1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

[Resolved] Computer Slow To Load Internet Pages

Discussion in 'Spyware, Adware, Viruses and Malware Removal' started by Whoosh, Mar 28, 2014.

  1. Whoosh

    Whoosh Established Techie7 Member

    A safe rugby message board I have used for years, recently got hijacked by a redirect to adverts. The first I knew of
    it was when I was sent to an advertising site when I was trying to open a thread.

    Since then I have noticed my computer can take a while to load pages or need a refresh to get to a site.
    If you could have a look to see if there is an issue I would greatly appreciate it.

    Thanks
    Nick

    MALWAREBYTES

    Malwarebytes Anti-Malware 1.75.0.1300
    www.malwarebytes.org

    Database version: v2014.03.28.08

    Windows 7 Service Pack 1 x86 NTFS
    Internet Explorer 11.0.9600.16521
    Nick :: NICK-PC [administrator]

    28/03/2014 22:16:22
    mbam-log-2014-03-28 (22-16-22).txt

    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 220503
    Time elapsed: 8 minute(s), 39 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 0
    (No malicious items detected)

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 0
    (No malicious items detected)

    (end)


    DDS

    .
    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT
    .
    DDS (Ver_2012-11-20.01)
    .
    Microsoft Windows 7 Home Premium
    Boot Device: \Device\HarddiskVolume1
    Install Date: 29/12/2010 19:43:15
    System Uptime: 28/03/2014 12:20:53 (10 hours ago)
    .
    Motherboard: LENOVO | | NITU1
    Processor: Pentium(R) Dual-Core CPU T4500 @ 2.30GHz | U2E1 | 2300/200mhz
    .
    ==== Disk Partitions =========================
    .
    C: is FIXED (NTFS) - 253 GiB total, 76.073 GiB free.
    D: is FIXED (NTFS) - 30 GiB total, 29.456 GiB free.
    E: is CDROM ()
    .
    ==== Disabled Device Manager Items =============
    .
    ==== System Restore Points ===================
    .
    RP528: 09/03/2014 21:34:49 - Windows Update
    RP529: 12/03/2014 15:12:35 - Windows Update
    RP530: 15/03/2014 19:25:34 - Windows Update
    RP531: 18/03/2014 19:56:32 - Windows Update
    RP532: 19/03/2014 21:03:52 - 19/03/2014
    RP533: 21/03/2014 22:27:57 - Windows Update
    RP534: 25/03/2014 11:38:40 - Windows Update
    RP535: 28/03/2014 13:26:24 - Windows Update
    .
    ==== Installed Programs ======================
    .
    Acrobat.com
    Adobe Flash Player 12 ActiveX
    ALPS Touch Pad Driver
    AviSynth 2.5
    Bing Bar
    Bing Bar Platform
    Broadcom 802.11 Wireless Driver
    Broadcom Gigabit Integrated Controller
    Conexant HD Audio
    DVD Flick 1.3.0.7
    EasyCapture
    EMET
    Energy Management
    Eraser 6.0.8.2273
    ESET Online Scanner v3
    Foxit Cloud
    Foxit Reader
    Free MKV Video2Dvd 3.30
    Free WebM to MP4 Converter 1.0
    Free WebM Video Converter version 5.0.21.1212
    Google Chrome
    Google Update Helper
    ImgBurn
    Intel(R) Graphics Media Accelerator Driver
    Intel(R) TV Wizard
    Intel® Matrix Storage Manager
    Junk Mail filter update
    Lenovo Bluetooth with Enhanced Data Rate Software
    Lenovo EasyCamera
    Lenovo OneKey Recovery
    Lenovo ReadyComm 5
    Lenovo ReadyComm 5.0 Service
    Malwarebytes Anti-Malware version 1.75.0.1300
    Microsoft .NET Framework 4.5.1
    Microsoft Application Error Reporting
    Microsoft Choice Guard
    Microsoft Office 2010
    Microsoft Office Click-to-Run 2010
    Microsoft Office Starter 2010 - English
    Microsoft Search Enhancement Pack
    Microsoft Security Client
    Microsoft Security Essentials
    Microsoft Silverlight
    Microsoft SQL Server 2005 Compact Edition [ENU]
    Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
    Microsoft Visual C++ 2005 Redistributable
    MSVCRT
    MSXML 4.0 SP3 Parser
    MSXML 4.0 SP3 Parser (KB2721691)
    MSXML 4.0 SP3 Parser (KB2758694)
    MSXML 4.0 SP3 Parser (KB973685)
    Nero BurnLite 10
    Nero Control Center 10
    Nero ControlCenter 10 Help (CHM)
    Nero Core Components 10
    Nero Update
    ooVoo
    Paint Shop Pro 4.15 SE
    PC-Doctor for Windows
    Power2Go
    Rapport
    Realtek USB 2.0 Card Reader
    Secunia PSI (3.0.0.9016)
    Security Update for Microsoft .NET Framework 4.5.1 (KB2898869)
    Security Update for Microsoft .NET Framework 4.5.1 (KB2901126)
    SUPERAntiSpyware
    TouchFreeze
    Trader's Little Helper 2.7.0
    Trusteer Endpoint Protection
    Unity Web Player
    VeriFace
    Windows Driver Package - Broadcom Bluetooth (06/15/2009 6.2.0.9000)
    Windows Driver Package - Broadcom Bluetooth (07/30/2009 6.2.0.9405)
    Windows Driver Package - Broadcom HIDClass (07/28/2009 6.2.0.9800)
    Windows Live Call
    Windows Live Communications Platform
    Windows Live Essentials
    Windows Live Mail
    Windows Live Messenger
    Windows Live Movie Maker
    Windows Live Photo Gallery
    Windows Live Sign-in Assistant
    Windows Live Sync
    Windows Live Upload Tool
    Windows Live Writer
    WinRAR archiver
    WMPCDText 1.2
    WOT for Internet Explorer
    Xiph.Org Open Codecs 0.85.17777
    .
    ==== Event Viewer Messages From Past Week ========
    .
    28/03/2014 17:59:59, Error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.169.1099.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: http://www.microsoft.com Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.10401.0 Error code: 0x8024402c Error description: An unexpected problem occurred while checking for updates. For information on installing or troubleshooting updates, see Help and Support.
    23/03/2014 13:45:54, Error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.169.561.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: http://www.microsoft.com Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.10401.0 Error code: 0x8024402c Error description: An unexpected problem occurred while checking for updates. For information on installing or troubleshooting updates, see Help and Support.
    22/03/2014 23:55:11, Error: Tcpip [4199] - The system detected an address conflict for IP address 192.168.1.7 with the system having network hardware address BC-CF-CC-04-46-18. Network operations on this system may be disrupted as a result.
    .
    ==== End Of File ===========================

    DDS (Ver_2012-11-20.01) - NTFS_x86
    Internet Explorer: 11.0.9600.16521
    Run by Nick at 22:27:12 on 2014-03-28
    Microsoft Windows 7 Home Premium 6.1.7601.1.1252.44.1033.18.3033.1371 [GMT 0:00]
    .
    AV: Microsoft Security Essentials *Enabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
    SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
    SP: Microsoft Security Essentials *Enabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
    .
    ============== Running Processes ================
    .
    C:\windows\system32\wininit.exe
    C:\windows\system32\lsm.exe
    c:\Program Files\Microsoft Security Client\MsMpEng.exe
    C:\windows\system32\WLANExt.exe
    C:\windows\system32\conhost.exe
    C:\windows\System32\spoolsv.exe
    C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
    C:\windows\system32\BtwRSupportService.exe
    C:\Program Files\Lenovo\Bluetooth Software\btwdins.exe
    C:\Program Files\Foxit Software\Foxit Reader\Foxit Cloud\FCUpdateService.exe
    C:\Program Files\Lenovo\ReadyComm\common\IGRS.exe
    C:\windows\System32\IgrsSvcs.exe
    C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
    C:\Program Files\Secunia\PSI\PSIA.exe
    C:\Program Files\Microsoft Application Virtualization Client\sftvsa.exe
    C:\Program Files\Microsoft Application Virtualization Client\sftlist.exe
    C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
    C:\windows\system32\wbem\wmiprvse.exe
    C:\Program Files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE
    c:\Program Files\Microsoft Security Client\NisSrv.exe
    C:\windows\system32\taskhost.exe
    C:\windows\system32\Dwm.exe
    C:\windows\Explorer.EXE
    C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
    C:\Windows\System32\igfxtray.exe
    C:\Windows\System32\hkcmd.exe
    C:\Windows\System32\igfxpers.exe
    C:\Program Files\USB Camera2\VM332_STI.EXE
    C:\Program Files\Conexant\SAII\SmartAudio.exe
    C:\windows\system32\igfxsrvc.exe
    C:\Program Files\Lenovo\VeriFace\PManage.exe
    C:\Program Files\Lenovo\Energy Management\utility.exe
    C:\Program Files\Lenovo\Energy Management\Energy Management.exe
    C:\Program Files\Eraser\Eraser.exe
    C:\Program Files\Microsoft Security Client\msseces.exe
    C:\Program Files\EMET\EMET_notifier.exe
    C:\Program Files\TouchFreeze\TouchFreeze.exe
    C:\Program Files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE
    C:\Program Files\Secunia\PSI\psi_tray.exe
    C:\windows\system32\SearchIndexer.exe
    C:\Program Files\Windows Media Player\wmpnetwk.exe
    C:\windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
    C:\Program Files\Nero\Update\NASvc.exe
    C:\windows\system32\taskeng.exe
    C:\Program Files\Google\Chrome\Application\chrome.exe
    C:\Program Files\Google\Chrome\Application\chrome.exe
    C:\Program Files\Google\Chrome\Application\chrome.exe
    C:\Program Files\Google\Chrome\Application\chrome.exe
    C:\Program Files\Google\Chrome\Application\chrome.exe
    C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
    C:\windows\notepad.exe
    C:\windows\system32\conhost.exe
    C:\windows\system32\wbem\wmiprvse.exe
    C:\windows\system32\svchost.exe -k DcomLaunch
    C:\windows\system32\svchost.exe -k RPCSS
    C:\windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    C:\windows\System32\svchost.exe -k LocalSystemNetworkRestricted
    C:\windows\system32\svchost.exe -k LocalService
    C:\windows\system32\svchost.exe -k netsvcs
    C:\windows\system32\svchost.exe -k GPSvcGroup
    C:\windows\system32\svchost.exe -k NetworkService
    C:\windows\system32\svchost.exe -k LocalServiceNoNetwork
    C:\windows\system32\svchost.exe -k imgsvc
    C:\windows\system32\svchost.exe -k bthsvcs
    C:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
    C:\windows\System32\svchost.exe -k LocalServicePeerNet
    C:\windows\system32\svchost.exe -k SDRSVC
    .
    ============== Pseudo HJT Report ===============
    .
    uStart Page = hxxp://www.google.co.uk/
    BHO: Search Helper: {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
    BHO: Qualys BrowserCheck IE Helper: {7D2FB79E-E58C-4DB5-A36F-AC1C73967FA5} - c:\windows\downloaded program files\qbc_bho.dll
    BHO: Windows Live Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
    BHO: WOT Helper: {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - c:\program files\wot\WOT.dll
    BHO: Bing Bar BHO: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn toolbar\platform\6.3.2322.0\npwinext.dll
    TB: WOT: {71576546-354D-41C9-AAE8-31F2EC22BF0D} - c:\program files\wot\WOT.dll
    TB: @c:\program files\msn toolbar\platform\6.3.2322.0\npwinext.dll,-100: {8dcb7100-df86-4384-8842-8fa844297b3f} - c:\program files\msn toolbar\platform\6.3.2322.0\npwinext.dll
    TB: WOT: {71576546-354D-41c9-AAE8-31F2EC22BF0D} - c:\program files\wot\WOT.dll
    uRun: [TouchFreeze] c:\program files\touchfreeze\TouchFreeze.exe
    uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
    mRun: [IAAnotif] c:\program files\intel\intel matrix storage manager\iaanotif.exe
    mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
    mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
    mRun: [Persistence] c:\windows\system32\igfxpers.exe
    mRun: [SmartAudio] c:\program files\conexant\saii\SAIICpl.exe /t
    mRun: [332BigDog] c:\program files\usb camera2\VM332_STI.EXE
    mRun: [VeriFaceManager] c:\program files\lenovo\veriface\PManage.exe
    mRun: [UpdateP2GShortCut] "c:\program files\lenovo\power2go\muitransfer\muistartmenu.exe" "c:\program files\lenovo\power2go" updatewithcreateonce "software\cyberlink\power2go\5.0"
    mRun: [EnergyUtility] c:\program files\lenovo\energy management\utility.exe
    mRun: [Energy Management] c:\program files\lenovo\energy management\Energy Management.exe
    mRun: [Eraser] "c:\progra~1\eraser\Eraser.exe" --atRestart
    mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
    mRun: [EMET Notifier] c:\program files\emet\EMET_notifier.exe
    dRunOnce: [WLStart] "c:\program files\windows live\installer\wlstart.exe" /nosearch /nohomepage
    StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\secuni~1.lnk - c:\program files\secunia\psi\psi_tray.exe
    uPolicies-Explorer: NoDrives = dword:0
    mPolicies-Explorer: NoDrives = dword:0
    mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
    mPolicies-System: ConsentPromptBehaviorUser = dword:3
    mPolicies-System: EnableUIADesktopToggle = dword:0
    IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
    IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\lenovo\bluetooth software\btsendto_ie.htm
    DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
    DPF: {7D2FB79E-E58C-4DB5-A36F-AC1C73967F4D} - hxxps://browsercheck.qualys.com/qbc_ax.cab
    DPF: {CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_11-windows-i586.cab
    DPF: {CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_13-windows-i586.cab
    DPF: {CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_15-windows-i586.cab
    DPF: {CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_17-windows-i586.cab
    TCP: NameServer = 192.168.1.1 192.168.1.1
    TCP: Interfaces\{14D602EB-8868-4EA4-9E77-BC880202ACF4} : DHCPNameServer = 192.168.1.1 192.168.1.1
    TCP: Interfaces\{53C7F6D7-A3E2-4EF3-93FB-B82F102A6EE0} : DHCPNameServer = 192.168.1.1 192.168.1.1
    Handler: wot - {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - c:\program files\wot\WOT.dll
    Notify: igfxcui - igfxdev.dll
    mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\33.0.1750.154\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
    .
    ============= SERVICES / DRIVERS ===============
    .
    R0 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2013-9-27 214696]
    R1 funfrm;funfrm;c:\windows\system32\drivers\funfrm.sys [2010-8-24 54800]
    R1 MpKslb4a30ae6;MpKslb4a30ae6;c:\programdata\microsoft\microsoft antimalware\definition updates\{608f36c1-1fcd-4c97-a19f-839d3ea1ccb6}\MpKslb4a30ae6.sys [2014-3-28 39464]
    R1 RapportCerberus_59849;RapportCerberus_59849;c:\programdata\trusteer\rapport\store\exts\rapportcerberus\baseline\RapportCerberus32_59849.sys [2013-12-12 340432]
    R1 RapportEI;RapportEI;c:\program files\trusteer\rapport\bin\RapportEI.sys [2014-2-10 155704]
    R1 RapportPG;RapportPG;c:\program files\trusteer\rapport\bin\RapportPG.sys [2014-2-10 228888]
    R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
    R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
    R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2013-10-10 120088]
    R2 BcmBtRSupport;Bluetooth Driver Management Service;c:\windows\system32\BtwRSupportService.exe [2013-10-28 1680088]
    R2 cvhsvc;Client Virtualization Handler;c:\program files\common files\microsoft shared\virtualization handler\CVHSVC.EXE [2013-4-22 822504]
    R2 FoxitCloudUpdateService;Foxit Cloud Safe Update Service;c:\program files\foxit software\foxit reader\foxit cloud\FCUpdateService.exe [2014-2-20 239680]
    R2 IGRS;IGRS;c:\program files\lenovo\readycomm\common\IGRS.exe [2009-7-14 38152]
    R2 NAUpdate;Nero Update;c:\program files\nero\update\NASvc.exe [2010-5-4 503080]
    R2 NisDrv;Microsoft Network Inspection System;c:\windows\system32\drivers\NisDrvWFP.sys [2011-4-27 104768]
    R2 RapportMgmtService;Rapport Management Service;c:\program files\trusteer\rapport\bin\RapportMgmtService.exe [2014-2-10 1444120]
    R2 ReadyComm.DirectRouter;ReadyComm.DirectRouter;c:\windows\system32\igrssvcs.exe -k igrssvcs --> c:\windows\system32\IgrsSvcs.exe -k IgrsSvcs [?]
    R2 Secunia PSI Agent;Secunia PSI Agent;c:\program files\secunia\psi\psia.exe [2013-12-6 1229528]
    R2 sftlist;Application Virtualization Client;c:\program files\microsoft application virtualization client\sftlist.exe [2013-6-26 523944]
    R3 ACPIVPC;Lenovo Virtual Power Controller Driver;c:\windows\system32\drivers\AcpiVpc.sys [2010-1-20 23136]
    R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2012-6-18 374648]
    R3 bcbtums;Bluetooth USB LD Filter;c:\windows\system32\drivers\bcbtums.sys [2013-10-28 175320]
    R3 btwampfl;btwampfl;c:\windows\system32\drivers\btwampfl.sys [2013-8-9 144600]
    R3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\drivers\btwl2cap.sys [2010-8-24 29472]
    R3 IntcHdmiAddService;Intel(R) High Definition Audio HDMI;c:\windows\system32\drivers\IntcHdmi.sys [2010-8-24 122368]
    R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2014-3-27 40776]
    R3 NisSrv;Microsoft Network Inspection;c:\program files\microsoft security client\NisSrv.exe [2013-10-23 280288]
    R3 PSI;PSI;c:\windows\system32\drivers\psi_mf_x86.sys [2013-12-6 16024]
    R3 Sftfs;Sftfs;c:\windows\system32\drivers\Sftfslh.sys [2013-6-26 583848]
    R3 Sftplay;Sftplay;c:\windows\system32\drivers\Sftplaylh.sys [2013-6-26 197800]
    R3 Sftredir;Sftredir;c:\windows\system32\drivers\Sftredirlh.sys [2013-6-26 24232]
    R3 Sftvol;Sftvol;c:\windows\system32\drivers\Sftvollh.sys [2013-6-26 20136]
    R3 sftvsa;Application Virtualization Service Agent;c:\program files\microsoft application virtualization client\sftvsa.exe [2013-6-26 207528]
    R3 vm332avs;Lenovo Camera2;c:\windows\system32\drivers\vm332avs.sys [2010-8-24 198000]
    R3 wdmirror;wdmirror;c:\windows\system32\drivers\WDMirror.sys [2010-8-24 11792]
    S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2013-9-11 105144]
    S3 Bridge0;Bridge0;c:\windows\system32\drivers\wdbridge.sys [2010-8-24 63240]
    S3 btusbflt;Bluetooth USB Filter;c:\windows\system32\drivers\btusbflt.sys [2010-4-14 45736]
    S3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\ieetwcollector.exe [2014-3-12 108032]
    S3 k57nd60x;Broadcom NetLink (TM) Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\k57nd60x.sys [2009-7-13 229888]
    S3 Lenovo ReadyComm AppSvc;Lenovo ReadyComm AppSvc;c:\program files\lenovo\readycomm\AppSvc.exe [2010-8-24 509192]
    S3 Lenovo ReadyComm ConnSvc;Lenovo ReadyComm ConnSvc;c:\program files\lenovo\readycomm\ConnSvc.exe [2010-8-24 579400]
    S3 netw5v32;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 32 Bit;c:\windows\system32\drivers\netw5v32.sys [2009-6-10 4231168]
    S3 PS_MDP;ReadyComm Presentation Space Helper Service;c:\windows\system32\igrssvcs.exe -k igrssvcs --> c:\windows\system32\IgrsSvcs.exe -k IgrsSvcs [?]
    S3 RapportKELL;RapportKELL;c:\windows\system32\drivers\RapportKELL.sys [2014-2-10 107256]
    S3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2012-11-14 14848]
    S3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RtsUStor.sys [2010-8-24 171520]
    S3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\TsUsbFlt.sys [2013-11-14 49152]
    S3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\wat\WatAdminSvc.exe [2010-12-29 1343400]
    S3 wsvd;wsvd;c:\windows\system32\drivers\wsvd.sys [2009-7-21 81704]
    .
    =============== Created Last 30 ================
    .
    2014-03-28 18:04:51 62576 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{608f36c1-1fcd-4c97-a19f-839d3ea1ccb6}\offreg.dll
    2014-03-28 18:04:51 39464 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{608f36c1-1fcd-4c97-a19f-839d3ea1ccb6}\MpKslb4a30ae6.sys
    2014-03-28 18:02:49 7969936 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{608f36c1-1fcd-4c97-a19f-839d3ea1ccb6}\mpengine.dll
    2014-03-28 16:08:10 7969936 ------w- c:\programdata\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll
    2014-03-27 22:41:18 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2014-03-25 11:41:08 765968 ------w- c:\programdata\microsoft\microsoft antimalware\definition updates\{73f582c9-4b33-46a0-8639-ef4c73621efd}\gapaengine.dll
    2014-02-27 20:51:56 -------- d-----w- c:\program files\AviSynth 2.5
    .
    ==================== Find3M ====================
    .
    2014-03-27 22:39:50 75480 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
    2014-03-12 11:04:57 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
    2014-03-12 11:04:57 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
    2014-03-01 04:11:20 2724864 ----a-w- c:\windows\system32\mshtml.tlb
    2014-03-01 04:10:48 4096 ----a-w- c:\windows\system32\ieetwcollectorres.dll
    2014-03-01 03:52:43 61952 ----a-w- c:\windows\system32\iesetup.dll
    2014-03-01 03:51:53 51200 ----a-w- c:\windows\system32\ieetwproxystub.dll
    2014-03-01 03:38:26 112128 ----a-w- c:\windows\system32\ieUnatt.exe
    2014-03-01 03:38:23 108032 ----a-w- c:\windows\system32\ieetwcollector.exe
    2014-03-01 03:37:35 553472 ----a-w- c:\windows\system32\jscript9diag.dll
    2014-03-01 03:31:30 646144 ----a-w- c:\windows\system32\MsSpellCheckingFacility.exe
    2014-03-01 03:14:15 4244480 ----a-w- c:\windows\system32\jscript9.dll
    2014-03-01 03:00:08 1964032 ----a-w- c:\windows\system32\inetcpl.cpl
    2014-03-01 02:32:16 1820160 ----a-w- c:\windows\system32\wininet.dll
    2014-02-10 11:35:40 107256 ----a-w- c:\windows\system32\drivers\RapportKELL.sys
    2014-02-07 01:07:56 2349056 ----a-w- c:\windows\system32\win32k.sys
    2014-02-04 02:04:22 1230336 ----a-w- c:\windows\system32\WindowsCodecs.dll
    2014-02-04 02:04:11 509440 ----a-w- c:\windows\system32\qedit.dll
    2014-01-29 02:06:47 381440 ----a-w- c:\windows\system32\wer.dll
    2014-01-28 02:07:07 185344 ----a-w- c:\windows\system32\wwansvc.dll
    2014-01-19 07:32:23 231584 ------w- c:\windows\system32\MpSigStub.exe
    2014-01-09 02:22:42 5694464 ----a-w- c:\windows\system32\mstscax.dll
    .
    ============= FINISH: 22:29:51.51 ===============

    Regards,
    Nick
     
  2. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running any tools, fixes or applying any changes to your computer other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

    =============================

    [​IMG] Download RogueKiller from one of the following links and save it to your Desktop:
    • Close all the running programs
    • Windows Vista/7/8 users: right click on RogueKiller.exe, click Run as Administrator
    • Otherwise just double-click on RogueKiller.exe
    • Pre-scan will start. Let it finish.
    • Click on SCAN button.
    • Wait until the Status box shows Scan Finished
    • Click on Delete.
    • Wait until the Status box shows Deleting Finished.
    • Click on Report and copy/paste the content of the Notepad into your next reply.
    • RKreport.txt could also be found on your desktop.
    • If more than one log is produced post all logs.
    • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again

    [​IMG] Create new restore point before proceeding with the next step....
    How to: http://www.smartestcomputing.us.com/topic/63983-how-to-create-new-restore-point-all-windows/

    Download Malwarebytes Anti-Rootkit (MBAR) from HERE
    • Unzip downloaded file.
    • Open the folder where the contents were unzipped and run mbar.exe
    • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    • Wait while the system shuts down and the cleanup process is performed.
    • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt
     
  3. Whoosh

    Whoosh Established Techie7 Member

    Hi Broni,

    RK

    Gave two reports posted below.

    Malwarebytes Rootkit was clean.

    - Scan Finished - No Malware Found

    RK

    RogueKiller V8.8.15 [Mar 27 2014] by Adlice Software
    mail : http://www.adlice.com/contact/
    Feedback : http://forum.adlice.com
    Website : http://www.adlice.com/softwares/roguekiller/
    Blog : http://www.adlice.com

    Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : Nick [Admin rights]
    Mode : Remove -- Date : 03/28/2014 23:51:31
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 1 ¤¤¤
    [SVCHOST] svchost.exe -- C:\Windows\System32\svchost.exe [7] -> KILLED [TermProc]

    ¤¤¤ Registry Entries : 5 ¤¤¤
    [HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> DELETED
    [HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
    [HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
    [HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
    [HJ DESK][PUM] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

    ¤¤¤ Scheduled tasks : 0 ¤¤¤

    ¤¤¤ Startup Entries : 0 ¤¤¤

    ¤¤¤ Web browsers : 0 ¤¤¤

    ¤¤¤ Browser Addons : 0 ¤¤¤

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [LOADED] ¤¤¤
    [Address] EAT @explorer.exe (BeginBufferedAnimation) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF09AE)
    [Address] EAT @explorer.exe (BeginBufferedPaint) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE49A1)
    [Address] EAT @explorer.exe (BeginPanningFeedback) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D10731)
    [Address] EAT @explorer.exe (BufferedPaintClear) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE6395)
    [Address] EAT @explorer.exe (BufferedPaintInit) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE940E)
    [Address] EAT @explorer.exe (BufferedPaintRenderAnimation) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF08ED)
    [Address] EAT @explorer.exe (BufferedPaintSetAlpha) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFE6B3)
    [Address] EAT @explorer.exe (BufferedPaintStopAllAnimations) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFD395)
    [Address] EAT @explorer.exe (BufferedPaintUnInit) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE94AB)
    [Address] EAT @explorer.exe (CloseThemeData) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE6A18)
    [Address] EAT @explorer.exe (DrawThemeBackground) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE3982)
    [Address] EAT @explorer.exe (DrawThemeBackgroundEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFD9DA)
    [Address] EAT @explorer.exe (DrawThemeEdge) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03B52)
    [Address] EAT @explorer.exe (DrawThemeIcon) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D135E7)
    [Address] EAT @explorer.exe (DrawThemeParentBackground) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE53E5)
    [Address] EAT @explorer.exe (DrawThemeParentBackgroundEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE51BF)
    [Address] EAT @explorer.exe (DrawThemeText) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE4EA1)
    [Address] EAT @explorer.exe (DrawThemeTextEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE63E6)
    [Address] EAT @explorer.exe (EnableThemeDialogTexture) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEFCAF)
    [Address] EAT @explorer.exe (EnableTheming) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12FEB)
    [Address] EAT @explorer.exe (EndBufferedAnimation) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE3F9A)
    [Address] EAT @explorer.exe (EndBufferedPaint) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE3F9A)
    [Address] EAT @explorer.exe (EndPanningFeedback) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D106CC)
    [Address] EAT @explorer.exe (GetBufferedPaintBits) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE4BAF)
    [Address] EAT @explorer.exe (GetBufferedPaintDC) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF04BC)
    [Address] EAT @explorer.exe (GetBufferedPaintTargetDC) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF0473)
    [Address] EAT @explorer.exe (GetBufferedPaintTargetRect) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12E7F)
    [Address] EAT @explorer.exe (GetCurrentThemeName) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF05DD)
    [Address] EAT @explorer.exe (GetThemeAppProperties) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF0FB1)
    [Address] EAT @explorer.exe (GetThemeBackgroundContentRect) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CECD2E)
    [Address] EAT @explorer.exe (GetThemeBackgroundExtent) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF8BF)
    [Address] EAT @explorer.exe (GetThemeBackgroundRegion) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF165D)
    [Address] EAT @explorer.exe (GetThemeBitmap) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEBF93)
    [Address] EAT @explorer.exe (GetThemeBool) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE7C1F)
    [Address] EAT @explorer.exe (GetThemeColor) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE616C)
    [Address] EAT @explorer.exe (GetThemeDocumentationProperty) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12932)
    [Address] EAT @explorer.exe (GetThemeEnumValue) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE616C)
    [Address] EAT @explorer.exe (GetThemeFilename) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12412)
    [Address] EAT @explorer.exe (GetThemeFont) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEFF21)
    [Address] EAT @explorer.exe (GetThemeInt) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE616C)
    [Address] EAT @explorer.exe (GetThemeIntList) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D123B1)
    [Address] EAT @explorer.exe (GetThemeMargins) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE86E9)
    [Address] EAT @explorer.exe (GetThemeMetric) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF06E2)
    [Address] EAT @explorer.exe (GetThemePartSize) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CECDB1)
    [Address] EAT @explorer.exe (GetThemePosition) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12350)
    [Address] EAT @explorer.exe (GetThemePropertyOrigin) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03FBB)
    [Address] EAT @explorer.exe (GetThemeRect) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF3611)
    [Address] EAT @explorer.exe (GetThemeStream) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF39D9)
    [Address] EAT @explorer.exe (GetThemeString) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D122E4)
    [Address] EAT @explorer.exe (GetThemeSysBool) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D13172)
    [Address] EAT @explorer.exe (GetThemeSysColor) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03274)
    [Address] EAT @explorer.exe (GetThemeSysColorBrush) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1301E)
    [Address] EAT @explorer.exe (GetThemeSysFont) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D129C4)
    [Address] EAT @explorer.exe (GetThemeSysInt) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12BD3)
    [Address] EAT @explorer.exe (GetThemeSysSize) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1320B)
    [Address] EAT @explorer.exe (GetThemeSysString) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12B3F)
    [Address] EAT @explorer.exe (GetThemeTextExtent) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE2D57)
    [Address] EAT @explorer.exe (GetThemeTextMetrics) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF992)
    [Address] EAT @explorer.exe (GetThemeTransitionDuration) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF1081)
    [Address] EAT @explorer.exe (GetWindowTheme) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEDF46)
    [Address] EAT @explorer.exe (HitTestThemeBackground) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF3CE3)
    [Address] EAT @explorer.exe (IsAppThemed) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF869)
    [Address] EAT @explorer.exe (IsCompositionActive) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE2E9A)
    [Address] EAT @explorer.exe (IsThemeActive) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF785)
    [Address] EAT @explorer.exe (IsThemeBackgroundPartiallyTransparent) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE60AB)
    [Address] EAT @explorer.exe (IsThemeDialogTextureEnabled) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1312B)
    [Address] EAT @explorer.exe (IsThemePartDefined) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE85B4)
    [Address] EAT @explorer.exe (OpenThemeData) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE73D2)
    [Address] EAT @explorer.exe (OpenThemeDataEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03D43)
    [Address] EAT @explorer.exe (SetThemeAppProperties) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D13296)
    [Address] EAT @explorer.exe (SetWindowTheme) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF0134)
    [Address] EAT @explorer.exe (SetWindowThemeAttribute) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFCFE6)
    [Address] EAT @explorer.exe (ThemeInitApiHook) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEB176)
    [Address] EAT @explorer.exe (UpdatePanningFeedback) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1068D)
    [Address] EAT @explorer.exe (DllGetClassObject) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387CF9D)
    [Address] EAT @explorer.exe (IEnumString_Next_WIC_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E000)
    [Address] EAT @explorer.exe (IEnumString_Reset_WIC_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E029)
    [Address] EAT @explorer.exe (IPropertyBag2_Write_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E049)
    [Address] EAT @explorer.exe (IWICBitmapClipper_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD2A)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportAnimation_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA9A)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportLossless_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EABD)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportMultiframe_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EAE0)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetContainerFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9D3)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetDeviceManufacturer_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9F6)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetDeviceModels_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA1F)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetFileExtensions_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA71)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetMimeTypes_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA48)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_CopyPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D845)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9AA)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetDecoderInfo_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetFrameCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9A2)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetFrame_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D868)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetMetadataQueryReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8DA)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetPreview_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC74)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9D3)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC05)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_CreateNewFrame_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB87)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_GetEncoderInfo_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB5E)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9A2)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB32)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_SetPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DBDC)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_SetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DBB3)
    [Address] EAT @explorer.exe (IWICBitmapFlipRotator_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD2A)
    [Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D88E)
    [Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetMetadataQueryReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8DA)
    [Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8B7)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9C5)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB03)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DFB7)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB06)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DA17)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetSize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9E5)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DADD)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_WriteSource_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DA71)
    [Address] EAT @explorer.exe (IWICBitmapLock_GetDataPointer_STA_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICBitmapLock_GetStride_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICBitmapScaler_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DCFE)
    [Address] EAT @explorer.exe (IWICBitmapSource_CopyPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICBitmapSource_CopyPixels_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC48)
    [Address] EAT @explorer.exe (IWICBitmapSource_GetPixelFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICBitmapSource_GetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICBitmapSource_GetSize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D91D)
    [Address] EAT @explorer.exe (IWICBitmap_Lock_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E981)
    [Address] EAT @explorer.exe (IWICBitmap_SetPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC74)
    [Address] EAT @explorer.exe (IWICBitmap_SetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC97)
    [Address] EAT @explorer.exe (IWICColorContext_InitializeFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB75)
    [Address] EAT @explorer.exe (IWICComponentFactory_CreateMetadataWriterFromReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7AA)
    [Address] EAT @explorer.exe (IWICComponentFactory_CreateQueryWriterFromBlockWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7D3)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetAuthor_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E958)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetCLSID_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetFriendlyName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9AA)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetSpecVersion_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D88E)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetVersion_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E981)
    [Address] EAT @explorer.exe (IWICFastMetadataEncoder_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8FD)
    [Address] EAT @explorer.exe (IWICFastMetadataEncoder_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICFormatConverter_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DCC7)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapClipper_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D557)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFlipRotator_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D580)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromHBITMAP_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D6BA)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromHICON_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D6E6)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D656)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromSource_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D62D)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapScaler_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D52E)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmap_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D68B)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateComponentInfo_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D4D9)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromFileHandle_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D4A1)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromFilename_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D466)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromStream_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D42E)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateEncoder_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D5D2)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateFastMetadataEncoderFromDecoder_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D70C)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateFastMetadataEncoderFromFrameDecode_Prox"�?‹Õ—ø"Uÿÿÿÿ—tDJ‚Á‹ÕQ) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D732)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateFormatConverter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D505)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreatePalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DADD)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateQueryWriterFromReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D781)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D758)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateStream_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D5A9)
    [Address] EAT @explorer.exe (IWICMetadataBlockReader_GetCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICMetadataBlockReader_GetReaderByIndex_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetContainerFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DFB7)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetEnumerator_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetLocation_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E049)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICMetadataQueryWriter_RemoveMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8DA)
    [Address] EAT @explorer.exe (IWICMetadataQueryWriter_SetMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DFDA)
    [Address] EAT @explorer.exe (IWICPalette_GetColorCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D96C)
    [Address] EAT @explorer.exe (IWICPalette_GetColors_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D88E)
    [Address] EAT @explorer.exe (IWICPalette_GetType_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D845)
    [Address] EAT @explorer.exe (IWICPalette_HasAlpha_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9A2)
    [Address] EAT @explorer.exe (IWICPalette_InitializeCustom_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB75)
    [Address] EAT @explorer.exe (IWICPalette_InitializeFromBitmap_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D943)
    [Address] EAT @explorer.exe (IWICPalette_InitializeFromPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICPalette_InitializePredefined_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D91D)
    [Address] EAT @explorer.exe (IWICPixelFormatInfo_GetBitsPerPixel_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB03)
    [Address] EAT @explorer.exe (IWICPixelFormatInfo_GetChannelCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD50)
    [Address] EAT @explorer.exe (IWICPixelFormatInfo_GetChannelMask_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB26)
    [Address] EAT @explorer.exe (IWICStream_InitializeFromIStream_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD50)
    [Address] EAT @explorer.exe (IWICStream_InitializeFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD73)
    [Address] EAT @explorer.exe (WICConvertBitmapSource) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DDB8)
    [Address] EAT @explorer.exe (WICCreateBitmapFromSection) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DF8D)
    [Address] EAT @explorer.exe (WICCreateBitmapFromSectionEx) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DE8C)
    [Address] EAT @explorer.exe (WICCreateColorContext_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB52)
    [Address] EAT @explorer.exe (WICCreateImagingFactory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D02B)
    [Address] EAT @explorer.exe (WICGetMetadataContentSize) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E61D)
    [Address] EAT @explorer.exe (WICMapGuidToShortName) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D0EC)
    [Address] EAT @explorer.exe (WICMapSchemaToName) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D2E0)
    [Address] EAT @explorer.exe (WICMapShortNameToGuid) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D217)
    [Address] EAT @explorer.exe (WICMatchMetadataContent) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E072)
    [Address] EAT @explorer.exe (WICSerializeMetadataContent) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E1B4)
    [Address] EAT @explorer.exe (WICSetEncoderFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD99)

    ¤¤¤ External Hives: ¤¤¤

    ¤¤¤ Infection : ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> %SystemRoot%\System32\drivers\etc\hosts




    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) HITACHI HTS545032B9A300 +++++
    --- User ---
    [MBR] efd4431e688506ed8d5e0c92d333105e
    [BSP] 484d48aad7c7618a68280e60d7379a52 : Windows 7/8 MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 200 MB
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 411648 | Size: 258962 MB
    2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 530766848 | Size: 30973 MB
    3 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 594199552 | Size: 15108 MB
    User = LL1 ... OK!
    User = LL2 ... OK!

    Finished : << RKreport[0]_D_03282014_235131.txt >>
    RKreport[0]_S_03282014_235033.txt


    RogueKiller V8.8.15 [Mar 27 2014] by Adlice Software
    mail : http://www.adlice.com/contact/
    Feedback : http://forum.adlice.com
    Website : http://www.adlice.com/softwares/roguekiller/
    Blog : http://www.adlice.com

    Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : Nick [Admin rights]
    Mode : Scan -- Date : 03/28/2014 23:50:33
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 1 ¤¤¤
    [SVCHOST] svchost.exe -- C:\Windows\System32\svchost.exe [7] -> KILLED [TermProc]

    ¤¤¤ Registry Entries : 5 ¤¤¤
    [HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> FOUND
    [HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> FOUND
    [HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
    [HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
    [HJ DESK][PUM] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

    ¤¤¤ Scheduled tasks : 0 ¤¤¤

    ¤¤¤ Startup Entries : 0 ¤¤¤

    ¤¤¤ Web browsers : 0 ¤¤¤

    ¤¤¤ Browser Addons : 0 ¤¤¤

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [LOADED] ¤¤¤
    [Address] EAT @explorer.exe (BeginBufferedAnimation) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF09AE)
    [Address] EAT @explorer.exe (BeginBufferedPaint) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE49A1)
    [Address] EAT @explorer.exe (BeginPanningFeedback) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D10731)
    [Address] EAT @explorer.exe (BufferedPaintClear) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE6395)
    [Address] EAT @explorer.exe (BufferedPaintInit) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE940E)
    [Address] EAT @explorer.exe (BufferedPaintRenderAnimation) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF08ED)
    [Address] EAT @explorer.exe (BufferedPaintSetAlpha) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFE6B3)
    [Address] EAT @explorer.exe (BufferedPaintStopAllAnimations) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFD395)
    [Address] EAT @explorer.exe (BufferedPaintUnInit) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE94AB)
    [Address] EAT @explorer.exe (CloseThemeData) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE6A18)
    [Address] EAT @explorer.exe (DrawThemeBackground) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE3982)
    [Address] EAT @explorer.exe (DrawThemeBackgroundEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFD9DA)
    [Address] EAT @explorer.exe (DrawThemeEdge) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03B52)
    [Address] EAT @explorer.exe (DrawThemeIcon) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D135E7)
    [Address] EAT @explorer.exe (DrawThemeParentBackground) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE53E5)
    [Address] EAT @explorer.exe (DrawThemeParentBackgroundEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE51BF)
    [Address] EAT @explorer.exe (DrawThemeText) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE4EA1)
    [Address] EAT @explorer.exe (DrawThemeTextEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE63E6)
    [Address] EAT @explorer.exe (EnableThemeDialogTexture) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEFCAF)
    [Address] EAT @explorer.exe (EnableTheming) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12FEB)
    [Address] EAT @explorer.exe (EndBufferedAnimation) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE3F9A)
    [Address] EAT @explorer.exe (EndBufferedPaint) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE3F9A)
    [Address] EAT @explorer.exe (EndPanningFeedback) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D106CC)
    [Address] EAT @explorer.exe (GetBufferedPaintBits) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE4BAF)
    [Address] EAT @explorer.exe (GetBufferedPaintDC) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF04BC)
    [Address] EAT @explorer.exe (GetBufferedPaintTargetDC) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF0473)
    [Address] EAT @explorer.exe (GetBufferedPaintTargetRect) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12E7F)
    [Address] EAT @explorer.exe (GetCurrentThemeName) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF05DD)
    [Address] EAT @explorer.exe (GetThemeAppProperties) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF0FB1)
    [Address] EAT @explorer.exe (GetThemeBackgroundContentRect) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CECD2E)
    [Address] EAT @explorer.exe (GetThemeBackgroundExtent) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF8BF)
    [Address] EAT @explorer.exe (GetThemeBackgroundRegion) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF165D)
    [Address] EAT @explorer.exe (GetThemeBitmap) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEBF93)
    [Address] EAT @explorer.exe (GetThemeBool) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE7C1F)
    [Address] EAT @explorer.exe (GetThemeColor) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE616C)
    [Address] EAT @explorer.exe (GetThemeDocumentationProperty) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12932)
    [Address] EAT @explorer.exe (GetThemeEnumValue) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE616C)
    [Address] EAT @explorer.exe (GetThemeFilename) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12412)
    [Address] EAT @explorer.exe (GetThemeFont) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEFF21)
    [Address] EAT @explorer.exe (GetThemeInt) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE616C)
    [Address] EAT @explorer.exe (GetThemeIntList) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D123B1)
    [Address] EAT @explorer.exe (GetThemeMargins) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE86E9)
    [Address] EAT @explorer.exe (GetThemeMetric) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF06E2)
    [Address] EAT @explorer.exe (GetThemePartSize) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CECDB1)
    [Address] EAT @explorer.exe (GetThemePosition) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12350)
    [Address] EAT @explorer.exe (GetThemePropertyOrigin) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03FBB)
    [Address] EAT @explorer.exe (GetThemeRect) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF3611)
    [Address] EAT @explorer.exe (GetThemeStream) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF39D9)
    [Address] EAT @explorer.exe (GetThemeString) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D122E4)
    [Address] EAT @explorer.exe (GetThemeSysBool) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D13172)
    [Address] EAT @explorer.exe (GetThemeSysColor) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03274)
    [Address] EAT @explorer.exe (GetThemeSysColorBrush) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1301E)
    [Address] EAT @explorer.exe (GetThemeSysFont) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D129C4)
    [Address] EAT @explorer.exe (GetThemeSysInt) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12BD3)
    [Address] EAT @explorer.exe (GetThemeSysSize) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1320B)
    [Address] EAT @explorer.exe (GetThemeSysString) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D12B3F)
    [Address] EAT @explorer.exe (GetThemeTextExtent) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE2D57)
    [Address] EAT @explorer.exe (GetThemeTextMetrics) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF992)
    [Address] EAT @explorer.exe (GetThemeTransitionDuration) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF1081)
    [Address] EAT @explorer.exe (GetWindowTheme) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEDF46)
    [Address] EAT @explorer.exe (HitTestThemeBackground) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF3CE3)
    [Address] EAT @explorer.exe (IsAppThemed) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF869)
    [Address] EAT @explorer.exe (IsCompositionActive) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE2E9A)
    [Address] EAT @explorer.exe (IsThemeActive) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEF785)
    [Address] EAT @explorer.exe (IsThemeBackgroundPartiallyTransparent) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE60AB)
    [Address] EAT @explorer.exe (IsThemeDialogTextureEnabled) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1312B)
    [Address] EAT @explorer.exe (IsThemePartDefined) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE85B4)
    [Address] EAT @explorer.exe (OpenThemeData) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CE73D2)
    [Address] EAT @explorer.exe (OpenThemeDataEx) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D03D43)
    [Address] EAT @explorer.exe (SetThemeAppProperties) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D13296)
    [Address] EAT @explorer.exe (SetWindowTheme) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CF0134)
    [Address] EAT @explorer.exe (SetWindowThemeAttribute) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CFCFE6)
    [Address] EAT @explorer.exe (ThemeInitApiHook) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73CEB176)
    [Address] EAT @explorer.exe (UpdatePanningFeedback) : PROPSYS.dll -> HOOKED (C:\windows\system32\UxTheme.dll @ 0x73D1068D)
    [Address] EAT @explorer.exe (DllGetClassObject) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387CF9D)
    [Address] EAT @explorer.exe (IEnumString_Next_WIC_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E000)
    [Address] EAT @explorer.exe (IEnumString_Reset_WIC_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E029)
    [Address] EAT @explorer.exe (IPropertyBag2_Write_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E049)
    [Address] EAT @explorer.exe (IWICBitmapClipper_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD2A)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportAnimation_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA9A)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportLossless_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EABD)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportMultiframe_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EAE0)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetContainerFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9D3)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetDeviceManufacturer_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9F6)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetDeviceModels_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA1F)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetFileExtensions_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA71)
    [Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetMimeTypes_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EA48)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_CopyPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D845)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9AA)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetDecoderInfo_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetFrameCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9A2)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetFrame_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D868)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetMetadataQueryReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8DA)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetPreview_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC74)
    [Address] EAT @explorer.exe (IWICBitmapDecoder_GetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9D3)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC05)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_CreateNewFrame_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB87)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_GetEncoderInfo_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB5E)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9A2)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB32)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_SetPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DBDC)
    [Address] EAT @explorer.exe (IWICBitmapEncoder_SetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DBB3)
    [Address] EAT @explorer.exe (IWICBitmapFlipRotator_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD2A)
    [Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D88E)
    [Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetMetadataQueryReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8DA)
    [Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8B7)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9C5)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB03)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DFB7)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DB06)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DA17)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetSize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9E5)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DADD)
    [Address] EAT @explorer.exe (IWICBitmapFrameEncode_WriteSource_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DA71)
    [Address] EAT @explorer.exe (IWICBitmapLock_GetDataPointer_STA_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICBitmapLock_GetStride_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICBitmapScaler_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DCFE)
    [Address] EAT @explorer.exe (IWICBitmapSource_CopyPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICBitmapSource_CopyPixels_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC48)
    [Address] EAT @explorer.exe (IWICBitmapSource_GetPixelFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICBitmapSource_GetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICBitmapSource_GetSize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D91D)
    [Address] EAT @explorer.exe (IWICBitmap_Lock_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E981)
    [Address] EAT @explorer.exe (IWICBitmap_SetPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC74)
    [Address] EAT @explorer.exe (IWICBitmap_SetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC97)
    [Address] EAT @explorer.exe (IWICColorContext_InitializeFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB75)
    [Address] EAT @explorer.exe (IWICComponentFactory_CreateMetadataWriterFromReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7AA)
    [Address] EAT @explorer.exe (IWICComponentFactory_CreateQueryWriterFromBlockWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7D3)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetAuthor_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E958)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetCLSID_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetFriendlyName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E9AA)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetSpecVersion_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D88E)
    [Address] EAT @explorer.exe (IWICComponentInfo_GetVersion_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E981)
    [Address] EAT @explorer.exe (IWICFastMetadataEncoder_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8FD)
    [Address] EAT @explorer.exe (IWICFastMetadataEncoder_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICFormatConverter_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DCC7)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapClipper_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D557)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFlipRotator_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D580)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromHBITMAP_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D6BA)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromHICON_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D6E6)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D656)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromSource_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D62D)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapScaler_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D52E)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmap_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D68B)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateComponentInfo_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D4D9)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromFileHandle_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D4A1)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromFilename_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D466)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromStream_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D42E)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateEncoder_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D5D2)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateFastMetadataEncoderFromDecoder_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D70C)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateFastMetadataEncoderFromFrameDecode_Prox"�?‹Õ—ø"Uÿÿÿÿ—tDJ‚Á‹ÕQ) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D732)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateFormatConverter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D505)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreatePalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DADD)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateQueryWriterFromReader_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D781)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D758)
    [Address] EAT @explorer.exe (IWICImagingFactory_CreateStream_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D5A9)
    [Address] EAT @explorer.exe (IWICMetadataBlockReader_GetCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DC25)
    [Address] EAT @explorer.exe (IWICMetadataBlockReader_GetReaderByIndex_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetContainerFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DFB7)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetEnumerator_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetLocation_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E049)
    [Address] EAT @explorer.exe (IWICMetadataQueryReader_GetMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D7FC)
    [Address] EAT @explorer.exe (IWICMetadataQueryWriter_RemoveMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D8DA)
    [Address] EAT @explorer.exe (IWICMetadataQueryWriter_SetMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DFDA)
    [Address] EAT @explorer.exe (IWICPalette_GetColorCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D96C)
    [Address] EAT @explorer.exe (IWICPalette_GetColors_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D88E)
    [Address] EAT @explorer.exe (IWICPalette_GetType_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D845)
    [Address] EAT @explorer.exe (IWICPalette_HasAlpha_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D9A2)
    [Address] EAT @explorer.exe (IWICPalette_InitializeCustom_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB75)
    [Address] EAT @explorer.exe (IWICPalette_InitializeFromBitmap_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D943)
    [Address] EAT @explorer.exe (IWICPalette_InitializeFromPalette_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D822)
    [Address] EAT @explorer.exe (IWICPalette_InitializePredefined_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D91D)
    [Address] EAT @explorer.exe (IWICPixelFormatInfo_GetBitsPerPixel_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB03)
    [Address] EAT @explorer.exe (IWICPixelFormatInfo_GetChannelCount_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD50)
    [Address] EAT @explorer.exe (IWICPixelFormatInfo_GetChannelMask_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB26)
    [Address] EAT @explorer.exe (IWICStream_InitializeFromIStream_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD50)
    [Address] EAT @explorer.exe (IWICStream_InitializeFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD73)
    [Address] EAT @explorer.exe (WICConvertBitmapSource) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DDB8)
    [Address] EAT @explorer.exe (WICCreateBitmapFromSection) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DF8D)
    [Address] EAT @explorer.exe (WICCreateBitmapFromSectionEx) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DE8C)
    [Address] EAT @explorer.exe (WICCreateColorContext_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387EB52)
    [Address] EAT @explorer.exe (WICCreateImagingFactory_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D02B)
    [Address] EAT @explorer.exe (WICGetMetadataContentSize) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E61D)
    [Address] EAT @explorer.exe (WICMapGuidToShortName) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D0EC)
    [Address] EAT @explorer.exe (WICMapSchemaToName) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D2E0)
    [Address] EAT @explorer.exe (WICMapShortNameToGuid) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387D217)
    [Address] EAT @explorer.exe (WICMatchMetadataContent) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E072)
    [Address] EAT @explorer.exe (WICSerializeMetadataContent) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387E1B4)
    [Address] EAT @explorer.exe (WICSetEncoderFormat_Proxy) : XmlLite.dll -> HOOKED (C:\windows\system32\WindowsCodecs.dll @ 0x7387DD99)

    ¤¤¤ External Hives: ¤¤¤

    ¤¤¤ Infection : ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> %SystemRoot%\System32\drivers\etc\hosts




    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) HITACHI HTS545032B9A300 +++++
    --- User ---
    [MBR] efd4431e688506ed8d5e0c92d333105e
    [BSP] 484d48aad7c7618a68280e60d7379a52 : Windows 7/8 MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 200 MB
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 411648 | Size: 258962 MB
    2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 530766848 | Size: 30973 MB
    3 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 594199552 | Size: 15108 MB
    User = LL1 ... OK!
    User = LL2 ... OK!

    Finished : << RKreport[0]_S_03282014_235033.txt >>

    Sincere thanks once again.

    Regards,
    Nick
     
  4. Whoosh

    Whoosh Established Techie7 Member

    Hi Broni,

    I hope you don't mind me asking, but I wondered what I need to do next.

    Thanks once again,
    Nick
     
  5. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    I'm sorry about it.
    I didn't see:
    Malwarebytes Rootkit was clean.

    Please download ComboFix from Here, Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    • Never rename Combofix unless instructed.
    • Close any open browsers.
    • Very Important! Temporarily disable your anti-virus and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
      If the connection is not there use restore point you created prior to running Combofix.
    • Double click on combofix.exe & follow the prompts.

    • NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG and CA Internet Security (Total Defense Internet Security) users: ComboFix will not run until AVG/CA Internet Security is uninstalled as a protective measure against the anti-virus. This is because AVG/CA Internet Security "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results". Since AVG/CA Internet Security cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG/CA Internet Security first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.
    **Note 3: If you receive an error Illegal operation attempted on a registery key that has been marked for deletion, restart computer to fix the issue.
    **Note 4: Some infections may take some significant time to be cured. As long as your computer clock is running Combofix is still working. Be patient.


    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try the following...

    Delete Combofix file, download fresh one, but rename combofix.exe to your_name.exe BEFORE saving it to your desktop.
    Do NOT run it yet.
    Download Rkill (courtesy of BleepingComputer.com) to your desktop.
    There are 2 different versions. If one of them won't run then download and try to run the other one.
    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
    iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

    Restart computer in safe mode

    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.

    When the scan is done Notepad will open with rKill.txt log.
    NOTE. rKill.txt log will also be present on your desktop.

    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    IF you had to run rKill post BOTH logs, rKill.txt and Combofix.txt.
     
  6. Whoosh

    Whoosh Established Techie7 Member

    Hi Broni,

    Sorry for any confusion I caused.

    Please find below the Combofix log.

    ComboFix 14-03-24.01 - Nick 01/04/2014 17:16:57.3.2 - x86
    Microsoft Windows 7 Home Premium 6.1.7601.1.1252.44.1033.18.3033.1985 [GMT 1:00]
    Running from: c:\users\Nick\Desktop\TEST\Downloads\ComboFix.exe
    AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
    SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
    SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
    * Created a new restore point
    .
    .
    ((((((((((((((((((((((((( Files Created from 2014-03-01 to 2014-04-01 )))))))))))))))))))))))))))))))
    .
    .
    2014-04-01 16:33 . 2014-04-01 16:33 -------- d-----w- c:\users\Public\AppData\Local\temp
    2014-04-01 16:33 . 2014-04-01 16:33 -------- d-----w- c:\users\Default\AppData\Local\temp
    2014-03-31 14:50 . 2014-03-31 14:50 39464 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{6B6078BE-3D24-4F52-A247-B7D66D0F33D8}\MpKsl7b362e97.sys
    2014-03-31 14:23 . 2014-03-07 04:35 7969936 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{6B6078BE-3D24-4F52-A247-B7D66D0F33D8}\mpengine.dll
    2014-03-30 03:38 . 2014-02-20 11:41 765968 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{0F6D0B63-0095-405B-A16E-5C9CFDC7C0AC}\gapaengine.dll
    2014-03-30 03:38 . 2014-03-07 04:35 7969936 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
    2014-03-28 23:57 . 2014-03-28 23:57 107224 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
    .
    .
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2014-03-28 23:57 . 2013-11-03 20:30 75480 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
    2014-03-12 11:04 . 2013-12-11 16:09 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
    2014-03-12 11:04 . 2013-12-11 16:09 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
    2014-03-11 08:52 . 2011-04-27 14:25 104264 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys
    2014-02-20 11:41 . 2011-08-11 13:56 765968 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\NISBackup\gapaengine.dll
    2014-02-10 11:35 . 2014-02-10 11:35 107256 ----a-w- c:\windows\system32\drivers\RapportKELL.sys
    2014-01-25 00:19 . 2014-01-25 00:19 231960 ----a-w- c:\windows\system32\drivers\MpFilter.sys
    2014-01-19 07:32 . 2011-02-28 02:59 231584 ------w- c:\windows\system32\MpSigStub.exe
    2014-01-09 02:22 . 2014-02-26 10:43 5694464 ----a-w- c:\windows\system32\mstscax.dll
    .
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\VeriFace Enc]
    @="{771C7324-DA80-49D3-8017-753B0AF60951}"
    [HKEY_CLASSES_ROOT\CLSID\{771C7324-DA80-49D3-8017-753B0AF60951}]
    2010-08-24 09:37 1410312 ----a-w- c:\windows\System32\IcnOvrly.dll
    .
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "TouchFreeze"="c:\program files\TouchFreeze\TouchFreeze.exe" [2005-04-29 45056]
    "SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2014-01-15 5625624]
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2009-06-04 186904]
    "IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-09-18 141848]
    "HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-09-18 174104]
    "Persistence"="c:\windows\system32\igfxpers.exe" [2009-09-18 150552]
    "SmartAudio"="c:\program files\CONEXANT\SAII\SAIICpl.exe" [2009-11-19 307768]
    "332BigDog"="c:\program files\USB Camera2\VM332_STI.EXE" [2010-01-19 536576]
    "VeriFaceManager"="c:\program files\Lenovo\VeriFace\PManage.exe" [2010-08-24 3122440]
    "UpdateP2GShortCut"="c:\program files\Lenovo\Power2Go\MUITransfer\MUIStartMenu.exe" [2008-12-03 218408]
    "EnergyUtility"="c:\program files\Lenovo\Energy Management\utility.exe" [2009-09-29 4114288]
    "Energy Management"="c:\program files\Lenovo\Energy Management\Energy Management.exe" [2009-09-29 5064560]
    "Eraser"="c:\progra~1\Eraser\Eraser.exe" [2010-11-04 980368]
    "MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2014-03-11 951576]
    "EMET Notifier"="c:\program files\EMET\EMET_notifier.exe" [2012-05-09 152152]
    .
    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
    "WLStart"="c:\program files\Windows Live\Installer\wlstart.exe" [2009-07-26 768336]
    .
    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    Secunia PSI Tray.lnk - c:\program files\Secunia\PSI\psi_tray.exe [2013-12-6 565464]
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "ConsentPromptBehaviorAdmin"= 5 (0x5)
    "ConsentPromptBehaviorUser"= 3 (0x3)
    "EnableUIADesktopToggle"= 0 (0x0)
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
    @=""
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
    @=""
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
    @="Service"
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
    @="Driver"
    .
    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Bluetooth.lnk]
    path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Bluetooth.lnk
    backup=c:\windows\pss\Bluetooth.lnk.CommonStartup
    backupExtension=.CommonStartup
    .
    [HKLM\~\startupfolder\C:^Users^Nick^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OpenOffice.org 3.2.lnk]
    path=c:\users\Nick\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OpenOffice.org 3.2.lnk
    backup=c:\windows\pss\OpenOffice.org 3.2.lnk.Startup
    backupExtension=.Startup
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ooVoo.exe]
    2010-02-02 10:41 19812536 ----a-w- c:\program files\ooVoo\ooVoo.exe
    .
    R3 Bridge0;Bridge0;c:\windows\system32\drivers\WDBridge.sys [2009-07-28 63240]
    R3 btusbflt;Bluetooth USB Filter;c:\windows\system32\drivers\btusbflt.sys [2010-04-14 45736]
    R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe [2014-03-01 108032]
    R3 k57nd60x;Broadcom NetLink (TM) Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\k57nd60x.sys [2009-07-13 229888]
    R3 Lenovo ReadyComm AppSvc;Lenovo ReadyComm AppSvc;c:\program files\Lenovo\ReadyComm\AppSvc.exe [2009-08-14 509192]
    R3 Lenovo ReadyComm ConnSvc;Lenovo ReadyComm ConnSvc;c:\program files\Lenovo\ReadyComm\ConnSvc.exe [2009-09-22 579400]
    R3 netw5v32;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 32 Bit;c:\windows\system32\DRIVERS\netw5v32.sys [2009-07-13 4231168]
    R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2014-03-11 104264]
    R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [2014-03-11 279776]
    R3 PS_MDP;ReadyComm Presentation Space Helper Service;c:\windows\System32\IgrsSvcs.exe [2009-07-14 20992]
    R3 RapportKELL;RapportKELL;c:\windows\system32\Drivers\RapportKELL.sys [2014-02-10 107256]
    R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2012-08-23 14848]
    R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys [2009-07-30 171520]
    R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2013-10-02 49152]
    R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2010-12-29 1343400]
    R3 wsvd;wsvd;c:\windows\system32\DRIVERS\wsvd.sys [2009-07-21 81704]
    S1 funfrm;funfrm; [x]
    S1 MpKsl7b362e97;MpKsl7b362e97;c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{6B6078BE-3D24-4F52-A247-B7D66D0F33D8}\MpKsl7b362e97.sys [2014-03-31 39464]
    S1 RapportCerberus_59849;RapportCerberus_59849;c:\programdata\Trusteer\Rapport\store\exts\RapportCerberus\baseline\RapportCerberus32_59849.sys [2013-12-12 340432]
    S1 RapportEI;RapportEI;c:\program files\Trusteer\Rapport\bin\RapportEI.sys [2014-02-10 155704]
    S1 RapportPG;RapportPG;c:\program files\Trusteer\Rapport\bin\RapportPG.sys [2014-02-10 228888]
    S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2011-07-22 12880]
    S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2011-07-12 67664]
    S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [2013-10-10 120088]
    S2 BcmBtRSupport;Bluetooth Driver Management Service;c:\windows\system32\BtwRSupportService.exe [2013-10-28 1680088]
    S2 cvhsvc;Client Virtualization Handler;c:\program files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [2013-04-22 822504]
    S2 FoxitCloudUpdateService;Foxit Cloud Safe Update Service;c:\program files\Foxit Software\Foxit Reader\Foxit Cloud\FCUpdateService.exe [2014-02-19 239680]
    S2 IGRS;IGRS;c:\program files\Lenovo\ReadyComm\common\IGRS.exe [2009-07-14 38152]
    S2 NAUpdate;Nero Update;c:\program files\Nero\Update\NASvc.exe [2010-05-04 503080]
    S2 RapportMgmtService;Rapport Management Service;c:\program files\Trusteer\Rapport\bin\RapportMgmtService.exe [2014-02-10 1444120]
    S2 ReadyComm.DirectRouter;ReadyComm.DirectRouter;c:\windows\System32\IgrsSvcs.exe [2009-07-14 20992]
    S2 Secunia PSI Agent;Secunia PSI Agent;c:\program files\Secunia\PSI\PSIA.exe [2013-12-06 1229528]
    S2 sftlist;Application Virtualization Client;c:\program files\Microsoft Application Virtualization Client\sftlist.exe [2013-06-26 523944]
    S3 ACPIVPC;Lenovo Virtual Power Controller Driver;c:\windows\system32\DRIVERS\AcpiVpc.sys [2010-01-20 23136]
    S3 bcbtums;Bluetooth USB LD Filter;c:\windows\system32\drivers\bcbtums.sys [2013-10-28 175320]
    S3 btwampfl;btwampfl;c:\windows\system32\DRIVERS\btwampfl.sys [2013-08-09 144600]
    S3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\DRIVERS\btwl2cap.sys [2009-04-07 29472]
    S3 IntcHdmiAddService;Intel(R) High Definition Audio HDMI;c:\windows\system32\drivers\IntcHdmi.sys [2009-05-25 122368]
    S3 PSI;PSI;c:\windows\system32\DRIVERS\psi_mf_x86.sys [2013-12-06 16024]
    S3 Sftfs;Sftfs;c:\windows\system32\DRIVERS\Sftfslh.sys [2013-06-26 583848]
    S3 Sftplay;Sftplay;c:\windows\system32\DRIVERS\Sftplaylh.sys [2013-06-26 197800]
    S3 Sftredir;Sftredir;c:\windows\system32\DRIVERS\Sftredirlh.sys [2013-06-26 24232]
    S3 Sftvol;Sftvol;c:\windows\system32\DRIVERS\Sftvollh.sys [2013-06-26 20136]
    S3 sftvsa;Application Virtualization Service Agent;c:\program files\Microsoft Application Virtualization Client\sftvsa.exe [2013-06-26 207528]
    S3 vm332avs;Lenovo Camera2;c:\windows\system32\Drivers\vm332avs.sys [2010-04-20 198000]
    S3 wdmirror;wdmirror;c:\windows\system32\DRIVERS\WDMirror.sys [2009-07-16 11792]
    .
    .
    --- Other Services/Drivers In Memory ---
    .
    *NewlyCreated* - MPKSL7B362E97
    *NewlyCreated* - MPKSL9CE04247
    *NewlyCreated* - NISDRV
    *Deregistered* - MpKsl9ce04247
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceAndNoImpersonation REG_MULTI_SZ SSDPSRV upnphost SCardSvr TBS fdrespub AppIDSvc QWAVE wcncsvc SensrSvc Mcx2Svc
    IgrsSvcs REG_MULTI_SZ ReadyComm.DirectRouter PS_MDP
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
    2014-03-15 13:29 1150280 ----a-w- c:\program files\Google\Chrome\Application\33.0.1750.154\Installer\chrmstp.exe
    .
    Contents of the 'Scheduled Tasks' folder
    .
    2014-04-01 c:\windows\Tasks\Adobe Flash Player Updater.job
    - c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-12-11 11:05]
    .
    2014-04-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2012-09-18 15:06]
    .
    2014-04-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2012-09-18 15:06]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.co.uk/
    TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
    .
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    .
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="ChromeHTML"
    .
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="ChromeHTML"
    .
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="ChromeHTML"
    .
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="ChromeHTML"
    .
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="ChromeHTML"
    .
    [HKEY_USERS\S-1-5-21-1647757156-3214455835-2215275708-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.eml\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="WindowsLiveMail.Email.1"
    .
    [HKEY_USERS\S-1-5-21-1647757156-3214455835-2215275708-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vcf\UserChoice]
    @Denied: (2) (LocalSystem)
    "Progid"="WindowsLiveMail.VCard.1"
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
    @Denied: (Full) (Everyone)
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------
    .
    - - - - - - - > 'Explorer.exe'(3120)
    c:\windows\system32\IcnOvrly.dll
    .
    Completion time: 2014-04-01 17:35:55
    ComboFix-quarantined-files.txt 2014-04-01 16:35
    .
    Pre-Run: 82,717,061,120 bytes free
    Post-Run: 82,663,514,112 bytes free
    .
    - - End Of File - - DF7FD06F0372D1C08D93C3E6978BEEF2
    A36C5E4F47E84449FF07ED3517B43A31

    Thanks once again for your wonderful help.

    Regards,
    Nick
     
  7. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Looks good.

    [​IMG] Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on adwcleaner.exe to run the tool.
    • Click on Scan button.
    • When the scan has finished click on Clean button.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the contents of that logfile with your next reply.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.

    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Post the contents of JRT.txt into your next message.

    [​IMG] Download OTL to your Desktop.
    Alternate download: http://www.itxassociates.com/OT-Tools/OTL.exe
    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Click the Scan All Users checkbox.
    • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  8. Whoosh

    Whoosh Established Techie7 Member

    Hi Broni,

    Please find below the 4 logs requested.

    Thanks,
    Nick

    AdwCleaner

    # AdwCleaner v3.023 - Report created 01/04/2014 at 18:33:23
    # Updated 01/04/2014 by Xplode
    # Operating System : Windows 7 Home Premium Service Pack 1 (32 bits)
    # Username : Nick - NICK-PC
    # Running from : C:\Users\Nick\Desktop\adwcleaner (1).exe
    # Option : Clean

    ***** [ Services ] *****


    ***** [ Files / Folders ] *****


    ***** [ Shortcuts ] *****


    ***** [ Registry ] *****


    ***** [ Browsers ] *****

    -\\ Internet Explorer v11.0.9600.16521


    -\\ Google Chrome v33.0.1750.154

    [ File : C:\Users\Nick\AppData\Local\Google\Chrome\User Data\Default\preferences ]


    *************************

    AdwCleaner[R0].txt - [1364 octets] - [10/12/2013 23:23:36]
    AdwCleaner[R10].txt - [1959 octets] - [15/03/2014 01:35:20]
    AdwCleaner[R11].txt - [2081 octets] - [19/03/2014 22:43:39]
    AdwCleaner[R12].txt - [2206 octets] - [01/04/2014 18:32:18]
    AdwCleaner[R1].txt - [876 octets] - [23/12/2013 19:47:54]
    AdwCleaner[R2].txt - [2305 octets] - [04/01/2014 22:27:39]
    AdwCleaner[R3].txt - [2410 octets] - [07/01/2014 16:25:57]
    AdwCleaner[R4].txt - [2530 octets] - [11/01/2014 18:43:03]
    AdwCleaner[R5].txt - [1612 octets] - [06/02/2014 13:20:39]
    AdwCleaner[R6].txt - [1476 octets] - [12/02/2014 01:01:33]
    AdwCleaner[R7].txt - [1597 octets] - [15/02/2014 17:49:52]
    AdwCleaner[R8].txt - [1732 octets] - [23/02/2014 11:44:16]
    AdwCleaner[R9].txt - [1841 octets] - [05/03/2014 02:25:52]
    AdwCleaner[S0].txt - [1451 octets] - [10/12/2013 23:25:51]
    AdwCleaner[S10].txt - [2022 octets] - [15/03/2014 01:36:17]
    AdwCleaner[S11].txt - [2144 octets] - [19/03/2014 22:44:33]
    AdwCleaner[S12].txt - [1588 octets] - [01/04/2014 18:33:23]
    AdwCleaner[S1].txt - [936 octets] - [23/12/2013 19:52:02]
    AdwCleaner[S2].txt - [2366 octets] - [04/01/2014 22:28:56]
    AdwCleaner[S3].txt - [2473 octets] - [07/01/2014 16:27:15]
    AdwCleaner[S4].txt - [2593 octets] - [11/01/2014 18:43:57]
    AdwCleaner[S5].txt - [1559 octets] - [06/02/2014 13:29:41]
    AdwCleaner[S6].txt - [1538 octets] - [12/02/2014 01:02:21]
    AdwCleaner[S7].txt - [1658 octets] - [15/02/2014 17:51:00]
    AdwCleaner[S8].txt - [1793 octets] - [23/02/2014 11:45:10]
    AdwCleaner[S9].txt - [1902 octets] - [05/03/2014 02:26:40]

    ########## EOF - C:\AdwCleaner\AdwCleaner[S12].txt - [2188 octets] ##########

    JRT Log

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Junkware Removal Tool (JRT) by Thisisu
    Version: 6.1.3 (03.23.2014:1)
    OS: Windows 7 Home Premium x86
    Ran by Nick on 01/04/2014 at 18:41:43.96
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




    ~~~ Services



    ~~~ Registry Values



    ~~~ Registry Keys



    ~~~ Files



    ~~~ Folders



    ~~~ Event Viewer Logs were cleared





    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Scan was completed on 01/04/2014 at 18:46:54.84
    End of JRT log
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


    OTL Log 1

    OTL Extras logfile created on: 4/1/2014 6:49:14 PM - Run 1
    OTL by OldTimer - Version 3.2.69.0 Folder = C:\Users\Nick\Desktop
    Home Premium Edition Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation
    Internet Explorer (Version = 9.11.9600.16521)
    Locale: 00000409 | Country: United Kingdom | Language: ENG | Date Format: dd/MM/yyyy

    2.96 Gb Total Physical Memory | 1.95 Gb Available Physical Memory | 65.90% Memory free
    5.92 Gb Paging File | 4.59 Gb Available in Paging File | 77.53% Paging File free
    Paging file location(s): ?:\pagefile.sys [binary data]

    %SystemDrive% = C: | %SystemRoot% = C:\windows | %ProgramFiles% = C:\Program Files
    Drive C: | 252.89 Gb Total Space | 76.74 Gb Free Space | 30.35% Space Free | Partition Type: NTFS
    Drive D: | 30.25 Gb Total Space | 29.46 Gb Free Space | 97.39% Space Free | Partition Type: NTFS

    Computer Name: NICK-PC | User Name: Nick | Logged in as Administrator.
    Boot Mode: Normal | Scan Mode: All users | Quick Scan
    Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

    ========== Extra Registry (SafeList) ==========


    ========== File Associations ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
    .cpl [@ = cplfile] -- C:\windows\System32\control.exe (Microsoft Corporation)
    .hlp [@ = hlpfile] -- C:\windows\winhlp32.exe (Microsoft Corporation)
    .html [@ = ChromeHTML] -- C:\Program Files\Google\Chrome\Application\chrome.exe (Google Inc.)

    [HKEY_USERS\.DEFAULT\SOFTWARE\Classes\<extension>]
    .html [@ = ChromeHTML] -- Reg Error: Key error. File not found

    [HKEY_USERS\S-1-5-18\SOFTWARE\Classes\<extension>]
    .html [@ = ChromeHTML] -- Reg Error: Key error. File not found

    [HKEY_USERS\S-1-5-21-1647757156-3214455835-2215275708-1000\SOFTWARE\Classes\<extension>]
    .html [@ = ChromeHTML] -- Reg Error: Key error. File not found

    ========== Shell Spawning ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
    batfile [open] -- "%1" %*
    cmdfile [open] -- "%1" %*
    comfile [open] -- "%1" %*
    cplfile [cplopen] -- %SystemRoot%\System32\control.exe "%1",%* (Microsoft Corporation)
    exefile [open] -- "%1" %*
    helpfile [open] -- Reg Error: Key error.
    hlpfile [open] -- %SystemRoot%\winhlp32.exe %1 (Microsoft Corporation)
    htmlfile [edit] -- Reg Error: Key error.
    https [open] -- "C:\Program Files\Google\Chrome\Application\chrome.exe" -- "%1" (Google Inc.)
    inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
    piffile [open] -- "%1" %*
    regfile [merge] -- Reg Error: Key error.
    scrfile [config] -- "%1"
    scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
    scrfile [open] -- "%1" /S
    txtfile [edit] -- Reg Error: Key error.
    Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
    Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
    Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Directory [tralih] -- "C:\Program Files\Trader's Little Helper\tralih.exe" /0 "%1" ()
    Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
    Folder [explore] -- Reg Error: Value error.
    Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

    ========== Security Center Settings ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
    "cval" = 1
    "UpdatesDisableNotify" = 0
    "FirewallDisableNotify" = 0
    "AntiVirusDisableNotify" = 0

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
    "VistaSp1" = Reg Error: Unknown registry data type -- File not found
    "AntiVirusOverride" = 0
    "AntiSpywareOverride" = 0
    "FirewallOverride" = 0

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Vol]

    ========== System Restore Settings ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
    "DisableSR" = 0

    ========== Firewall Settings ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
    "DisableNotifications" = 0
    "EnableFirewall" = 1

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
    "DisableNotifications" = 0
    "EnableFirewall" = 1

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
    "DisableNotifications" = 0
    "EnableFirewall" = 1

    ========== Authorized Applications List ==========

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]


    ========== Vista Active Open Ports Exception List ==========

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
    "{12CAB2A8-2E05-4B2C-931C-38177DF49D59}" = rport=10243 | protocol=6 | dir=out | app=system |
    "{24E4E367-15CA-49A4-BAC3-F8E8047A9113}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{2AAE5DBC-AD10-479E-98D8-A644D985D81A}" = lport=139 | protocol=6 | dir=in | app=system |
    "{2E629675-1099-4FA4-8267-BCC03892829F}" = rport=139 | protocol=6 | dir=out | app=system |
    "{2ED1C350-49AE-4C87-885B-6EF8717F7503}" = lport=2869 | protocol=6 | dir=in | app=system |
    "{31F34488-A5EE-437E-B125-91836D89D96A}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{36817A09-9276-496F-8B8E-02360C29093F}" = lport=10243 | protocol=6 | dir=in | app=system |
    "{3C4B5711-678C-41B5-B80D-5E598AC83EF8}" = lport=2177 | protocol=17 | dir=in | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{6372632E-828B-454F-80ED-B5DE349EFE2D}" = lport=138 | protocol=17 | dir=in | app=system |
    "{662F5E87-C418-4F9C-B06B-CFD015C583A5}" = rport=2177 | protocol=17 | dir=out | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{66590D87-3953-46D3-81A5-3F2F9717B9A4}" = lport=137 | protocol=17 | dir=in | app=system |
    "{6A9B272D-5048-4F40-A5F1-38C1C2CBE7C9}" = lport=2177 | protocol=6 | dir=in | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{6ED3FB91-061A-4B84-9AA6-3B0AE55A1D72}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe |
    "{72592225-AE8B-4F65-BBE2-86CEB53123FF}" = rport=445 | protocol=6 | dir=out | app=system |
    "{73F15A9C-2554-4F73-BD47-34EDDB7A22C1}" = rport=138 | protocol=17 | dir=out | app=system |
    "{7953C553-87BC-4F69-AD5D-A16DAEB60EBD}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=svchost.exe |
    "{7DF818FD-3B8D-465B-914B-06E10F964788}" = lport=445 | protocol=6 | dir=in | app=system |
    "{8917FD1B-ADE6-42A7-AF89-B785826C5E9B}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{90780268-1C49-4A0B-BCD8-9F7458083DB6}" = lport=rpc-epmap | protocol=6 | dir=in | svc=rpcss | name=@firewallapi.dll,-28539 |
    "{9CAE5882-4924-4565-8C1D-D923E3BBF504}" = rport=2177 | protocol=6 | dir=out | svc=qwave | app=%systemroot%\system32\svchost.exe |
    "{A15C1A8D-2BC8-472E-BE39-F503E90E6125}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe |
    "{D06AD277-C9B9-4E80-B7F0-2154BFD203E2}" = lport=rpc | protocol=6 | dir=in | svc=spooler | app=%systemroot%\system32\spoolsv.exe |
    "{D33BB2C4-642D-46C3-9423-1A278D549D8F}" = rport=137 | protocol=17 | dir=out | app=system |
    "{D4D563A7-9FBA-4CA9-BC5F-96FC0D368E1B}" = rport=1900 | protocol=17 | dir=out | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe |
    "{F112D21A-6F58-46AA-A863-9987E95B01DA}" = lport=2869 | protocol=6 | dir=in | app=system |

    ========== Vista Active Application Exception List ==========

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
    "{159693EF-6FF6-45E1-83CF-5E66B9A87F3C}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{170ABCDB-D133-46B8-AEA1-973D639DFDAF}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{1A3703E6-FCE8-4A18-9471-4B6743886CD7}" = dir=out | app=c:\windows\system32\igrssvcs.exe |
    "{27C6F774-0D38-4A98-9C26-671CBF705EE9}" = dir=in | app=c:\windows\system32\igrssvcs.exe |
    "{35E8E65D-0D9E-4E4B-BED6-5AF021F500D7}" = dir=in | app=c:\program files\lenovo\readycomm\connsvc.exe |
    "{39AC1207-2644-4213-8538-950DBDF54F7F}" = dir=in | app=c:\program files\common files\mcafee\mna\mcnasvc.exe |
    "{4186DD57-C03E-414D-9F21-6664683F5784}" = protocol=58 | dir=in | name=@firewallapi.dll,-28545 |
    "{528D8003-4537-4E3C-99EE-B2DFD94265A1}" = dir=out | app=c:\program files\lenovo\readycomm\appsvc.exe |
    "{60CBB0EF-7A04-4208-A3C1-C2BBB61E5390}" = dir=in | app=c:\program files\lenovo\readycomm\common\igrs.exe |
    "{641D57DD-06CF-44DA-9D37-B4A2E09283B0}" = protocol=1 | dir=in | name=@firewallapi.dll,-28543 |
    "{68AAFDC9-70E8-4179-95B6-12C46F1A3E17}" = dir=out | app=c:\program files\lenovo\readycomm\common\igrs.exe |
    "{6DCF09DA-26F7-4348-8A65-4C6F3C4ED99A}" = dir=in | app=c:\program files\lenovo\readycomm\common\igrs.exe |
    "{7103F98E-9DC9-404E-96C8-31F591635074}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmplayer.exe |
    "{7178494A-0D40-4477-A251-889F721B5C83}" = protocol=1 | dir=out | name=@firewallapi.dll,-28544 |
    "{7B45A94A-6AF2-48A0-B600-DB8EB3E6DCBA}" = dir=in | app=c:\program files\windows live\sync\windowslivesync.exe |
    "{95574679-BEB2-4553-9115-E94F92B77859}" = protocol=6 | dir=out | svc=upnphost | app=%systemroot%\system32\svchost.exe |
    "{95C83DF3-C6FD-4172-9237-E1299059D621}" = dir=in | app=c:\program files\lenovo\readycomm\projectionist.exe |
    "{9B81700C-39EA-4460-9901-93AB1C9E95F2}" = protocol=6 | dir=in | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{9CA59713-228C-44F0-BA7C-B8031350DE7F}" = dir=in | app=c:\program files\lenovo\readycomm\appsvc.exe |
    "{A1649164-AD3F-44DA-AF83-21B938CB9A60}" = dir=out | app=c:\program files\lenovo\readycomm\projectionist.exe |
    "{A40BEA43-AD3A-486C-B25D-41A3CC7B909F}" = dir=in | app=c:\program files\lenovo\readycomm\readycom.exe |
    "{AA373539-9F5C-4916-9AAE-8DE58CCF9D47}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{BA912587-979B-4050-A275-4DD3816FEE5B}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{C22426B9-7360-47C9-B0ED-E9A4208434AF}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmplayer.exe |
    "{C2BF5F86-0FB5-4AF1-BA9C-A7BC6C38070D}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmpnetwk.exe |
    "{C37F10EC-BD15-4DFF-8F35-5C4553B3C3D3}" = protocol=6 | dir=out | app=system |
    "{CD115A02-1D7C-4319-ABD6-DD1A2B23A0CC}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{D43A216D-F028-4972-8B01-71DE034E560D}" = protocol=58 | dir=out | name=@firewallapi.dll,-28546 |
    "{DA0D73C8-4436-44AD-8941-E2826F927AA8}" = dir=out | app=c:\program files\lenovo\readycomm\connsvc.exe |
    "{EF0E35AC-6B94-43F9-87D5-2A1863D76364}" = dir=out | app=c:\program files\lenovo\readycomm\common\igrs.exe |
    "{F7623BF7-2E80-466C-98CF-6917B572C5A8}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmplayer.exe |
    "{F9543B6F-36E3-443A-A164-F439ACA2F26C}" = dir=out | app=c:\program files\lenovo\readycomm\readycomm.exe |
    "TCP Query User{8F4C4641-08CE-40B9-97F0-C0E4AFC1DE83}C:\program files\oovoo\oovoo.exe" = protocol=6 | dir=in | app=c:\program files\oovoo\oovoo.exe |
    "TCP Query User{E5F6BFA9-B880-4971-A23E-31509CD2B316}C:\program files\oovoo\oovoo.exe" = protocol=6 | dir=in | app=c:\program files\oovoo\oovoo.exe |
    "UDP Query User{4EB8E6D9-D61C-45F4-A8B5-A65607345797}C:\program files\oovoo\oovoo.exe" = protocol=17 | dir=in | app=c:\program files\oovoo\oovoo.exe |
    "UDP Query User{BAEE6023-B22C-4289-A54B-CCBA69C8FBD8}C:\program files\oovoo\oovoo.exe" = protocol=17 | dir=in | app=c:\program files\oovoo\oovoo.exe |

    ========== HKEY_LOCAL_MACHINE Uninstall List ==========

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
    "{08234a0d-cf39-4dca-99f0-0c5cb496da81}" = Bing Bar
    "{17542DBF-E17C-4562-BC4D-FA3EF3076C45}" = Lenovo ReadyComm 5
    "{178832DE-9DE0-4C87-9F82-9315A9B03985}" = Windows Live Writer
    "{196467F1-C11F-4F76-858B-5812ADC83B94}" = MSXML 4.0 SP3 Parser
    "{1DD81E7D-0D28-4CEB-87B2-C041A4FCB215}" = Rapport
    "{205C6BDD-7B73-42DE-8505-9A093F35A238}" = Windows Live Upload Tool
    "{22B775E7-6C42-4FC5-8E10-9A5E3257BD94}" = MSVCRT
    "{2436F2A8-4B7E-4B6C-AE4E-604C84AA6A4F}" = Nero Core Components 10
    "{36A345C9-0691-45A1-AEEF-29ECEC8B5014}" = Microsoft Security Client
    "{392A74D0-4DFE-49F7-87C3-8A61708F8856}" = Eraser 6.0.8.2273
    "{3B4E636E-9D65-4D67-BA61-189800823F52}" = Windows Live Communications Platform
    "{3D5044A5-97B8-45C0-B956-BB2376569188}" = Windows Live Movie Maker
    "{40BF1E83-20EB-11D8-97C5-0009C5020658}" = Power2Go
    "{41914D8B-9D6E-4764-A1F9-BC43FB6782C1}_is1" = Foxit Cloud
    "{45338B07-A236-4270-9A77-EBB4115517B5}" = Windows Live Sign-in Assistant
    "{46F4D124-20E5-4D12-BE52-EC177A7A4B42}" = Lenovo OneKey Recovery
    "{4903D172-DCCB-392F-93A3-34CA9D47FE3D}" = Microsoft .NET Framework 4.5.1
    "{49F3D04B-B849-4C89-AB31-2366A004EA28}" = Broadcom Gigabit Integrated Controller
    "{4BB1DCED-84D3-47F9-B718-5947E904593E}" = Lenovo EasyCamera
    "{523B2B1B-D8DB-4B41-90FF-C4D799E2758A}" = Nero ControlCenter 10 Help (CHM)
    "{6412CECE-8172-4BE5-935B-6CECACD2CA87}" = Windows Live Mail
    "{6438EBAC-5305-39A5-A93E-88CDFA6CE947}" = Google Chrome
    "{65BB0407-4CC8-4DC7-952E-3EEFDF05602A}" = Nero Update
    "{65C0025A-2CDE-43C5-82D0-C7A56EF0DB39}" = Bing Bar Platform
    "{6DFB899F-17A2-48F0-A533-ED8D6866CF38}" = Nero Control Center 10
    "{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}" = Microsoft Visual C++ 2005 Redistributable
    "{76C66170-C538-4E77-B54D-48E136B5B533}" = Lenovo ReadyComm 5.0 Service
    "{770657D0-A123-3C07-8E44-1C83EC895118}" = Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
    "{77DCDCE3-2DED-62F3-8154-05E745472D07}" = Acrobat.com
    "{81128EE8-8EAD-4DB0-85C6-17C2CE50FF71}" = Windows Live Essentials
    "{842BEE12-CCCB-43F4-ABAF-CBA6DFE2583D}" = Nero BurnLite 10
    "{84EBDF39-4B33-49D7-A0BD-EB6E2C4E81C1}" = Windows Live Sync
    "{8991E763-21F5-4DEA-A938-5D9D77DCB488}" = Broadcom 802.11 Wireless Driver
    "{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}" = Microsoft Silverlight
    "{90140000-006D-0409-0000-0000000FF1CE}" = Microsoft Office Click-to-Run 2010
    "{90140011-0066-0409-0000-0000000FF1CE}" = Microsoft Office Starter 2010 - English
    "{9068B2BE-D93A-4C0A-861C-5E35E2C0E09E}" = Intel® Matrix Storage Manager
    "{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033" = Microsoft .NET Framework 4.5.1
    "{95120000-00B9-0409-0000-0000000FF1CE}" = Microsoft Application Error Reporting
    "{95140000-0070-0000-0000-0000000FF1CE}" = Microsoft Office 2010
    "{96AE7E41-E34E-47D0-AC07-1091A8127911}" = Realtek USB 2.0 Card Reader
    "{9E9D49A4-1DF4-4138-B7DB-5D87A893088E}" = Lenovo Bluetooth with Enhanced Data Rate Software
    "{9F72EF8B-AEC9-4CA5-B483-143980AFD6FD}" = ALPS Touch Pad Driver
    "{A85FD55B-891B-4314-97A5-EA96C0BD80B5}" = Windows Live Messenger
    "{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}" = Google Update Helper
    "{AB627AF2-9C7E-4DBD-816B-3B2646B81E89}" = Nero BurnLite 10
    "{AE1E24C2-E720-42D5-B8E1-48F71A97B4DB}" = Energy Management
    "{C0DA129B-1E45-494D-A362-5CD0109C306B}" = WOT for Internet Explorer
    "{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}" = SUPERAntiSpyware
    "{CE4CAD46-3F3F-4248-B0F2-6B0FAFBE40B1}_is1" = WMPCDText 1.2
    "{CFF8B8E8-E086-4DE0-935F-FE22CAB54F80}" = Microsoft Search Enhancement Pack
    "{D031E017-2434-40A7-A352-4DDD0199170D}" = TouchFreeze
    "{D6C75F0B-3BC1-4FC9-B8C5-3F7E8ED059CA}" = Windows Live Photo Gallery
    "{DE7A5DDF-47B3-42FF-A082-E158DEA37392}" = EMET
    "{E2DFE069-083E-4631-9B6C-43C48E991DE5}" = Junk Mail filter update
    "{EB6AB017-B964-4573-9DDB-ACC32F95E28A}_is1" = Free WebM to MP4 Converter 1.0
    "{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}" = Microsoft SQL Server 2005 Compact Edition [ENU]
    "{F0E12BBA-AD66-4022-A453-A1C8A0C4D570}" = Microsoft Choice Guard
    "{F6BD194C-4190-4D73-B1B1-C48C99921BFE}" = Windows Live Call
    "{FAA7F8FF-3C05-4A61-8F14-D8A6E9ED6623}" = ooVoo
    "A6A8668C0A13640CA28FE2A7D9654BE4AE478B13" = Windows Driver Package - Broadcom Bluetooth (07/30/2009 6.2.0.9405)
    "Adobe Flash Player ActiveX" = Adobe Flash Player 12 ActiveX
    "AviSynth" = AviSynth 2.5
    "B7541EC5F72AA713F557569278EB6273725F5607" = Windows Driver Package - Broadcom Bluetooth (06/15/2009 6.2.0.9000)
    "BF20603967CFDCB2BBF91950E8A56DFBC5C833FE" = Windows Driver Package - Broadcom HIDClass (07/28/2009 6.2.0.9800)
    "CNXT_AUDIO_HDA" = Conexant HD Audio
    "DVD Flick_is1" = DVD Flick 1.3.0.7
    "EasyCapture4.0" = EasyCapture
    "ESET Online Scanner" = ESET Online Scanner v3
    "Foxit Reader_is1" = Foxit Reader
    "Free MKV Video2Dvd 3.30_is1" = Free MKV Video2Dvd 3.30
    "Free WebM Video Converter_is1" = Free WebM Video Converter version 5.0.21.1212
    "HDMI" = Intel(R) Graphics Media Accelerator Driver
    "ImgBurn" = ImgBurn
    "InstallShield_{46F4D124-20E5-4D12-BE52-EC177A7A4B42}" = Lenovo OneKey Recovery
    "Malwarebytes' Anti-Malware_is1" = Malwarebytes Anti-Malware version 1.75.0.1300
    "Microsoft Security Client" = Microsoft Security Essentials
    "Office14.Click2Run" = Microsoft Office Click-to-Run 2010
    "Open Codecs" = Xiph.Org Open Codecs 0.85.17777
    "Paint Shop Pro 4.15" = Paint Shop Pro 4.15 SE
    "PC-Doctor for Windows" = PC-Doctor for Windows
    "Rapport_msi" = Trusteer Endpoint Protection
    "Secunia PSI" = Secunia PSI (3.0.0.9016)
    "TradersLittleHelper_is1" = Trader's Little Helper 2.7.0
    "TVWiz" = Intel(R) TV Wizard
    "VeriFace" = VeriFace
    "WinLiveSuite_Wave3" = Windows Live Essentials
    "WinRAR archiver" = WinRAR archiver

    ========== HKEY_USERS Uninstall List ==========

    [HKEY_USERS\S-1-5-21-1647757156-3214455835-2215275708-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
    "UnityWebPlayer" = Unity Web Player

    < End of report >

    OTL - Log 2

    OTL logfile created on: 4/1/2014 6:49:14 PM - Run 1
    OTL by OldTimer - Version 3.2.69.0 Folder = C:\Users\Nick\Desktop
    Home Premium Edition Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation
    Internet Explorer (Version = 9.11.9600.16521)
    Locale: 00000409 | Country: United Kingdom | Language: ENG | Date Format: dd/MM/yyyy

    2.96 Gb Total Physical Memory | 1.95 Gb Available Physical Memory | 65.90% Memory free
    5.92 Gb Paging File | 4.59 Gb Available in Paging File | 77.53% Paging File free
    Paging file location(s): ?:\pagefile.sys [binary data]

    %SystemDrive% = C: | %SystemRoot% = C:\windows | %ProgramFiles% = C:\Program Files
    Drive C: | 252.89 Gb Total Space | 76.74 Gb Free Space | 30.35% Space Free | Partition Type: NTFS
    Drive D: | 30.25 Gb Total Space | 29.46 Gb Free Space | 97.39% Space Free | Partition Type: NTFS

    Computer Name: NICK-PC | User Name: Nick | Logged in as Administrator.
    Boot Mode: Normal | Scan Mode: All users | Quick Scan
    Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days

    ========== Processes (SafeList) ==========

    PRC - [2014/04/01 18:28:09 | 000,602,112 | ---- | M] (OldTimer Tools) -- C:\Users\Nick\Desktop\OTL.exe
    PRC - [2014/03/11 10:13:24 | 000,279,776 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft Security Client\NisSrv.exe
    PRC - [2014/03/11 10:13:24 | 000,022,216 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft Security Client\MsMpEng.exe
    PRC - [2014/03/11 10:13:14 | 000,951,576 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Security Client\msseces.exe
    PRC - [2014/02/19 19:40:02 | 000,239,680 | ---- | M] (Foxit Corporation) -- C:\Program Files\Foxit Software\Foxit Reader\Foxit Cloud\FCUpdateService.exe
    PRC - [2014/02/10 12:35:22 | 001,444,120 | ---- | M] (Trusteer Ltd.) -- C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe
    PRC - [2014/02/10 12:35:20 | 002,484,504 | ---- | M] (Trusteer Ltd.) -- C:\Program Files\Trusteer\Rapport\bin\RapportService.exe
    PRC - [2014/01/15 14:26:12 | 005,625,624 | ---- | M] (SUPERAntiSpyware) -- C:\Program Files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE
    PRC - [2013/12/06 15:47:20 | 001,229,528 | ---- | M] (Secunia) -- C:\Program Files\Secunia\PSI\psia.exe
    PRC - [2013/12/06 15:47:18 | 000,565,464 | ---- | M] (Secunia) -- C:\Program Files\Secunia\PSI\psi_tray.exe
    PRC - [2013/10/28 19:02:16 | 001,680,088 | ---- | M] (Broadcom Corporation.) -- C:\Windows\System32\BtwRSupportService.exe
    PRC - [2013/10/10 23:54:44 | 000,120,088 | ---- | M] (SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SASCore.exe
    PRC - [2013/08/02 01:52:57 | 000,271,360 | ---- | M] (Microsoft Corporation) -- C:\Windows\System32\conhost.exe
    PRC - [2013/06/26 19:23:04 | 000,207,528 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Application Virtualization Client\sftvsa.exe
    PRC - [2013/06/26 19:23:00 | 000,523,944 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft Application Virtualization Client\sftlist.exe
    PRC - [2012/11/23 03:48:41 | 000,049,152 | ---- | M] (Microsoft Corporation) -- C:\Windows\System32\taskhost.exe
    PRC - [2012/05/09 14:25:58 | 000,152,152 | ---- | M] (Microsoft Corporation) -- C:\Program Files\EMET\EMET_notifier.exe
    PRC - [2011/02/25 06:30:54 | 002,616,320 | ---- | M] (Microsoft Corporation) -- C:\Windows\explorer.exe
    PRC - [2010/11/04 22:09:22 | 000,980,368 | ---- | M] (The Eraser Project) -- C:\Program Files\Eraser\Eraser.exe
    PRC - [2010/08/24 10:37:47 | 003,122,440 | ---- | M] (Lenovo) -- C:\Program Files\Lenovo\VeriFace\PManage.exe
    PRC - [2010/05/04 13:07:22 | 000,503,080 | ---- | M] (Nero AG) -- C:\Program Files\Nero\Update\NASvc.exe
    PRC - [2010/04/09 06:32:30 | 000,716,344 | ---- | M] (Conexant Systems, Inc) -- C:\Program Files\CONEXANT\SAII\SmartAudio.exe
    PRC - [2010/01/19 11:44:40 | 000,536,576 | ---- | M] (Vimicro) -- C:\Program Files\USB Camera2\VM332_STI.EXE
    PRC - [2009/09/29 17:22:46 | 005,064,560 | ---- | M] (Lenovo (Beijing) Limited) -- C:\Program Files\Lenovo\Energy Management\Energy Management.exe
    PRC - [2009/08/11 17:09:52 | 000,582,944 | ---- | M] (Broadcom Corporation.) -- C:\Program Files\Lenovo\Bluetooth Software\btwdins.exe
    PRC - [2009/07/14 15:27:26 | 000,038,152 | ---- | M] (Lenovo Group Limited) -- C:\Program Files\Lenovo\ReadyComm\common\IGRS.exe
    PRC - [2009/07/14 02:14:41 | 000,020,992 | ---- | M] (Microsoft Corporation) -- C:\Windows\System32\IgrsSvcs.exe
    PRC - [2009/06/04 20:03:32 | 000,186,904 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
    PRC - [2009/06/04 20:03:06 | 000,354,840 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTmon.exe
    PRC - [2005/04/29 17:15:40 | 000,045,056 | ---- | M] () -- C:\Program Files\TouchFreeze\TouchFreeze.exe


    ========== Modules (No Company Name) ==========

    MOD - [2014/02/13 12:14:30 | 000,240,128 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\WindowsFormsIntegra#\8012aa4ee70de24f41aba38ff60e90c8\WindowsFormsIntegration.ni.dll
    MOD - [2014/02/13 12:12:27 | 002,297,856 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Core\2196d55235295bf4425dc2f8daf831c4\System.Core.ni.dll
    MOD - [2014/02/13 12:10:54 | 000,220,672 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\CustomMarshalers\d682d06abf8257c72ce11cefd1d74cf5\CustomMarshalers.ni.dll
    MOD - [2014/02/13 12:09:59 | 000,253,952 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\Interop.CxHDAudioAP#\c1099c876b155eabcf1d6f0c7b6465d7\Interop.CxHDAudioAPILib.ni.dll
    MOD - [2014/02/13 12:09:55 | 001,670,144 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\de972dcfe4a8a4d4601a2fc1d30f1a0c\Microsoft.VisualBasic.ni.dll
    MOD - [2014/02/13 12:09:53 | 001,310,720 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\SmartAudio\714b32111b8e10a6a7136faa73322d95\SmartAudio.ni.exe
    MOD - [2014/02/13 11:55:05 | 000,368,128 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\72284863df9bea3f081ae98996400619\PresentationFramework.Aero.ni.dll
    MOD - [2014/02/13 11:54:38 | 000,771,584 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\6013ba20c72207054261c46f625ae552\System.Runtime.Remoting.ni.dll
    MOD - [2014/02/13 11:54:17 | 014,340,096 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\59c61d9e80273d9450b68a21aa66ab5e\PresentationFramework.ni.dll
    MOD - [2014/02/13 11:53:57 | 012,436,480 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\c6b80904ea323b50d5e74f059e0c3645\System.Windows.Forms.ni.dll
    MOD - [2014/02/13 11:53:48 | 001,593,344 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\236414f8e3137dd32f350e41fbdfa2c8\System.Drawing.ni.dll
    MOD - [2014/02/13 11:53:35 | 005,464,064 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Xml\aef3e3e63c8a2facdb5b12a0de76c3b9\System.Xml.ni.dll
    MOD - [2014/02/13 11:53:28 | 000,978,432 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\8a9cfd6b821ec7ec605897b699b69f53\System.Configuration.ni.dll
    MOD - [2014/02/13 11:53:20 | 012,238,336 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\PresentationCore\3344867dbfd5f65d44ab55dfa57b222a\PresentationCore.ni.dll
    MOD - [2014/02/13 11:53:04 | 003,348,480 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\WindowsBase\dbc40282ea71e3ca17b22db86d9d394a\WindowsBase.ni.dll
    MOD - [2014/02/13 11:53:00 | 007,989,760 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System\4241d1ece5590df3a828c9739dc82bf2\System.ni.dll
    MOD - [2014/02/13 11:52:51 | 011,499,520 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ede2c6c842840e009f01bcc74fa4c457\mscorlib.ni.dll
    MOD - [2014/02/06 13:35:40 | 001,125,592 | ---- | M] () -- C:\ProgramData\Trusteer\Rapport\store\exts\RapportMS\baseline\RapportMS.dll
    MOD - [2012/06/27 15:09:06 | 000,557,056 | ---- | M] () -- C:\Program Files\Trusteer\Rapport\bin\js32.dll
    MOD - [2010/11/05 02:57:39 | 000,069,120 | ---- | M] () -- C:\windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll
    MOD - [2010/08/24 10:37:47 | 000,492,808 | ---- | M] () -- C:\Program Files\Lenovo\VeriFace\ChooseLang.dll
    MOD - [2010/08/24 10:37:46 | 001,410,312 | ---- | M] () -- C:\Windows\System32\IcnOvrly.dll
    MOD - [2008/12/20 04:20:08 | 000,051,016 | ---- | M] () -- C:\Program Files\Lenovo\Energy Management\HookLib.dll
    MOD - [2005/04/29 17:15:40 | 000,045,056 | ---- | M] () -- C:\Program Files\TouchFreeze\TouchFreeze.exe
    MOD - [2005/04/29 17:15:36 | 000,045,056 | ---- | M] () -- C:\Program Files\TouchFreeze\TouchFreeze.dll


    ========== Services (SafeList) ==========

    SRV - [2014/03/12 12:05:01 | 000,257,928 | ---- | M] (Adobe Systems Incorporated) [On_Demand | Stopped] -- C:\Windows\System32\Macromed\Flash\FlashPlayerUpdateService.exe -- (AdobeFlashPlayerUpdateSvc)
    SRV - [2014/03/11 10:13:24 | 000,279,776 | ---- | M] (Microsoft Corporation) [On_Demand | Running] -- c:\Program Files\Microsoft Security Client\NisSrv.exe -- (NisSrv)
    SRV - [2014/03/11 10:13:24 | 000,022,216 | ---- | M] (Microsoft Corporation) [Auto | Running] -- c:\Program Files\Microsoft Security Client\MsMpEng.exe -- (MsMpSvc)
    SRV - [2014/03/01 04:38:23 | 000,108,032 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\windows\System32\IEEtwCollector.exe -- (IEEtwCollectorService)
    SRV - [2014/02/19 19:40:02 | 000,239,680 | ---- | M] (Foxit Corporation) [Auto | Running] -- C:\Program Files\Foxit Software\Foxit Reader\Foxit Cloud\FCUpdateService.exe -- (FoxitCloudUpdateService)
    SRV - [2014/02/10 12:35:22 | 001,444,120 | ---- | M] (Trusteer Ltd.) [Auto | Running] -- C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe -- (RapportMgmtService)
    SRV - [2013/12/06 15:47:20 | 001,229,528 | ---- | M] (Secunia) [Auto | Running] -- C:\Program Files\Secunia\PSI\psia.exe -- (Secunia PSI Agent)
    SRV - [2013/10/28 19:02:16 | 001,680,088 | ---- | M] (Broadcom Corporation.) [Auto | Running] -- C:\Windows\System32\BtwRSupportService.exe -- (BcmBtRSupport)
    SRV - [2013/10/10 23:54:44 | 000,120,088 | ---- | M] (SUPERAntiSpyware.com) [Auto | Running] -- C:\Program Files\SUPERAntiSpyware\SASCore.exe -- (!SASCORE)
    SRV - [2013/06/26 19:23:04 | 000,207,528 | ---- | M] (Microsoft Corporation) [On_Demand | Running] -- C:\Program Files\Microsoft Application Virtualization Client\sftvsa.exe -- (sftvsa)
    SRV - [2013/06/26 19:23:00 | 000,523,944 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft Application Virtualization Client\sftlist.exe -- (sftlist)
    SRV - [2013/05/27 05:57:27 | 000,680,960 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Windows Defender\MpSvc.dll -- (WinDefend)
    SRV - [2010/12/29 22:55:34 | 001,343,400 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\System32\Wat\WatAdminSvc.exe -- (WatAdminSvc)
    SRV - [2010/05/04 13:07:22 | 000,503,080 | ---- | M] (Nero AG) [Auto | Running] -- C:\Program Files\Nero\Update\NASvc.exe -- (NAUpdate)
    SRV - [2009/09/22 19:16:32 | 000,579,400 | ---- | M] (Lenovo Group Limited) [On_Demand | Stopped] -- C:\Program Files\Lenovo\ReadyComm\ConnSvc.exe -- (Lenovo ReadyComm ConnSvc)
    SRV - [2009/08/14 15:22:48 | 000,509,192 | ---- | M] (Lenovo Group Limited) [On_Demand | Stopped] -- C:\Program Files\Lenovo\ReadyComm\AppSvc.exe -- (Lenovo ReadyComm AppSvc)
    SRV - [2009/08/11 17:09:52 | 000,582,944 | ---- | M] (Broadcom Corporation.) [Auto | Running] -- C:\Program Files\Lenovo\Bluetooth Software\btwdins.exe -- (btwdins)
    SRV - [2009/07/16 04:12:42 | 000,276,296 | ---- | M] (Lenovo Group Limited) [On_Demand | Stopped] -- C:\Program Files\Lenovo\ReadyComm\PS_MDP.dll -- (PS_MDP)
    SRV - [2009/07/14 15:27:26 | 000,038,152 | ---- | M] (Lenovo Group Limited) [Auto | Running] -- C:\Program Files\Lenovo\ReadyComm\common\IGRS.exe -- (IGRS)
    SRV - [2009/07/14 15:27:20 | 000,103,688 | ---- | M] (Lenovo Group Limited) [Auto | Running] -- C:\Program Files\Lenovo\ReadyComm\common\router.dll -- (ReadyComm.DirectRouter)
    SRV - [2009/07/14 02:16:13 | 000,025,088 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\System32\sensrsvc.dll -- (SensrSvc)
    SRV - [2009/06/04 20:03:06 | 000,354,840 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTmon.exe -- (IAANTMON)


    ========== Driver Services (SafeList) ==========

    DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Users\Nick\AppData\Local\Temp\catchme.sys -- (catchme)
    DRV - [2014/03/11 09:52:30 | 000,104,264 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\Windows\System32\drivers\NisDrvWFP.sys -- (NisDrv)
    DRV - [2014/02/10 12:35:40 | 000,228,888 | ---- | M] (Trusteer Ltd.) [Kernel | System | Running] -- C:\Program Files\Trusteer\Rapport\bin\RapportPG.sys -- (RapportPG)
    DRV - [2014/02/10 12:35:40 | 000,155,704 | ---- | M] (Trusteer Ltd.) [Kernel | System | Running] -- C:\Program Files\Trusteer\Rapport\bin\RapportEI.sys -- (RapportEI)
    DRV - [2014/02/10 12:35:40 | 000,107,256 | ---- | M] (Trusteer Ltd.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\RapportKELL.sys -- (RapportKELL)
    DRV - [2013/12/12 12:10:27 | 000,340,432 | ---- | M] () [Kernel | System | Running] -- C:\ProgramData\Trusteer\Rapport\store\exts\RapportCerberus\baseline\RapportCerberus32_59849.sys -- (RapportCerberus_59849)
    DRV - [2013/12/06 15:47:12 | 000,016,024 | ---- | M] (Secunia) [File_System | On_Demand | Running] -- C:\Windows\System32\drivers\psi_mf_x86.sys -- (PSI)
    DRV - [2013/10/28 19:02:14 | 000,175,320 | ---- | M] (Broadcom Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\bcbtums.sys -- (bcbtums)
    DRV - [2013/10/02 01:42:31 | 000,049,152 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\TsUsbFlt.sys -- (TsUsbFlt)
    DRV - [2013/06/26 19:23:04 | 000,020,136 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Sftvollh.sys -- (Sftvol)
    DRV - [2013/06/26 19:23:00 | 000,197,800 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Sftplaylh.sys -- (Sftplay)
    DRV - [2013/06/26 19:23:00 | 000,024,232 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Running] -- C:\Windows\System32\drivers\Sftredirlh.sys -- (Sftredir)
    DRV - [2013/06/26 19:22:58 | 000,583,848 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Sftfslh.sys -- (Sftfs)
    DRV - [2012/08/23 15:44:32 | 000,014,848 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\rdpvideominiport.sys -- (RdpVideoMiniport)
    DRV - [2011/07/22 17:27:02 | 000,012,880 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
    DRV - [2011/07/12 22:55:22 | 000,067,664 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) [Kernel | System | Running] -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
    DRV - [2010/11/20 10:59:44 | 000,035,968 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\winusb.sys -- (WinUsb)
    DRV - [2010/08/24 10:37:10 | 000,054,800 | ---- | M] () [Kernel | System | Running] -- C:\windows\System32\drivers\funfrm.sys -- (funfrm)
    DRV - [2010/04/22 05:08:22 | 000,218,744 | ---- | M] (Alps Electric Co., Ltd.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Apfiltr.sys -- (ApfiltrService)
    DRV - [2010/04/20 18:45:28 | 000,198,000 | ---- | M] (Vimicro Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\vm332avs.sys -- (vm332avs)
    DRV - [2010/04/14 02:01:48 | 000,045,736 | ---- | M] (Broadcom Corporation.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\btusbflt.sys -- (btusbflt)
    DRV - [2010/03/31 07:49:52 | 000,517,688 | ---- | M] (Conexant Systems Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\CHDRT32.sys -- (CnxtHdAudService)
    DRV - [2010/01/20 07:14:42 | 000,023,136 | ---- | M] (Lenovo Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\AcpiVpc.sys -- (ACPIVPC)
    DRV - [2009/07/30 10:45:22 | 000,171,520 | ---- | M] (Realtek Semiconductor Corp.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\RtsUStor.sys -- (RSUSBSTOR)
    DRV - [2009/07/28 22:09:36 | 000,063,240 | ---- | M] (Lenovo) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\wdbridge.sys -- (Bridge0)
    DRV - [2009/07/21 22:14:58 | 000,081,704 | ---- | M] (CyberLink) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\wsvd.sys -- (wsvd)
    DRV - [2009/07/16 13:37:14 | 000,011,792 | ---- | M] (Windows (R) Codename Longhorn DDK provider) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\WDMirror.sys -- (wdmirror)
    DRV - [2009/07/14 00:52:10 | 000,014,336 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\vwifimp.sys -- (vwifimp)
    DRV - [2009/07/14 00:45:33 | 000,083,456 | ---- | M] (Brother Industries Ltd.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\serial.sys -- (Serial)
    DRV - [2009/07/13 23:02:51 | 004,231,168 | ---- | M] (Intel Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\netw5v32.sys -- (netw5v32)
    DRV - [2009/07/13 23:02:49 | 000,229,888 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\k57nd60x.sys -- (k57nd60x)
    DRV - [2009/05/25 21:12:36 | 000,122,368 | ---- | M] (Intel(R) Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\IntcHdmi.sys -- (IntcHdmiAddService)
    DRV - [2008/08/06 13:34:16 | 000,128,104 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Stopped] -- C:\Windows\System32\drivers\WimFltr.sys -- (WimFltr)


    ========== Standard Registry (SafeList) ==========


    ========== Internet Explorer ==========

    IE - HKLM\..\SearchScopes,DefaultScope =
    IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC


    IE - HKU\.DEFAULT\..\SearchScopes,DefaultScope =
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

    IE - HKU\S-1-5-18\..\SearchScopes,DefaultScope =
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

    IE - HKU\S-1-5-19\..\SearchScopes,DefaultScope =

    IE - HKU\S-1-5-20\..\SearchScopes,DefaultScope =

    IE - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
    IE - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\..\SearchScopes,DefaultScope =
    IE - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&form=LENDF8&pc=MALN&src=IE-SearchBox
    IE - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE11SR
    IE - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\..\SearchScopes\{E6139CAF-F041-49DE-866E-CE6942E087E3}: "URL" = http://www.google.com/search?q={sea...rce}&ie={inputEncoding?}&oe={outputEncoding?}
    IE - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0


    ========== FireFox ==========

    FF - HKLM\Software\MozillaPlugins\@foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/pdf: C:\Program Files\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll (Foxit Corporation)
    FF - HKLM\Software\MozillaPlugins\@foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.fdf: C:\Program Files\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll (Foxit Corporation)
    FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@microsoft.com/SharePoint,version=14.0: C:\PROGRA~1\MICROS~2\Office14\NPSPWRAP.DLL (Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@microsoft.com/WLPG,version=14.0.8081.0709: C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
    FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Program Files\Google\Update\1.3.23.9\npGoogleUpdate3.dll (Google Inc.)
    FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Program Files\Google\Update\1.3.23.9\npGoogleUpdate3.dll (Google Inc.)
    FF - HKCU\Software\MozillaPlugins\@unity3d.com/UnityPlayer,version=1.0: C:\Users\Nick\AppData\LocalLow\Unity\WebPlayer\loader\npUnity3D32.dll (Unity Technologies ApS)



    ========== Chrome ==========

    CHR - default_search_provider: Google (Enabled)
    CHR - default_search_provider: search_url = {google:baseURL}search?q={searchTerms}&{google:RLZ}{google:eek:riginalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:bookmarkBarPinned}{google:searchClient}{google:sourceId}{google:instantExtendedEnabledParameter}{google:eek:mniboxStartMarginParameter}ie={inputEncoding}
    CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}sugkey={google:suggestAPIKeyParameter},
    CHR - homepage: http://www.google.co.uk/
    CHR - plugin: Widevine Content Decryption Module (Enabled) = C:\Users\Nick\AppData\Local\Google\Chrome\User Data\WidevineCDM\1.4.1.376\_platform_specific\win_x86\widevinecdmadapter.dll
    CHR - plugin: Shockwave Flash (Enabled) = C:\Program Files\Google\Chrome\Application\33.0.1750.154\PepperFlash\pepflashplayer.dll
    CHR - plugin: Chrome Remote Desktop Viewer (Disabled) = internal-remoting-viewer
    CHR - plugin: Native Client (Enabled) = C:\Program Files\Google\Chrome\Application\33.0.1750.154\ppGoogleNaClPluginChrome.dll
    CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Program Files\Google\Chrome\Application\33.0.1750.154\pdf.dll
    CHR - plugin: Qualys BrowserCheck Plugin (Enabled) = C:\Users\Nick\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejhnkognlohdkpjkjongioociddgoibk\1.9.20.1_0\npqbc.dll
    CHR - plugin: Microsoft Office 2010 (Enabled) = C:\PROGRA~1\MICROS~2\Office14\NPSPWRAP.DLL
    CHR - plugin: Foxit Reader Plugin for Mozilla (Disabled) = C:\Program Files\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll
    CHR - plugin: Google Update (Enabled) = C:\Program Files\Google\Update\1.3.22.3\npGoogleUpdate3.dll
    CHR - plugin: Java Deployment Toolkit 7.0.450.18 (Disabled) = C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll
    CHR - plugin: Java(TM) Platform SE 7 U45 (Disabled) = C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll
    CHR - plugin: Windows Live® Photo Gallery (Enabled) = C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll
    CHR - plugin: Unity Player (Enabled) = C:\Users\Nick\AppData\LocalLow\Unity\WebPlayer\loader\npUnity3D32.dll
    CHR - plugin: Silverlight Plug-In (Enabled) = c:\Program Files\Microsoft Silverlight\5.1.20913.0\npctrl.dll
    CHR - Extension: WOT = C:\Users\Nick\AppData\Local\Google\Chrome\User Data\Default\Extensions\bhmmomiinigofkjcapegjjndpbikblnp\2.5.6_0\
    CHR - Extension: Qualys BrowserCheck for Windows = C:\Users\Nick\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejhnkognlohdkpjkjongioociddgoibk\1.9.20.1_0\
    CHR - Extension: http://www.google.co.uk/ = C:\Users\Nick\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghejcmaiefeefmcdbmpkdjmfiphepccj\2013.6.20.57098_0\
    CHR - Extension: Google Wallet = C:\Users\Nick\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\0.0.6.1_0\

    O1 HOSTS File: ([2009/06/10 22:39:37 | 000,000,824 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts
    O2 - BHO: (Qualys BrowserCheck IE Helper) - {7D2FB79E-E58C-4DB5-A36F-AC1C73967FA5} - C:\Windows\Downloaded Program Files\qbc_bho.dll (Qualys, Inc.)
    O2 - BHO: (WOT Helper) - {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - C:\Program Files\WOT\WOT.dll ()
    O3 - HKLM\..\Toolbar: (WOT) - {71576546-354D-41c9-AAE8-31F2EC22BF0D} - C:\Program Files\WOT\WOT.dll ()
    O3 - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\..\Toolbar\WebBrowser: (WOT) - {71576546-354D-41C9-AAE8-31F2EC22BF0D} - C:\Program Files\WOT\WOT.dll ()
    O4 - HKLM..\Run: [332BigDog] C:\Program Files\USB Camera2\VM332_STI.EXE (Vimicro)
    O4 - HKLM..\Run: [EMET Notifier] C:\Program Files\EMET\EMET_notifier.exe (Microsoft Corporation)
    O4 - HKLM..\Run: [Energy Management] C:\Program Files\Lenovo\Energy Management\Energy Management.exe (Lenovo (Beijing) Limited)
    O4 - HKLM..\Run: [EnergyUtility] C:\Program Files\Lenovo\Energy Management\utility.exe (Lenovo(beijing) Limited)
    O4 - HKLM..\Run: [Eraser] C:\Program Files\Eraser\Eraser.exe (The Eraser Project)
    O4 - HKLM..\Run: [IAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe (Intel Corporation)
    O4 - HKLM..\Run: [MSC] c:\Program Files\Microsoft Security Client\msseces.exe (Microsoft Corporation)
    O4 - HKLM..\Run: [SmartAudio] C:\Program Files\CONEXANT\SAII\SAIICpl.exe ()
    O4 - HKLM..\Run: [UpdateP2GShortCut] C:\Program Files\Lenovo\Power2Go\MUITransfer\MUIStartMenu.exe (CyberLink Corp.)
    O4 - HKLM..\Run: [VeriFaceManager] C:\Program Files\Lenovo\VeriFace\PManage.exe (Lenovo)
    O4 - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE (SUPERAntiSpyware)
    O4 - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000..\Run: [TouchFreeze] C:\Program Files\TouchFreeze\TouchFreeze.exe ()
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
    O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5
    O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
    O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-18\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-19\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-20\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O7 - HKU\S-1-5-21-1647757156-3214455835-2215275708-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
    O9 - Extra Button: @C:\Program Files\Lenovo\Bluetooth Software\btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\Lenovo\Bluetooth Software\btsendto_ie.htm ()
    O9 - Extra 'Tools' menuitem : @C:\Program Files\Lenovo\Bluetooth Software\btrez.dll,-12650 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\Lenovo\Bluetooth Software\btsendto_ie.htm ()
    O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab (OnlineScanner Control)
    O16 - DPF: {7D2FB79E-E58C-4DB5-A36F-AC1C73967F4D} https://browsercheck.qualys.com/qbc_ax.cab (Qualys BrowserCheck)
    O16 - DPF: {CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_11-windows-i586.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_13-windows-i586.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_15-windows-i586.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_17-windows-i586.cab (Reg Error: Key error.)
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1 192.168.1.1
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{14D602EB-8868-4EA4-9E77-BC880202ACF4}: DhcpNameServer = 192.168.1.1 192.168.1.1
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{53C7F6D7-A3E2-4EF3-93FB-B82F102A6EE0}: DhcpNameServer = 192.168.1.1 192.168.1.1
    O18 - Protocol\Handler\wot {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - C:\Program Files\WOT\WOT.dll ()
    O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\windows\explorer.exe (Microsoft Corporation)
    O20 - HKLM Winlogon: UserInit - (C:\windows\system32\userinit.exe) - C:\Windows\System32\userinit.exe (Microsoft Corporation)
    O20 - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\windows\System32\SystemPropertiesPerformance.exe (Microsoft Corporation)
    O32 - HKLM CDRom: AutoRun - 1
    O32 - AutoRun File - [2009/06/10 22:42:20 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
    O34 - HKLM BootExecute: (autocheck autochk *)
    O35 - HKLM\..comfile [open] -- "%1" %*
    O35 - HKLM\..exefile [open] -- "%1" %*
    O37 - HKLM\...com [@ = ComFile] -- "%1" %*
    O37 - HKLM\...exe [@ = exefile] -- "%1" %*
    O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
    O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
    O38 - SubSystems\\Windows: (ServerDll=sxssrv,4)

    ========== Files/Folders - Created Within 30 Days ==========

    [2014/04/01 18:28:06 | 000,602,112 | ---- | C] (OldTimer Tools) -- C:\Users\Nick\Desktop\OTL.exe
    [2014/04/01 18:27:41 | 001,038,974 | ---- | C] (Thisisu) -- C:\Users\Nick\Desktop\JRT.exe
    [2014/04/01 17:35:58 | 000,000,000 | ---D | C] -- C:\windows\temp
    [2014/04/01 17:35:06 | 000,000,000 | -HSD | C] -- C:\$RECYCLE.BIN
    [2014/04/01 17:13:51 | 000,518,144 | ---- | C] (SteelWerX) -- C:\windows\SWREG.exe
    [2014/04/01 17:13:51 | 000,406,528 | ---- | C] (SteelWerX) -- C:\windows\SWSC.exe
    [2014/04/01 17:13:51 | 000,060,416 | ---- | C] (NirSoft) -- C:\windows\NIRCMD.exe
    [2014/04/01 17:13:27 | 000,000,000 | ---D | C] -- C:\Qoobox
    [2014/03/31 15:33:09 | 000,000,000 | ---D | C] -- C:\Users\Nick\Documents\TINA WORK
    [2014/03/29 18:33:42 | 000,000,000 | ---D | C] -- C:\Users\Nick\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Games
    [2014/03/29 00:57:33 | 000,107,224 | ---- | C] (Malwarebytes Corporation) -- C:\windows\System32\drivers\MBAMSwissArmy.sys
    [2014/03/29 00:55:46 | 012,589,848 | ---- | C] (Malwarebytes Corp.) -- C:\Users\Nick\Desktop\mbar-1.07.0.1009 (2).exe
    [2014/03/29 00:45:49 | 000,000,000 | ---D | C] -- C:\Users\Nick\Desktop\RK_Quarantine
    [2014/03/28 17:24:59 | 000,688,992 | R--- | C] (Swearware) -- C:\Users\Nick\Desktop\dds.com

    ========== Files - Modified Within 30 Days ==========

    [2014/04/01 18:46:00 | 000,000,830 | ---- | M] () -- C:\windows\tasks\Adobe Flash Player Updater.job
    [2014/04/01 18:43:14 | 000,009,920 | -H-- | M] () -- C:\windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
    [2014/04/01 18:43:14 | 000,009,920 | -H-- | M] () -- C:\windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
    [2014/04/01 18:39:52 | 000,667,564 | ---- | M] () -- C:\windows\System32\perfh009.dat
    [2014/04/01 18:39:52 | 000,126,950 | ---- | M] () -- C:\windows\System32\perfc009.dat
    [2014/04/01 18:35:25 | 000,000,878 | ---- | M] () -- C:\windows\tasks\GoogleUpdateTaskMachineCore.job
    [2014/04/01 18:34:35 | 000,067,584 | --S- | M] () -- C:\windows\bootstat.dat
    [2014/04/01 18:34:29 | 2384,932,864 | -HS- | M] () -- C:\hiberfil.sys
    [2014/04/01 18:28:09 | 000,602,112 | ---- | M] (OldTimer Tools) -- C:\Users\Nick\Desktop\OTL.exe
    [2014/04/01 18:27:51 | 001,038,974 | ---- | M] (Thisisu) -- C:\Users\Nick\Desktop\JRT.exe
    [2014/04/01 18:27:35 | 001,426,178 | ---- | M] () -- C:\Users\Nick\Desktop\adwcleaner (1).exe
    [2014/04/01 17:54:00 | 000,000,882 | ---- | M] () -- C:\windows\tasks\GoogleUpdateTaskMachineUA.job
    [2014/04/01 17:09:22 | 000,001,335 | ---- | M] () -- C:\Users\Nick\Desktop\ComboFix.exe - Shortcut.lnk
    [2014/04/01 10:37:45 | 395,608,063 | ---- | M] () -- C:\Users\Nick\Documents\LOGICAL VOLUME IDENTIFIER.ISO
    [2014/03/30 04:37:27 | 000,002,155 | ---- | M] () -- C:\windows\epplauncher.mif
    [2014/03/29 00:57:33 | 000,107,224 | ---- | M] (Malwarebytes Corporation) -- C:\windows\System32\drivers\MBAMSwissArmy.sys
    [2014/03/29 00:57:11 | 000,075,480 | ---- | M] (Malwarebytes Corporation) -- C:\windows\System32\drivers\mbamchameleon.sys
    [2014/03/29 00:56:06 | 012,589,848 | ---- | M] (Malwarebytes Corp.) -- C:\Users\Nick\Desktop\mbar-1.07.0.1009 (2).exe
    [2014/03/29 00:42:43 | 003,972,608 | ---- | M] () -- C:\Users\Nick\Desktop\RogueKiller.exe
    [2014/03/28 17:25:10 | 000,688,992 | R--- | M] (Swearware) -- C:\Users\Nick\Desktop\dds.com
    [2014/03/19 22:09:28 | 001,950,720 | ---- | M] () -- C:\Users\Nick\Desktop\adwcleaner .exe
    [2014/03/15 14:34:13 | 000,002,129 | ---- | M] () -- C:\Users\Public\Desktop\Google Chrome.lnk
    [2014/03/13 15:43:45 | 000,002,229 | ---- | M] () -- C:\Users\Nick\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk
    [2014/03/12 16:26:20 | 000,306,920 | ---- | M] () -- C:\windows\System32\FNTCACHE.DAT
    [2014/03/02 21:28:17 | 000,001,068 | ---- | M] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Secunia PSI Tray.lnk

    ========== Files Created - No Company Name ==========

    [2014/04/01 18:27:28 | 001,426,178 | ---- | C] () -- C:\Users\Nick\Desktop\adwcleaner (1).exe
    [2014/04/01 17:13:51 | 000,256,000 | ---- | C] () -- C:\windows\PEV.exe
    [2014/04/01 17:13:51 | 000,208,896 | ---- | C] () -- C:\windows\MBR.exe
    [2014/04/01 17:13:51 | 000,098,816 | ---- | C] () -- C:\windows\sed.exe
    [2014/04/01 17:13:51 | 000,080,412 | ---- | C] () -- C:\windows\grep.exe
    [2014/04/01 17:13:51 | 000,068,096 | ---- | C] () -- C:\windows\zip.exe
    [2014/04/01 17:09:22 | 000,001,335 | ---- | C] () -- C:\Users\Nick\Desktop\ComboFix.exe - Shortcut.lnk
    [2014/03/29 00:42:40 | 003,972,608 | ---- | C] () -- C:\Users\Nick\Desktop\RogueKiller.exe
    [2014/03/19 22:09:27 | 001,950,720 | ---- | C] () -- C:\Users\Nick\Desktop\adwcleaner .exe

    ========== ZeroAccess Check ==========

    [2009/07/14 05:42:31 | 000,000,227 | RHS- | M] () -- C:\windows\assembly\Desktop.ini

    [HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]

    [HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32]

    [HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
    "" = %SystemRoot%\system32\shell32.dll -- [2013/07/26 02:55:59 | 012,872,704 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Apartment

    [HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32]
    "" = %systemroot%\system32\wbem\fastprox.dll -- [2010/11/20 13:19:02 | 000,606,208 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Free

    [HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32]
    "" = %systemroot%\system32\wbem\wbemess.dll -- [2009/07/14 02:16:17 | 000,342,528 | ---- | M] (Microsoft Corporation)
    "ThreadingModel" = Both

    ========== LOP Check ==========

    [2011/04/27 23:29:39 | 000,000,000 | ---D | M] -- C:\Users\Default\AppData\Roaming\Trusteer
    [2011/04/27 23:29:39 | 000,000,000 | ---D | M] -- C:\Users\Default User\AppData\Roaming\Trusteer
    [2012/12/15 02:15:25 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\DVDVideoSoft
    [2010/12/29 21:31:38 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\EasyCapture
    [2014/02/20 18:20:31 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\Foxit Software
    [2011/07/26 13:48:40 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\ImgBurn
    [2010/12/29 20:44:04 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\ooVoo Details
    [2010/12/30 01:33:27 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\OpenOffice.org
    [2013/03/11 16:38:27 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\Qualys
    [2014/04/01 18:33:27 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\SoftGrid Client
    [2011/01/07 15:00:44 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\TP
    [2010/12/30 01:27:56 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\Trusteer
    [2012/07/03 14:28:57 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\Zoominto
    [2013/06/06 16:18:08 | 000,000,000 | ---D | M] -- C:\Users\Nick\AppData\Roaming\{90140011-0066-0409-0000-0000000FF1CE}

    ========== Purity Check ==========



    < End of report >

    Broni,

    OTL has the clean up button in dark letters. I know your instructions did not mention it but should I
    press it to complete the clean?

    Thanks once again.
    Nick
     
  9. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    [​IMG]
    Run OTL
    • Under the Custom Scans/Fixes box at the bottom, paste in the following
    Code:
    :OTL
    DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Users\Nick\AppData\Local\Temp\catchme.sys -- (catchme)
    O16 - DPF: {CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_11-windows-i586.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_13-windows-i586.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_15-windows-i586.cab (Reg Error: Key error.)
    O16 - DPF: {CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_17-windows-i586.cab (Reg Error: Key error.)
    
    
    :Services
    
    :Reg
    
    :Files
    C:\FRST
    
    :Commands
    [purity]
    [emptytemp]
    [emptyjava]
    [emptyflash]
    [Reboot]
    
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    NOTE. If for any reason OTL stalls (most likely at "killing processes..." step) run the fix from safe mode.

    Last scans...

    [​IMG] Download Security Check from here or here and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
    NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
    NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.


    [​IMG] Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
    • Make sure the following options are checked:
      • Internet Services
      • Windows Firewall
      • System Restore
      • Security Center
      • Windows Update
      • Windows Defender
      • Other Services
    • Press "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please copy and paste the log to your reply.

    [​IMG] Download Temp File Cleaner (TFC)
    Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.

    [​IMG] Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Click on "Run ESET Online Scanner" button.
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, click on List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  10. Whoosh

    Whoosh Established Techie7 Member

    Hi Broni,

    Eset scan ran fine and no threats were detected.

    Here are the logs you asked for..

    OTL

    All processes killed
    ========== OTL ==========
    Service catchme stopped successfully!
    Service catchme deleted successfully!
    File C:\Users\Nick\AppData\Local\Temp\catchme.sys not found.
    Starting removal of ActiveX control {CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA}
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0011-ABCDEFFEDCBA}\ not found.
    Starting removal of ActiveX control {CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA}
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0013-ABCDEFFEDCBA}\ not found.
    Starting removal of ActiveX control {CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA}
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0015-ABCDEFFEDCBA}\ not found.
    Starting removal of ActiveX control {CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA}
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0017-ABCDEFFEDCBA}\ not found.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    File\Folder C:\FRST not found.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Nick
    ->Temp folder emptied: 2788425 bytes
    ->Temporary Internet Files folder emptied: 6686081 bytes
    ->Java cache emptied: 0 bytes
    ->Google Chrome cache emptied: 11580269 bytes
    ->Flash cache emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 13258 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 20.00 mb


    [EMPTYJAVA]

    User: All Users

    User: Default

    User: Default User

    User: Nick
    ->Java cache emptied: 0 bytes

    User: Public

    Total Java Files Cleaned = 0.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: Nick
    ->Flash cache emptied: 0 bytes

    User: Public

    Total Flash Files Cleaned = 0.00 mb


    OTL by OldTimer - Version 3.2.69.0 log created on 04012014_211751

    Files\Folders moved on Reboot...
    C:\Users\Nick\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moved successfully.

    PendingFileRenameOperations files...

    Registry entries deleted on Reboot...

    Security Check

    Results of screen317's Security Check version 0.99.81
    Windows 7 Service Pack 1 x86 (UAC is enabled)
    Internet Explorer 11
    ``````````````Antivirus/Firewall Check:``````````````
    Windows Firewall Enabled!
    Microsoft Security Essentials
    Antivirus up to date!
    `````````Anti-malware/Other Utilities Check:`````````
    SUPERAntiSpyware
    Secunia PSI (3.0.0.9016)
    Malwarebytes Anti-Malware version 1.75.0.1300
    Google Chrome 33.0.1750.149
    Google Chrome 33.0.1750.154
    ````````Process Check: objlist.exe by Laurent````````
    Microsoft Security Essentials MSMpEng.exe
    Microsoft Security Essentials msseces.exe
    `````````````````System Health check`````````````````
    Total Fragmentation on Drive C: 0%
    ````````````````````End of Log``````````````````````

    Farbar Service Scanner

    Farbar Service Scanner Version: 25-02-2014
    Ran by Nick (administrator) on 01-04-2014 at 21:29:27
    Running from "C:\Users\Nick\Desktop"
    Microsoft Windows 7 Home Premium Service Pack 1 (X86)
    Boot Mode: Normal
    ****************************************************************

    Internet Services:
    ============

    Connection Status:
    ==============
    Localhost is accessible.
    LAN connected.
    Google IP is accessible.
    Google.com is accessible.
    Yahoo.com is accessible.


    Windows Firewall:
    =============

    Firewall Disabled Policy:
    ==================


    System Restore:
    ============

    System Restore Disabled Policy:
    ========================


    Action Center:
    ============


    Windows Update:
    ============

    Windows Autoupdate Disabled Policy:
    ============================


    Other Services:
    ==============


    File Check:
    ========
    C:\windows\system32\nsisvc.dll => MD5 is legit
    C:\windows\system32\Drivers\nsiproxy.sys => MD5 is legit
    C:\windows\system32\dhcpcore.dll => MD5 is legit
    C:\windows\system32\Drivers\afd.sys
    [2013-10-09 23:17] - [2013-09-14 01:48] - 0338944 ____A (Microsoft Corporation) F81BB7E487EDCEAB630A7EE66CF23913

    C:\windows\system32\Drivers\tdx.sys => MD5 is legit
    C:\windows\system32\Drivers\tcpip.sys
    [2013-10-09 23:17] - [2013-09-08 03:07] - 1294272 ____A (Microsoft Corporation) CA59F7C570AF70BC174F477CFE2D9EE3

    C:\windows\system32\dnsrslvr.dll => MD5 is legit
    C:\windows\system32\mpssvc.dll => MD5 is legit
    C:\windows\system32\bfe.dll => MD5 is legit
    C:\windows\system32\Drivers\mpsdrv.sys => MD5 is legit
    C:\windows\system32\SDRSVC.dll => MD5 is legit
    C:\windows\system32\vssvc.exe => MD5 is legit
    C:\windows\system32\wscsvc.dll => MD5 is legit
    C:\windows\system32\wbem\WMIsvc.dll => MD5 is legit
    C:\windows\system32\wuaueng.dll => MD5 is legit
    C:\windows\system32\qmgr.dll => MD5 is legit
    C:\windows\system32\es.dll => MD5 is legit
    C:\windows\system32\cryptsvc.dll
    [2013-08-13 19:02] - [2013-07-09 05:46] - 0140288 ____A (Microsoft Corporation) 7CA1BECEA5DE2643ADDAD32670E7A4C9

    C:\windows\system32\ipnathlp.dll => MD5 is legit
    C:\windows\system32\iphlpsvc.dll => MD5 is legit
    C:\windows\system32\svchost.exe => MD5 is legit
    C:\windows\system32\rpcss.dll => MD5 is legit


    **** End of log ****

    TFC ran fine.

    Eset scan found no threats.

    I really appreciate your help, thanks again,
    Nick
     
  11. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Your computer is clean [​IMG]

    1. This step will remove all cleaning tools we used, it'll reset restore points (so you won't get reinfected by accidentally using some older restore point) and it'll make some other minor adjustments...
    This is a very crucial step so make sure you don't skip it.
    Download [​IMG]DelFix by Xplode to your desktop. Delfix will delete all the used tools and logfiles.

    Double-click Delfix.exe to start the tool.
    Make sure the following items are checked:
    • Activate UAC (optional; some users prefer to keep it off)
    • Remove disinfection tools
    • Create registry backup
    • Purge System Restore
    • Reset system settings
    Now click "Run" and wait patiently.
    Once finished a logfile will be created. You don't have to attach it to your next reply.

    2. Make sure Windows Updates are current.

    3. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    4. Check if your browser plugins are up to date.
    Firefox - https://www.mozilla.org/en-US/plugincheck/
    other browsers: https://browsercheck.qualys.com/ (click on "Launch a quick scan now" link)

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC), AdwCleaner and Junkware Removal Tool (JRT) weekly (you need to redownload these tools since they were removed by DelFix).

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    11. Read:
    How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
    Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/
    About those Toolbars and Add-ons - Potentially Unwanted Programs (PUPs) which change your browser settings: http://www.bleepingcomputer.com/for...curity-questions-best-practices/#entry3187642

    12. Please, let me know, how your computer is doing.
     
  12. Whoosh

    Whoosh Established Techie7 Member

    Hello Broni,

    Thank you so much for your help and kindness!

    I have completed all you asked in the previous post and my computer seems a lot
    happier in itself.

    Once again I just can't thank you enough.

    Take Care,
    Nick
     
  13. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Way to go!! [​IMG]
    Good luck and stay safe :)