Broadband Manager
    Mozilla Firefox 26.0 (x86 en-US)
    Mozilla Maintenance Service
    MSI Game Corner Console
    MSI HOUSE
    MSI Software Install
    MSVCRT
    MSVCRT_amd64
    Nuance PDF Reader
    Realtek Ethernet Controller Driver
    Realtek HDMI Audio Driver for ATI
    Realtek High Definition Audio Driver
    Realtek USB 2.0 Reader Driver
    REALTEK Wireless LAN Driver
    S-Bar
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2633870)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2729449)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2737019)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2742595)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2789642)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2804576)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2835393)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2840628)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2840628v2)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2858302v2)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2898855v2)
    Security Update for Microsoft .NET Framework 4 Client Profile (KB2901110v2)
    Skype Click to Call
    Skype™ 6.11
    SRS Premium Sound Control Panel
    Telstra Mobile Broadband Manager
    Update for Microsoft .NET Framework 4 Client Profile (KB2468871)
    Update for Microsoft .NET Framework 4 Client Profile (KB2533523)
    Update for Microsoft .NET Framework 4 Client Profile (KB2600217)
    Update for Microsoft .NET Framework 4 Client Profile (KB2836939v3)
    WebM Media Foundation Components
    Windows Live ???
    Windows Live ????
    Windows Live Communications Platform
    Windows Live Essentials
    Windows Live ID Sign-in Assistant
    Windows Live Installer
    Windows Live Language Selector
    Windows Live Mail
    Windows Live Mesh
    Windows Live Mesh ActiveX Control for Remote Connections
    Windows Live Messenger
    Windows Live MIME IFilter
    Windows Live Movie Maker
    Windows Live Photo Common
    Windows Live Photo Gallery
    Windows Live PIMT Platform
    Windows Live Remote Client
    Windows Live Remote Client Resources
    Windows Live Remote Service
    Windows Live Remote Service Resources
    Windows Live SOXE
    Windows Live SOXE Definitions
    Windows Live UX Platform
    Windows Live UX Platform Language Pack
    Windows Live Writer
    Windows Live Writer Resources
    WinRAR archiver
    ZTE LTE Device USB Driver
    .
    ==== Event Viewer Messages From Past Week ========
    .
    13/02/2014 8:53:48 PM, Error: Disk [11] - The driver detected a controller error on \Device\Harddisk1\DR1.
    13/02/2014 7:56:59 PM, Error: Service Control Manager [7000] - The Google Update Service (gupdate) service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.
    13/02/2014 7:56:59 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1053" attempting to start the service gupdate with arguments "/comsvc" in order to run the server: {4EB61BAC-A3B6-4760-9581-655041EF4D69}
    13/02/2014 7:56:56 PM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the Google Update Service (gupdate) service to connect.
    13/02/2014 7:56:25 PM, Error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: ESProtectionDriver
    13/02/2014 6:59:05 AM, Error: Service Control Manager [7011] - A timeout (30000 milliseconds) was reached while waiting for a transaction response from the SwiCardDetectSvc service.
    .
    ==== End Of File ===========================
     
  10. 2014/02/13
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    dds log

    DDS (Ver_2012-11-20.01) - NTFS_AMD64
    Internet Explorer: 11.0.9600.16518
    Run by Laptop at 20:55:30 on 2014-02-13
    Microsoft Windows 7 Home Premium 6.1.7601.1.1252.61.1033.18.1644.751 [GMT 10:00]
    .
    AV: avast! Antivirus *Enabled/Updated* {17AD7D40-BA12-9C46-7131-94903A54AD8B}
    SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
    SP: avast! Antivirus *Enabled/Updated* {ACCC9CA4-9C28-93C8-4B81-AFE241D3E736}
    .
    ============== Running Processes ===============
    .
    C:\windows\system32\lsm.exe
    C:\windows\system32\svchost.exe -k DcomLaunch
    C:\windows\system32\svchost.exe -k RPCSS
    C:\windows\system32\atiesrxx.exe
    C:\windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    C:\windows\System32\svchost.exe -k LocalSystemNetworkRestricted
    C:\windows\system32\svchost.exe -k LocalService
    C:\windows\system32\svchost.exe -k netsvcs
    C:\windows\system32\atieclxx.exe
    C:\windows\system32\svchost.exe -k NetworkService
    C:\windows\system32\svchost.exe -k LocalServiceNoNetwork
    C:\Program Files\AVAST Software\Avast\AvastSvc.exe
    C:\windows\system32\Dwm.exe
    C:\windows\Explorer.EXE
    C:\windows\System32\spoolsv.exe
    C:\windows\system32\taskhost.exe
    C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
    C:\Program Files\Elantech\ETDCtrl.exe
    C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE
    C:\ProgramData\FLEXnet\Connect\11\ISUSPM.exe
    C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
    C:\Program Files (x86)\Canon\IJPLM\IJPLMSVC.EXE
    C:\Program Files\SRS Labs\SRS Premium Sound Control Panel\SRSPremiumPanel_64.exe
    C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe
    C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
    C:\Program Files (x86)\S-Bar\MSIService.exe
    C:\Program Files (x86)\MSI\MSI HOUSE\MSIFoundationService.exe
    C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
    C:\Program Files (x86)\S-Bar\S-Bar.exe
    C:\Program Files (x86)\MSI\Cinema ProII\CinemaProII.exe
    C:\Program Files (x86)\MSI\Cinema ProII\Cinema ProII Controler.exe
    C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
    C:\Program Files\AVAST Software\Avast\AvastUI.exe
    C:\Program Files (x86)\MSI Game Corner\Game Console\OberonGameConsoleService.exe
    C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe
    C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe
    C:\windows\system32\svchost.exe -k imgsvc
    C:\Program Files (x86)\Sierra Wireless Inc\Common\SwiCardDetect64.exe
    C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
    C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe
    C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
    C:\windows\system32\wbem\wmiprvse.exe
    C:\windows\system32\wbem\wmiprvse.exe
    C:\Program Files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE
    C:\windows\system32\SearchIndexer.exe
    C:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
    C:\Program Files\Elantech\ETDCtrlHelper.exe
    C:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
    C:\windows\System32\svchost.exe -k secsvcs
    C:\windows\system32\svchost.exe -k SDRSVC
    C:\Program Files\Windows Media Player\wmpnetwk.exe
    C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\SeaPort.exe
    \\?\C:\windows\system32\wbem\WMIADAP.EXE
    C:\windows\system32\taskeng.exe
    C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
    C:\ProgramData\FLEXnet\Connect\11\agent.exe
    C:\windows\System32\cscript.exe
    .
    ============== Pseudo HJT Report ===============
    .
    uStart Page = hxxps://www.google.com.au/
    uDefault_Page_URL = hxxp://www.google.com
    mStart Page = hxxp://www.google.com
    mDefault_Page_URL = hxxp://www.google.com
    mWinlogon: Userinit = userinit.exe,
    BHO: Canon Easy-WebPrint EX BHO: {3785D0AD-BFFF-47F6-BF5B-A587C162FED9} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexbho.dll
    BHO: avast! Online Security: {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
    BHO: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
    BHO: Bing Bar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\BingExt.dll
    TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
    TB: Canon Easy-WebPrint EX: {759D9886-0C6F-4498-BAB6-4A5F47C6C72F} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexhlp.dll
    TB: Bing Bar: {8dcb7100-df86-4384-8842-8fa844297b3f} -
    TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
    TB: avast! Online Security: {CC1A175A-E45B-41ED-A30C-C9B1D7A0C02F} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
    EB: Canon Easy-WebPrint EX: {21347690-EC41-4F9A-8887-1F4AEE672439} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexhlp.dll
    uRun: [ISUSPM] C:\ProgramData\FLEXnet\Connect\11\ISUSPM.exe -scheduler
    uRun: [Facebook Update] "C:\Users\Laptop\AppData\Local\Facebook\Update\FacebookUpdate.exe" /c /nocrashserver
    uRun: [Skype] "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun
    mRun: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
    mRun: [S-Bar] C:\Program Files (x86)\S-Bar\S-Bar.exe
    mRun: [Cinema ProII AP] C:\Program Files (x86)\MSI\Cinema ProII\CinemaProII.exe
    mRun: [Cinema ProII Controler] C:\Program Files (x86)\MSI\Cinema ProII\Cinema ProII Controler.exe
    mRun: [Nuance PDF Reader-reminder] "C:\Program Files (x86)\Nuance\PDF Reader\Ereg\Ereg.exe" -r "C:\ProgramData\Nuance\PDF Reader\Ereg\Ereg.ini "
    mRun: [CanonSolutionMenuEx] C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE /logon
    mRun: [BigPondWirelessBroadbandCM] "C:\Program Files (x86)\Telstra\Mobile Broadband Manager\TelstraUCM.exe" -tsr
    mRun: [AvastUI.exe] "C:\Program Files\AVAST Software\Avast\AvastUI.exe" /nogui
    StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\SRSPCS~1.LNK - C:\Program Files\SRS Labs\SRS Premium Sound Control Panel\SRSPremiumPanel_64.exe
    mPolicies-Explorer: NoActiveDesktop = dword:1
    mPolicies-Explorer: NoActiveDesktopChanges = dword:1
    mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
    mPolicies-System: ConsentPromptBehaviorUser = dword:3
    mPolicies-System: EnableUIADesktopToggle = dword:0
    IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
    TCP: NameServer = 10.0.0.138
    TCP: Interfaces\{3A6CB2BF-332E-4E54-93F6-DAE34BC16DDF} : NameServer = 10.5.133.45 10.5.136.242
    TCP: Interfaces\{62A40AC7-A121-4199-BED8-065674228879} : NameServer = 10.5.136.242 10.5.133.45
    TCP: Interfaces\{A1BCC920-46D3-4099-B72B-B4927046C821} : DHCPNameServer = 192.168.0.1
    TCP: Interfaces\{B22B735C-582A-4F6F-91B6-63B0C93842FA} : NameServer = 10.5.136.242 10.5.133.45
    TCP: Interfaces\{E10D322A-2CC4-4884-9598-AF74D3AF6734} : DHCPNameServer = 10.0.0.138
    Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
    Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll
    Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
    SSODL: WebCheck - <orphaned>
    mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "C:\Program Files (x86)\Google\Chrome\Application\32.0.1700.107\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
    x64-mStart Page = hxxp://www.google.com
    x64-mDefault_Page_URL = hxxp://www.google.com
    x64-BHO: avast! Online Security: {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE64.dll
    x64-BHO: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    x64-BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll
    x64-TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll
    x64-TB: avast! Online Security: {CC1A175A-E45B-41ED-A30C-C9B1D7A0C02F} - C:\Program Files\AVAST Software\Avast\aswWebRepIE64.dll
    x64-Run: [RtHDVCpl] C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe -s
    x64-Run: [ETDCtrl] C:\Program Files (x86)\Elantech\ETDCtrl.exe
    x64-Run: [CanonMyPrinter] C:\Program Files\Canon\MyPrinter\BJMyPrt.exe /logon
    x64-IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - <orphaned>
    x64-DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    x64-Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll
    x64-Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - <orphaned>
    x64-Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - <orphaned>
    x64-SSODL: WebCheck - <orphaned>
    .
    ================= FIREFOX ===================
    .
    FF - ProfilePath - C:\Users\Laptop\AppData\Roaming\Mozilla\Firefox\Profiles\qjhz9ibe.default\
    FF - plugin: C:\PROGRA~2\MICROS~1\Office14\NPSPWRAP.DLL
    FF - plugin: C:\Program Files (x86)\Canon\Easy-PhotoPrint EX\NPEZFFPI.DLL
    FF - plugin: C:\Program Files (x86)\Google\Update\1.3.22.3\npGoogleUpdate3.dll
    FF - plugin: c:\Program Files (x86)\Microsoft Silverlight\5.1.20913.0\npctrlui.dll
    FF - plugin: C:\Program Files (x86)\Nuance\PDF Reader\bin\nppdf.dll
    FF - plugin: C:\Program Files (x86)\Nuance\PDF Reader\Bin\nppdf.dll
    FF - plugin: C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll
    FF - plugin: C:\Users\Laptop\AppData\Local\Facebook\Video\Skype\npFacebookVideoCalling.dll
    .
    ============= SERVICES / DRIVERS ===============
    .
    R0 amd_sata;amd_sata;C:\windows\System32\drivers\amd_sata.sys [2011-8-3 79488]
    R0 amd_xata;amd_xata;C:\windows\System32\drivers\amd_xata.sys [2011-8-3 40064]
    R0 aswRvrt;avast! Revert;C:\windows\System32\drivers\aswRvrt.sys [2014-2-13 65776]
    R0 aswVmm;avast! VM Monitor;C:\windows\System32\drivers\aswVmm.sys [2014-2-13 207904]
    R1 aswSnx;aswSnx;C:\windows\System32\drivers\aswSnx.sys [2014-2-13 1038072]
    R1 aswSP;aswSP;C:\windows\System32\drivers\aswSP.sys [2014-2-13 421704]
    R2 AMD External Events Utility;AMD External Events Utility;C:\windows\System32\atiesrxx.exe [2011-8-3 204288]
    R2 AMD FUEL Service;AMD FUEL Service;C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [2011-6-28 365568]
    R2 aswMonFlt;aswMonFlt;C:\windows\System32\drivers\aswMonFlt.sys [2014-2-13 78648]
    R2 avast! Antivirus;avast! Antivirus;C:\Program Files\AVAST Software\Avast\AvastSvc.exe [2014-2-13 50344]
    R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-19 130384]
    R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-19 138576]
    R2 cvhsvc;Client Virtualization Handler;C:\Program Files (x86)\Common Files\microsoft shared\Virtualization Handler\CVHSVC.EXE [2013-4-22 822504]
    R3 amdiox64;AMD IO Driver;C:\windows\System32\drivers\amdiox64.sys [2011-8-3 46136]
    R3 aswStm;aswStm;C:\windows\System32\drivers\aswStm.sys [2014-2-13 80184]
    R3 BBUpdate;BBUpdate;C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\SeaPort.EXE [2012-6-11 240208]
    R3 ETD;ELAN PS/2 Port Input Device;C:\windows\System32\drivers\ETD.sys [2011-8-3 142632]
    R3 huawei_enumerator;huawei_enumerator;C:\windows\System32\drivers\ew_jubusenum.sys [2013-11-28 87040]
    R3 MBAMProtector;MBAMProtector;C:\windows\System32\drivers\mbam.sys [2014-2-12 25928]
    R3 RTL8167;Realtek 8167 NT Driver;C:\windows\System32\drivers\Rt64win7.sys [2011-8-3 408680]
    R3 RTL8192Ce;Realtek Wireless LAN 802.11n PCI-E NIC Driver;C:\windows\System32\drivers\rtl8192ce.sys [2011-8-3 1105000]
    R3 Sftfs;Sftfs;C:\windows\System32\drivers\Sftfslh.sys [2013-6-26 767144]
    R3 Sftplay;Sftplay;C:\windows\System32\drivers\Sftplaylh.sys [2013-6-26 273576]
    R3 Sftredir;Sftredir;C:\windows\System32\drivers\Sftredirlh.sys [2013-6-26 28840]
    R3 Sftvol;Sftvol;C:\windows\System32\drivers\Sftvollh.sys [2013-6-26 23208]
    R3 usbfilter;AMD USB Filter Driver;C:\windows\System32\drivers\usbfilter.sys [2011-8-3 44672]
    S2 BBSvc;BingBar Service;C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\BBSvc.EXE [2012-6-11 193616]
    S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;C:\windows\System32\drivers\AtihdW76.sys [2011-8-3 231440]
    S3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;C:\windows\System32\drivers\ew_hwusbdev.sys [2013-11-28 117248]
    S3 ew_usbenumfilter;huawei_CompositeFilter;C:\windows\System32\drivers\ew_usbenumfilter.sys [2013-11-28 13952]
    S3 ewusbmbb;HUAWEI USB-WWAN miniport;C:\windows\System32\drivers\ewusbwwan.sys [2013-11-28 422400]
    S3 massfilter;Mass Storage Filter Driver;C:\windows\System32\drivers\massfilter.sys [2012-1-4 9216]
    S3 massfilter_lte;LTE Device Mass Storage Filter Driver;C:\windows\System32\drivers\massfilter_LTE.sys [2012-1-4 18456]
    S3 RSUSBVSTOR;RtsUVStor.Sys Realtek USB Card Reader;C:\windows\System32\drivers\RtsUVStor.sys [2011-8-3 307304]
    S3 swg3kser00;Sierra Wireless QMI USB Device for Legacy Serial Communication;C:\windows\System32\drivers\swg3kser00.sys [2012-5-17 258432]
    S3 swiwdmbx;Sierra Wireless USB Bus Service;C:\windows\System32\drivers\swiwdmbx64.sys [2012-5-17 109312]
    S3 SWNC8UA3;Sierra Wireless MUX NDIS Driver (UMTSA3);C:\windows\System32\drivers\swnc8ua3.sys [2012-5-17 249344]
    S3 TsUsbFlt;TsUsbFlt;C:\windows\System32\drivers\TsUsbFlt.sys [2010-11-21 59392]
    S3 TsUsbGD;Remote Desktop Generic USB Device;C:\windows\System32\drivers\TsUsbGD.sys [2010-11-21 31232]
    .
    =============== Created Last 30 ================
    .
    2014-02-12 22:00:14 -------- d-----w- C:\Users\Laptop\AppData\Roaming\AVAST Software
    2014-02-12 21:58:11 80184 ----a-w- C:\windows\System32\drivers\aswStm.sys
    2014-02-12 21:58:11 207904 ----a-w- C:\windows\System32\drivers\aswVmm.sys
    2014-02-12 21:58:10 92544 ----a-w- C:\windows\System32\drivers\aswRdr2.sys
    2014-02-12 21:58:10 78648 ----a-w- C:\windows\System32\drivers\aswMonFlt.sys
    2014-02-12 21:58:10 65776 ----a-w- C:\windows\System32\drivers\aswRvrt.sys
    2014-02-12 21:58:10 1038072 ----a-w- C:\windows\System32\drivers\aswSnx.sys
    2014-02-12 21:57:59 43152 ----a-w- C:\windows\avastSS.scr
    2014-02-12 21:57:01 -------- d-----w- C:\Program Files\AVAST Software
    2014-02-12 21:55:31 -------- d-----w- C:\ProgramData\AVAST Software
    2014-02-12 21:27:27 167424 ----a-w- C:\Program Files\Windows Media Player\wmplayer.exe
    2014-02-12 21:27:27 164864 ----a-w- C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    2014-02-12 21:27:26 12625920 ----a-w- C:\windows\System32\wmploc.DLL
    2014-02-12 21:27:25 12625408 ----a-w- C:\windows\SysWow64\wmploc.DLL
    2014-02-12 21:03:17 548864 ----a-w- C:\windows\System32\vbscript.dll
    2014-02-12 21:03:17 454656 ----a-w- C:\windows\SysWow64\vbscript.dll
    2014-02-12 16:02:36 -------- d-----w- C:\Users\Laptop\AppData\Local\Axialis
    2014-02-12 14:50:01 -------- d-----w- C:\Users\Laptop\AppData\Local\Mozilla
    2014-02-12 13:54:36 -------- d-----w- C:\windows\ERUNT
    2014-02-12 13:37:41 -------- d-----w- C:\AdwCleaner
    2014-02-12 12:57:17 1882112 ----a-w- C:\windows\System32\msxml3.dll
    2014-02-12 12:57:16 2048 ----a-w- C:\windows\SysWow64\msxml3r.dll
    2014-02-12 12:57:16 2048 ----a-w- C:\windows\System32\msxml3r.dll
    2014-02-12 12:57:16 1237504 ----a-w- C:\windows\SysWow64\msxml3.dll
    2014-02-12 12:57:13 335360 ----a-w- C:\windows\System32\msieftp.dll
    2014-02-12 12:57:12 301568 ----a-w- C:\windows\SysWow64\msieftp.dll
    2014-02-12 12:53:22 465920 ----a-w- C:\windows\System32\WMPhoto.dll
    2014-02-12 12:53:22 417792 ----a-w- C:\windows\SysWow64\WMPhoto.dll
    2014-02-12 12:50:42 10315576 ----a-w- C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{A1C82590-7BFA-4B43-A384-4B772269CC10}\mpengine.dll
    2014-02-12 12:50:37 81408 ----a-w- C:\windows\System32\imagehlp.dll
    2014-02-12 12:50:37 159232 ----a-w- C:\windows\SysWow64\imagehlp.dll
    2014-02-12 12:50:30 2048 ----a-w- C:\windows\SysWow64\tzres.dll
    2014-02-12 12:50:30 2048 ----a-w- C:\windows\System32\tzres.dll
    2014-02-12 12:42:09 99840 ----a-w- C:\windows\System32\drivers\usbccgp.sys
    2014-02-12 12:42:09 53248 ----a-w- C:\windows\System32\drivers\usbehci.sys
    2014-02-12 12:42:09 343040 ----a-w- C:\windows\System32\drivers\usbhub.sys
    2014-02-12 12:42:09 325120 ----a-w- C:\windows\System32\drivers\usbport.sys
    2014-02-12 12:42:09 30720 ----a-w- C:\windows\System32\drivers\usbuhci.sys
    2014-02-12 12:42:09 25600 ----a-w- C:\windows\System32\drivers\usbohci.sys
    2014-02-12 12:42:08 7808 ----a-w- C:\windows\System32\drivers\usbd.sys
    2014-02-12 12:40:24 1987584 ----a-w- C:\windows\SysWow64\d3d10warp.dll
    2014-02-12 12:40:23 3928064 ----a-w- C:\windows\System32\d2d1.dll
    2014-02-12 12:40:23 2565120 ----a-w- C:\windows\System32\d3d10warp.dll
    2014-02-12 12:40:22 3419136 ----a-w- C:\windows\SysWow64\d2d1.dll
    2014-02-12 12:40:15 3156480 ----a-w- C:\windows\System32\win32k.sys
    2014-02-12 12:40:11 376768 ----a-w- C:\windows\System32\drivers\netio.sys
    2014-02-12 12:31:52 202752 ----a-w- C:\windows\System32\scrrun.dll
    2014-02-12 12:31:52 168960 ----a-w- C:\windows\System32\wscript.exe
    2014-02-12 12:31:52 163840 ----a-w- C:\windows\SysWow64\scrrun.dll
    2014-02-12 12:31:52 156160 ----a-w- C:\windows\System32\cscript.exe
    2014-02-12 12:31:52 150016 ----a-w- C:\windows\System32\wshom.ocx
    2014-02-12 12:31:52 141824 ----a-w- C:\windows\SysWow64\wscript.exe
    2014-02-12 12:31:52 121856 ----a-w- C:\windows\SysWow64\wshom.ocx
    2014-02-12 12:31:51 126976 ----a-w- C:\windows\SysWow64\cscript.exe
    2014-02-12 11:58:17 -------- d-----w- C:\Users\Laptop\AppData\Roaming\Malwarebytes
    2014-02-12 11:57:39 -------- d-----w- C:\ProgramData\Malwarebytes
    2014-02-12 11:57:35 25928 ----a-w- C:\windows\System32\drivers\mbam.sys
    2014-02-12 11:57:34 -------- d-----w- C:\Program Files (x86)\Malwarebytes' Anti-Malware
    .
    ==================== Find3M ====================
    .
    2014-02-12 13:19:46 71048 ----a-w- C:\windows\SysWow64\FlashPlayerCPLApp.cpl
    2014-02-12 13:19:46 692616 ----a-w- C:\windows\SysWow64\FlashPlayerApp.exe
    2014-02-06 11:30:46 2724864 ----a-w- C:\windows\System32\mshtml.tlb
    2014-02-06 11:30:12 4096 ----a-w- C:\windows\System32\ieetwcollectorres.dll
    2014-02-06 11:07:39 66048 ----a-w- C:\windows\System32\iesetup.dll
    2014-02-06 11:06:47 48640 ----a-w- C:\windows\System32\ieetwproxystub.dll
    2014-02-06 10:49:03 139264 ----a-w- C:\windows\System32\ieUnatt.exe
    2014-02-06 10:48:45 111616 ----a-w- C:\windows\System32\ieetwcollector.exe
    2014-02-06 10:48:11 708608 ----a-w- C:\windows\System32\jscript9diag.dll
    2014-02-06 10:20:26 2724864 ----a-w- C:\windows\SysWow64\mshtml.tlb
    2014-02-06 10:11:37 5768704 ----a-w- C:\windows\System32\jscript9.dll
    2014-02-06 10:01:36 61952 ----a-w- C:\windows\SysWow64\iesetup.dll
    2014-02-06 10:00:46 51200 ----a-w- C:\windows\SysWow64\ieetwproxystub.dll
    2014-02-06 09:50:32 2041856 ----a-w- C:\windows\System32\inetcpl.cpl
    2014-02-06 09:47:22 112128 ----a-w- C:\windows\SysWow64\ieUnatt.exe
    2014-02-06 09:46:27 553472 ----a-w- C:\windows\SysWow64\jscript9diag.dll
    2014-02-06 09:25:36 4244480 ----a-w- C:\windows\SysWow64\jscript9.dll
    2014-02-06 09:24:52 2334208 ----a-w- C:\windows\System32\wininet.dll
    2014-02-06 09:09:30 1964032 ----a-w- C:\windows\SysWow64\inetcpl.cpl
    2014-02-06 08:41:35 1820160 ----a-w- C:\windows\SysWow64\wininet.dll
    2013-12-17 20:13:56 270496 ------w- C:\windows\System32\MpSigStub.exe
    2013-12-04 02:27:33 485888 ----a-w- C:\windows\System32\secproc_isv.dll
    2013-12-04 02:27:33 123392 ----a-w- C:\windows\System32\secproc_ssp_isv.dll
    2013-12-04 02:27:33 123392 ----a-w- C:\windows\System32\secproc_ssp.dll
    2013-12-04 02:27:16 488448 ----a-w- C:\windows\System32\secproc.dll
    2013-12-04 02:26:32 528384 ----a-w- C:\windows\System32\msdrm.dll
    2013-12-04 02:16:51 658432 ----a-w- C:\windows\System32\RMActivate_isv.exe
    2013-12-04 02:16:51 626176 ----a-w- C:\windows\System32\RMActivate.exe
    2013-12-04 02:16:50 552960 ----a-w- C:\windows\System32\RMActivate_ssp_isv.exe
    2013-12-04 02:16:48 553984 ----a-w- C:\windows\System32\RMActivate_ssp.exe
    2013-12-04 02:03:20 87040 ----a-w- C:\windows\SysWow64\secproc_ssp_isv.dll
    2013-12-04 02:03:20 87040 ----a-w- C:\windows\SysWow64\secproc_ssp.dll
    2013-12-04 02:03:20 423936 ----a-w- C:\windows\SysWow64\secproc_isv.dll
    2013-12-04 02:03:08 428032 ----a-w- C:\windows\SysWow64\secproc.dll
    2013-12-04 02:02:06 390144 ----a-w- C:\windows\SysWow64\msdrm.dll
    2013-12-04 01:54:14 510976 ----a-w- C:\windows\SysWow64\RMActivate_ssp.exe
    2013-12-04 01:54:10 594944 ----a-w- C:\windows\SysWow64\RMActivate_isv.exe
    2013-12-04 01:54:09 572416 ----a-w- C:\windows\SysWow64\RMActivate.exe
    2013-12-04 01:54:06 508928 ----a-w- C:\windows\SysWow64\RMActivate_ssp_isv.exe
    .
    ============= FINISH: 20:57:24.28 ===============
     
  11. 2014/02/13
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You abandoned this topic in the past: http://www.windowsbbs.com/malware-virus-removal/106151-inactive-infected-dell-laptop.html
    If it happens again you won't be able to receive any more help in malware removal forum.

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running any tools, fixes or applying any changes to your computer other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

    =====================================

    [​IMG] Download RogueKiller from one of the following links and save it to your Desktop:
    • Close all the running programs
    • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
    • Otherwise just double-click on RogueKiller.exe
    • Pre-scan will start. Let it finish.
    • Click on SCAN button.
    • Wait until the Status box shows Scan Finished
    • Click on Delete.
    • Wait until the Status box shows Deleting Finished.
    • Click on Report and copy/paste the content of the Notepad into your next reply.
    • RKreport.txt could also be found on your desktop.
    • If more than one log is produced post all logs.
    • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again

    [​IMG] Create new restore point before proceeding with the next step....
    How to: http://www.smartestcomputing.us.com/topic/63983-how-to-create-new-restore-point-all-windows/

    Download Malwarebytes Anti-Rootkit (MBAR) from HERE
    • Unzip downloaded file.
    • Open the folder where the contents were unzipped and run mbar.exe
    • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    • Wait while the system shuts down and the cleanup process is performed.
    • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt
     
  12. 2014/02/14
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    TXT files as requested

    RogueKiller V8.8.7 [Feb 11 2014] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
    Feedback : http://forum.adlice.com
    Website : http://www.adlice.com/softwares/roguekiller/
    Blog : http://www.adlice.com


    Malwarebytes Anti-Rootkit BETA 1.07.0.1009
    www.malwarebytes.org

    Database version: v2014.02.13.11

    Windows 7 Service Pack 1 x64 NTFS
    Internet Explorer 11.0.9600.16518
    Laptop :: LAPTOP-MSI [administrator]

    14/02/2014 7:59:10 AM
    mbar-log-2014-02-14 (07-59-10).txt

    Scan type: Quick scan
    Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
    Scan options disabled:
    Objects scanned: 252239
    Time elapsed: 5 hour(s), 29 minute(s), 44 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 0
    (No malicious items detected)

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 0
    (No malicious items detected)

    Physical Sectors Detected: 0
    (No malicious items detected)

    (end)




    Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
    Started in : Normal mode
    User : Laptop [Admin rights]
    Mode : Remove -- Date : 02/14/2014 07:32:53
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 0 ¤¤¤

    ¤¤¤ Registry Entries : 5 ¤¤¤
    [HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> DELETED
    [HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
    [HJ POL][PUM] HKCU\[...]\System : DisableCMD (0) -> DELETED
    [HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
    [HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

    ¤¤¤ Scheduled tasks : 2 ¤¤¤
    [V1][SUSP PATH] FixIt_F66956F4-B17B-4115-BBB0-D431EB5C3051.job : C:\Users\Laptop\AppData\Local\Temp\Fixit\DeleteAclKey.bat [-] -> DELETED
    [V2][SUSP PATH] FixIt_F66956F4-B17B-4115-BBB0-D431EB5C3051 : C:\Users\Laptop\AppData\Local\Temp\Fixit\DeleteAclKey.bat [-] -> DELETED

    ¤¤¤ Startup Entries : 0 ¤¤¤

    ¤¤¤ Web browsers : 0 ¤¤¤

    ¤¤¤ Browser Addons : 0 ¤¤¤

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

    ¤¤¤ External Hives: ¤¤¤

    ¤¤¤ Infection : ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> %SystemRoot%\System32\drivers\etc\hosts




    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST925031 5AS SATA Disk Device +++++
    --- User ---
    [MBR] ecb8687c8d90a11f4158746490c04c4a
    [BSP] 22e45268573028d4824f11a0b1546136 : Windows 7/8 MBR Code
    Partition table:
    0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 9019 Mo
    1 - [ACTIVE] ACER (0x27) [VISIBLE] Offset (sectors): 18472960 | Size: 100 Mo
    2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 18677760 | Size: 137609 Mo
    3 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 300501542 | Size: 91744 Mo
    User = LL1 ... OK!
    User = LL2 ... OK!

    +++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ USB) TOSHIBA TOSHIBA USB DRV USB Device +++++
    --- User ---
    [MBR] ca1dfc81fdfa16399aa85471805d2a4a
    [BSP] 33a07a59d299ab4ea9f4ab0156f9d86f : Windows XP MBR Code
    Partition table:
    0 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 8064 | Size: 3692 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR! ([0x32] The request is not supported. )

    Finished : << RKreport[0]_D_02142014_073253.txt >>
    RKreport[0]_S_02142014_071911.txt



    ---------------------------------------
    Malwarebytes Anti-Rootkit BETA 1.07.0.1009

    (c) Malwarebytes Corporation 2011-2012

    OS version: 6.1.7601 Windows 7 Service Pack 1 x64

    Account is Administrative

    Internet Explorer version: 11.0.9600.16518

    File system is: NTFS
    Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED, Q:\ DRIVE_FIXED
    CPU speed: 1.496000 GHz
    Memory total: 1723600896, free: 484425728

    Downloaded database version: v2014.02.13.11
    Downloaded database version: v2013.12.18.01
    =======================================
    Initializing...
    ------------ Kernel report ------------
    02/14/2014 07:58:55
    ------------ Loaded modules -----------
    \SystemRoot\system32\ntoskrnl.exe
    \SystemRoot\system32\hal.dll
    \SystemRoot\system32\kdcom.dll
    \SystemRoot\system32\mcupdate_AuthenticAMD.dll
    \SystemRoot\system32\PSHED.dll
    \SystemRoot\system32\CLFS.SYS
    \SystemRoot\system32\CI.dll
    \SystemRoot\system32\drivers\Wdf01000.sys
    \SystemRoot\system32\drivers\WDFLDR.SYS
    \SystemRoot\system32\drivers\ACPI.sys
    \SystemRoot\system32\drivers\WMILIB.SYS
    \SystemRoot\system32\drivers\msisadrv.sys
    \SystemRoot\system32\drivers\pci.sys
    \SystemRoot\system32\drivers\vdrvroot.sys
    \SystemRoot\System32\drivers\partmgr.sys
    \SystemRoot\system32\drivers\compbatt.sys
    \SystemRoot\system32\drivers\BATTC.SYS
    \SystemRoot\system32\drivers\volmgr.sys
    \SystemRoot\System32\drivers\volmgrx.sys
    \SystemRoot\system32\drivers\pciide.sys
    \SystemRoot\system32\drivers\PCIIDEX.SYS
    \SystemRoot\System32\drivers\mountmgr.sys
    \SystemRoot\system32\drivers\atapi.sys
    \SystemRoot\system32\drivers\ataport.SYS
    \SystemRoot\system32\drivers\amdsata.sys
    \SystemRoot\system32\drivers\storport.sys
    \SystemRoot\system32\drivers\amdxata.sys
    \SystemRoot\system32\drivers\amd_sata.sys
    \SystemRoot\system32\drivers\amd_xata.sys
    \SystemRoot\system32\drivers\fltmgr.sys
    \SystemRoot\system32\drivers\fileinfo.sys
    \SystemRoot\System32\Drivers\Ntfs.sys
    \SystemRoot\System32\Drivers\msrpc.sys
    \SystemRoot\System32\Drivers\ksecdd.sys
    \SystemRoot\System32\Drivers\cng.sys
    \SystemRoot\System32\drivers\pcw.sys
    \SystemRoot\System32\Drivers\Fs_Rec.sys
    \SystemRoot\system32\drivers\ndis.sys
    \SystemRoot\system32\drivers\NETIO.SYS
    \SystemRoot\System32\Drivers\ksecpkg.sys
    \SystemRoot\System32\drivers\tcpip.sys
    \SystemRoot\System32\drivers\fwpkclnt.sys
    \SystemRoot\system32\drivers\volsnap.sys
    \SystemRoot\System32\Drivers\spldr.sys
    \SystemRoot\System32\drivers\rdyboost.sys
    \SystemRoot\System32\Drivers\mup.sys
    \SystemRoot\System32\drivers\hwpolicy.sys
    \SystemRoot\System32\DRIVERS\fvevol.sys
    \SystemRoot\system32\drivers\disk.sys
    \SystemRoot\system32\drivers\CLASSPNP.SYS
    \SystemRoot\System32\Drivers\aswVmm.sys
    \SystemRoot\System32\Drivers\aswRvrt.sys
    \SystemRoot\system32\DRIVERS\cdrom.sys
    \??\C:\windows\system32\drivers\aswSnx.sys
    \??\C:\windows\system32\drivers\aswSP.sys
    \SystemRoot\System32\Drivers\Null.SYS
    \SystemRoot\System32\Drivers\Beep.SYS
    \SystemRoot\System32\drivers\vga.sys
    \SystemRoot\System32\drivers\VIDEOPRT.SYS
    \SystemRoot\System32\drivers\watchdog.sys
    \SystemRoot\System32\DRIVERS\RDPCDD.sys
    \SystemRoot\system32\drivers\rdpencdd.sys
    \SystemRoot\system32\drivers\rdprefmp.sys
    \SystemRoot\System32\Drivers\Msfs.SYS
    \SystemRoot\System32\Drivers\Npfs.SYS
    \SystemRoot\system32\DRIVERS\tdx.sys
    \SystemRoot\system32\DRIVERS\TDI.SYS
    \SystemRoot\system32\drivers\afd.sys
    \??\C:\windows\system32\drivers\aswRdr2.sys
    \SystemRoot\System32\DRIVERS\netbt.sys
    \SystemRoot\system32\DRIVERS\wfplwf.sys
    \SystemRoot\system32\DRIVERS\pacer.sys
    \SystemRoot\system32\DRIVERS\vwififlt.sys
    \SystemRoot\system32\DRIVERS\netbios.sys
    \SystemRoot\system32\DRIVERS\wanarp.sys
    \SystemRoot\system32\drivers\termdd.sys
    \SystemRoot\system32\DRIVERS\rdbss.sys
    \SystemRoot\system32\drivers\nsiproxy.sys
    \SystemRoot\system32\drivers\mssmbios.sys
    \SystemRoot\System32\drivers\discache.sys
    \SystemRoot\System32\Drivers\dfsc.sys
    \SystemRoot\system32\drivers\blbdrive.sys
    \SystemRoot\system32\DRIVERS\tunnel.sys
    \SystemRoot\system32\DRIVERS\atikmpag.sys
    \SystemRoot\system32\DRIVERS\atikmdag.sys
    \SystemRoot\System32\drivers\dxgkrnl.sys
    \SystemRoot\System32\drivers\dxgmms1.sys
    \SystemRoot\system32\drivers\HDAudBus.sys
    \SystemRoot\system32\DRIVERS\usbohci.sys
    \SystemRoot\system32\DRIVERS\USBPORT.SYS
    \SystemRoot\system32\DRIVERS\usbfilter.sys
    \SystemRoot\system32\DRIVERS\usbehci.sys
    \SystemRoot\system32\drivers\i8042prt.sys
    \SystemRoot\system32\DRIVERS\kbdclass.sys
    \SystemRoot\system32\drivers\ETD.sys
    \SystemRoot\system32\DRIVERS\mouclass.sys
    \SystemRoot\system32\drivers\CmBatt.sys
    \SystemRoot\system32\drivers\wmiacpi.sys
    \SystemRoot\system32\DRIVERS\Rt64win7.sys
    \SystemRoot\system32\DRIVERS\rtl8192Ce.sys
    \SystemRoot\system32\DRIVERS\vwifibus.sys
    \SystemRoot\system32\DRIVERS\amdppm.sys
    \SystemRoot\system32\drivers\CompositeBus.sys
    \SystemRoot\system32\DRIVERS\AgileVpn.sys
    \SystemRoot\system32\DRIVERS\rasl2tp.sys
    \SystemRoot\system32\DRIVERS\ndistapi.sys
    \SystemRoot\system32\DRIVERS\ndiswan.sys
    \SystemRoot\system32\DRIVERS\raspppoe.sys
    \SystemRoot\system32\DRIVERS\raspptp.sys
    \SystemRoot\system32\DRIVERS\rassstp.sys
    \SystemRoot\system32\drivers\swenum.sys
    \SystemRoot\system32\drivers\ks.sys
    \SystemRoot\system32\drivers\amdiox64.sys
    \SystemRoot\system32\DRIVERS\umbus.sys
    \SystemRoot\system32\DRIVERS\ew_jubusenum.sys
    \SystemRoot\system32\DRIVERS\usbhub.sys
    \SystemRoot\System32\Drivers\NDProxy.SYS
    \SystemRoot\system32\drivers\RtHDMIVX.sys
    \SystemRoot\system32\drivers\portcls.sys
    \SystemRoot\system32\drivers\drmk.sys
    \SystemRoot\system32\drivers\ksthunk.sys
    \SystemRoot\system32\drivers\RTKVHD64.sys
    \SystemRoot\System32\Drivers\crashdmp.sys
    \SystemRoot\System32\Drivers\dump_diskdump.sys
    \SystemRoot\System32\Drivers\dump_amd_sata.sys
    \SystemRoot\System32\Drivers\dump_dumpfve.sys
    \SystemRoot\system32\DRIVERS\HIDPARSE.SYS
    \SystemRoot\System32\win32k.sys
    \SystemRoot\System32\drivers\Dxapi.sys
    \SystemRoot\system32\DRIVERS\monitor.sys
    \SystemRoot\System32\TSDDD.dll
    \SystemRoot\System32\cdd.dll
    \SystemRoot\system32\drivers\luafv.sys
    \??\C:\windows\system32\drivers\aswMonFlt.sys
    \??\C:\windows\system32\drivers\mbam.sys
    \SystemRoot\system32\DRIVERS\Sftvollh.sys
    \SystemRoot\system32\DRIVERS\lltdio.sys
    \SystemRoot\system32\DRIVERS\nwifi.sys
    \SystemRoot\system32\DRIVERS\ndisuio.sys
    \SystemRoot\system32\DRIVERS\rspndr.sys
    \SystemRoot\system32\drivers\HTTP.sys
    \SystemRoot\system32\DRIVERS\bowser.sys
    \SystemRoot\System32\drivers\mpsdrv.sys
    \SystemRoot\system32\DRIVERS\mrxsmb.sys
    \SystemRoot\system32\DRIVERS\mrxsmb10.sys
    \SystemRoot\system32\DRIVERS\mrxsmb20.sys
    \SystemRoot\system32\drivers\peauth.sys
    \SystemRoot\System32\Drivers\secdrv.SYS
    \SystemRoot\system32\DRIVERS\Sftfslh.sys
    \SystemRoot\system32\DRIVERS\Sftplaylh.sys
    \SystemRoot\System32\DRIVERS\srvnet.sys
    \SystemRoot\System32\drivers\tcpipreg.sys
    \SystemRoot\System32\DRIVERS\srv2.sys
    \SystemRoot\System32\DRIVERS\srv.sys
    \SystemRoot\system32\DRIVERS\Sftredirlh.sys
    \??\C:\windows\system32\drivers\aswStm.sys
    \SystemRoot\System32\Drivers\fastfat.SYS
    \SystemRoot\system32\drivers\WudfPf.sys
    \SystemRoot\system32\DRIVERS\USBSTOR.SYS
    \SystemRoot\system32\DRIVERS\USBD.SYS
    \SystemRoot\system32\DRIVERS\WUDFRd.sys
    \??\C:\windows\system32\drivers\mbamchameleon.sys
    \??\C:\windows\system32\drivers\MBAMSwissArmy.sys
    \Windows\System32\ntdll.dll
    \Windows\System32\smss.exe
    \Windows\System32\apisetschema.dll
    \Windows\System32\autochk.exe
    \Windows\System32\shell32.dll
    \Windows\System32\comdlg32.dll
    \Windows\System32\difxapi.dll
    \Windows\System32\kernel32.dll
    \Windows\System32\psapi.dll
    \Windows\System32\usp10.dll
    \Windows\System32\msvcrt.dll
    \Windows\System32\urlmon.dll
    \Windows\System32\wininet.dll
    \Windows\System32\msctf.dll
    \Windows\System32\oleaut32.dll
    \Windows\System32\Wldap32.dll
    \Windows\System32\rpcrt4.dll
    \Windows\System32\iertutil.dll
    \Windows\System32\advapi32.dll
    \Windows\System32\sechost.dll
    \Windows\System32\lpk.dll
    \Windows\System32\setupapi.dll
    \Windows\System32\gdi32.dll
    \Windows\System32\clbcatq.dll
    \Windows\System32\ws2_32.dll
    \Windows\System32\normaliz.dll
    \Windows\System32\imm32.dll
    \Windows\System32\nsi.dll
    \Windows\System32\ole32.dll
    \Windows\System32\imagehlp.dll
    \Windows\System32\shlwapi.dll
    \Windows\System32\user32.dll
    \Windows\System32\devobj.dll
    \Windows\System32\api-ms-win-downlevel-version-l1-1-0.dll
    \Windows\System32\crypt32.dll
    \Windows\System32\api-ms-win-downlevel-normaliz-l1-1-0.dll
    \Windows\System32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
    \Windows\System32\api-ms-win-downlevel-user32-l1-1-0.dll
    \Windows\System32\wintrust.dll
    \Windows\System32\api-ms-win-downlevel-advapi32-l1-1-0.dll
    \Windows\System32\KernelBase.dll
    \Windows\System32\cfgmgr32.dll
    \Windows\System32\comctl32.dll
    \Windows\System32\api-ms-win-downlevel-ole32-l1-1-0.dll
    \Windows\System32\msasn1.dll
    ----------- End -----------
    Done!
    <<<1>>>
    Upper Device Name: \Device\Harddisk1\DR4
    Upper Device Object: 0xfffffa8001bc8060
    Upper Device Driver Name: \Driver\Disk\
    Lower Device Name: \Device\0000008b\
    Lower Device Object: 0xfffffa8004a2b060
    Lower Device Driver Name: \Driver\USBSTOR\
    <<<1>>>
    Upper Device Name: \Device\Harddisk0\DR0
    Upper Device Object: 0xfffffa80024fd3f0
    Upper Device Driver Name: \Driver\Disk\
    Lower Device Name: \Device\00000069\
    Lower Device Object: 0xfffffa80021e14f0
    Lower Device Driver Name: \Driver\amd_sata\
    <<<2>>>
    Physical Sector Size: 512
    Drive: 0, DevicePointer: 0xfffffa80024fd3f0, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
    --------- Disk Stack ------
    DevicePointer: 0xfffffa80024fe040, DeviceName: Unknown, DriverName: \Driver\partmgr\
    DevicePointer: 0xfffffa80024fd3f0, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
    DevicePointer: 0xfffffa80021e5ac0, DeviceName: Unknown, DriverName: \Driver\amd_xata\
    DevicePointer: 0xfffffa80021e14f0, DeviceName: \Device\00000069\, DriverName: \Driver\amd_sata\
    ------------ End ----------
    Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
    Upper DeviceData: 0x0, 0x0, 0x0
    Lower DeviceData: 0x0, 0x0, 0x0
    <<<3>>>
    Volume: C:
    File system type: NTFS
    SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
    <<<2>>>
    <<<3>>>
    Volume: C:
    File system type: NTFS
    SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
    Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
    <<<2>>>
    <<<3>>>
    Volume: C:
    File system type: NTFS
    SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
    Done!
    Drive 0
    Scanning MBR on drive 0...
    Inspecting partition table:
    MBR Signature: 55AA
    Disk Signature: 8CF11780

    Partition information:

    Partition 0 type is Other (0x27)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 2048 Numsec = 18470912

    Partition 1 type is Other (0x27)
    Partition is ACTIVE.
    Partition starts at LBA: 18472960 Numsec = 204800
    Partition is not bootable

    Partition 2 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 18677760 Numsec = 281823782

    Partition 3 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 300501542 Numsec = 187893578

    Disk Size: 250059350016 bytes
    Sector size: 512 bytes

    Scanning physical sectors of unpartitioned space on drive 0 (1-2047-488377168-488397168)...
    Done!
    Physical Sector Size: 512
    Drive: 1, DevicePointer: 0xfffffa8001bc8060, DeviceName: \Device\Harddisk1\DR4\, DriverName: \Driver\Disk\
    --------- Disk Stack ------
    DevicePointer: 0xfffffa8001c0d9b0, DeviceName: Unknown, DriverName: \Driver\partmgr\
    DevicePointer: 0xfffffa8001bc8060, DeviceName: \Device\Harddisk1\DR4\, DriverName: \Driver\Disk\
    DevicePointer: 0xfffffa8002197bf0, DeviceName: Unknown, DriverName: \Driver\usbfilter\
    DevicePointer: 0xfffffa8004a2b060, DeviceName: \Device\0000008b\, DriverName: \Driver\USBSTOR\
    ------------ End ----------
    Alternate DeviceName: \Device\Harddisk1\DR4\, DriverName: \Driver\Disk\
    Upper DeviceData: 0x0, 0x0, 0x0
    Lower DeviceData: 0x0, 0x0, 0x0
    Drive 1
    Scanning MBR on drive 1...
    Inspecting partition table:
    MBR Signature: 55AA
    Disk Signature: C3072E18

    Partition information:

    Partition 0 type is Other (0xc)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 8064 Numsec = 7562688

    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0 Numsec = 0

    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0 Numsec = 0

    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0 Numsec = 0

    Disk Size: 3876225024 bytes
    Sector size: 512 bytes

    Done!
    <<<2>>>
    <<<3>>>
    Volume: F:
    File system type: UNKNOWN
    Scan finished
    =======================================


    Removal queue found; removal started
    Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-0-i.mbam...
    Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\VBR-0-1-18472960-i.mbam...
    Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-0-r.mbam...
    Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-1-i.mbam...
    Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-1-r.mbam...
    Removal finished
     
  13. 2014/02/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Did you read?

    ================================

    Please download ComboFix from Here, Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    • Never rename Combofix unless instructed.
    • Close any open browsers.
    • Very Important! Temporarily disable your anti-virus and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
      If the connection is not there use restore point you created prior to running Combofix.
    • Double click on combofix.exe & follow the prompts.

    • NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG and CA Internet Security (Total Defense Internet Security) users: ComboFix will not run until AVG/CA Internet Security is uninstalled as a protective measure against the anti-virus. This is because AVG/CA Internet Security "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results ". Since AVG/CA Internet Security cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG/CA Internet Security first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.
    **Note 3: If you receive an error Illegal operation attempted on a registery key that has been marked for deletion, restart computer to fix the issue.
    **Note 4: Some infections may take some significant time to be cured. As long as your computer clock is running Combofix is still working. Be patient.


    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try the following...

    Delete Combofix file, download fresh one, but rename combofix.exe to your_name.exe BEFORE saving it to your desktop.
    Do NOT run it yet.
    Download Rkill (courtesy of BleepingComputer.com) to your desktop.
    There are 2 different versions. If one of them won't run then download and try to run the other one.
    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
    iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

    Restart computer in safe mode

    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.

    When the scan is done Notepad will open with rKill.txt log.
    NOTE. rKill.txt log will also be present on your desktop.

    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    IF you had to run rKill post BOTH logs, rKill.txt and Combofix.txt.
     
  14. 2014/02/14
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    Broni, yes i had seen your reference to the Dell laptop, and i was going to bring that up at the end. As had happened earlier if the cleaning of this laptop, i had to fly out to one of our remote communications sites for urgent maintenance, i ended up being away for nearly 2 weeks. In the interum the owner of it had come and picked it up,as he was flying out himself. So by the time i returned i had completly forgotten about it. I do appologise for not getting back to you for your help and you time on this. Thank you.
     
  15. 2014/02/14
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    Broni, Combofit .txt for this unit as follows.

    ComboFix 14-02-14.01 - Laptop 15/02/2014 10:03:37.1.1 - x64
    Microsoft Windows 7 Home Premium 6.1.7601.1.1252.61.1033.18.1644.727 [GMT 10:00]
    Running from: c:\users\Laptop\Desktop\ComboFix.exe
    AV: avast! Antivirus *Disabled/Updated* {17AD7D40-BA12-9C46-7131-94903A54AD8B}
    SP: avast! Antivirus *Disabled/Updated* {ACCC9CA4-9C28-93C8-4B81-AFE241D3E736}
    SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
    .
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    c:\users\Guest\AppData\Local\Kosong.Bron.Tok.txt
    c:\users\Guest\AppData\Local\Update.16.Bron.Tok.bin
    c:\users\Guest\AppData\Roaming\.#
    c:\users\Laptop\AppData\Local\Kosong.Bron.Tok.txt
    c:\users\Laptop\AppData\Roaming\.#
    c:\users\Laptop\AppData\Roaming\.#\MBX@13A4@20C2770.###
    c:\users\Laptop\AppData\Roaming\.#\MBX@13A4@20C27A0.###
    .
    .
    ((((((((((((((((((((((((( Files Created from 2014-01-15 to 2014-02-15 )))))))))))))))))))))))))))))))
    .
    .
    2014-02-15 00:16 . 2014-02-15 00:16 -------- d-----w- c:\users\Default\AppData\Local\temp
    2014-02-15 00:16 . 2014-02-15 00:16 -------- d-----w- c:\users\Guest\AppData\Local\temp
    2014-02-14 12:19 . 2014-02-14 12:19 -------- d-----w- c:\program files (x86)\WinDirStat
    2014-02-13 21:58 . 2014-02-14 03:29 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
    2014-02-13 21:55 . 2014-02-13 21:55 91352 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
    2014-02-12 22:00 . 2014-02-12 22:00 -------- d-----w- c:\users\Laptop\AppData\Roaming\AVAST Software
    2014-02-12 21:59 . 2014-02-12 21:59 -------- d-----w- c:\program files\Google
    2014-02-12 21:58 . 2014-02-12 21:58 80184 ----a-w- c:\windows\system32\drivers\aswStm.sys
    2014-02-12 21:58 . 2014-02-12 21:58 207904 ----a-w- c:\windows\system32\drivers\aswVmm.sys
    2014-02-12 21:58 . 2014-02-12 21:58 78648 ----a-w- c:\windows\system32\drivers\aswMonFlt.sys
    2014-02-12 21:58 . 2014-02-12 21:58 65776 ----a-w- c:\windows\system32\drivers\aswRvrt.sys
    2014-02-12 21:58 . 2014-02-12 21:58 421704 ----a-w- c:\windows\system32\drivers\aswSP.sys
    2014-02-12 21:58 . 2014-02-12 21:58 1038072 ----a-w- c:\windows\system32\drivers\aswSnx.sys
    2014-02-12 21:58 . 2014-02-12 21:58 92544 ----a-w- c:\windows\system32\drivers\aswRdr2.sys
    2014-02-12 21:58 . 2014-02-12 21:58 334136 ----a-w- c:\windows\system32\aswBoot.exe
    2014-02-12 21:57 . 2014-02-12 21:57 43152 ----a-w- c:\windows\avastSS.scr
    2014-02-12 21:57 . 2014-02-12 21:57 -------- d-----w- c:\program files\AVAST Software
    2014-02-12 21:55 . 2014-02-12 21:55 -------- d-----w- c:\programdata\AVAST Software
    2014-02-12 21:27 . 2013-05-10 04:30 167424 ----a-w- c:\program files\Windows Media Player\wmplayer.exe
    2014-02-12 21:27 . 2013-05-10 03:48 164864 ----a-w- c:\program files (x86)\Windows Media Player\wmplayer.exe
    2014-02-12 21:27 . 2013-05-10 05:56 12625920 ----a-w- c:\windows\system32\wmploc.DLL
    2014-02-12 21:27 . 2013-05-10 04:56 12625408 ----a-w- c:\windows\SysWow64\wmploc.DLL
    2014-02-12 21:27 . 2013-05-10 05:56 14631424 ----a-w- c:\windows\system32\wmp.dll
    2014-02-12 21:03 . 2013-12-21 09:53 548864 ----a-w- c:\windows\system32\vbscript.dll
    2014-02-12 21:03 . 2013-12-21 08:56 454656 ----a-w- c:\windows\SysWow64\vbscript.dll
    2014-02-12 16:02 . 2014-02-12 16:02 -------- d-----w- c:\users\Laptop\AppData\Local\Axialis
    2014-02-12 14:50 . 2014-02-12 14:50 -------- d-----w- c:\users\Laptop\AppData\Local\Mozilla
    2014-02-12 14:48 . 2014-02-13 21:32 75888 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{A1C82590-7BFA-4B43-A384-4B772269CC10}\offreg.dll
    2014-02-12 14:48 . 2014-02-12 14:48 -------- d-----w- c:\program files (x86)\Mozilla Maintenance Service
    2014-02-12 13:54 . 2014-02-12 13:54 -------- d-----w- c:\windows\ERUNT
    2014-02-12 13:37 . 2014-02-12 13:39 -------- d-----w- C:\AdwCleaner
    2014-02-12 12:57 . 2013-12-06 02:30 1882112 ----a-w- c:\windows\system32\msxml3.dll
    2014-02-12 12:57 . 2013-12-06 02:30 2048 ----a-w- c:\windows\system32\msxml3r.dll
    2014-02-12 12:57 . 2013-12-06 02:02 2048 ----a-w- c:\windows\SysWow64\msxml3r.dll
    2014-02-12 12:57 . 2013-12-06 02:02 1237504 ----a-w- c:\windows\SysWow64\msxml3.dll
    2014-02-12 12:57 . 2013-10-30 02:32 335360 ----a-w- c:\windows\system32\msieftp.dll
    2014-02-12 12:57 . 2013-10-30 02:19 301568 ----a-w- c:\windows\SysWow64\msieftp.dll
    2014-02-12 12:53 . 2013-11-23 18:26 417792 ----a-w- c:\windows\SysWow64\WMPhoto.dll
    2014-02-12 12:53 . 2013-11-23 17:47 465920 ----a-w- c:\windows\system32\WMPhoto.dll
    2014-02-12 12:50 . 2013-12-04 03:28 10315576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{A1C82590-7BFA-4B43-A384-4B772269CC10}\mpengine.dll
    2014-02-12 12:50 . 2013-10-19 02:18 81408 ----a-w- c:\windows\system32\imagehlp.dll
    2014-02-12 12:50 . 2013-10-19 01:36 159232 ----a-w- c:\windows\SysWow64\imagehlp.dll
    2014-02-12 12:50 . 2013-11-12 02:23 2048 ----a-w- c:\windows\system32\tzres.dll
    2014-02-12 12:50 . 2013-11-12 02:07 2048 ----a-w- c:\windows\SysWow64\tzres.dll
    2014-02-12 12:42 . 2013-11-27 01:41 343040 ----a-w- c:\windows\system32\drivers\usbhub.sys
    2014-02-12 12:42 . 2013-11-27 01:41 99840 ----a-w- c:\windows\system32\drivers\usbccgp.sys
    2014-02-12 12:42 . 2013-11-27 01:41 53248 ----a-w- c:\windows\system32\drivers\usbehci.sys
    2014-02-12 12:42 . 2013-11-27 01:41 325120 ----a-w- c:\windows\system32\drivers\usbport.sys
    2014-02-12 12:42 . 2013-11-27 01:41 25600 ----a-w- c:\windows\system32\drivers\usbohci.sys
    2014-02-12 12:42 . 2013-11-27 01:41 30720 ----a-w- c:\windows\system32\drivers\usbuhci.sys
    2014-02-12 12:42 . 2013-11-27 01:41 7808 ----a-w- c:\windows\system32\drivers\usbd.sys
    2014-02-12 12:40 . 2013-12-24 23:09 1987584 ----a-w- c:\windows\SysWow64\d3d10warp.dll
    2014-02-12 12:40 . 2013-12-24 22:48 2565120 ----a-w- c:\windows\system32\d3d10warp.dll
    2014-02-12 12:40 . 2013-11-22 22:48 3928064 ----a-w- c:\windows\system32\d2d1.dll
    2014-02-12 12:40 . 2013-11-26 08:16 3419136 ----a-w- c:\windows\SysWow64\d2d1.dll
    2014-02-12 12:40 . 2013-11-26 10:32 3156480 ----a-w- c:\windows\system32\win32k.sys
    2014-02-12 12:40 . 2013-11-26 11:40 376768 ----a-w- c:\windows\system32\drivers\netio.sys
    2014-02-12 12:31 . 2013-10-12 02:32 150016 ----a-w- c:\windows\system32\wshom.ocx
    2014-02-12 12:31 . 2013-10-12 02:31 202752 ----a-w- c:\windows\system32\scrrun.dll
    2014-02-12 12:31 . 2013-10-12 02:04 121856 ----a-w- c:\windows\SysWow64\wshom.ocx
    2014-02-12 12:31 . 2013-10-12 02:03 163840 ----a-w- c:\windows\SysWow64\scrrun.dll
    2014-02-12 12:31 . 2013-10-12 01:33 156160 ----a-w- c:\windows\system32\cscript.exe
    2014-02-12 12:31 . 2013-10-12 01:33 168960 ----a-w- c:\windows\system32\wscript.exe
    2014-02-12 12:31 . 2013-10-12 01:15 141824 ----a-w- c:\windows\SysWow64\wscript.exe
    2014-02-12 12:31 . 2013-10-12 01:15 126976 ----a-w- c:\windows\SysWow64\cscript.exe
    2014-02-12 11:58 . 2014-02-12 11:58 -------- d-----w- c:\users\Laptop\AppData\Roaming\Malwarebytes
    2014-02-12 11:57 . 2014-02-12 11:57 -------- d-----w- c:\programdata\Malwarebytes
    2014-02-12 11:57 . 2013-04-04 04:50 25928 ----a-w- c:\windows\system32\drivers\mbam.sys
    2014-02-12 11:57 . 2014-02-12 11:57 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware
    2014-01-29 04:14 . 2014-01-29 04:14 -------- d-----w- c:\users\Guest\AppData\Roaming\Telstra
    2014-01-29 04:12 . 2014-01-29 04:12 -------- d-----w- c:\users\Guest\AppData\Roaming\Sierra Wireless
    .
    .
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2014-02-12 13:19 . 2012-05-14 14:21 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
    2014-02-12 13:19 . 2012-05-14 14:21 692616 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
    2013-12-17 20:13 . 2010-11-21 03:27 270496 ------w- c:\windows\system32\MpSigStub.exe
    2013-12-04 03:18 . 2013-12-04 03:18 194048 ----a-w- c:\windows\SysWow64\elshyph.dll
    2013-12-04 03:18 . 2013-12-04 03:18 940032 ----a-w- c:\windows\system32\MsSpellCheckingFacility.exe
    2013-12-04 03:18 . 2013-12-04 03:18 645120 ----a-w- c:\windows\SysWow64\jsIntl.dll
    2013-12-04 03:18 . 2013-12-04 03:18 235008 ----a-w- c:\windows\system32\elshyph.dll
    2013-12-04 03:18 . 2013-12-04 03:18 71680 ----a-w- c:\windows\SysWow64\RegisterIEPKEYs.exe
    2013-12-04 03:18 . 2013-12-04 03:18 182272 ----a-w- c:\windows\SysWow64\msls31.dll
    2013-12-04 03:18 . 2013-12-04 03:18 62464 ----a-w- c:\windows\SysWow64\tdc.ocx
    2013-12-04 03:18 . 2013-12-04 03:18 34816 ----a-w- c:\windows\SysWow64\JavaScriptCollectionAgent.dll
    2013-12-04 03:18 . 2013-12-04 03:18 337408 ----a-w- c:\windows\SysWow64\html.iec
    2013-12-04 03:18 . 2013-12-04 03:18 24576 ----a-w- c:\windows\SysWow64\licmgr10.dll
    2013-12-04 03:18 . 2013-12-04 03:18 151552 ----a-w- c:\windows\SysWow64\iexpress.exe
    2013-12-04 03:18 . 2013-12-04 03:18 139264 ----a-w- c:\windows\SysWow64\wextract.exe
    2013-12-04 03:18 . 2013-12-04 03:18 1051136 ----a-w- c:\windows\SysWow64\mshtmlmedia.dll
    2013-12-04 03:18 . 2013-12-04 03:18 61952 ----a-w- c:\windows\SysWow64\MshtmlDac.dll
    2013-12-04 03:18 . 2013-12-04 03:18 36352 ----a-w- c:\windows\SysWow64\imgutil.dll
    2013-12-04 03:18 . 2013-12-04 03:18 13312 ----a-w- c:\windows\SysWow64\mshta.exe
    2013-12-04 03:18 . 2013-12-04 03:18 74240 ----a-w- c:\windows\SysWow64\SetIEInstalledDate.exe
    2013-12-04 03:18 . 2013-12-04 03:18 48640 ----a-w- c:\windows\SysWow64\mshtmler.dll
    2013-12-04 03:18 . 2013-12-04 03:18 111616 ----a-w- c:\windows\SysWow64\IEAdvpack.dll
    2013-12-04 03:18 . 2013-12-04 03:18 86016 ----a-w- c:\windows\SysWow64\iesysprep.dll
    2013-12-04 03:18 . 2013-12-04 03:18 942592 ----a-w- c:\windows\system32\jsIntl.dll
    2013-12-04 03:18 . 2013-12-04 03:18 86016 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
    2013-12-04 03:18 . 2013-12-04 03:18 90112 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
    2013-12-04 03:18 . 2013-12-04 03:18 52224 ----a-w- c:\windows\system32\msfeedsbs.dll
    2013-12-04 03:18 . 2013-12-04 03:18 247808 ----a-w- c:\windows\system32\msls31.dll
    2013-12-04 03:18 . 2013-12-04 03:18 13312 ----a-w- c:\windows\system32\msfeedssync.exe
    2013-12-04 03:18 . 2013-12-04 03:18 131072 ----a-w- c:\windows\system32\IEAdvpack.dll
    2013-12-04 03:18 . 2013-12-04 03:18 77312 ----a-w- c:\windows\system32\tdc.ocx
    2013-12-04 03:18 . 2013-12-04 03:18 48640 ----a-w- c:\windows\system32\mshtmler.dll
    2013-12-04 03:18 . 2013-12-04 03:18 453120 ----a-w- c:\windows\system32\dxtmsft.dll
    2013-12-04 03:18 . 2013-12-04 03:18 413696 ----a-w- c:\windows\system32\html.iec
    2013-12-04 03:18 . 2013-12-04 03:18 40448 ----a-w- c:\windows\system32\JavaScriptCollectionAgent.dll
    2013-12-04 03:18 . 2013-12-04 03:18 296960 ----a-w- c:\windows\system32\dxtrans.dll
    2013-12-04 03:18 . 2013-12-04 03:18 105984 ----a-w- c:\windows\system32\iesysprep.dll
    2013-12-04 03:18 . 2013-12-04 03:18 81408 ----a-w- c:\windows\system32\icardie.dll
    2013-12-04 03:18 . 2013-12-04 03:18 616104 ----a-w- c:\windows\system32\ieapfltr.dat
    2013-12-04 03:18 . 2013-12-04 03:18 30208 ----a-w- c:\windows\system32\licmgr10.dll
    2013-12-04 03:18 . 2013-12-04 03:18 263376 ----a-w- c:\windows\system32\iedkcs32.dll
    2013-12-04 03:18 . 2013-12-04 03:18 243200 ----a-w- c:\windows\system32\webcheck.dll
    2013-12-04 03:18 . 2013-12-04 03:18 235520 ----a-w- c:\windows\system32\url.dll
    2013-12-04 03:18 . 2013-12-04 03:18 1228800 ----a-w- c:\windows\system32\mshtmlmedia.dll
    2013-12-04 03:18 . 2013-12-04 03:18 84992 ----a-w- c:\windows\system32\mshtmled.dll
    2013-12-04 03:18 . 2013-12-04 03:18 167424 ----a-w- c:\windows\system32\iexpress.exe
    2013-12-04 03:18 . 2013-12-04 03:18 143872 ----a-w- c:\windows\system32\wextract.exe
    2013-12-04 03:18 . 2013-12-04 03:18 101376 ----a-w- c:\windows\system32\inseng.dll
    2013-12-04 03:18 . 2013-12-04 03:18 83968 ----a-w- c:\windows\system32\MshtmlDac.dll
    2013-12-04 03:18 . 2013-12-04 03:18 774144 ----a-w- c:\windows\system32\jscript.dll
    2013-12-04 03:18 . 2013-12-04 03:18 62464 ----a-w- c:\windows\system32\pngfilt.dll
    2013-12-04 03:18 . 2013-12-04 03:18 48128 ----a-w- c:\windows\system32\imgutil.dll
    2013-12-04 03:18 . 2013-12-04 03:18 147968 ----a-w- c:\windows\system32\occache.dll
    2013-12-04 03:18 . 2013-12-04 03:18 13824 ----a-w- c:\windows\system32\mshta.exe
    2013-12-04 03:18 . 2013-12-04 03:18 135680 ----a-w- c:\windows\system32\iepeers.dll
    .
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    .
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ISUSPM "= "c:\programdata\FLEXnet\Connect\11\ISUSPM.exe" [2009-05-05 222496]
    "Skype "= "c:\program files (x86)\Skype\Phone\Skype.exe" [2013-11-14 20584608]
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
    "StartCCC "= "c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2011-06-27 336384]
    "S-Bar "= "c:\program files (x86)\S-Bar\S-Bar.exe" [2011-07-11 5231104]
    "Cinema ProII AP "= "c:\program files (x86)\MSI\Cinema ProII\CinemaProII.exe" [2011-01-25 200192]
    "Cinema ProII Controler "= "c:\program files (x86)\MSI\Cinema ProII\Cinema ProII Controler.exe" [2010-06-25 1689600]
    "Nuance PDF Reader-reminder "= "c:\program files (x86)\Nuance\PDF Reader\Ereg\Ereg.exe" [2008-11-03 328992]
    "CanonSolutionMenuEx "= "c:\program files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE" [2011-08-04 1612920]
    "BigPondWirelessBroadbandCM "= "c:\program files (x86)\Telstra\Mobile Broadband Manager\TelstraUCM.exe" [2012-03-30 6213720]
    "AvastUI.exe "= "c:\program files\AVAST Software\Avast\AvastUI.exe" [2014-02-12 3767096]
    .
    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    SRS PC Sound.lnk - c:\program files\SRS Labs\SRS Premium Sound Control Panel\SRSPremiumPanel_64.exe /h [2010-12-7 1927528]
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "ConsentPromptBehaviorAdmin "= 5 (0x5)
    "ConsentPromptBehaviorUser "= 3 (0x3)
    "EnableUIADesktopToggle "= 0 (0x0)
    .
    [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
    "LoadAppInit_DLLs "=1 (0x1)
    .
    R1 ESProtectionDriver;Malwarebytes Anti-Exploit;c:\program files\Malwarebytes Anti-Exploit\MBAE.sys;c:\program files\Malwarebytes Anti-Exploit\MBAE.sys [x]
    R2 BBSvc;BingBar Service;c:\program files (x86)\Microsoft\BingBar\7.1.391.0\BBSvc.exe;c:\program files (x86)\Microsoft\BingBar\7.1.391.0\BBSvc.exe [x]
    R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x]
    R2 Skype C2C Service;Skype C2C Service;c:\programdata\Skype\Toolbars\Skype C2C Service\c2c_service.exe;c:\programdata\Skype\Toolbars\Skype C2C Service\c2c_service.exe [x]
    R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe;c:\program files (x86)\Skype\Updater\Updater.exe [x]
    R3 aswStm;aswStm;c:\windows\system32\drivers\aswStm.sys;c:\windows\SYSNATIVE\drivers\aswStm.sys [x]
    R3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW76.sys;c:\windows\SYSNATIVE\drivers\AtihdW76.sys [x]
    R3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\DRIVERS\ew_hwusbdev.sys;c:\windows\SYSNATIVE\DRIVERS\ew_hwusbdev.sys [x]
    R3 ew_usbenumfilter;huawei_CompositeFilter;c:\windows\system32\DRIVERS\ew_usbenumfilter.sys;c:\windows\SYSNATIVE\DRIVERS\ew_usbenumfilter.sys [x]
    R3 ewusbmbb;HUAWEI USB-WWAN miniport;c:\windows\system32\DRIVERS\ewusbwwan.sys;c:\windows\SYSNATIVE\DRIVERS\ewusbwwan.sys [x]
    R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe;c:\windows\SYSNATIVE\IEEtwCollector.exe [x]
    R3 massfilter;Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter.sys;c:\windows\SYSNATIVE\drivers\massfilter.sys [x]
    R3 massfilter_lte;LTE Device Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter_lte.sys;c:\windows\SYSNATIVE\drivers\massfilter_lte.sys [x]
    R3 MGHwCtrl;MGHwCtrl;c:\program files\MSI\MSI Software Install\MGHwCtrl.sys;c:\program files\MSI\MSI Software Install\MGHwCtrl.sys [x]
    R3 RSUSBVSTOR;RtsUVStor.Sys Realtek USB Card Reader;c:\windows\System32\Drivers\RtsUVStor.sys;c:\windows\SYSNATIVE\Drivers\RtsUVStor.sys [x]
    R3 swg3kser00;Sierra Wireless QMI USB Device for Legacy Serial Communication;c:\windows\system32\DRIVERS\swg3kser00.sys;c:\windows\SYSNATIVE\DRIVERS\swg3kser00.sys [x]
    R3 swiwdmbx;Sierra Wireless USB Bus Service;c:\windows\system32\DRIVERS\swiwdmbx64.sys;c:\windows\SYSNATIVE\DRIVERS\swiwdmbx64.sys [x]
    R3 SWNC8UA3;Sierra Wireless MUX NDIS Driver (UMTSA3);c:\windows\system32\DRIVERS\swnc8ua3.sys;c:\windows\SYSNATIVE\DRIVERS\swnc8ua3.sys [x]
    R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
    R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
    R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe;c:\windows\SYSNATIVE\Wat\WatAdminSvc.exe [x]
    R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe;c:\program files\Windows Live\Mesh\wlcrasvc.exe [x]
    S0 amd_sata;amd_sata;c:\windows\system32\drivers\amd_sata.sys;c:\windows\SYSNATIVE\drivers\amd_sata.sys [x]
    S0 amd_xata;amd_xata;c:\windows\system32\drivers\amd_xata.sys;c:\windows\SYSNATIVE\drivers\amd_xata.sys [x]
    S0 aswRvrt;avast! Revert; [x]
    S0 aswVmm;avast! VM Monitor; [x]
    S1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys;c:\windows\SYSNATIVE\drivers\aswSnx.sys [x]
    S1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys;c:\windows\SYSNATIVE\drivers\aswSP.sys [x]
    S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe;c:\windows\SYSNATIVE\atiesrxx.exe [x]
    S2 AMD FUEL Service;AMD FUEL Service;c:\program files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe;c:\program files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [x]
    S2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys;c:\windows\SYSNATIVE\drivers\aswMonFlt.sys [x]
    S2 cvhsvc;Client Virtualization Handler;c:\program files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE;c:\program files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [x]
    S2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [x]
    S2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [x]
    S2 Micro Star SCM;Micro Star SCM;c:\program files (x86)\S-Bar\MSIService.exe;c:\program files (x86)\S-Bar\MSIService.exe [x]
    S2 MSI Foundation Service;MSI Foundation Service;c:\program files (x86)\MSI\MSI HOUSE\MSIFoundationService.exe;c:\program files (x86)\MSI\MSI HOUSE\MSIFoundationService.exe [x]
    S2 OberonGameConsoleService;Oberon Media Game Console service;c:\program files (x86)\MSI Game Corner\Game Console\OberonGameConsoleService.exe;c:\program files (x86)\MSI Game Corner\Game Console\OberonGameConsoleService.exe [x]
    S2 sftlist;Application Virtualization Client;c:\program files (x86)\Microsoft Application Virtualization Client\sftlist.exe;c:\program files (x86)\Microsoft Application Virtualization Client\sftlist.exe [x]
    S2 SwiCardDetectSvc;Sierra Wireless Card Detection Service;c:\program files (x86)\Sierra Wireless Inc\Common\SwiCardDetect64.exe;c:\program files (x86)\Sierra Wireless Inc\Common\SwiCardDetect64.exe [x]
    S3 amdiox64;AMD IO Driver;c:\windows\system32\drivers\amdiox64.sys;c:\windows\SYSNATIVE\drivers\amdiox64.sys [x]
    S3 BBUpdate;BBUpdate;c:\program files (x86)\Microsoft\BingBar\7.1.391.0\SeaPort.exe;c:\program files (x86)\Microsoft\BingBar\7.1.391.0\SeaPort.exe [x]
    S3 ETD;ELAN PS/2 Port Input Device;c:\windows\system32\drivers\ETD.sys;c:\windows\SYSNATIVE\drivers\ETD.sys [x]
    S3 huawei_enumerator;huawei_enumerator;c:\windows\system32\DRIVERS\ew_jubusenum.sys;c:\windows\SYSNATIVE\DRIVERS\ew_jubusenum.sys [x]
    S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys;c:\windows\SYSNATIVE\drivers\mbam.sys [x]
    S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x]
    S3 RTL8192Ce;Realtek Wireless LAN 802.11n PCI-E NIC Driver;c:\windows\system32\DRIVERS\rtl8192Ce.sys;c:\windows\SYSNATIVE\DRIVERS\rtl8192Ce.sys [x]
    S3 Sftfs;Sftfs;c:\windows\system32\DRIVERS\Sftfslh.sys;c:\windows\SYSNATIVE\DRIVERS\Sftfslh.sys [x]
    S3 Sftplay;Sftplay;c:\windows\system32\DRIVERS\Sftplaylh.sys;c:\windows\SYSNATIVE\DRIVERS\Sftplaylh.sys [x]
    S3 Sftredir;Sftredir;c:\windows\system32\DRIVERS\Sftredirlh.sys;c:\windows\SYSNATIVE\DRIVERS\Sftredirlh.sys [x]
    S3 Sftvol;Sftvol;c:\windows\system32\DRIVERS\Sftvollh.sys;c:\windows\SYSNATIVE\DRIVERS\Sftvollh.sys [x]
    S3 sftvsa;Application Virtualization Service Agent;c:\program files (x86)\Microsoft Application Virtualization Client\sftvsa.exe;c:\program files (x86)\Microsoft Application Virtualization Client\sftvsa.exe [x]
    S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\DRIVERS\usbfilter.sys;c:\windows\SYSNATIVE\DRIVERS\usbfilter.sys [x]
    .
    .
    --- Other Services/Drivers In Memory ---
    .
    *NewlyCreated* - ASWRVRT
    *NewlyCreated* - ASWSP
    .
    [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
    2014-02-12 14:46 1211720 ----a-w- c:\program files (x86)\Google\Chrome\Application\32.0.1700.107\Installer\chrmstp.exe
    .
    Contents of the 'Scheduled Tasks' folder
    .
    2014-02-14 c:\windows\Tasks\Adobe Flash Player Updater.job
    - c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-05-14 13:19]
    .
    2014-02-14 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-3605120656-3930247630-567234770-1001Core.job
    - c:\users\Laptop\AppData\Local\Facebook\Update\FacebookUpdate.exe [2012-05-26 20:40]
    .
    2014-02-14 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-3605120656-3930247630-567234770-1001UA.job
    - c:\users\Laptop\AppData\Local\Facebook\Update\FacebookUpdate.exe [2012-05-26 20:40]
    .
    2014-02-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-05-19 11:36]
    .
    2014-02-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-05-19 11:36]
    .
    .
    --------- X64 Entries -----------
    .
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
    @= "{472083B0-C522-11CF-8763-00608CC02F24} "
    [HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
    2014-02-12 21:58 287280 ----a-w- c:\program files\AVAST Software\Avast\ashShA64.dll
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "RtHDVCpl "= "c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2010-12-14 11697768]
    "CanonMyPrinter "= "c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2011-03-14 2779024]
    .
    ------- Supplementary Scan -------
    .
    uLocal Page = c:\windows\system32\blank.htm
    uStart Page = https://www.google.com.au/
    mDefault_Page_URL = hxxp://www.google.com
    mStart Page = hxxp://www.google.com
    mLocal Page = c:\windows\SysWOW64\blank.htm
    TCP: DhcpNameServer = 10.0.0.138
    TCP: Interfaces\{3A6CB2BF-332E-4E54-93F6-DAE34BC16DDF}: NameServer = 10.5.133.45 10.5.136.242
    TCP: Interfaces\{62A40AC7-A121-4199-BED8-065674228879}: NameServer = 10.5.136.242 10.5.133.45
    TCP: Interfaces\{B22B735C-582A-4F6F-91B6-63B0C93842FA}: NameServer = 10.5.136.242 10.5.133.45
    FF - ProfilePath - c:\users\Laptop\AppData\Roaming\Mozilla\Firefox\Profiles\qjhz9ibe.default\
    .
    - - - - ORPHANS REMOVED - - - -
    .
    Toolbar-Locked - (no file)
    Toolbar-10 - (no file)
    HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
    Toolbar-Locked - (no file)
    Toolbar-10 - (no file)
    HKLM-Run-ETDCtrl - c:\program files (x86)\Elantech\ETDCtrl.exe
    .
    .
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @= "FlashBroker "
    "LocalizedString "= "@c:\\windows\\system32\\Macromed\\Flash\\FlashUtil64_12_0_0_44_ActiveX.exe,-101 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
    "Enabled "=dword:00000001
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
    @= "c:\\windows\\system32\\Macromed\\Flash\\FlashUtil64_12_0_0_44_ActiveX.exe "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
    @= "{FAB3E735-69C7-453B-A446-B6823C6DF1C9} "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @= "IFlashBroker5 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
    @= "{00020424-0000-0000-C000-000000000046} "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
    @= "{FAB3E735-69C7-453B-A446-B6823C6DF1C9} "
    "Version "= "1.0 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @= "FlashBroker "
    "LocalizedString "= "@c:\\windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_12_0_0_44_ActiveX.exe,-101 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
    "Enabled "=dword:00000001
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
    @= "c:\\windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_12_0_0_44_ActiveX.exe "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
    @= "{FAB3E735-69C7-453B-A446-B6823C6DF1C9} "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
    @Denied: (A 2) (Everyone)
    @= "Shockwave Flash Object "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
    @= "c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_44.ocx "
    "ThreadingModel "= "Apartment "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
    @= "0 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
    @= "ShockwaveFlash.ShockwaveFlash.11 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
    @= "c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_44.ocx, 1 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
    @= "{D27CDB6B-AE6D-11cf-96B8-444553540000} "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
    @= "1.0 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
    @= "ShockwaveFlash.ShockwaveFlash "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
    @Denied: (A 2) (Everyone)
    @= "Macromedia Flash Factory Object "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
    @= "c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_44.ocx "
    "ThreadingModel "= "Apartment "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
    @= "FlashFactory.FlashFactory.1 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
    @= "c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_44.ocx, 1 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
    @= "{D27CDB6B-AE6D-11cf-96B8-444553540000} "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
    @= "1.0 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
    @= "FlashFactory.FlashFactory "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @= "IFlashBroker5 "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
    @= "{00020424-0000-0000-C000-000000000046} "
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
    @= "{FAB3E735-69C7-453B-A446-B6823C6DF1C9} "
    "Version "= "1.0 "
    .
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    .
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    .
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial "=dword:00000000
    .
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
    @Denied: (Full) (Everyone)
    .
    Completion time: 2014-02-15 10:22:55
    ComboFix-quarantined-files.txt 2014-02-15 00:22
    .
    Pre-Run: 91,090,710,528 bytes free
    Post-Run: 92,396,371,968 bytes free
    .
    - - End Of File - - 69C049588C5D0B049565F12BB57F92ED
    A36C5E4F47E84449FF07ED3517B43A31


    Cheers
    Graham
     
  16. 2014/02/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Looks good.

    [​IMG] Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on adwcleaner.exe to run the tool.
    • Click on Scan button.
    • When the scan has finished click on Clean button.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the contents of that logfile with your next reply.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.

    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator ".
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Post the contents of JRT.txt into your next message.

    [​IMG] Download OTL to your Desktop.
    Alternate download: http://www.itxassociates.com/OT-Tools/OTL.exe
    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Click the Scan All Users checkbox.
    • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  17. 2014/02/14
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    Broni, TXT's as requested.

    # AdwCleaner v3.018 - Report created 15/02/2014 at 12:05:37
    # Updated 28/01/2014 by Xplode
    # Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
    # Username : Laptop - LAPTOP-MSI
    # Running from : C:\Users\Laptop\Desktop\adwcleaner.exe
    # Option : Clean

    ***** [ Services ] *****


    ***** [ Files / Folders ] *****


    ***** [ Shortcuts ] *****


    ***** [ Registry ] *****

    Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
    Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1

    ***** [ Browsers ] *****

    -\\ Internet Explorer v11.0.9600.16518


    -\\ Mozilla Firefox v26.0 (en-US)

    [ File : C:\Users\Laptop\AppData\Roaming\Mozilla\Firefox\Profiles\qjhz9ibe.default\prefs.js ]


    -\\ Google Chrome v32.0.1700.107

    [ File : C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\preferences ]


    *************************

    AdwCleaner[R0].txt - [12562 octets] - [12/02/2014 23:37:44]
    AdwCleaner[R1].txt - [1151 octets] - [15/02/2014 12:03:23]
    AdwCleaner[S0].txt - [11319 octets] - [12/02/2014 23:39:08]
    AdwCleaner[S1].txt - [1077 octets] - [15/02/2014 12:05:37]

    ########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [1137 octets] ##########


    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Junkware Removal Tool (JRT) by Thisisu
    Version: 6.1.1 (02.04.2014:1)
    OS: Windows 7 Home Premium x64
    Ran by Laptop on Sat 15/02/2014 at 12:15:34.68
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




    ~~~ Services



    ~~~ Registry Values



    ~~~ Registry Keys



    ~~~ Files

    Successfully deleted: [File] C:\windows\syswow64\sho273F.tmp



    ~~~ Folders



    ~~~ Event Viewer Logs were cleared





    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Scan was completed on Sat 15/02/2014 at 12:40:24.75
    End of JRT log
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


    OTL Extras logfile created on: 2/15/2014 1:21:25 PM - Run 1
    OTL by OldTimer - Version 3.2.69.0 Folder = C:\Users\Laptop\Desktop
    64bit- Home Premium Edition Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation
    Internet Explorer (Version = 9.11.9600.16518)
    Locale: 00000409 | Country: Australia | Language: ENA | Date Format: d/MM/yyyy

    1.61 Gb Total Physical Memory | 0.80 Gb Available Physical Memory | 49.72% Memory free
    3.21 Gb Paging File | 1.94 Gb Available in Paging File | 60.34% Paging File free
    Paging file location(s): ?:\pagefile.sys [binary data]

    %SystemDrive% = C: | %SystemRoot% = C:\windows | %ProgramFiles% = C:\Program Files (x86)
    Drive C: | 134.38 Gb Total Space | 85.89 Gb Free Space | 63.92% Space Free | Partition Type: NTFS
    Drive D: | 89.59 Gb Total Space | 55.64 Gb Free Space | 62.11% Space Free | Partition Type: NTFS
    Drive F: | 3.60 Gb Total Space | 1.76 Gb Free Space | 48.94% Space Free | Partition Type: FAT32

    Computer Name: LAPTOP-MSI | User Name: Laptop | Logged in as Administrator.
    Boot Mode: Normal | Scan Mode: All users | Quick Scan | Include 64bit Scans
    Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

    ========== Extra Registry (SafeList) ==========


    ========== File Associations ==========

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
    .html[@ = htmlfile] -- C:\Program Files\Internet Explorer\iexplore.exe (Microsoft Corporation)
    .url[@ = InternetShortcut] -- C:\windows\SysNative\rundll32.exe (Microsoft Corporation)

    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
    .cpl [@ = cplfile] -- C:\windows\SysWow64\control.exe (Microsoft Corporation)
    .html [@ = htmlfile] -- C:\Program Files\Internet Explorer\iexplore.exe (Microsoft Corporation)

    ========== Shell Spawning ==========

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
    batfile [open] -- "%1" %*
    cmdfile [open] -- "%1" %*
    comfile [open] -- "%1" %*
    exefile [open] -- "%1" %*
    helpfile [open] -- Reg Error: Key error.
    htmlfile [edit] -- Reg Error: Key error.
    htmlfile [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    htmlfile [opennew] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    htmlfile [print] -- rundll32.exe %SystemRoot%\system32\mshtml.dll,PrintHTML "%1" (Microsoft Corporation)
    http [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    https [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
    InternetShortcut [open] -- "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll ",OpenURL %l (Microsoft Corporation)
    InternetShortcut [print] -- "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\mshtml.dll ",PrintHTML "%1" (Microsoft Corporation)
    piffile [open] -- "%1" %*
    regfile [merge] -- Reg Error: Key error.
    scrfile [config] -- "%1 "
    scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
    scrfile [open] -- "%1" /S
    txtfile [edit] -- Reg Error: Key error.
    Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
    Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
    Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Folder [explore] -- Reg Error: Value error.
    Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Applications\iexplore.exe [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} [OpenHomePage] -- "C:\Program Files\Internet Explorer\iexplore.exe" (Microsoft Corporation)

    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
    batfile [open] -- "%1" %*
    cmdfile [open] -- "%1" %*
    comfile [open] -- "%1" %*
    cplfile [cplopen] -- %SystemRoot%\System32\control.exe "%1 ",%* (Microsoft Corporation)
    exefile [open] -- "%1" %*
    helpfile [open] -- Reg Error: Key error.
    htmlfile [edit] -- Reg Error: Key error.
    htmlfile [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    htmlfile [opennew] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    http [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    https [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
    piffile [open] -- "%1" %*
    regfile [merge] -- Reg Error: Key error.
    scrfile [config] -- "%1 "
    scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
    scrfile [open] -- "%1" /S
    txtfile [edit] -- Reg Error: Key error.
    Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
    Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
    Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Folder [explore] -- Reg Error: Value error.
    Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Applications\iexplore.exe [open] -- "C:\Program Files\Internet Explorer\iexplore.exe" %1 (Microsoft Corporation)
    CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} [OpenHomePage] -- Reg Error: Value error.

    ========== Security Center Settings ==========

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
    "cval" = 1
    "FirewallDisableNotify" = 0
    "AntiVirusDisableNotify" = 0
    "UpdatesDisableNotify" = 0

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
    "VistaSp1" = 28 4D B2 76 41 04 CA 01 [binary data]
    "AntiVirusOverride" = 0
    "AntiSpywareOverride" = 0
    "FirewallOverride" = 0

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Vol]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]

    ========== System Restore Settings ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
    "DisableSR" = 0

    ========== Firewall Settings ==========

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall]

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile]

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
    "EnableFirewall" = 1
    "DisableNotifications" = 0

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
    "EnableFirewall" = 1
    "DisableNotifications" = 0

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
    "EnableFirewall" = 1
    "DisableNotifications" = 0

    ========== Authorized Applications List ==========

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]


    ========== Vista Active Open Ports Exception List ==========

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
    "{006ADE61-CEFA-43FE-8189-483151F62AF1}" = rport=1900 | protocol=17 | dir=out | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe |
    "{0145B135-D6FC-4E47-8445-9164A6D76ECD}" = rport=2177 | protocol=17 | dir=out | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{1E3FA74B-0A04-4078-BF0D-7B9AA451D75F}" = rport=10243 | protocol=6 | dir=out | app=system |
    "{20675C96-B2AC-48CD-A798-A078B3633863}" = rport=3702 | protocol=17 | dir=out | svc=fdrespub | app=%systemroot%\system32\svchost.exe |
    "{23E1319C-8389-441E-90DC-314623F7CE40}" = lport=rpc-epmap | protocol=6 | dir=in | svc=rpcss | name=@firewallapi.dll,-28539 |
    "{24F3FECA-BF75-4FFA-899F-13D71DA935E9}" = lport=139 | protocol=6 | dir=in | app=system |
    "{3F1C9A7A-9084-45F0-BF04-EDDC4C27CED5}" = rport=445 | protocol=6 | dir=out | app=system |
    "{47A5725F-47D7-4152-9EEA-4D5EA4779AA5}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{4E4B58D0-0389-46CB-9B47-40BC7C436C77}" = lport=10243 | protocol=6 | dir=in | app=system |
    "{5416D446-EC61-42DB-A50D-9A3B811CD963}" = rport=137 | protocol=17 | dir=out | app=system |
    "{55CCF7D6-B9C8-4041-A830-CF483AD50DFE}" = lport=2177 | protocol=6 | dir=in | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{6D73DAFC-B2FF-45D0-9695-33119FE596FC}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{6EABE138-DEF1-4DA7-BBE8-E3DBE4EA34C1}" = lport=3702 | protocol=17 | dir=in | svc=fdphost | app=%systemroot%\system32\svchost.exe |
    "{70B68EF5-B6EA-4B16-9657-FE9613FA9A64}" = rport=2177 | protocol=6 | dir=out | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{97E475B3-2DB0-4911-A4F0-2378AE1523F5}" = rport=138 | protocol=17 | dir=out | app=system |
    "{9A62734F-DD80-4E72-9448-90A96F06DFF6}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe |
    "{A1C182C9-7556-4215-B103-AA65DE17FEBD}" = lport=2869 | protocol=6 | dir=in | app=system |
    "{A34500AE-2892-4529-AA8E-F01B41C211CD}" = rport=139 | protocol=6 | dir=out | app=system |
    "{A39764F1-037C-4418-AD5A-B563855BFFDD}" = lport=rpc | protocol=6 | dir=in | svc=spooler | app=%systemroot%\system32\spoolsv.exe |
    "{A8C4757B-C1D7-44A3-8CF4-DEC6E671E2F0}" = lport=1900 | protocol=17 | dir=in | name=windows live communications platform (ssdp) |
    "{ACE54424-27F4-4E7F-8D4D-53954164CA27}" = lport=2177 | protocol=17 | dir=in | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{B661A203-47F4-4287-B8D9-D89B768A547C}" = lport=445 | protocol=6 | dir=in | app=system |
    "{B78C4AF7-939C-4610-BB26-352856BA698E}" = lport=3702 | protocol=17 | dir=in | svc=fdrespub | app=%systemroot%\system32\svchost.exe |
    "{B8A9E0ED-8E9D-4AF8-B657-630C03378883}" = lport=138 | protocol=17 | dir=in | app=system |
    "{BE9BC1A8-CB00-470F-9676-78728E63338B}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe |
    "{BFA55E7B-1392-40CA-A487-EBD52935817F}" = rport=3702 | protocol=17 | dir=out | svc=fdphost | app=%systemroot%\system32\svchost.exe |
    "{C3F43594-35F3-4881-A447-3801F92825AA}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{DDC84E9D-DA7B-4955-8FFB-80720E506967}" = rport=1900 | protocol=17 | dir=out | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe |
    "{DF9430C3-853A-4C5D-BBB1-C28AAA6C12D2}" = lport=137 | protocol=17 | dir=in | app=system |
    "{E28E7008-5EE5-40F0-917C-377C98D269A5}" = lport=2869 | protocol=6 | dir=in | name=windows live communications platform (upnp) |
    "{F56423FE-AEB7-4233-B458-8A511FF149EE}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{F8EAF4DE-4EDB-415F-A6C2-6E91C946819B}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{FEAACCF9-4663-4204-9ABC-7A55FC9BF603}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe |

    ========== Vista Active Application Exception List ==========

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
    "{0391F005-BAD1-4B82-A3B4-6D3534137958}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmplayer.exe |
    "{0B590490-415F-4C7D-9E55-7D8A405FD042}" = protocol=6 | dir=out | app=system |
    "{0C541D8C-F56E-4B1D-9F2F-B7716A42451B}" = protocol=6 | dir=in | app=c:\program files (x86)\bearshare applications\mediabar\datamngr\toolbar\dtuser.exe |
    "{1283D73A-E1E6-4FD8-A7C1-98C5C203A230}" = protocol=6 | dir=out | svc=upnphost | app=%systemroot%\system32\svchost.exe |
    "{145F0E72-A2C6-47F1-84C0-1877BD387E41}" = protocol=58 | dir=in | name=@firewallapi.dll,-28545 |
    "{1DE4228E-A8B2-40C6-A5F3-38BFC22FCCB5}" = protocol=1 | dir=in | name=@firewallapi.dll,-28543 |
    "{2221A36A-8C65-465D-9186-A9AED3E26499}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{254B93D5-C3DB-4550-A5A0-826EDB3AF69A}" = dir=in | app=c:\program files (x86)\windows live\mesh\moe.exe |
    "{28CEB232-AA12-4EC0-9027-E0DC1199583F}" = protocol=6 | dir=out | svc=upnphost | app=%systemroot%\system32\svchost.exe |
    "{39030104-045B-4F1E-BB8D-F9D3EE6DBB3C}" = protocol=6 | dir=in | app=c:\programdata\esafe\egdpsvc.exe |
    "{3F62297C-0FD3-4F04-8A89-88126EE32906}" = dir=in | app=c:\program files (x86)\windows live\contacts\wlcomm.exe |
    "{41040BAB-7281-407F-A63A-BBEFC3CA723D}" = protocol=17 | dir=in | app=c:\program files (x86)\bearshare applications\mediabar\datamngr\toolbar\dtuser.exe |
    "{43785033-35BC-487C-9280-FE4A0DF7F3C4}" = dir=in | app=c:\program files (x86)\skype\phone\skype.exe |
    "{503CA0B4-E70C-4FC2-992A-1FFB392C7174}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmplayer.exe |
    "{6AEDB455-BBCE-4C32-A1BC-649B667B9259}" = protocol=6 | dir=in | app=c:\program files (x86)\bearshare applications\bearshare\bearshare.exe |
    "{73157704-F282-4438-B2F8-255AE3770CBE}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{79EB03EA-9BED-4263-90B6-99FAFBFA3976}" = protocol=6 | dir=in | app=c:\program files (x86)\bearshare applications\bearshare\bearshare.exe |
    "{7C7E2BFD-14F7-47E3-A289-70EF08E5A13B}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{836B397E-0974-440B-B922-2B05B27D848C}" = protocol=6 | dir=in | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{8B939BA8-1DC6-4262-8747-7CEB469E3EB0}" = protocol=6 | dir=out | app=%programfiles(x86)%\windows media player\wmplayer.exe |
    "{9E452CC6-E670-442E-81CE-C86E53591789}" = protocol=17 | dir=out | app=%programfiles(x86)%\windows media player\wmplayer.exe |
    "{AA8A4AB4-E631-4147-83F5-BAD82BF37239}" = protocol=17 | dir=in | app=c:\program files (x86)\bearshare applications\bearshare\bearshare.exe |
    "{AC1FA7CD-D577-47DE-8178-2928444017A3}" = protocol=17 | dir=in | app=%programfiles(x86)%\windows media player\wmplayer.exe |
    "{BA967F57-FF38-4533-8FC6-E61D7E5B064A}" = protocol=58 | dir=out | name=@firewallapi.dll,-28546 |
    "{D81CB4D6-1327-41AA-835E-1E42E009D2A2}" = dir=in | app=c:\users\laptop\appdata\local\facebook\video\skype\facebookvideocalling.exe |
    "{DCB28A08-3BE1-481E-9CD2-2E34194A69E3}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{E37BF0B5-4A2D-4306-B686-D287B256BBD4}" = protocol=17 | dir=in | app=c:\program files (x86)\bearshare applications\bearshare\bearshare.exe |
    "{E89A992B-D9FC-46A6-9DCC-45932188E2C7}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{E9428307-A428-40EB-BBB8-DC1EAAEF2FEF}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{F297A2A8-53EC-4567-9A0A-3FEC24BE4C35}" = protocol=1 | dir=out | name=@firewallapi.dll,-28544 |
    "{F49762E2-8C1B-43CE-806E-C50AEE761BC9}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{FA88A714-A539-4E5D-8889-E36DC2C75EDD}" = dir=in | app=c:\program files (x86)\windows live\messenger\msnmsgr.exe |
    "TCP Query User{BA69AE85-CB82-4853-AA46-BD239438F680}C:\program files (x86)\bearshare applications\bearshare\bearshare.exe" = protocol=6 | dir=in | app=c:\program files (x86)\bearshare applications\bearshare\bearshare.exe |
    "UDP Query User{8AACD820-3EE7-41EF-8B6C-7AAF77CC5ABB}C:\program files (x86)\bearshare applications\bearshare\bearshare.exe" = protocol=17 | dir=in | app=c:\program files (x86)\bearshare applications\bearshare\bearshare.exe |

    ========== HKEY_LOCAL_MACHINE Uninstall List ==========

    64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
    "{00C1EF09-B5B7-4082-B1F4-C35CE7A7FCA9}" = ZTE LTE Device USB Driver
    "{1199FAD5-9546-44f3-81CF-FFDB8040B7BF}_Canon_MG3100_series" = Canon MG3100 series MP Drivers
    "{1B8ABA62-74F0-47ED-B18C-A43128E591B8}" = Windows Live ID Sign-in Assistant
    "{206BD2C5-DE08-4577-A0D7-D441A79D5A3A}" = Windows Live Remote Client Resources
    "{2998191E-A35E-47E2-BE38-7702C731D722}" = SRS Premium Sound Control Panel
    "{4B6C7001-C7D6-3710-913E-5BC23FCE91E6}" = Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148
    "{503F672D-6C84-448A-8F8F-4BC35AC83441}" = AMD APP SDK Runtime
    "{5094768B-3F53-7CEE-F29C-5DA2A1D7919E}" = AMD Fuel
    "{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}" = Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161
    "{656DEEDE-F6AC-47CA-A568-A1B4E34B5760}" = Windows Live Remote Service Resources
    "{825C7D3F-D0B3-49D5-A42B-CBB0FBE85E99}" = Windows Live Remote Client Resources
    "{847B0532-55E3-4AAF-8D7B-E3A1A7CD17E5}" = Windows Live Remote Client Resources
    "{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}" = Microsoft Silverlight
    "{90140000-006D-0409-1000-0000000FF1CE}" = Microsoft Office Click-to-Run 2010
    "{95120000-00B9-0409-1000-0000000FF1CE}" = Microsoft Application Error Reporting
    "{AE91E0F3-C49A-4EF4-8B98-A07BD409EB90}" = Windows Live Remote Service Resources
    "{C1324AF2-DF5C-A52C-B380-B7CBB67A3534}" = ccc-utility64
    "{CCEFD9B7-A152-5638-1718-8BF98C5E43E5}" = ATI Catalyst Install Manager
    "{D07A61E5-A59C-433C-BCBD-22025FA2287B}" = Windows Live Language Selector
    "{DA54F80E-261C-41A2-A855-549A144F2F59}" = Windows Live MIME IFilter
    "{DA5E371C-6333-3D8A-93A4-6FD5B20BCC6E}" = Microsoft Visual C++ 2010 x64 Redistributable - 10.0.30319
    "{DF6D988A-EEA0-4277-AAB8-158E086E439B}" = Windows Live Remote Client
    "{E02A6548-6FDE-40E2-8ED9-119D7D7E641F}" = Windows Live Remote Service
    "{E67C77C8-EC8E-C75D-9B73-2F61DB59CDC4}" = AMD Media Foundation Decoders
    "{F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4}" = Microsoft .NET Framework 4 Client Profile
    "{FAA3933C-6F0D-4350-B66B-9D7F7031343E}" = Windows Live Remote Service Resources
    "Elantech" = ETDWare PS/2-X64 8.0.5.4_WHQL
    "Microsoft .NET Framework 4 Client Profile" = Microsoft .NET Framework 4 Client Profile

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
    "{000F2A10-9CDF-47BF-9CF2-9AC87567B433}" = Windows Live Photo Common
    "{00F3295E-E3CB-6BA9-31AE-3DEFABD595CC}" = CCC Help Danish
    "{02ED7035-4F7B-5026-2A8B-126B65BD5804}" = Catalyst Control Center Profiles Mobile
    "{03241D8D-2217-42F7-9FCB-6A68D141C14D}" = Windows Live 软件包
    "{0B0F231F-CE6A-483D-AA23-77B364F75917}" = Windows Live Installer
    "{13AF0085-6FAC-2909-8DD8-B41E01DA1EF5}" = AMD VISION Engine Control Center
    "{13E22AB7-DD1F-25BD-9AE6-8400E0BAC121}" = CCC Help Turkish
    "{18455581-E099-4BA8-BC6B-F34B2F06600C}" = Google Toolbar for Internet Explorer
    "{19BA08F7-C728-469C-8A35-BFBD3633BE08}" = Windows Live Movie Maker
    "{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
    "{1F6AB0E7-8CDD-4B93-8A23-AA9EB2FEFCE4}" = Junk Mail filter update
    "{200FEC62-3C34-4D60-9CE8-EC372E01C08F}" = Windows Live SOXE Definitions
    "{21B49B4A-BBC3-4A09-9C68-6C3CC0B1EA01}" = Windows Live Messenger
    "{2318C2B1-4965-11d4-9B18-009027A5CD4F}" = Google Toolbar for Internet Explorer
    "{28006915-2739-4EBE-B5E8-49B25D32EB33}" = Atheros Client Installation Program
    "{2892E1B7-E24D-4CCB-B8A7-B63D4B66F89F}" = BurnRecovery
    "{2902F983-B4C1-44BA-B85D-5C6D52E2C441}" = Windows Live Mesh ActiveX Control for Remote Connections
    "{29373E24-AC72-424E-8F2A-FB0F9436F21F}" = Windows Live Photo Common
    "{2C865FB0-051E-4D22-AC62-428E035AEAF0}" = Windows Live Mesh
    "{317D56AC-0DB3-48F5-929A-42032DAC9AD7}" = Windows Live Writer
    "{332EBFE0-C39E-42D1-99B5-ABBBECAD71B6}" = MSI Software Install
    "{3336F667-9049-4D46-98B6-4C743EEBC5B1}" = Windows Live Photo Gallery
    "{34F4D9A4-42C2-4348-BEF4-E553C84549E7}" = Windows Live Photo Gallery
    "{368BEC2C-B7A2-4762-9213-2D8465D533CA}" = Windows Live UX Platform Language Pack
    "{3CCDB14F-8C00-1D3D-F764-F1C732B9C305}" = CCC Help Greek
    "{4484967B-6ED8-A1F5-E339-1934E3020C8B}" = CCC Help French
    "{48C0FA5E-1B15-3FFD-54ED-602ACCE8892B}" = CCC Help Portuguese
    "{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}" = Skype™ 6.11
    "{51C7AD07-C3F6-4635-8E8A-231306D810FE}" = Cisco LEAP Module
    "{5449FB4F-1802-4D5B-A6D8-087DB1142147}" = Realtek HDMI Audio Driver for ATI
    "{579684A4-DDD5-4CA3-9EA8-7BE7D9593DB4}" = Windows Live UX Platform Language Pack
    "{588CE0C0-860B-49A8-AFCF-3C69465B345F}" = Windows Live Mesh
    "{5C8AE80F-1C1F-8FB4-C4F1-60EECB534278}" = CCC Help English
    "{5F624839-947D-46EA-BD63-FD847C1AC6F1}" = BearShare
    "{622DE1BE-9EDE-49D3-B349-29D64760342A}" = 適用遠端連線的 Windows Live Mesh ActiveX 控制項
    "{62BBB2F0-E220-4821-A564-730807D2C34D}" = Realtek USB 2.0 Reader Driver
    "{63AE67AA-1AB1-4565-B4EF-ABBC5C841E8D}" = Windows Live Messenger
    "{64BF0187-F3D2-498B-99EA-163AF9AE6EC9}" = Cisco EAP-FAST Module
    "{6807427D-8D68-4D30-AF5B-0B38F8F948C8}" = Windows Live Writer Resources
    "{682B3E4F-696A-42DE-A41C-4C07EA1678B4}" = Windows Live SOXE
    "{6AB07D1C-1FFD-E5D7-2260-AA27B2F192B5}" = CCC Help Chinese Standard
    "{6CB36609-E3A6-446C-A3C1-C71E311D2B9C}" = Windows Live Movie Maker
    "{7115EEBC-DA7B-434C-B81C-EA5B26EA9A94}" = Windows Live Writer Resources
    "{74855C8E-27F6-DCCF-A08C-6A40B768C975}" = CCC Help Japanese
    "{753F0A72-59C3-41CE-A36A-F2DF2079275C}" = Windows Live Mail
    "{7B982EBD-D017-4527-BF1A-FC489EC6B100}" = Windows Live 照片库
    "{7DB11606-D621-4D3B-A7F7-25466A423AAF}" = Mobile Broadband Manager
    "{7DBBB2A8-F6A3-39B5-46D5-923196E81B66}" = CCC Help Spanish
    "{80956555-A512-4190-9CAD-B000C36D6B6B}" = Windows Live Messenger
    "{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-110209593}" = Chicken Invaders 2
    "{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-111252743}" = Mahjong Escape Ancient China
    "{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-113784233}" = Home Sweet Home
    "{83C292B7-38A5-440B-A731-07070E81A64F}" = Windows Live PIMT Platform
    "{8833FFB6-5B0C-4764-81AA-06DFEED9A476}" = Realtek Ethernet Controller Driver
    "{88C24502-3EBE-9D5C-C09D-63347E99DB27}" = CCC Help Czech
    "{8BBC7FB6-7FFD-A0A7-9104-EAD38E119D8E}" = CCC Help Russian
    "{8C612082-D6C6-163F-11B0-BAB93E1F8914}" = CCC Help Norwegian
    "{8C6D6116-B724-4810-8F2D-D047E6B7D68E}" = Mesh Runtime
    "{8DD46C6A-0056-4FEC-B70A-28BB16A1F11F}" = MSVCRT
    "{8DF41A9F-FE13-43E8-A003-5F9B55A011EE}" = Facebook Video Calling 2.0.0.447
    "{90140011-0066-0409-0000-0000000FF1CE}" = Microsoft Office Starter 2010 - English
    "{903EDF14-4E28-4463-AA5E-4AEE71C0263B}" = Windows Live Movie Maker
    "{92EA4134-10D1-418A-91E1-5A0453131A38}" = Windows Live Movie Maker
    "{94DE7548-E449-4F7D-804F-0C5CDC3A1E6A}" = EasyFace2
    "{95140000-0070-0000-0000-0000000FF1CE}" = Microsoft Office 2010
    "{992B45D0-56C5-7E4E-7C41-B2F0BEB91E41}" = CCC Help Finnish
    "{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
    "{9BE518E6-ECC6-35A9-88E4-87755C07200F}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
    "{9D3D8C60-A55F-4123-B2B9-173F09590E16}" = REALTEK Wireless LAN Driver
    "{9D56775A-93F3-44A3-8092-840E3826DE30}" = Windows Live Mail
    "{A0B91308-6666-4249-8FF6-1E11AFD75FE1}" = Windows Live Mail
    "{A0C91188-C88F-4E86-93E6-CD7C9A266649}" = Windows Live Mesh
    "{A31FFFBF-3A18-E95B-8F39-B3411820AB08}" = CCC Help Swedish
    "{A726AE06-AAA3-43D1-87E3-70F510314F04}" = Windows Live Writer
    "{A86A4C1D-05B5-46B0-A808-1A15DCD17A17}_is1" = MSI Game Corner Console
    "{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}" = Google Update Helper
    "{A9BDCA6B-3653-467B-AC83-94367DA3BFE3}" = Windows Live Photo Common
    "{AAAFC670-569B-4A2F-82B4-42945E0DE3EF}" = Windows Live Writer
    "{AAF454FC-82CA-4F29-AB31-6A109485E76E}" = Windows Live Writer
    "{AE85EE86-4DDC-6F1A-C873-218B377A6444}" = CCC Help German
    "{B0F1B02F-47A6-411D-A38B-E44CC7F53CCC}" = e-tax 2012
    "{B480904D-F73F-4673-B034-8A5F492C9184}" = Nuance PDF Reader
    "{B5594DAD-0050-6AFE-882D-B51DB10C1C94}" = CCC Help Dutch
    "{B6CF2967-C81E-40C0-9815-C05774FEF120}" = Skype Click to Call
    "{C13926BE-159B-4494-BEEC-AB6E207F70AD}" = Cinema ProII Setup
    "{C66824E4-CBB3-4851-BB3F-E8CFD6350923}" = Windows Live Mail
    "{CE95A79E-E4FC-4FFF-8A75-29F04B942FF2}" = Windows Live UX Platform
    "{D02E3267-AC49-B134-D521-6094713929D8}" = Catalyst Control Center InstallProxy
    "{D0B44725-3666-492D-BEF6-587A14BD9BD9}" = MSVCRT_amd64
    "{D299197D-CDEA-41A6-A363-F532DE4114FD}" = Windows Live UX Platform Language Pack
    "{D436F577-1695-4D2F-8B44-AC76C99E0002}" = Windows Live Photo Common
    "{D45240D3-B6B3-4FF9-B243-54ECE3E10066}" = Windows Live Communications Platform
    "{DA5597C9-9216-44FF-9670-D1E48817B998}" = MSI HOUSE
    "{DAEE3EA3-0649-37A8-365D-58DD52BF9874}" = CCC Help Hungarian
    "{DDC8BDEE-DCAC-404D-8257-3E8D4B782467}" = Windows Live Writer Resources
    "{DECDCB7C-58CC-4865-91AF-627F9798FE48}" = Windows Live Mesh
    "{E0194090-D359-446E-AEAE-D3CEDD46E48E}" = S-Bar
    "{E09C4DB7-630C-4F06-A631-8EA7239923AF}" = D3DX10
    "{E220BA54-25CA-13FA-21AA-C88342B20747}" = CCC Help Italian
    "{E5B6A047-5868-66BB-E7E4-88DFE0B91C9F}" = CCC Help Polish
    "{E62E0550-C098-43A2-B54B-03FB1E634483}" = Windows Live Writer
    "{E66B5520-69C1-B559-DCAB-AB0C451F9FDB}" = CCC Help Korean
    "{E8BAA541-D161-4C9B-85BF-01F05A56BD7F}}_is1" = Live Update 5
    "{EB4DF488-AAEF-406F-A341-CB2AAA315B90}" = Windows Live Messenger
    "{ED5776D5-59B4-46B7-AF81-5F2D94D7C640}" = Cisco PEAP Module
    "{EECD7B96-1416-4D3A-B12D-0D2512120C36}" = EasyViewer
    "{EEDE3071-D70E-F01A-4A2B-0D79184AD4D2}" = CCC Help Thai
    "{EEF99142-3357-402C-B298-DEC303E12D92}" = Windows Live 影像中心
    "{EF7EAB13-46FC-49DD-8E3C-AAF8A286C5BB}" = Windows Live 程式集
    "{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}" = Microsoft SQL Server 2005 Compact Edition [ENU]
    "{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
    "{F97661EA-27AF-E018-B14D-12139173A657}" = CCC Help Chinese Traditional
    "{F992409C-9D10-4AE2-BAEB-B5409AD3785E}" = 用于远程连接的 Windows Live Mesh ActiveX 控件(简体中文)
    "{FC3FA913-C422-A7BB-D868-DBD7C07C5704}" = Catalyst Control Center Localization All
    "{FE044230-9CA5-43F7-9B58-5AC5A28A1F33}" = Windows Live Essentials
    "Adobe Flash Player ActiveX" = Adobe Flash Player 12 ActiveX
    "Avast" = avast! Free Antivirus
    "BearShare" = BearShare
    "Canon MG3100 series On-screen Manual" = Canon MG3100 series On-screen Manual
    "CANONIJPLM100" = Canon Inkjet Printer/Scanner/Fax Extended Survey Program
    "CanonMyPrinter" = Canon My Printer
    "CanonSolutionMenuEX" = Canon Solution Menu EX
    "Easy-PhotoPrint EX" = Canon Easy-PhotoPrint EX
    "Easy-WebPrint EX" = Canon Easy-WebPrint EX
    "Google Chrome" = Google Chrome
    "i-Charger_is1" = i-Charger
    "InstallShield_{EECD7B96-1416-4D3A-B12D-0D2512120C36}" = EasyViewer
    "KeyboardTest_is1" = KeyboardTest V3.0
    "Malwarebytes' Anti-Malware_is1" = Malwarebytes Anti-Malware version 1.75.0.1300
    "Mobile Broadband Manager" = Telstra Mobile Broadband Manager
    "Mozilla Firefox 26.0 (x86 en-US)" = Mozilla Firefox 26.0 (x86 en-US)
    "MozillaMaintenanceService" = Mozilla Maintenance Service
    "MP Navigator EX 5.0" = Canon MP Navigator EX 5.0
    "Office14.Click2Run" = Microsoft Office Click-to-Run 2010
    "webmmf" = WebM Media Foundation Components
    "WinLiveSuite" = Windows Live 程式集
    "WinRAR archiver" = WinRAR archiver

    ========== HKEY_USERS Uninstall List ==========

    [HKEY_USERS\S-1-5-21-3605120656-3930247630-567234770-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
    "WinDirStat" = WinDirStat 1.1.2

    < End of report >
     
  18. 2014/02/14
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    OTL logfile created on: 2/15/2014 1:21:25 PM - Run 1
    OTL by OldTimer - Version 3.2.69.0 Folder = C:\Users\Laptop\Desktop
    64bit- Home Premium Edition Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation
    Internet Explorer (Version = 9.11.9600.16518)
    Locale: 00000409 | Country: Australia | Language: ENA | Date Format: d/MM/yyyy

    1.61 Gb Total Physical Memory | 0.80 Gb Available Physical Memory | 49.72% Memory free
    3.21 Gb Paging File | 1.94 Gb Available in Paging File | 60.34% Paging File free
    Paging file location(s): ?:\pagefile.sys [binary data]

    %SystemDrive% = C: | %SystemRoot% = C:\windows | %ProgramFiles% = C:\Program Files (x86)
    Drive C: | 134.38 Gb Total Space | 85.89 Gb Free Space | 63.92% Space Free | Partition Type: NTFS
    Drive D: | 89.59 Gb Total Space | 55.64 Gb Free Space | 62.11% Space Free | Partition Type: NTFS
    Drive F: | 3.60 Gb Total Space | 1.76 Gb Free Space | 48.94% Space Free | Partition Type: FAT32

    Computer Name: LAPTOP-MSI | User Name: Laptop | Logged in as Administrator.
    Boot Mode: Normal | Scan Mode: All users | Quick Scan | Include 64bit Scans
    Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

    ========== Processes (SafeList) ==========

    PRC - [2014/02/15 12:01:22 | 000,602,112 | ---- | M] (OldTimer Tools) -- C:\Users\Laptop\Desktop\OTL.exe
    PRC - [2014/02/13 07:57:51 | 003,767,096 | ---- | M] (AVAST Software) -- C:\Program Files\AVAST Software\Avast\AvastUI.exe
    PRC - [2014/02/13 07:57:51 | 000,050,344 | ---- | M] (AVAST Software) -- C:\Program Files\AVAST Software\Avast\AvastSvc.exe
    PRC - [2013/12/19 18:02:22 | 001,997,808 | ---- | M] (Micro-Star International) -- C:\Program Files (x86)\MSI\Live Update 5\LU5.exe
    PRC - [2013/10/09 10:58:16 | 003,275,136 | ---- | M] (Skype Technologies S.A.) -- C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe
    PRC - [2013/06/26 19:21:50 | 000,207,528 | ---- | M] (Microsoft Corporation) -- C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe
    PRC - [2013/06/26 19:21:46 | 000,523,944 | ---- | M] (Microsoft Corporation) -- C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe
    PRC - [2013/04/04 14:50:32 | 000,418,376 | ---- | M] (Malwarebytes Corporation) -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe
    PRC - [2012/06/11 16:22:16 | 000,240,208 | ---- | M] (Microsoft Corporation.) -- C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\SeaPort.EXE
    PRC - [2011/07/12 05:18:52 | 000,160,768 | ---- | M] (Micro-Star International Co., Ltd.) -- C:\Program Files (x86)\S-Bar\MSIService.exe
    PRC - [2011/02/07 17:56:11 | 000,138,192 | ---- | M] () -- C:\Program Files (x86)\Canon\IJPLM\ijplmsvc.exe
    PRC - [2011/01/26 07:33:48 | 000,200,192 | ---- | M] (Micro-Star Int'l Co., Ltd.) -- C:\Program Files (x86)\MSI\Cinema ProII\CinemaProII.exe
    PRC - [2010/06/26 04:46:10 | 001,689,600 | ---- | M] (msi) -- C:\Program Files (x86)\MSI\Cinema ProII\Cinema ProII Controler.exe
    PRC - [2009/05/05 16:06:06 | 000,222,496 | ---- | M] (Acresso Corporation) -- C:\ProgramData\FLEXnet\Connect\11\ISUSPM.exe


    ========== Modules (No Company Name) ==========

    MOD - [2014/02/13 07:57:55 | 019,336,120 | ---- | M] () -- C:\Program Files\AVAST Software\Avast\libcef.dll


    ========== Services (SafeList) ==========

    SRV:64bit: - [2014/02/13 07:57:51 | 000,050,344 | ---- | M] (AVAST Software) [Auto | Running] -- C:\Program Files\AVAST Software\Avast\AvastSvc.exe -- (avast! Antivirus)
    SRV:64bit: - [2014/02/06 20:48:45 | 000,111,616 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\windows\SysNative\IEEtwCollector.exe -- (IEEtwCollectorService)
    SRV:64bit: - [2013/05/27 15:50:47 | 001,011,712 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Windows Defender\MpSvc.dll -- (WinDefend)
    SRV:64bit: - [2011/06/28 08:52:00 | 000,365,568 | ---- | M] (Advanced Micro Devices, Inc.) [Auto | Running] -- C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe -- (AMD FUEL Service)
    SRV:64bit: - [2011/06/27 17:44:48 | 000,204,288 | ---- | M] (AMD) [Auto | Running] -- C:\Windows\SysNative\atiesrxx.exe -- (AMD External Events Utility)
    SRV:64bit: - [2010/09/23 11:10:10 | 000,057,184 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Program Files\Windows Live\Mesh\wlcrasvc.exe -- (wlcrasvc)
    SRV - [2014/02/12 23:19:48 | 000,257,928 | ---- | M] (Adobe Systems Incorporated) [On_Demand | Stopped] -- C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe -- (AdobeFlashPlayerUpdateSvc)
    SRV - [2013/12/06 05:36:33 | 000,119,408 | ---- | M] (Mozilla Foundation) [On_Demand | Stopped] -- C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe -- (MozillaMaintenance)
    SRV - [2013/10/23 08:15:08 | 000,172,192 | R--- | M] (Skype Technologies) [Auto | Stopped] -- C:\Program Files (x86)\Skype\Updater\Updater.exe -- (SkypeUpdate)
    SRV - [2013/10/09 10:58:16 | 003,275,136 | ---- | M] (Skype Technologies S.A.) [Auto | Running] -- C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe -- (Skype C2C Service)
    SRV - [2013/06/26 19:21:50 | 000,207,528 | ---- | M] (Microsoft Corporation) [On_Demand | Running] -- C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe -- (sftvsa)
    SRV - [2013/06/26 19:21:46 | 000,523,944 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe -- (sftlist)
    SRV - [2013/04/04 14:50:32 | 000,701,512 | ---- | M] (Malwarebytes Corporation) [Auto | Stopped] -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe -- (MBAMService)
    SRV - [2013/04/04 14:50:32 | 000,418,376 | ---- | M] (Malwarebytes Corporation) [Auto | Running] -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe -- (MBAMScheduler)
    SRV - [2012/06/11 16:22:16 | 000,240,208 | ---- | M] (Microsoft Corporation.) [On_Demand | Running] -- C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\SeaPort.EXE -- (BBUpdate)
    SRV - [2012/06/11 16:22:16 | 000,193,616 | ---- | M] (Microsoft Corporation.) [Auto | Stopped] -- C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\BBSvc.EXE -- (BBSvc)
    SRV - [2011/07/12 05:18:52 | 000,160,768 | ---- | M] (Micro-Star International Co., Ltd.) [Auto | Running] -- C:\Program Files (x86)\S-Bar\MSIService.exe -- (Micro Star SCM)
    SRV - [2011/06/24 11:44:16 | 000,317,296 | ---- | M] (Sierra Wireless, Inc.) [Auto | Running] -- C:\Program Files (x86)\Sierra Wireless Inc\Common\SwiCardDetect64.exe -- (SwiCardDetectSvc)
    SRV - [2011/02/07 17:56:11 | 000,138,192 | ---- | M] () [Auto | Running] -- C:\Program Files (x86)\Canon\IJPLM\ijplmsvc.exe -- (IJPLMSVC)
    SRV - [2010/07/17 09:39:32 | 000,012,800 | ---- | M] (MSI) [Auto | Running] -- C:\Program Files (x86)\MSI\MSI HOUSE\MSIFoundationService.exe -- (MSI Foundation Service)
    SRV - [2010/03/19 06:16:28 | 000,130,384 | ---- | M] (Microsoft Corporation) [Auto | Stopped] -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -- (clr_optimization_v4.0.30319_32)
    SRV - [2010/01/28 07:22:18 | 000,044,432 | ---- | M] () [Auto | Running] -- C:\Program Files (x86)\MSI Game Corner\Game Console\OberonGameConsoleService.exe -- (OberonGameConsoleService)
    SRV - [2009/06/11 07:23:09 | 000,066,384 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe -- (clr_optimization_v2.0.50727_32)


    ========== Driver Services (SafeList) ==========

    DRV:64bit: - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\MSI\MSI Software Install\MGHwCtrl.sys -- (MGHwCtrl)
    DRV:64bit: - File not found [Kernel | System | Stopped] -- C:\Program Files\Malwarebytes Anti-Exploit\MBAE.sys -- (ESProtectionDriver)
    DRV:64bit: - [2014/02/13 07:58:01 | 001,038,072 | ---- | M] (AVAST Software) [File_System | System | Running] -- C:\Windows\SysNative\drivers\aswSnx.sys -- (aswSnx)
    DRV:64bit: - [2014/02/13 07:58:01 | 000,421,704 | ---- | M] (AVAST Software) [File_System | System | Running] -- C:\Windows\SysNative\drivers\aswSP.sys -- (aswSP)
    DRV:64bit: - [2014/02/13 07:58:01 | 000,207,904 | ---- | M] () [Kernel | Boot | Running] -- C:\windows\SysNative\drivers\aswVmm.sys -- (aswVmm)
    DRV:64bit: - [2014/02/13 07:58:01 | 000,080,184 | ---- | M] (AVAST Software) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\aswStm.sys -- (aswStm)
    DRV:64bit: - [2014/02/13 07:58:01 | 000,078,648 | ---- | M] (AVAST Software) [File_System | Auto | Running] -- C:\Windows\SysNative\drivers\aswMonFlt.sys -- (aswMonFlt)
    DRV:64bit: - [2014/02/13 07:58:01 | 000,065,776 | ---- | M] () [Kernel | Boot | Running] -- C:\windows\SysNative\drivers\aswRvrt.sys -- (aswRvrt)
    DRV:64bit: - [2014/02/13 07:58:00 | 000,092,544 | ---- | M] (AVAST Software) [Kernel | System | Running] -- C:\Windows\SysNative\drivers\aswRdr2.sys -- (aswRdr)
    DRV:64bit: - [2013/06/26 19:21:50 | 000,023,208 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\Sftvollh.sys -- (Sftvol)
    DRV:64bit: - [2013/06/26 19:21:48 | 000,028,840 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Running] -- C:\Windows\SysNative\drivers\Sftredirlh.sys -- (Sftredir)
    DRV:64bit: - [2013/06/26 19:21:46 | 000,273,576 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\Sftplaylh.sys -- (Sftplay)
    DRV:64bit: - [2013/06/26 19:21:44 | 000,767,144 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\Sftfslh.sys -- (Sftfs)
    DRV:64bit: - [2013/04/04 14:50:32 | 000,025,928 | ---- | M] (Malwarebytes Corporation) [File_System | On_Demand | Running] -- C:\Windows\SysNative\drivers\mbam.sys -- (MBAMProtector)
    DRV:64bit: - [2012/03/01 16:46:16 | 000,023,408 | ---- | M] (Microsoft Corporation) [Recognizer | Boot | Unknown] -- C:\windows\SysNative\drivers\fs_rec.sys -- (Fs_Rec)
    DRV:64bit: - [2012/01/04 16:35:36 | 000,422,400 | R--- | M] (Huawei Technologies Co., Ltd.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\ewusbwwan.sys -- (ewusbmbb)
    DRV:64bit: - [2012/01/04 16:35:36 | 000,223,232 | R--- | M] (Huawei Technologies Co., Ltd.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\ewusbmdm.sys -- (hwdatacard)
    DRV:64bit: - [2012/01/04 16:35:36 | 000,087,040 | R--- | M] (Huawei Technologies Co., Ltd.) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\ew_jubusenum.sys -- (huawei_enumerator)
    DRV:64bit: - [2012/01/04 16:35:36 | 000,013,952 | R--- | M] (Huawei Technologies Co., Ltd.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\ew_usbenumfilter.sys -- (ew_usbenumfilter)
    DRV:64bit: - [2012/01/04 16:35:34 | 000,117,248 | R--- | M] (Huawei Technologies Co., Ltd.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\ew_hwusbdev.sys -- (ew_hwusbdev)
    DRV:64bit: - [2012/01/04 16:35:32 | 000,018,456 | R--- | M] (HandSet Incorporated) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\massfilter_LTE.sys -- (massfilter_lte)
    DRV:64bit: - [2012/01/04 16:35:30 | 000,009,216 | R--- | M] (ZTE Incorporated) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\massfilter.sys -- (massfilter)
    DRV:64bit: - [2011/08/03 03:50:02 | 000,107,904 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amdsata.sys -- (amdsata)
    DRV:64bit: - [2011/08/03 03:50:02 | 000,027,008 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amdxata.sys -- (amdxata)
    DRV:64bit: - [2011/06/27 18:30:42 | 009,883,136 | ---- | M] (ATI Technologies Inc.) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\atikmdag.sys -- (amdkmdag)
    DRV:64bit: - [2011/06/27 17:02:34 | 000,307,712 | ---- | M] (Advanced Micro Devices, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\atikmpag.sys -- (amdkmdap)
    DRV:64bit: - [2011/06/06 20:07:00 | 000,231,440 | ---- | M] (Advanced Micro Devices) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\AtihdW76.sys -- (AtiHDAudioService)
    DRV:64bit: - [2011/06/02 20:28:33 | 000,142,632 | ---- | M] (ELAN Microelectronics Corp.) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\ETD.sys -- (ETD)
    DRV:64bit: - [2011/05/16 10:44:24 | 000,109,312 | ---- | M] (Sierra Wireless Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\swiwdmbx64.sys -- (swiwdmbx)
    DRV:64bit: - [2011/05/13 12:54:12 | 000,258,432 | ---- | M] (Sierra Wireless Incorporated) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\swg3kser00.sys -- (swg3kser00)
    DRV:64bit: - [2011/04/15 16:37:50 | 000,079,488 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amd_sata.sys -- (amd_sata)
    DRV:64bit: - [2011/04/15 16:37:50 | 000,040,064 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amd_xata.sys -- (amd_xata)
    DRV:64bit: - [2011/03/03 13:42:10 | 000,249,344 | ---- | M] (Sierra Wireless Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\swnc8ua3.sys -- (SWNC8UA3)
    DRV:64bit: - [2010/12/17 12:28:50 | 000,408,680 | ---- | M] (Realtek ) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\Rt64win7.sys -- (RTL8167)
    DRV:64bit: - [2010/12/03 21:29:00 | 001,105,000 | ---- | M] (Realtek Semiconductor Corporation ) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\rtl8192ce.sys -- (RTL8192Ce)
    DRV:64bit: - [2010/11/30 16:40:04 | 000,307,304 | ---- | M] (Realtek Semiconductor Corp.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\RtsUVStor.sys -- (RSUSBVSTOR)
    DRV:64bit: - [2010/11/29 06:50:38 | 000,044,672 | ---- | M] (Advanced Micro Devices) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\usbfilter.sys -- (usbfilter)
    DRV:64bit: - [2010/11/21 13:24:33 | 000,059,392 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TsUsbFlt.sys -- (TsUsbFlt)
    DRV:64bit: - [2010/11/21 13:23:47 | 000,078,720 | ---- | M] (Hewlett-Packard Company) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\HpSAMD.sys -- (HpSAMD)
    DRV:64bit: - [2010/11/21 13:23:47 | 000,031,232 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TsUsbGD.sys -- (TsUsbGD)
    DRV:64bit: - [2010/05/24 22:07:58 | 000,253,728 | ---- | M] (Realtek Semiconductor Corp.) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\RtHDMIVX.sys -- (RTHDMIAzAudService)
    DRV:64bit: - [2010/02/19 02:18:24 | 000,046,136 | ---- | M] (Advanced Micro Devices) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\amdiox64.sys -- (amdiox64)
    DRV:64bit: - [2009/07/14 11:52:20 | 000,194,128 | ---- | M] (AMD Technologies Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsbs.sys -- (amdsbs)
    DRV:64bit: - [2009/07/14 11:48:04 | 000,065,600 | ---- | M] (LSI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\lsi_sas2.sys -- (LSI_SAS2)
    DRV:64bit: - [2009/07/14 11:45:55 | 000,024,656 | ---- | M] (Promise Technology) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\stexstor.sys -- (stexstor)
    DRV:64bit: - [2009/06/20 12:09:57 | 001,394,688 | ---- | M] (Atheros Communications, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\athrx.sys -- (athr)
    DRV:64bit: - [2009/06/11 06:34:33 | 003,286,016 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\evbda.sys -- (ebdrv)
    DRV:64bit: - [2009/06/11 06:34:28 | 000,468,480 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\bxvbda.sys -- (b06bdrv)
    DRV:64bit: - [2009/06/11 06:34:23 | 000,270,848 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\b57nd60a.sys -- (b57nd60a)
    DRV:64bit: - [2009/06/11 06:31:59 | 000,031,232 | ---- | M] (Hauppauge Computer Works, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\hcw85cir.sys -- (hcw85cir)
    DRV - [2010/10/22 10:37:36 | 000,014,136 | ---- | M] (MSI) [Kernel | On_Demand | Running] -- C:\Program Files (x86)\MSI\Live Update 5\NTIOLib_X64.sys -- (NTIOLib_1_0_4)
    DRV - [2009/07/14 11:19:10 | 000,019,008 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Stopped] -- C:\Windows\SysWOW64\drivers\wimmount.sys -- (WIMMount)


    ========== Standard Registry (SafeList) ==========


    ========== Internet Explorer ==========

    IE:64bit: - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com
    IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {33BB0A4E-99AF-4226-BDF6-49120163DE86}
    IE:64bit: - HKLM\..\SearchScopes\{99643666-A5D3-4F26-99E1-C6C8E9814D4E}: "URL" = http://www.bing.com/search?q={searchTerms}&form=MSITDF&pc=MAM3&src=IE-SearchBox
    IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.google.com
    IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
    IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com
    IE - HKLM\..\SearchScopes,DefaultScope =
    IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
    IE - HKLM\..\SearchScopes\{99643666-A5D3-4F26-99E1-C6C8E9814D4E}: "URL" = http://www.bing.com/search?q={searchTerms}&form=MSITDF&pc=MAM3&src=IE-SearchBox


    IE - HKU\.DEFAULT\..\SearchScopes,DefaultScope =
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

    IE - HKU\S-1-5-18\..\SearchScopes,DefaultScope =
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

    IE - HKU\S-1-5-19\..\SearchScopes,DefaultScope =

    IE - HKU\S-1-5-20\..\SearchScopes,DefaultScope =

    IE - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = https://www.google.com.au/
    IE - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\..\SearchScopes,DefaultScope =
    IE - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\..\SearchScopes\F8FE70A94B0443E8AE0C292DE171C5C7: "URL" = http://dts.search-results.com/sr?src=ieb&appid=105&systemid=2&sr=0&q={searchTerms}
    IE - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

    ========== FireFox ==========

    FF - prefs.js..extensions.enabledAddons: %7B972ce4c6-7e08-4474-a285-3208198ce6fd%7D:26.0
    FF - user.js - File not found

    FF:64bit: - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: disabled File not found
    FF:64bit: - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\5.1.20913.0\npctrl.dll ( Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@canon.com/EPPEX: C:\Program Files (x86)\Canon\Easy-PhotoPrint EX\NPEZFFPI.DLL (CANON INC.)
    FF - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: disabled File not found
    FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files (x86)\Microsoft Silverlight\5.1.20913.0\npctrl.dll ( Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@microsoft.com/SharePoint,version=14.0: C:\PROGRA~2\MICROS~1\Office14\NPSPWRAP.DLL (Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@microsoft.com/WLPG,version=15.4.3502.0922: C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@microsoft.com/WLPG,version=15.4.3508.1109: C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Program Files (x86)\Google\Update\1.3.22.3\npGoogleUpdate3.dll (Google Inc.)
    FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Program Files (x86)\Google\Update\1.3.22.3\npGoogleUpdate3.dll (Google Inc.)
    FF - HKLM\Software\MozillaPlugins\ZEON/PDF,version=2.0: C:\Program Files (x86)\Nuance\PDF Reader\bin\nppdf.dll (Zeon Corporation)
    FF - HKCU\Software\MozillaPlugins\@Skype Limited.com/Facebook Video Calling Plugin: C:\Users\Laptop\AppData\Local\Facebook\Video\Skype\npFacebookVideoCalling.dll (Skype Limited)

    FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\wrc@avast.com: C:\Program Files\AVAST Software\Avast\WebRep\FF [2014/02/13 07:58:06 | 000,000,000 | ---D | M]
    FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 26.0\extensions\\Components: C:\Program Files (x86)\Mozilla Firefox\components
    FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 26.0\extensions\\Plugins: C:\Program Files (x86)\Mozilla Firefox\plugins

    [2014/02/13 00:50:15 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Laptop\AppData\Roaming\mozilla\Extensions
    [2014/02/13 00:48:15 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files (x86)\Mozilla Firefox\browser\extensions
    [2014/02/13 00:48:15 | 000,000,000 | ---D | M] (Default) -- C:\Program Files (x86)\Mozilla Firefox\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

    ========== Chrome ==========

    CHR - default_search_provider: Google (Enabled)
    CHR - default_search_provider: search_url = {google:baseURL}search?q={searchTerms}&{google:RLZ}{google:eek:riginalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:bookmarkBarPinned}{google:searchClient}{google:sourceId}{google:instantExtendedEnabledParameter}{google:eek:mniboxStartMarginParameter}ie={inputEncoding}
    CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&xssi=t&q={searchTerms}&{google:cursorPosition}{google:zeroPrefixUrl}{google:pageClassification}sugkey={google:suggestAPIKeyParameter},
    CHR - Extension: Google Docs = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake\0.5_0\
    CHR - Extension: Google Drive = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\6.3_0\
    CHR - Extension: YouTube = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo\4.2.6_0\
    CHR - Extension: Google Search = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf\0.0.0.20_0\
    CHR - Extension: avast! Online Security = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\gomekmidlodglbbmalcneegieacbdmki\9.0.2013.75_0\
    CHR - Extension: Google Wallet = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\0.0.6.0_0\
    CHR - Extension: Gmail = C:\Users\Laptop\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\7_0\

    O1 HOSTS File: ([2014/02/15 10:17:13 | 000,000,027 | ---- | M]) - C:\Windows\SysNative\drivers\etc\hosts
    O1 - Hosts: 127.0.0.1 localhost
    O2:64bit: - BHO: (avast! Online Security) - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE64.dll (AVAST Software)
    O2:64bit: - BHO: (Google Toolbar Helper) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
    O2 - BHO: (Canon Easy-WebPrint EX BHO) - {3785D0AD-BFFF-47F6-BF5B-A587C162FED9} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexbho.dll (CANON INC.)
    O2 - BHO: (avast! Online Security) - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll (AVAST Software)
    O2 - BHO: (Bing Bar Helper) - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\BingExt.dll (Microsoft Corporation.)
    O3:64bit: - HKLM\..\Toolbar: (Google Toolbar) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
    O3:64bit: - HKLM\..\Toolbar: (avast! Online Security) - {CC1A175A-E45B-41ED-A30C-C9B1D7A0C02F} - C:\Program Files\AVAST Software\Avast\aswWebRepIE64.dll (AVAST Software)
    O3 - HKLM\..\Toolbar: (Canon Easy-WebPrint EX) - {759D9886-0C6F-4498-BAB6-4A5F47C6C72F} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexhlp.dll (CANON INC.)
    O3 - HKLM\..\Toolbar: (Bing Bar) - {8dcb7100-df86-4384-8842-8fa844297b3f} - C:\Program Files (x86)\Microsoft\BingBar\7.1.391.0\BingExt.dll (Microsoft Corporation.)
    O3 - HKLM\..\Toolbar: (avast! Online Security) - {CC1A175A-E45B-41ED-A30C-C9B1D7A0C02F} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll (AVAST Software)
    O3 - HKLM\..\Toolbar: (no name) - 10 - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
    O3:64bit: - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
    O4:64bit: - HKLM..\Run: [CanonMyPrinter] C:\Program Files\Canon\MyPrinter\BJMyPrt.exe (CANON INC.)
    O4:64bit: - HKLM..\Run: [ETDCtrl] C:\Program Files\Elantech\ETDCtrl.exe (ELAN Microelectronics Corp.)
    O4:64bit: - HKLM..\Run: [RtHDVCpl] C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe (Realtek Semiconductor)
    O4 - HKLM..\Run: [AvastUI.exe] C:\Program Files\AVAST Software\Avast\AvastUI.exe (AVAST Software)
    O4 - HKLM..\Run: [BigPondWirelessBroadbandCM] C:\Program Files (x86)\Telstra\Mobile Broadband Manager\TelstraUCM.exe (Telstra)
    O4 - HKLM..\Run: [CanonSolutionMenuEx] C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE (CANON INC.)
    O4 - HKLM..\Run: [Cinema ProII AP] C:\Program Files (x86)\MSI\Cinema ProII\CinemaProII.exe (Micro-Star Int'l Co., Ltd.)
    O4 - HKLM..\Run: [Cinema ProII Controler] C:\Program Files (x86)\MSI\Cinema ProII\Cinema ProII Controler.exe (msi)
    O4 - HKLM..\Run: [Live Update 5] C:\Program Files (x86)\MSI\Live Update 5\BootStartLiveupdate.exe ()
    O4 - HKLM..\Run: [Nuance PDF Reader-reminder] C:\Program Files (x86)\Nuance\PDF Reader\Ereg\Ereg.exe (Nuance Communications, Inc.)
    O4 - HKLM..\Run: [S-Bar] C:\Program Files (x86)\S-Bar\S-Bar.exe (MSI)
    O4 - HKLM..\Run: [StartCCC] C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe (Advanced Micro Devices, Inc.)
    O4 - HKU\S-1-5-21-3605120656-3930247630-567234770-1001..\Run: [ISUSPM] C:\ProgramData\FLEXnet\Connect\11\ISUSPM.exe (Acresso Corporation)
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
    O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5
    O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
    O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-18\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-19\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-20\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-21-3605120656-3930247630-567234770-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
    O9:64bit: - Extra Button: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - Reg Error: Key error. File not found
    O13 - gopher Prefix: missing
    O16:64bit: - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object)
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 10.0.0.138
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{3A6CB2BF-332E-4E54-93F6-DAE34BC16DDF}: NameServer = 10.5.133.45 10.5.136.242
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{62A40AC7-A121-4199-BED8-065674228879}: NameServer = 10.5.136.242 10.5.133.45
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{A1BCC920-46D3-4099-B72B-B4927046C821}: DhcpNameServer = 192.168.0.1
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{B22B735C-582A-4F6F-91B6-63B0C93842FA}: NameServer = 10.5.136.242 10.5.133.45
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{E10D322A-2CC4-4884-9598-AF74D3AF6734}: DhcpNameServer = 10.0.0.138
    O18:64bit: - Protocol\Handler\livecall - No CLSID value found
    O18:64bit: - Protocol\Handler\msnim - No CLSID value found
    O18:64bit: - Protocol\Handler\skype4com - No CLSID value found
    O18:64bit: - Protocol\Handler\skype-ie-addon-data {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll (Skype Technologies S.A.)
    O18:64bit: - Protocol\Handler\wlmailhtml - No CLSID value found
    O18:64bit: - Protocol\Handler\wlpg - No CLSID value found
    O18 - Protocol\Handler\skype4com {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll (Skype Technologies)
    O18 - Protocol\Handler\skype-ie-addon-data {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
    O20:64bit: - HKLM Winlogon: Shell - (Explorer.exe) - C:\windows\explorer.exe (Microsoft Corporation)
    O20:64bit: - HKLM Winlogon: UserInit - (C:\windows\system32\userinit.exe) - C:\Windows\SysNative\userinit.exe (Microsoft Corporation)
    O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\windows\SysWow64\explorer.exe (Microsoft Corporation)
    O20 - HKLM Winlogon: UserInit - (C:\windows\system32\userinit.exe) - C:\Windows\SysWOW64\userinit.exe (Microsoft Corporation)
    O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
    O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
    O32 - HKLM CDRom: AutoRun - 1
    O34 - HKLM BootExecute: (autocheck autochk *)
    O35:64bit: - HKLM\..comfile [open] -- "%1" %*
    O35:64bit: - HKLM\..exefile [open] -- "%1" %*
    O35 - HKLM\..comfile [open] -- "%1" %*
    O35 - HKLM\..exefile [open] -- "%1" %*
    O37:64bit: - HKLM\...com [@ = ComFile] -- "%1" %*
    O37:64bit: - HKLM\...exe [@ = exefile] -- "%1" %*
    O37 - HKLM\...com [@ = ComFile] -- "%1" %*
    O37 - HKLM\...exe [@ = exefile] -- "%1" %*
    O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
    O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
    O38 - SubSystems\\Windows: (ServerDll=sxssrv,4)

    ========== Files/Folders - Created Within 30 Days ==========

    [2014/02/15 13:20:34 | 000,602,112 | ---- | C] (OldTimer Tools) -- C:\Users\Laptop\Desktop\OTL.exe
    [2014/02/15 12:13:13 | 001,037,530 | ---- | C] (Thisisu) -- C:\Users\Laptop\Desktop\JRT.exe
    [2014/02/15 11:53:25 | 000,011,832 | ---- | C] (Windows (R) Codename Longhorn DDK provider) -- C:\windows\acpimof.dll
    [2014/02/15 11:36:08 | 000,000,000 | ---D | C] -- C:\ProgramData\PassMark
    [2014/02/15 11:36:02 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KeyboardTest
    [2014/02/15 11:35:58 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\KeyboardTest
    [2014/02/15 10:37:55 | 001,933,048 | ---- | C] (Bleeping Computer, LLC) -- C:\Users\Laptop\Desktop\rkill.exe
    [2014/02/15 10:23:12 | 000,000,000 | -HSD | C] -- C:\$RECYCLE.BIN
    [2014/02/15 09:59:46 | 000,518,144 | ---- | C] (SteelWerX) -- C:\windows\SWREG.exe
    [2014/02/15 09:59:46 | 000,406,528 | ---- | C] (SteelWerX) -- C:\windows\SWSC.exe
    [2014/02/15 09:59:46 | 000,060,416 | ---- | C] (NirSoft) -- C:\windows\NIRCMD.exe
    [2014/02/15 09:59:27 | 000,000,000 | ---D | C] -- C:\Qoobox
    [2014/02/15 09:58:52 | 000,000,000 | ---D | C] -- C:\windows\erdnt
    [2014/02/15 09:57:09 | 005,183,211 | R--- | C] (Swearware) -- C:\Users\Laptop\Desktop\ComboFix.exe
    [2014/02/14 22:19:05 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat
    [2014/02/14 22:19:05 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinDirStat
    [2014/02/14 22:19:04 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\WinDirStat
    [2014/02/14 21:33:41 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\diskdetective
    [2014/02/14 07:58:56 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes' Anti-Malware (portable)
    [2014/02/14 07:55:00 | 000,091,352 | ---- | C] (Malwarebytes Corporation) -- C:\windows\SysNative\drivers\mbamchameleon.sys
    [2014/02/14 07:54:43 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\mbar
    [2014/02/14 07:13:48 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\RK_Quarantine
    [2014/02/13 20:39:41 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\new scans
    [2014/02/13 08:24:24 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Roaming\Google
    [2014/02/13 08:00:14 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Roaming\AVAST Software
    [2014/02/13 07:59:54 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Avast
    [2014/02/13 07:59:00 | 000,000,000 | ---D | C] -- C:\Program Files\Google
    [2014/02/13 07:58:44 | 000,000,000 | ---D | C] -- C:\ProgramData\Google
    [2014/02/13 07:58:11 | 000,080,184 | ---- | C] (AVAST Software) -- C:\windows\SysNative\drivers\aswStm.sys
    [2014/02/13 07:58:10 | 001,038,072 | ---- | C] (AVAST Software) -- C:\windows\SysNative\drivers\aswSnx.sys
    [2014/02/13 07:58:10 | 000,421,704 | ---- | C] (AVAST Software) -- C:\windows\SysNative\drivers\aswSP.sys
    [2014/02/13 07:58:10 | 000,092,544 | ---- | C] (AVAST Software) -- C:\windows\SysNative\drivers\aswRdr2.sys
    [2014/02/13 07:58:10 | 000,078,648 | ---- | C] (AVAST Software) -- C:\windows\SysNative\drivers\aswMonFlt.sys
    [2014/02/13 07:58:08 | 000,334,136 | ---- | C] (AVAST Software) -- C:\windows\SysNative\aswBoot.exe
    [2014/02/13 07:57:59 | 000,043,152 | ---- | C] (AVAST Software) -- C:\windows\avastSS.scr
    [2014/02/13 07:57:01 | 000,000,000 | ---D | C] -- C:\Program Files\AVAST Software
    [2014/02/13 07:55:31 | 000,000,000 | ---D | C] -- C:\ProgramData\AVAST Software
    [2014/02/13 02:02:36 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Local\Axialis
    [2014/02/13 01:12:14 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\movie
    [2014/02/13 00:50:01 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Roaming\Mozilla
    [2014/02/13 00:50:01 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Local\Mozilla
    [2014/02/13 00:48:22 | 000,000,000 | ---D | C] -- C:\ProgramData\Mozilla
    [2014/02/13 00:48:21 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Mozilla Maintenance Service
    [2014/02/13 00:48:07 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Mozilla Firefox
    [2014/02/13 00:46:36 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome
    [2014/02/12 23:54:36 | 000,000,000 | ---D | C] -- C:\windows\ERUNT
    [2014/02/12 23:37:41 | 000,000,000 | ---D | C] -- C:\AdwCleaner
    [2014/02/12 23:35:35 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\virus remval tools
    [2014/02/12 21:58:17 | 000,000,000 | ---D | C] -- C:\Users\Laptop\AppData\Roaming\Malwarebytes
    [2014/02/12 21:57:40 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes' Anti-Malware
    [2014/02/12 21:57:39 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes
    [2014/02/12 21:57:35 | 000,025,928 | ---- | C] (Malwarebytes Corporation) -- C:\windows\SysNative\drivers\mbam.sys
    [2014/02/12 21:57:34 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Malwarebytes' Anti-Malware
    [2014/02/12 19:17:12 | 000,000,000 | ---D | C] -- C:\Users\Laptop\Desktop\photos
    [1 C:\windows\*.tmp files -> C:\windows\*.tmp -> ]

    ========== Files - Modified Within 30 Days ==========

    [2014/02/15 13:27:01 | 000,000,830 | ---- | M] () -- C:\windows\tasks\Adobe Flash Player Updater.job
    [2014/02/15 12:55:00 | 000,000,898 | ---- | M] () -- C:\windows\tasks\GoogleUpdateTaskMachineUA.job
    [2014/02/15 12:45:02 | 000,000,932 | ---- | M] () -- C:\windows\tasks\FacebookUpdateTaskUserS-1-5-21-3605120656-3930247630-567234770-1001UA.job
    [2014/02/15 12:15:52 | 000,024,656 | -H-- | M] () -- C:\windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
    [2014/02/15 12:15:52 | 000,024,656 | -H-- | M] () -- C:\windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
    [2014/02/15 12:12:39 | 000,727,334 | ---- | M] () -- C:\windows\SysNative\PerfStringBackup.INI
    [2014/02/15 12:12:39 | 000,629,326 | ---- | M] () -- C:\windows\SysNative\perfh009.dat
    [2014/02/15 12:12:39 | 000,111,220 | ---- | M] () -- C:\windows\SysNative\perfc009.dat
    [2014/02/15 12:08:07 | 000,000,894 | ---- | M] () -- C:\windows\tasks\GoogleUpdateTaskMachineCore.job
    [2014/02/15 12:07:17 | 000,067,584 | --S- | M] () -- C:\windows\bootstat.dat
    [2014/02/15 12:07:00 | 1292,697,600 | -HS- | M] () -- C:\hiberfil.sys
    [2014/02/15 12:01:22 | 000,602,112 | ---- | M] (OldTimer Tools) -- C:\Users\Laptop\Desktop\OTL.exe
    [2014/02/15 12:00:54 | 001,037,530 | ---- | M] (Thisisu) -- C:\Users\Laptop\Desktop\JRT.exe
    [2014/02/15 11:59:58 | 001,166,132 | ---- | M] () -- C:\Users\Laptop\Desktop\adwcleaner.exe
    [2014/02/15 11:53:25 | 000,002,060 | ---- | M] () -- C:\Users\Public\Desktop\Live Update 5.lnk
    [2014/02/15 11:36:02 | 000,001,108 | ---- | M] () -- C:\Users\Laptop\Desktop\KeyboardTest.lnk
    [2014/02/15 10:34:36 | 001,933,048 | ---- | M] (Bleeping Computer, LLC) -- C:\Users\Laptop\Desktop\rkill.exe
    [2014/02/15 10:17:13 | 000,000,027 | ---- | M] () -- C:\windows\SysNative\drivers\etc\hosts
    [2014/02/15 09:35:14 | 005,183,211 | R--- | M] (Swearware) -- C:\Users\Laptop\Desktop\ComboFix.exe
    [2014/02/15 06:45:01 | 000,000,910 | ---- | M] () -- C:\windows\tasks\FacebookUpdateTaskUserS-1-5-21-3605120656-3930247630-567234770-1001Core.job
    [2014/02/14 22:19:05 | 000,001,084 | ---- | M] () -- C:\Users\Laptop\Desktop\WinDirStat.lnk
    [2014/02/14 07:55:00 | 000,091,352 | ---- | M] (Malwarebytes Corporation) -- C:\windows\SysNative\drivers\mbamchameleon.sys
    [2014/02/13 07:59:55 | 000,002,019 | ---- | M] () -- C:\Users\Public\Desktop\avast! Free Antivirus.lnk
    [2014/02/13 07:58:01 | 001,038,072 | ---- | M] (AVAST Software) -- C:\windows\SysNative\drivers\aswSnx.sys
    [2014/02/13 07:58:01 | 000,421,704 | ---- | M] (AVAST Software) -- C:\windows\SysNative\drivers\aswSP.sys
    [2014/02/13 07:58:01 | 000,334,136 | ---- | M] (AVAST Software) -- C:\windows\SysNative\aswBoot.exe
    [2014/02/13 07:58:01 | 000,207,904 | ---- | M] () -- C:\windows\SysNative\drivers\aswVmm.sys
    [2014/02/13 07:58:01 | 000,080,184 | ---- | M] (AVAST Software) -- C:\windows\SysNative\drivers\aswStm.sys
    [2014/02/13 07:58:01 | 000,078,648 | ---- | M] (AVAST Software) -- C:\windows\SysNative\drivers\aswMonFlt.sys
    [2014/02/13 07:58:01 | 000,065,776 | ---- | M] () -- C:\windows\SysNative\drivers\aswRvrt.sys
    [2014/02/13 07:58:00 | 000,092,544 | ---- | M] (AVAST Software) -- C:\windows\SysNative\drivers\aswRdr2.sys
    [2014/02/13 07:57:59 | 000,043,152 | ---- | M] (AVAST Software) -- C:\windows\avastSS.scr
    [2014/02/13 07:41:12 | 000,002,332 | ---- | M] () -- C:\Users\Laptop\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk
    [2014/02/13 07:38:09 | 000,275,712 | ---- | M] () -- C:\windows\SysNative\FNTCACHE.DAT
    [2014/02/13 00:48:24 | 000,001,200 | ---- | M] () -- C:\Users\Public\Desktop\Mozilla Firefox.lnk
    [2014/02/13 00:46:36 | 000,002,308 | ---- | M] () -- C:\Users\Public\Desktop\Google Chrome.lnk
    [2014/02/12 23:39:10 | 000,001,221 | ---- | M] () -- C:\Users\Laptop\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
    [2014/02/12 21:57:45 | 000,001,186 | ---- | M] () -- C:\Users\Laptop\Application Data\Microsoft\Internet Explorer\Quick Launch\Malwarebytes Anti-Malware.lnk
    [2014/02/12 21:57:45 | 000,001,162 | ---- | M] () -- C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
    [1 C:\windows\*.tmp files -> C:\windows\*.tmp -> ]

    ========== Files Created - No Company Name ==========

    [2014/02/15 12:02:35 | 001,166,132 | ---- | C] () -- C:\Users\Laptop\Desktop\adwcleaner.exe
    [2014/02/15 11:53:25 | 000,002,060 | ---- | C] () -- C:\Users\Public\Desktop\Live Update 5.lnk
    [2014/02/15 11:36:02 | 000,001,108 | ---- | C] () -- C:\Users\Laptop\Desktop\KeyboardTest.lnk
    [2014/02/15 09:59:46 | 000,256,000 | ---- | C] () -- C:\windows\PEV.exe
    [2014/02/15 09:59:46 | 000,208,896 | ---- | C] () -- C:\windows\MBR.exe
    [2014/02/15 09:59:46 | 000,098,816 | ---- | C] () -- C:\windows\sed.exe
    [2014/02/15 09:59:46 | 000,080,412 | ---- | C] () -- C:\windows\grep.exe
    [2014/02/15 09:59:46 | 000,068,096 | ---- | C] () -- C:\windows\zip.exe
    [2014/02/14 22:19:05 | 000,001,084 | ---- | C] () -- C:\Users\Laptop\Desktop\WinDirStat.lnk
    [2014/02/13 07:59:55 | 000,002,019 | ---- | C] () -- C:\Users\Public\Desktop\avast! Free Antivirus.lnk
    [2014/02/13 07:58:11 | 000,207,904 | ---- | C] () -- C:\windows\SysNative\drivers\aswVmm.sys
    [2014/02/13 07:58:10 | 000,065,776 | ---- | C] () -- C:\windows\SysNative\drivers\aswRvrt.sys
    [2014/02/13 00:48:24 | 000,001,200 | ---- | C] () -- C:\Users\Public\Desktop\Mozilla Firefox.lnk
    [2014/02/13 00:48:23 | 000,001,212 | ---- | C] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Firefox.lnk
    [2014/02/13 00:46:36 | 000,002,332 | ---- | C] () -- C:\Users\Laptop\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk
    [2014/02/13 00:46:36 | 000,002,308 | ---- | C] () -- C:\Users\Public\Desktop\Google Chrome.lnk
    [2014/02/12 21:57:45 | 000,001,186 | ---- | C] () -- C:\Users\Laptop\Application Data\Microsoft\Internet Explorer\Quick Launch\Malwarebytes Anti-Malware.lnk
    [2014/02/12 21:57:45 | 000,001,162 | ---- | C] () -- C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
    [2013/07/17 08:20:38 | 000,000,017 | ---- | C] () -- C:\windows\SysWow64\shortcut_ex.dat
    [2013/03/22 17:11:59 | 000,121,064 | ---- | C] () -- C:\Users\Laptop\AppData\Local\NetMailTmp.bin
    [2012/05/10 13:29:43 | 000,735,726 | ---- | C] () -- C:\windows\SysWow64\PerfStringBackup.INI
    [2012/05/07 02:45:14 | 000,016,384 | ---- | C] () -- C:\Users\Laptop\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
    [2011/08/03 05:08:02 | 000,131,368 | ---- | C] () -- C:\ProgramData\FullRemove.exe

    ========== ZeroAccess Check ==========

    [2009/07/14 14:55:00 | 000,000,227 | RHS- | M] () -- C:\windows\assembly\Desktop.ini

    [HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32] /64

    [HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]

    [HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32] /64

    [HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32]

    [HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32] /64
    " " = C:\Windows\SysNative\shell32.dll -- [2013/07/26 12:24:57 | 014,172,672 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Apartment

    [HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
    " " = %SystemRoot%\system32\shell32.dll -- [2013/07/26 11:55:59 | 012,872,704 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Apartment

    [HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32] /64
    " " = C:\Windows\SysNative\wbem\fastprox.dll -- [2009/07/14 11:40:51 | 000,909,312 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Free

    [HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32]
    " " = %systemroot%\system32\wbem\fastprox.dll -- [2010/11/21 13:24:25 | 000,606,208 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Free

    [HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32] /64
    " " = C:\Windows\SysNative\wbem\wbemess.dll -- [2009/07/14 11:41:56 | 000,505,856 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Both

    [HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32]

    ========== LOP Check ==========

    [2012/12/20 00:42:25 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\Canon
    [2013/09/13 15:48:22 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\GameConsole
    [2013/09/13 15:38:14 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\Nuance
    [2014/01/29 14:12:21 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\Sierra Wireless
    [2013/09/30 13:55:33 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\SoftGrid Client
    [2014/01/29 14:14:22 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\Telstra
    [2013/09/13 15:37:56 | 000,000,000 | ---D | M] -- C:\Users\Guest\AppData\Roaming\Zeon
    [2014/02/13 08:00:14 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\AVAST Software
    [2012/10/18 22:14:13 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\Canon
    [2014/02/12 22:43:02 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\GameConsole
    [2014/02/12 22:43:02 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\MusicNet
    [2012/04/29 00:51:38 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\Nuance
    [2012/05/17 16:34:10 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\Sierra Wireless
    [2014/02/15 10:39:54 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\SoftGrid Client
    [2014/02/12 22:28:20 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\Telstra
    [2014/02/12 22:43:02 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\Tific
    [2012/05/10 13:34:33 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\TP
    [2012/04/27 09:16:56 | 000,000,000 | ---D | M] -- C:\Users\Laptop\AppData\Roaming\Zeon

    ========== Purity Check ==========



    ========== Alternate Data Streams ==========

    @Alternate Data Stream - 148 bytes -> C:\ProgramData\TEMP:AB689DEA
    @Alternate Data Stream - 144 bytes -> C:\ProgramData\TEMP:9E22BBE8
    @Alternate Data Stream - 132 bytes -> C:\ProgramData\TEMP:EB603FE4
    @Alternate Data Stream - 109 bytes -> C:\ProgramData\TEMP:BC359956

    < End of report >

    Cheers
    Graham
     
  19. 2014/02/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    [​IMG] Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following
    Code:
    :OTL
    DRV:64bit: - File not found [Kernel | On_Demand | Stopped] -- C:\Program Files\MSI\MSI Software Install\MGHwCtrl.sys -- (MGHwCtrl)
    DRV:64bit: - File not found [Kernel | System | Stopped] -- C:\Program Files\Malwarebytes Anti-Exploit\MBAE.sys -- (ESProtectionDriver)
    O3 - HKLM\..\Toolbar: (no name) - 10 - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
    O9:64bit: - Extra Button: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - Reg Error: Key error. File not found
    @Alternate Data Stream - 148 bytes -> C:\ProgramData\TEMP:AB689DEA
    @Alternate Data Stream - 144 bytes -> C:\ProgramData\TEMP:9E22BBE8
    @Alternate Data Stream - 132 bytes -> C:\ProgramData\TEMP:EB603FE4
    @Alternate Data Stream - 109 bytes -> C:\ProgramData\TEMP:BC359956
    
    :Services
    
    :Reg
    
    :Files
    C:\FRST
    
    :Commands
    [purity]
    [emptytemp]
    [emptyjava]
    [emptyflash]
    [Reboot]
    
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    NOTE. If for any reason OTL stalls (most likely at "killing processes..." step) run the fix from safe mode.

    Last scans....

    [​IMG] Download Security Check from here or here and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
    NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
    NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.


    [​IMG] Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
    • Make sure the following options are checked:
      • Internet Services
      • Windows Firewall
      • System Restore
      • Security Center
      • Windows Update
      • Windows Defender
      • Other Services
    • Press "Scan ".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please copy and paste the log to your reply.

    [​IMG] Download Temp File Cleaner (TFC)
    Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.

    [​IMG] Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Click on "Run ESET Online Scanner" button.
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, click on List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  20. 2014/02/16
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    logs as requested;

    All processes killed
    Error: Unable to interpret <Code: > in the current context!
    ========== OTL ==========
    Service MGHwCtrl stopped successfully!
    Service MGHwCtrl deleted successfully!
    File C:\Program Files\MSI\MSI Software Install\MGHwCtrl.sys not found.
    Service ESProtectionDriver stopped successfully!
    Service ESProtectionDriver deleted successfully!
    File C:\Program Files\Malwarebytes Anti-Exploit\MBAE.sys not found.
    Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\10 deleted successfully.
    Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\Locked deleted successfully.
    64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{898EA8C8-E7FF-479B-8935-AEC46303B9E5}\ deleted successfully.
    64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{898EA8C8-E7FF-479B-8935-AEC46303B9E5}\ not found.
    ADS C:\ProgramData\TEMP:AB689DEA deleted successfully.
    ADS C:\ProgramData\TEMP:9E22BBE8 deleted successfully.
    ADS C:\ProgramData\TEMP:EB603FE4 deleted successfully.
    ADS C:\ProgramData\TEMP:BC359956 deleted successfully.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    File\Folder C:\FRST not found.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 138110 bytes
    ->Flash cache emptied: 708 bytes

    User: Laptop
    ->Temp folder emptied: 2206727 bytes
    ->Temporary Internet Files folder emptied: 175116601 bytes
    ->FireFox cache emptied: 18725808 bytes
    ->Google Chrome cache emptied: 9933464 bytes
    ->Flash cache emptied: 595 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 6 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 21020 bytes
    %systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 12920931 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 42310724 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 249.00 mb


    [EMPTYJAVA]

    User: All Users

    User: Default

    User: Default User

    User: Guest

    User: Laptop

    User: Public

    Total Java Files Cleaned = 0.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default

    User: Default User

    User: Guest
    ->Flash cache emptied: 0 bytes

    User: Laptop
    ->Flash cache emptied: 0 bytes

    User: Public

    Total Flash Files Cleaned = 0.00 mb


    OTL by OldTimer - Version 3.2.69.0 log created on 02162014_152736

    Files\Folders moved on Reboot...
    C:\Users\Laptop\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
    C:\Users\Laptop\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moved successfully.
    File\Folder C:\windows\temp\_avast_\Webshlock.txt not found!
    C:\windows\SysWow64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moved successfully.

    PendingFileRenameOperations files...

    Registry entries deleted on Reboot...
     
  21. 2014/02/16
    GRAHAM WESTON

    GRAHAM WESTON Well-Known Member Thread Starter

    Joined:
    2002/07/30
    Messages:
    371
    Likes Received:
    0
    Results of screen317's Security Check version 0.99.79
    Windows 7 Service Pack 1 x64 (UAC is enabled)
    Internet Explorer 11
    ``````````````Antivirus/Firewall Check:``````````````
    Windows Firewall Enabled!
    avast! Antivirus
    Antivirus up to date!
    `````````Anti-malware/Other Utilities Check:`````````
    Malwarebytes Anti-Malware version 1.75.0.1300
    Mozilla Firefox (26.0)
    Google Chrome 32.0.1700.107
    ````````Process Check: objlist.exe by Laurent````````
    Malwarebytes' Anti-Malware mbamscheduler.exe
    AVAST Software Avast AvastSvc.exe
    AVAST Software Avast AvastUI.exe
    `````````````````System Health check`````````````````
    Total Fragmentation on Drive C: 2%
    ````````````````````End of Log``````````````````````


    Farbar Service Scanner Version: 02-02-2014
    Ran by Laptop (administrator) on 16-02-2014 at 15:50:55
    Running from "C:\Users\Laptop\Desktop "
    Microsoft Windows 7 Home Premium Service Pack 1 (X64)
    Boot Mode: Normal
    ****************************************************************

    Internet Services:
    ============

    Connection Status:
    ==============
    Localhost is accessible.
    LAN connected.
    Google IP is accessible.
    Google.com is accessible.
    Yahoo.com is accessible.


    Windows Firewall:
    =============

    Firewall Disabled Policy:
    ==================


    System Restore:
    ============

    System Restore Disabled Policy:
    ========================


    Action Center:
    ============


    Windows Update:
    ============

    Windows Autoupdate Disabled Policy:
    ============================


    Windows Defender:
    ==============

    Other Services:
    ==============


    File Check:
    ========
    C:\Windows\System32\nsisvc.dll => MD5 is legit
    C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
    C:\Windows\System32\dhcpcore.dll => MD5 is legit
    C:\Windows\System32\drivers\afd.sys => MD5 is legit
    C:\Windows\System32\drivers\tdx.sys => MD5 is legit
    C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
    C:\Windows\System32\dnsrslvr.dll => MD5 is legit
    C:\Windows\System32\mpssvc.dll => MD5 is legit
    C:\Windows\System32\bfe.dll => MD5 is legit
    C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
    C:\Windows\System32\SDRSVC.dll => MD5 is legit
    C:\Windows\System32\vssvc.exe => MD5 is legit
    C:\Windows\System32\wscsvc.dll => MD5 is legit
    C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
    C:\Windows\System32\wuaueng.dll => MD5 is legit
    C:\Windows\System32\qmgr.dll => MD5 is legit
    C:\Windows\System32\es.dll => MD5 is legit
    C:\Windows\System32\cryptsvc.dll => MD5 is legit
    C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
    C:\Windows\System32\ipnathlp.dll => MD5 is legit
    C:\Windows\System32\iphlpsvc.dll => MD5 is legit
    C:\Windows\System32\svchost.exe => MD5 is legit
    C:\Windows\System32\rpcss.dll => MD5 is legit


    **** End of log ****

    C:\Users\Guest\Pictures\about.Brontok.A.html Win32/Brontok.A virus deleted - quarantined
    C:\Users\Laptop\Desktop\Vanuatu Photos\Autoexec.bat Win32/AutoRun.VB.ATY worm cleaned by deleting - quarantined
    C:\Users\Laptop\Pictures\about.Brontok.A.html Win32/Brontok.A virus deleted - quarantined


    Regards
    Graham
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.