Program error updating

Ошибка program_error_updating Malwarebytes Anti-Malware Program_Error_Updating (0 0 Хост не найден) ошибки могут привести к зависанию или сбою компьютера, а также к возможному заражению вредоносным ПО. Выполните следующие простые действия, чтобы исправить Runtime Errors ошибки быстро и просто.

Как исправить время выполнения Ошибка program_error_updating Malwarebytes Anti-Malware Program_Error_Updating (0 0 Хост не найден)

В этой статье представлена ошибка с номером Ошибка program_error_updating, известная как Malwarebytes Anti-Malware Program_Error_Updating (0 0 Хост не найден), описанная как Ошибка program_error_updating: Возникла ошибка в приложении Malwarebytes Anti-Malware. Приложение будет закрыто. Приносим свои извинения за неудобства.

О программе Runtime Ошибка program_error_updating

Время выполнения Ошибка program_error_updating происходит, когда Malwarebytes Anti-Malware дает сбой или падает во время запуска, отсюда и название. Это не обязательно означает, что код был каким-то образом поврежден, просто он не сработал во время выполнения. Такая ошибка появляется на экране в виде раздражающего уведомления, если ее не устранить. Вот симптомы, причины и способы устранения проблемы.

Определения (Бета)

Здесь мы приводим некоторые определения слов, содержащихся в вашей ошибке, в попытке помочь вам понять вашу проблему. Эта работа продолжается, поэтому иногда мы можем неправильно определить слово, так что не стесняйтесь пропустить этот раздел!

  • Хост . Компьютерная система общего назначения, подключенная к некоторой сети связи или сетям связи с целью достижения совместного использования ресурсов между участвующими системами, называется Хостом.
  • < li> Вредоносное ПО. Вредоносное ПО — это любое вредоносное программное обеспечение, скрипт или код, разработанные или используемые с целью компрометации или нанесения вреда информационным активам без информированного согласия владельца.

Симптомы Ошибка program_error_updating — Malwarebytes Anti-Malware Program_Error_Updating (0 0 Хост не найден)

Ошибки времени выполнения происходят без предупреждения. Сообщение об ошибке может появиться на экране при любом запуске %программы%. Фактически, сообщение об ошибке или другое диалоговое окно может появляться снова и снова, если не принять меры на ранней стадии.

Возможны случаи удаления файлов или появления новых файлов. Хотя этот симптом в основном связан с заражением вирусом, его можно отнести к симптомам ошибки времени выполнения, поскольку заражение вирусом является одной из причин ошибки времени выполнения. Пользователь также может столкнуться с внезапным падением скорости интернет-соединения, но, опять же, это не всегда так.

Fix Malwarebytes Anti-Malware Program_Error_Updating (0 0 Хост не найден) (Error Ошибка program_error_updating)
(Только для примера)

Причины Malwarebytes Anti-Malware Program_Error_Updating (0 0 Хост не найден) — Ошибка program_error_updating

При разработке программного обеспечения программисты составляют код, предвидя возникновение ошибок. Однако идеальных проектов не бывает, поскольку ошибки можно ожидать даже при самом лучшем дизайне программы. Глюки могут произойти во время выполнения программы, если определенная ошибка не была обнаружена и устранена во время проектирования и тестирования.

Ошибки во время выполнения обычно вызваны несовместимостью программ, запущенных в одно и то же время. Они также могут возникать из-за проблем с памятью, плохого графического драйвера или заражения вирусом. Каким бы ни был случай, проблему необходимо решить немедленно, чтобы избежать дальнейших проблем. Ниже приведены способы устранения ошибки.

Методы исправления

Ошибки времени выполнения могут быть раздражающими и постоянными, но это не совсем безнадежно, существует возможность ремонта. Вот способы сделать это.

Если метод ремонта вам подошел, пожалуйста, нажмите кнопку upvote слева от ответа, это позволит другим пользователям узнать, какой метод ремонта на данный момент работает лучше всего.

Обратите внимание: ни ErrorVault.com, ни его авторы не несут ответственности за результаты действий, предпринятых при использовании любого из методов ремонта, перечисленных на этой странице — вы выполняете эти шаги на свой страх и риск.

Метод 1 — Закройте конфликтующие программы

Когда вы получаете ошибку во время выполнения, имейте в виду, что это происходит из-за программ, которые конфликтуют друг с другом. Первое, что вы можете сделать, чтобы решить проблему, — это остановить эти конфликтующие программы.

  • Откройте диспетчер задач, одновременно нажав Ctrl-Alt-Del. Это позволит вам увидеть список запущенных в данный момент программ.
  • Перейдите на вкладку «Процессы» и остановите программы одну за другой, выделив каждую программу и нажав кнопку «Завершить процесс».
  • Вам нужно будет следить за тем, будет ли сообщение об ошибке появляться каждый раз при остановке процесса.
  • Как только вы определите, какая программа вызывает ошибку, вы можете перейти к следующему этапу устранения неполадок, переустановив приложение.

Метод 2 — Обновите / переустановите конфликтующие программы

Использование панели управления

  • В Windows 7 нажмите кнопку «Пуск», затем нажмите «Панель управления», затем «Удалить программу».
  • В Windows 8 нажмите кнопку «Пуск», затем прокрутите вниз и нажмите «Дополнительные настройки», затем нажмите «Панель управления»> «Удалить программу».
  • Для Windows 10 просто введите «Панель управления» в поле поиска и щелкните результат, затем нажмите «Удалить программу».
  • В разделе «Программы и компоненты» щелкните проблемную программу и нажмите «Обновить» или «Удалить».
  • Если вы выбрали обновление, вам просто нужно будет следовать подсказке, чтобы завершить процесс, однако, если вы выбрали «Удалить», вы будете следовать подсказке, чтобы удалить, а затем повторно загрузить или использовать установочный диск приложения для переустановки. программа.

Использование других методов

  • В Windows 7 список всех установленных программ можно найти, нажав кнопку «Пуск» и наведя указатель мыши на список, отображаемый на вкладке. Вы можете увидеть в этом списке утилиту для удаления программы. Вы можете продолжить и удалить с помощью утилит, доступных на этой вкладке.
  • В Windows 10 вы можете нажать «Пуск», затем «Настройка», а затем — «Приложения».
  • Прокрутите вниз, чтобы увидеть список приложений и функций, установленных на вашем компьютере.
  • Щелкните программу, которая вызывает ошибку времени выполнения, затем вы можете удалить ее или щелкнуть Дополнительные параметры, чтобы сбросить приложение.

Метод 3 — Обновите программу защиты от вирусов или загрузите и установите последнюю версию Центра обновления Windows.

Заражение вирусом, вызывающее ошибку выполнения на вашем компьютере, необходимо немедленно предотвратить, поместить в карантин или удалить. Убедитесь, что вы обновили свою антивирусную программу и выполнили тщательное сканирование компьютера или запустите Центр обновления Windows, чтобы получить последние определения вирусов и исправить их.

Метод 4 — Переустановите библиотеки времени выполнения

Вы можете получить сообщение об ошибке из-за обновления, такого как пакет MS Visual C ++, который может быть установлен неправильно или полностью. Что вы можете сделать, так это удалить текущий пакет и установить новую копию.

  • Удалите пакет, выбрав «Программы и компоненты», найдите и выделите распространяемый пакет Microsoft Visual C ++.
  • Нажмите «Удалить» в верхней части списка и, когда это будет сделано, перезагрузите компьютер.
  • Загрузите последний распространяемый пакет от Microsoft и установите его.

Метод 5 — Запустить очистку диска

Вы также можете столкнуться с ошибкой выполнения из-за очень нехватки свободного места на вашем компьютере.

  • Вам следует подумать о резервном копировании файлов и освобождении места на жестком диске.
  • Вы также можете очистить кеш и перезагрузить компьютер.
  • Вы также можете запустить очистку диска, открыть окно проводника и щелкнуть правой кнопкой мыши по основному каталогу (обычно это C :)
  • Щелкните «Свойства», а затем — «Очистка диска».

Метод 6 — Переустановите графический драйвер

Если ошибка связана с плохим графическим драйвером, вы можете сделать следующее:

  • Откройте диспетчер устройств и найдите драйвер видеокарты.
  • Щелкните правой кнопкой мыши драйвер видеокарты, затем нажмите «Удалить», затем перезагрузите компьютер.

Метод 7 — Ошибка выполнения, связанная с IE

Если полученная ошибка связана с Internet Explorer, вы можете сделать следующее:

  1. Сбросьте настройки браузера.
    • В Windows 7 вы можете нажать «Пуск», перейти в «Панель управления» и нажать «Свойства обозревателя» слева. Затем вы можете перейти на вкладку «Дополнительно» и нажать кнопку «Сброс».
    • Для Windows 8 и 10 вы можете нажать «Поиск» и ввести «Свойства обозревателя», затем перейти на вкладку «Дополнительно» и нажать «Сброс».
  2. Отключить отладку скриптов и уведомления об ошибках.
    • В том же окне «Свойства обозревателя» можно перейти на вкладку «Дополнительно» и найти пункт «Отключить отладку сценария».
    • Установите флажок в переключателе.
    • Одновременно снимите флажок «Отображать уведомление о каждой ошибке сценария», затем нажмите «Применить» и «ОК», затем перезагрузите компьютер.

Если эти быстрые исправления не работают, вы всегда можете сделать резервную копию файлов и запустить восстановление на вашем компьютере. Однако вы можете сделать это позже, когда перечисленные здесь решения не сработают.

Другие языки:

How to fix Error program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)) — Error program_error_updating: Malwarebytes Anti-Malware has encountered a problem and needs to close. We are sorry for the inconvenience.
Wie beheben Fehler program_error_update (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host nicht gefunden)) — Fehler program_error_updating: Malwarebytes Anti-Malware hat ein Problem festgestellt und muss geschlossen werden. Wir entschuldigen uns für die Unannehmlichkeiten.
Come fissare Errore program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host non trovato)) — Error program_error_updating: Malwarebytes Anti-Malware ha riscontrato un problema e deve essere chiuso. Ci scusiamo per l’inconveniente.
Hoe maak je Fout program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host niet gevonden)) — Fout program_error_updating: Malwarebytes Anti-Malware heeft een probleem ondervonden en moet worden afgesloten. Excuses voor het ongemak.
Comment réparer Erreur program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 hôte introuvable)) — Erreur program_error_updating : Malwarebytes Anti-Malware a rencontré un problème et doit fermer. Nous sommes désolés du dérangement.
어떻게 고치는 지 오류 program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating(0 0 호스트를 찾을 수 없음)) — Error program_error_updating: Malwarebytes Anti-Malware에 문제가 발생해 닫아야 합니다. 불편을 끼쳐드려 죄송합니다.
Como corrigir o Erro program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host não encontrado)) — Erro program_error_updating: O Malwarebytes Anti-Malware encontrou um problema e precisa fechar. Lamentamos o inconveniente.
Hur man åtgärdar Fel program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 värd hittades inte)) — Fel program_error_updating: Malwarebytes Anti-Malware har stött på ett problem och måste stängas. Vi är ledsna för besväret.
Jak naprawić Błąd program_error_aktualizacja (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Nie znaleziono hosta)) — Błąd program_error_updating: Malwarebytes Anti-Malware napotkał problem i musi zostać zamknięty. Przepraszamy za niedogodności.
Cómo arreglar Error program_error_updating (Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host no encontrado)) — Error program_error_updating: Malwarebytes Anti-Malware ha detectado un problema y debe cerrarse. Lamentamos las molestias.

The Author Об авторе: Фил Харт является участником сообщества Microsoft с 2010 года. С текущим количеством баллов более 100 000 он внес более 3000 ответов на форумах Microsoft Support и создал почти 200 новых справочных статей в Technet Wiki.

Следуйте за нами: Facebook Youtube Twitter

Рекомендуемый инструмент для ремонта:

Этот инструмент восстановления может устранить такие распространенные проблемы компьютера, как синие экраны, сбои и замораживание, отсутствующие DLL-файлы, а также устранить повреждения от вредоносных программ/вирусов и многое другое путем замены поврежденных и отсутствующих системных файлов.

ШАГ 1:

Нажмите здесь, чтобы скачать и установите средство восстановления Windows.

ШАГ 2:

Нажмите на Start Scan и позвольте ему проанализировать ваше устройство.

ШАГ 3:

Нажмите на Repair All, чтобы устранить все обнаруженные проблемы.

СКАЧАТЬ СЕЙЧАС

Совместимость

Требования

1 Ghz CPU, 512 MB RAM, 40 GB HDD
Эта загрузка предлагает неограниченное бесплатное сканирование ПК с Windows. Полное восстановление системы начинается от $19,95.

ID статьи: ACX05874RU

Применяется к: Windows 10, Windows 8.1, Windows 7, Windows Vista, Windows XP, Windows 2000

Совет по увеличению скорости #23

Устранение неполадок, связанных с зависанием Windows при выключении:

Если ваша Windows слишком долго отключается, вы всегда можете что-то с этим сделать. Устраните проблему, попробовав переустановить сетевые драйверы, отключив определенные аппаратные устройства, проверив жесткий диск и закрыв некоторые программы перед выключением.

Нажмите здесь, чтобы узнать о другом способе ускорения работы ПК под управлением Windows

Icon Ex Номер ошибки: Ошибка program_error_updating
Название ошибки: Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)
Описание ошибки: Ошибка program_error_updating: Возникла ошибка в приложении Malwarebytes Anti-Malware. Приложение будет закрыто. Приносим извинения за неудобства.
Разработчик: Malwarebytes Corporation
Программное обеспечение: Malwarebytes Anti-Malware
Относится к: Windows XP, Vista, 7, 8, 10, 11

Проверка «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)»

Обычно люди ссылаются на «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)» как на ошибку времени выполнения (ошибку). Разработчики Malwarebytes Corporation обычно оценивают Malwarebytes Anti-Malware с помощью серии модулей для удаления ошибок в соответствии с отраслевыми стандартами. Тем не менее, возможно, что иногда ошибки, такие как ошибка program_error_updating, не устранены, даже на этом этапе.

Некоторые пользователи могут столкнуться с сообщением «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)» при использовании Malwarebytes Anti-Malware. В случае обнаруженной ошибки program_error_updating клиенты могут сообщить о наличии проблемы Malwarebytes Corporation по электронной почте или сообщать об ошибках. Затем Malwarebytes Corporation исправит ошибки и подготовит файл обновления для загрузки. Чтобы исправить такие ошибки program_error_updating ошибки, устанавливаемое обновление программного обеспечения будет выпущено от поставщика программного обеспечения.

Что запускает ошибку времени выполнения program_error_updating?

В большинстве случаев вы увидите «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)» во время загрузки Malwarebytes Anti-Malware. Три распространенные причины, по которым ошибки во время выполнения, такие как всплывающее окно ошибки program_error_updating:

Ошибка program_error_updating Crash — ошибка program_error_updating блокирует любой вход, и это может привести к сбою машины. Если Malwarebytes Anti-Malware не может обработать данный ввод, или он не может получить требуемый вывод, это обычно происходит.

Утечка памяти «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)» — при утечке памяти Malwarebytes Anti-Malware это может привести к медленной работе устройства из-за нехватки системных ресурсов. Возможные искры включают сбой освобождения, который произошел в программе, отличной от C ++, когда поврежденный код сборки неправильно выполняет бесконечный цикл.

Ошибка program_error_updating Logic Error — «логическая ошибка», как говорят, генерируется, когда программное обеспечение получает правильный ввод, но генерирует неверный вывод. Это может произойти, когда исходный код Malwarebytes Corporation имеет уязвимость в отношении передачи данных.

Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) проблемы часто являются результатом отсутствия, удаления или случайного перемещения файла из исходного места установки Malwarebytes Anti-Malware. Как правило, решить проблему позволяет получение новой копии файла Malwarebytes Corporation, которая не содержит вирусов. Помимо прочего, в качестве общей меры по профилактике и очистке мы рекомендуем использовать очиститель реестра для очистки любых недопустимых записей файлов, расширений файлов Malwarebytes Corporation или разделов реестра, что позволит предотвратить появление связанных с ними сообщений об ошибках.

Типичные ошибки Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)

Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) Проблемы, связанные с Malwarebytes Anti-Malware:

  • «Ошибка приложения Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found).»
  • «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) не является приложением Win32.»
  • «Извините, Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) столкнулся с проблемой. «
  • «Не удается найти Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)»
  • «Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) не найден.»
  • «Ошибка запуска программы: Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found).»
  • «Файл Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) не запущен.»
  • «Отказ Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found).»
  • «Ошибка в пути к программному обеспечению: Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found). «

Проблемы Malwarebytes Anti-Malware Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) возникают при установке, во время работы программного обеспечения, связанного с Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found), во время завершения работы или запуска или менее вероятно во время обновления операционной системы. Выделение при возникновении ошибок Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) имеет первостепенное значение для поиска причины проблем Malwarebytes Anti-Malware и сообщения о них вMalwarebytes Corporation за помощью.

Истоки проблем Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found)

Эти проблемы Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) создаются отсутствующими или поврежденными файлами Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found), недопустимыми записями реестра Malwarebytes Anti-Malware или вредоносным программным обеспечением.

В первую очередь, проблемы Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) создаются:

  • Недопустимый Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) или поврежденный раздел реестра.
  • Загрязненный вирусом и поврежденный Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found).
  • Malwarebytes Anti-Malware Program_Error_Updating (0 0 Host Not Found) злонамеренно или ошибочно удален другим программным обеспечением (кроме Malwarebytes Anti-Malware).
  • Другая программа находится в конфликте с Malwarebytes Anti-Malware и его общими файлами ссылок.
  • Поврежденная загрузка или неполная установка программного обеспечения Malwarebytes Anti-Malware.

Продукт Solvusoft

Загрузка
WinThruster 2022 — Проверьте свой компьютер на наличие ошибок.

Совместима с Windows 2000, XP, Vista, 7, 8, 10 и 11

Установить необязательные продукты — WinThruster (Solvusoft) | Лицензия | Политика защиты личных сведений | Условия | Удаление

Click here follow the steps to fix Malwarebytes Program_error_updating and related errors.

Instructions

 

To Fix (Malwarebytes Program_error_updating) error you need to
follow the steps below:

Step 1:

 
Download
(Malwarebytes Program_error_updating) Repair Tool
   

Step 2:

 
Click the «Scan» button
   

Step 3:

 
Click ‘Fix All‘ and you’re done!
 

Compatibility:
Windows 7, 8, Vista, XP

Download Size: 6MB
Requirements: 300 MHz Processor, 256 MB Ram, 22 MB HDD

Limitations:
This download is a free evaluation version. To unlock all features and tools, a purchase is required.

Malwarebytes Program_error_updating Error Codes are caused in one way or another by misconfigured system files
in your windows operating system.

If you have Malwarebytes Program_error_updating errors then we strongly recommend that you

Download (Malwarebytes Program_error_updating) Repair Tool.

This article contains information that shows you how to fix
Malwarebytes Program_error_updating
both
(manually) and (automatically) , In addition, this article will help you troubleshoot some common error messages related to Malwarebytes Program_error_updating error code that you may receive.

Note:
This article was updated on 2023-02-04 and previously published under WIKI_Q210794

Contents

  •   1. What is Malwarebytes Program_error_updating error?
  •   2. What causes Malwarebytes Program_error_updating error?
  •   3. How to easily fix Malwarebytes Program_error_updating errors

What is Malwarebytes Program_error_updating error?

The Malwarebytes Program_error_updating error is the Hexadecimal format of the error caused. This is common error code format used by windows and other windows compatible software and driver vendors.

This code is used by the vendor to identify the error caused. This Malwarebytes Program_error_updating error code has a numeric error number and a technical description. In some cases the error may have more parameters in Malwarebytes Program_error_updating format .This additional hexadecimal code are the address of the memory locations where the instruction(s) was loaded at the time of the error.

What causes Malwarebytes Program_error_updating error?

The Malwarebytes Program_error_updating error may be caused by windows system files damage. The corrupted system files entries can be a real threat to the well being of your computer.

There can be many events which may have resulted in the system files errors. An incomplete installation, an incomplete uninstall, improper deletion of applications or hardware. It can also be caused if your computer is recovered from a virus or adware/spyware
attack or by an improper shutdown of the computer. All the above actives
may result in the deletion or corruption of the entries in the windows
system files. This corrupted system file will lead to the missing and wrongly
linked information and files needed for the proper working of the
application.

How to easily fix Malwarebytes Program_error_updating error?

There are two (2) ways to fix Malwarebytes Program_error_updating Error:

Advanced Computer User Solution (manual update):

1) Start your computer and log on as an administrator.

2) Click the Start button then select All Programs, Accessories, System Tools, and then click System Restore.

3) In the new window, select «Restore my computer to an earlier time» option and then click Next.

4) Select the most recent system restore point from the «On this list, click a restore point» list, and then click Next.

5) Click Next on the confirmation window.

6) Restarts the computer when the restoration is finished.

Novice Computer User Solution (completely automated):

1) Download (Malwarebytes Program_error_updating) repair utility.

2) Install program and click Scan button.

3) Click the Fix Errors button when scan is completed.

4) Restart your computer.

How does it work?

This tool will scan and diagnose, then repairs, your PC with patent
pending technology that fix your windows operating system registry
structure.
basic features: (repairs system freezing and rebooting issues , start-up customization , browser helper object management , program removal management , live updates , windows structure repair.)

OK, having just recently (with forum help — thanks to essexboy  :)) cleaned up my main PC I thought I’d check out another of my machines. I haven’t used this machine (a Dell Dimension 5150, Windows XP SP2) for any serious work in a while, and its only current function is to act as the connection point for my router (Sky Netgear). I attempted to update the machine’s Avast license, which had just expired, but found that I could not connect (I also can’t get on the Avast website or forum from that machine). When I did a MBAM scan it found 40 items, but on quarantining them I found I could no longer connect to the internet at all (my other computers are unaffected).

Here is the MBAM Quick Scan log:

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6705

Windows 5.1.2600 Service Pack 2
Internet Explorer 7.0.5346.5

21/06/2011 18:20:22
mbam-log-2011-06-21 (18-20-22).txt

Scan type: Quick scan
Objects scanned: 178748
Time elapsed: 51 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 19
Registry Values Infected: 0
Registry Data Items Infected: 10
Folders Infected: 2
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOTAppID{127DF9B4-D75D-44A6-AF78-8C3A8CEB03DB} (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{4D25F926-B9FE-4682-BF72-8AB8210D6D75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{A9AAE1AB-9688-42C5-86F5-C12F6B9015AD} (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTTypeLib{DF901432-1B9F-4F5B-9E56-301C553F9095} (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTInterface{43382522-A846-46F4-AC57-1F71AE6E1086} (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTACM.ACMFactory.1 (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTACM.ACMFactory (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{E856B973-45FD-4559-8F82-EAB539144667} (Adware.Gdown) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTTypeLib{DF058C45-CD18-453e-8745-5A77F60722AB} (Adware.Gdown) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTInterface{B5A33C35-7298-4D15-8753-A2E851E2EAB3} (Adware.Gdown) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTGTDOWNDE.GTAutoFixDLCtrl.1 (Adware.Gdown) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTGTDOWNDE.GTAutoFixDLCtrl (Adware.Gdown) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTMyWaySearchAssistantDE.Auxiliary (Adware.MyWaySearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTMyWaySearchAssistantDE.Auxiliary.1 (Adware.MyWaySearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTWUSN.1 (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTAppIDACM.DLL (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREWhenUSave (Adware.WhenU) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftMSSMGR (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallSaveNow (Adware.WhenU) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersNameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersNameServer (Trojan.DNSChanger) -> Bad: (85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{2810EB22-763D-4D0C-9450-64BBD1758685}DhcpNameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{28CADAA1-7656-44ED-8F2A-929890F916EE}NameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{28CADAA1-7656-44ED-8F2A-929890F916EE}DhcpNameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{483891FD-2711-460A-95A6-1CB900F62714}NameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{483891FD-2711-460A-95A6-1CB900F62714}DhcpNameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{A0F30003-1275-436D-854A-20A0F03D3478}NameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{F84EAB08-51AD-4372-9ED3-688F2F999D50}NameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{F84EAB08-51AD-4372-9ED3-688F2F999D50}DhcpNameServer (Trojan.DNSChanger) -> Bad: (85.255.115.36,85.255.112.132) Good: () -> Quarantined and deleted successfully.

Folders Infected:
c:program filesSave (Adware.WhenU) -> Quarantined and deleted successfully.
c:documents and settingsEddiestart menuProgramsWhenU (Adware.WhenU) -> Quarantined and deleted successfully.

Files Infected:
c:WINDOWSsystem32gtdownde_87.ocx (Adware.Gdown) -> Quarantined and deleted successfully.
c:documents and settingsinternetlocal settingsTempD.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:program filesSaveffext.mod (Adware.WhenU) -> Quarantined and deleted successfully.
c:program filesSavesave.htm (Adware.WhenU) -> Quarantined and deleted successfully.
c:documents and settingsEddiestart menuProgramsWhenUcustomer support.lnk (Adware.WhenU) -> Quarantined and deleted successfully.
c:documents and settingsEddiestart menuProgramsWhenUlearn more about whenu save.url (Adware.WhenU) -> Quarantined and deleted successfully.
c:documents and settingsEddiestart menuProgramsWhenUlearn more about whenu savenow.url (Adware.WhenU) -> Quarantined and deleted successfully.
c:documents and settingsEddiestart menuProgramsWhenUuninstall instructions.lnk (Adware.WhenU) -> Quarantined and deleted successfully.
c:documents and settingsEddiestart menuProgramsWhenUwhenu.com website.url (Adware.WhenU) -> Quarantined and deleted successfully.


The OTS log is also attached (I restored all quarantined items before running OTS).

I should add that I have also been unable to update MBAM via the net — I had to physically transfer the updated rules.ref file from my clean machine to the infected one. I keep getting an error with the following format:

PROGRAM_ERROR_UPDATING(11001, 0, Host not found)
No such host is known.

Googling this took me to the MBAM forum, which advises restoring the router to factory settings. I haven’t attempted this yet, as I thought it best to just post the logs before doing anything else. It seems, from what I’ve read, that the culprit is most likely the DNSChanger Trojan.

Best,
Christopher

  • #1

Hi, Running W7 sp1 Home premium 32 bit machine…

We have dowloaded Malware Bytes to start getting the logs for analysis but the program says 75 days out of date and the update fails with the following message

Program error updating (0,0,metadata integrity failure)

Any thoughts on how to get the update to stick? We have uninstalled and reinstalled MalwareBytes and also turned off the antivirus during the update. It gets to 100% and then shows the message.

Thanks in advance! cheers, DL

  • #2

Please, observe following rules:

  • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
  • If you’re stuck, or you’re not sure about certain step, always ask before doing anything else.
  • Please refrain from running tools or applying updates other than those I suggest.
  • Never run more than one scan at a time.
  • Keep updating me regarding your computer behavior, good, or bad.
  • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I’ll certainly let you know.
  • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
  • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

========================================================

Is this a different computer than in your other topics?

If so, you know the drill.

Please, complete all steps listed here: https://www.techspot.com/community/…lware-removal-preliminary-instructions.58138/
Make sure, you PASTE all logs. If some log exceeds 50,000 characters post limit, split it between couple of replies.
Attached logs won’t be reviewed.
Complete as many steps as you can.

  • #3

Broni,
I am unable to update MalwareBytes on this machine for some reason, so I don’t trust the logs.
I have attached them below, in case there is an issue…this computer is networked with another with a bug that we fixed earlier. Logs below

Malware log (not sure if it is reliable as the database didnt update and it said it is 75 days out of date)

Malwarebytes Anti-Malware (Trial) 1.61.0.1400
www.malwarebytes.org
Database version: v2012.06.04.04
Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 9.0.8112.16421
Owner :: WEST [administrator]
Protection: Enabled
18/06/2012 7:38:51 PM
mbam-log-2012-06-18 (19-38-51).txt
Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 278123
Time elapsed: 52 minute(s), 34 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
(end)
GMER log

GMER 1.0.15.15641 — http://www.gmer.net
Rootkit scan 2012-06-18 22:16:58
Windows 6.1.7601 Service Pack 1 Harddisk0DR0 -> DeviceIdeIdeDeviceP2T0L0-2 WDC_WD3200AAJS-22L7A0 rev.01.03E01
Running: pu82zy4i.exe; Driver: C:UsersOwnerAppDataLocalTemppgldqpow.sys

—- Kernel code sections — GMER 1.0.15 —-
.text ntkrnlpa.exe!ZwRollbackEnlistment + 140D 82C8B3C9 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 82CC4D52 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, …] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
? System32drivershaosr.sys The system cannot find the path specified. !
—- User code sections — GMER 1.0.15 —-
.text C:Windowssystem32svchost.exe[772] kernel32.dll!CreateProcessW + 2 76D3204F 8 Bytes JMP 5FF4E43F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] kernel32.dll!CreateProcessA + 2 76D32084 8 Bytes JMP 5FF4E2E3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] kernel32.dll!LoadLibraryExW + 2 76D7507B 9 Bytes JMP 5FF4DD6F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] ADVAPI32.dll!CreateProcessAsUserA + 2 777B253A 8 Bytes JMP 5FF4E853 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] ADVAPI32.dll!CreateProcessWithLogonW + 2 777B52EB 6 Bytes JMP 5FF4E59B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[772] SHELL32.dll!SHCreateProcessAsUserW 761C6710 8 Bytes JMP 5FF4E9AD C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] kernel32.dll!CreateProcessW + 2 76D3204F 5 Bytes JMP 5FF4E440 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] kernel32.dll!CreateProcessA + 2 76D32084 5 Bytes JMP 5FF4E2E4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] kernel32.dll!LoadLibraryExW + 2 76D7507B 4 Bytes JMP 5FF4DD70 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] kernel32.dll!LoadLibraryExW + 7 76D75080 4 Bytes JMP 0767E115
.text C:WindowsSystem32svchost.exe[880] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] ADVAPI32.dll!CreateProcessAsUserA + 2 777B253A 5 Bytes JMP 5FF4E854 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] ADVAPI32.dll!CreateProcessWithLogonW + 2 777B52EB 6 Bytes JMP 5FF4E59C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[880] SHELL32.dll!SHCreateProcessAsUserW 761C6710 8 Bytes JMP 5FF4E9AE C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] kernel32.dll!CreateProcessW 76D3204D 7 Bytes JMP 5FF4E43F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] kernel32.dll!CreateProcessA 76D32082 7 Bytes JMP 5FF4E2E3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] kernel32.dll!LoadLibraryExW 76D75079 6 Bytes JMP 5FF4DD6F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] kernel32.dll!GetProcAddress 76D7CC94 6 Bytes JMP 5FF4DECB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] kernel32.dll!FreeLibrary 76D7EF67 6 Bytes JMP 5FF4E027 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] ADVAPI32.dll!CreateProcessAsUserW 7777C592 6 Bytes JMP 5FF4E6F7 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] ADVAPI32.dll!CreateProcessAsUserA 777B2538 7 Bytes JMP 5FF4E853 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1100] ADVAPI32.dll!CreateProcessWithLogonW 777B52E9 8 Bytes JMP 5FF4E59B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] kernel32.dll!CreateProcessW + 2 76D3204F 8 Bytes JMP 5FF4E43F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] kernel32.dll!CreateProcessA + 2 76D32084 8 Bytes JMP 5FF4E2E3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] kernel32.dll!LoadLibraryExW + 2 76D7507B 9 Bytes JMP 5FF4DD6F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] ADVAPI32.dll!CreateProcessAsUserA + 2 777B253A 8 Bytes JMP 5FF4E853 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1196] ADVAPI32.dll!CreateProcessWithLogonW + 2 777B52EB 6 Bytes JMP 5FF4E59B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] kernel32.dll!CreateProcessW + 2 76D3204F 5 Bytes JMP 5FF4E440 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] kernel32.dll!CreateProcessA + 2 76D32084 5 Bytes JMP 5FF4E2E4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] kernel32.dll!LoadLibraryExW + 2 76D7507B 4 Bytes JMP 5FF4DD70 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] kernel32.dll!LoadLibraryExW + 7 76D75080 4 Bytes JMP 0767E115
.text C:Windowssystem32svchost.exe[1392] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] ADVAPI32.dll!CreateProcessAsUserA + 2 777B253A 5 Bytes JMP 5FF4E854 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1392] ADVAPI32.dll!CreateProcessWithLogonW + 2 777B52EB 6 Bytes JMP 5FF4E59C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] kernel32.dll!CreateProcessW 76D3204D 5 Bytes JMP 5FF4E440 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] kernel32.dll!CreateProcessA 76D32082 5 Bytes JMP 5FF4E2E4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] kernel32.dll!LoadLibraryExW 76D75079 5 Bytes JMP 5FF4DD70 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] ADVAPI32.dll!CreateProcessAsUserA 777B2538 5 Bytes JMP 5FF4E854 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[1488] ADVAPI32.dll!CreateProcessWithLogonW 777B52E9 5 Bytes JMP 5FF4E59C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] kernel32.dll!CreateProcessW 76D3204D 7 Bytes JMP 5FF4E43F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] kernel32.dll!CreateProcessA 76D32082 7 Bytes JMP 5FF4E2E3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] kernel32.dll!LoadLibraryExW 76D75079 6 Bytes JMP 5FF4DD6F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] kernel32.dll!GetProcAddress 76D7CC94 6 Bytes JMP 5FF4DECB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] kernel32.dll!FreeLibrary 76D7EF67 6 Bytes JMP 5FF4E027 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] ADVAPI32.dll!CreateProcessAsUserW 7777C592 6 Bytes JMP 5FF4E6F7 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] ADVAPI32.dll!CreateProcessAsUserA 777B2538 7 Bytes JMP 5FF4E853 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] ADVAPI32.dll!CreateProcessWithLogonW 777B52E9 8 Bytes JMP 5FF4E59B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[2820] SHELL32.dll!SHCreateProcessAsUserW 761C6710 8 Bytes JMP 5FF4E9AF C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] kernel32.dll!CreateProcessW 76D3204D 7 Bytes JMP 5FF4E43F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] kernel32.dll!CreateProcessA 76D32082 7 Bytes JMP 5FF4E2E3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] kernel32.dll!LoadLibraryExW 76D75079 6 Bytes JMP 5FF4DD6F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] kernel32.dll!GetProcAddress 76D7CC94 6 Bytes JMP 5FF4DECB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] kernel32.dll!FreeLibrary 76D7EF67 6 Bytes JMP 5FF4E027 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] ADVAPI32.dll!CreateProcessAsUserW 7777C592 6 Bytes JMP 5FF4E6F7 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] ADVAPI32.dll!CreateProcessAsUserA 777B2538 7 Bytes JMP 5FF4E853 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Windowssystem32svchost.exe[3060] ADVAPI32.dll!CreateProcessWithLogonW 777B52E9 8 Bytes JMP 5FF4E59B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] kernel32.dll!CreateProcessW + 2 76D3204F 5 Bytes JMP 5FF4E440 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] kernel32.dll!CreateProcessA + 2 76D32084 5 Bytes JMP 5FF4E2E4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] kernel32.dll!LoadLibraryExW + 2 76D7507B 4 Bytes JMP 5FF4DD70 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] kernel32.dll!LoadLibraryExW + 7 76D75080 4 Bytes JMP 0767E115
.text C:WindowsSystem32svchost.exe[5332] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] ADVAPI32.dll!CreateProcessAsUserA + 2 777B253A 5 Bytes JMP 5FF4E854 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] ADVAPI32.dll!CreateProcessWithLogonW + 2 777B52EB 6 Bytes JMP 5FF4E59C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:WindowsSystem32svchost.exe[5332] SHELL32.dll!SHCreateProcessAsUserW 761C6710 8 Bytes JMP 5FF4E9AE C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!CreateProcessW + 2 76D3204F 5 Bytes JMP 5FF4E440 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!CreateProcessA + 2 76D32084 5 Bytes JMP 5FF4E2E4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!VirtualProtect + 2 76D72BCF 4 Bytes JMP 5FF53B4C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!VirtualProtect + 7 76D72BD4 4 Bytes JMP 0767BC69
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!LoadLibraryExW + 2 76D7507B 4 Bytes JMP 5FF4DD70 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!LoadLibraryExW + 7 76D75080 4 Bytes JMP 0767E115
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!GetProcAddress 76D7CC94 5 Bytes JMP 5FF4DECC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!FreeLibrary 76D7EF67 5 Bytes JMP 5FF4E028 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!DebugActiveProcess + 2 76DB738E 8 Bytes JMP 5FF544D0 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!VirtualProtectEx + 2 76DBFD53 4 Bytes JMP 5FF539F0 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] kernel32.dll!VirtualProtectEx + 7 76DBFD58 4 Bytes JMP 076C8DED
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SetUserObjectSecurity + 2 77252287 6 Bytes JMP 5FF53893 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!BroadcastSystemMessageExW + 2 77254257 8 Bytes JMP 5FF504E3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!BroadcastSystemMessageW + 2 77257CBA 7 Bytes JMP 5FF5022B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!PostThreadMessageA + 2 7725AD0B 8 Bytes JMP 5FF4F337 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendMessageA + 2 7725AD62 7 Bytes JMP 5FF4EDC7 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!PostMessageA + 2 7725B448 6 Bytes JMP 5FF4F07F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendNotifyMessageW + 2 7725C88C 6 Bytes JMP 5FF4FCBB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SetWindowsHookExW + 2 7725E30E 8 Bytes JMP 5FF53E03 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendMessageTimeoutW + 2 7725E45B 8 Bytes JMP 5FF4FA03 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!PostThreadMessageW + 2 7725EEFE 6 Bytes JMP 5FF4F493 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendMessageCallbackW + 2 77262F7D 8 Bytes JMP 5FF4F74B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!PostMessageW + 2 7726447D 7 Bytes JMP 5FF4F1DB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendMessageW + 2 7726553B 7 Bytes JMP 5FF4EF23 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendNotifyMessageA + 2 7727493E 6 Bytes JMP 5FF4FB5F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendDlgItemMessageW + 2 772770DA 7 Bytes JMP 5FF4FF73 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendDlgItemMessageA + 2 77277243 7 Bytes JMP 5FF4FE17 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!OpenClipboard + 2 77284480 7 Bytes JMP 5FF4D95B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SetWindowsHookExA + 2 77286D0E 8 Bytes JMP 5FF53CA7 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendMessageTimeoutA + 2 77286DAB 8 Bytes JMP 5FF4F8A7 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SetWindowsHookA + 2 7729B643 8 Bytes JMP 5FF53F5F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SetWindowsHookW + 2 7729B65E 8 Bytes JMP 5FF540BB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!EndTask + 2 7729FD68 6 Bytes JMP 5FF4EC6B C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!ExitWindowsEx + 2 772A06C9 6 Bytes JMP 5FF54FB3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!BroadcastSystemMessageExA + 2 772B3B25 8 Bytes JMP 5FF50387 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!BroadcastSystemMessage + 2 772B3B4C 7 Bytes JMP 5FF500CF C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] USER32.dll!SendMessageCallbackA + 2 772B3E8D 8 Bytes JMP 5FF4F5EF C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!EnumDependentServicesW 77771E3A 7 Bytes JMP 5FF52016 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!StartServiceW 77777974 5 Bytes JMP 5FF513DC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!QueryServiceStatusEx 7777798C 5 Bytes JMP 5FF51694 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!SetFileSecurityW 777779C3 5 Bytes JMP 5FF5306C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!SetSecurityInfo + 2 77779EE1 6 Bytes JMP 5FF53480 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!SetNamedSecurityInfoW + 2 77779FE4 6 Bytes JMP 5FF53738 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!EnumServicesStatusExW 7777B466 7 Bytes JMP 5FF52AF6 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!QueryServiceConfigW 7777B537 5 Bytes JMP 5FF51AA8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!CreateProcessAsUserW 7777C592 5 Bytes JMP 5FF4E6F8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!OpenServiceW 7777CA4C 5 Bytes JMP 5FF50FC8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!OpenSCManagerW 7777CA64 5 Bytes JMP 5FF50A58 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!QueryServiceStatus 77782A86 5 Bytes JMP 5FF51538 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!OpenSCManagerA 77782BD8 5 Bytes JMP 5FF508FC C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!OpenServiceA 77782BF0 5 Bytes JMP 5FF50E6C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!AdjustTokenPrivileges 7778418E 5 Bytes JMP 5FF52DB4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!SetKernelObjectSecurity 77784645 5 Bytes JMP 5FF531C8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!CreateServiceW 7779712C 5 Bytes JMP 5FF50D10 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!ControlService 77797144 5 Bytes JMP 5FF517F0 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!DeleteService 7779715C 5 Bytes JMP 5FF51124 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!QueryServiceConfigA 77799A4F 5 Bytes JMP 5FF5194C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!EnumServicesStatusExA 7779A3E2 7 Bytes JMP 5FF5299A C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!CreateProcessAsUserA + 2 777B253A 5 Bytes JMP 5FF4E854 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!ChangeServiceConfig2A + 2 777B30CA 9 Bytes JMP 5FF5242C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!ChangeServiceConfig2W + 2 777B30DA 9 Bytes JMP 5FF52588 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!ChangeServiceConfigA + 2 777B30EA 9 Bytes JMP 5FF52174 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!ChangeServiceConfigW + 2 777B30FA 9 Bytes JMP 5FF522D0 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!CreateServiceA + 2 777B315A 9 Bytes JMP 5FF50BB4 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!QueryServiceConfig2A + 2 777B33EB 9 Bytes JMP 5FF51C04 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!QueryServiceConfig2W + 2 777B33FB 9 Bytes JMP 5FF51D60 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!SetServiceObjectSecurity + 2 777B3535 9 Bytes JMP 5FF53324 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!StartServiceA + 2 777B3545 9 Bytes JMP 5FF51280 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!CreateProcessWithLogonW + 2 777B52EB 6 Bytes JMP 5FF4E59C C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!InitiateSystemShutdownW + 2 777CDA6F 6 Bytes JMP 5FF548E8 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!InitiateSystemShutdownExW + 2 777CDB3C 6 Bytes JMP 5FF54BA0 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!AbortSystemShutdownW + 2 777CDD62 7 Bytes JMP 5FF54E58 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!EnumServicesStatusA 777D2021 7 Bytes JMP 5FF526E2 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!EnumDependentServicesA 777D2104 7 Bytes JMP 5FF51EBA C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ADVAPI32.dll!EnumServicesStatusW + 2 777D2223 5 Bytes JMP 5FF52840 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ole32.dll!CoGetClassObject + 2 771254AF 8 Bytes JMP 5FF4D3EB C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ole32.dll!CoInitializeEx + 2 771309AF 6 Bytes JMP 5FF4D133 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ole32.dll!CoCreateInstanceEx + 2 77139D50 7 Bytes JMP 5FF4D28F C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ole32.dll!CoGetInstanceFromFile + 2 771B340D 8 Bytes JMP 5FF4D547 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
.text C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] ole32.dll!CoGetInstanceFromIStorage + 2 771D0F09 8 Bytes JMP 5FF4D6A3 C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
—- User IAT/EAT — GMER 1.0.15 —-
IAT C:Program FilesCACA Internet Security Suiteccprovep.exe[6916] @ C:Windowssystem32ole32.dll [USER32.dll!SetWindowsHookExW] [5FF53E04] C:Windowssystem32UmxSbxw.dll (User mode executive module DLL/CA)
—- Devices — GMER 1.0.15 —-
Device DriverACPI_HAL Device0000046 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)
AttachedDevice Drivervolmgr DeviceHarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice Drivervolmgr DeviceHarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice Drivervolmgr DeviceHarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice Drivervolmgr DeviceHarddiskVolume4 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice Drivervolmgr DeviceHarddiskVolume5 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
—- EOF — GMER 1.0.15 —-

  • #4

DDS log

.
DDS (Ver_2011-08-26.01) — NTFSx86
Internet Explorer: 9.0.8112.16421
Run by Owner at 22:18:23 on 2012-06-18
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.61.1033.18.2013.885 [GMT 8:00]
.
AV: CA Anti-Virus Plus *Disabled/Updated* {57B5C44D-AAB5-DBC9-741B-542BE5A132EA}
SP: CA Anti-Virus Plus *Disabled/Updated* {ECD425A9-8C8F-D447-4EAB-6F599E267857}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
FW: CA Personal Firewall *Enabled* {6F8E4568-E0DA-DA91-5F44-FD1E1B727591}
.
============== Running Processes ===============
.
C:Windowssystem32wininit.exe
C:Windowssystem32lsm.exe
C:Windowssystem32svchost.exe -k DcomLaunch
C:Windowssystem32svchost.exe -k RPCSS
C:WindowsSystem32svchost.exe -k LocalServiceNetworkRestricted
C:WindowsSystem32svchost.exe -k LocalSystemNetworkRestricted
C:Windowssystem32svchost.exe -k netsvcs
C:Windowssystem32svchost.exe -k LocalService
C:Windowssystem32svchost.exe -k NetworkService
C:WindowsSystem32spoolsv.exe
C:Windowssystem32svchost.exe -k LocalServiceNoNetwork
C:Program FilesApplication UpdaterApplicationUpdater.exe
C:Program FilesCACA Internet Security SuiteCA Anti-Virus Pluscaamsvc.exe
C:Program FilesCACA Internet Security SuiteCA Anti-Virus Plusisafe.exe
C:Windowssystem32taskhost.exe
C:Program FilesCACA Internet Security Suiteccschedulersvc.exe
C:Windowssystem32Dwm.exe
C:WindowsExplorer.EXE
C:Program FilesCAPCPitstopScheduleService.exe
C:Program FilesMicrosoft Application Virtualization Clientsftvsa.exe
C:Windowssystem32svchost.exe -k imgsvc
C:Program FilesCASharedComponentsTMEngineUmxEngine.exe
C:Program FilesCommon FilesMicrosoft SharedWindows LiveWLIDSVC.EXE
C:Program FilesCACA Internet Security SuiteccEvtMgr.exe
C:Program FilesMicrosoft Application Virtualization Clientsftlist.exe
C:Program FilesCommon FilesMicrosoft SharedWindows LiveWLIDSvcM.exe
C:Program FilesCommon FilesMicrosoft SharedVirtualization HandlerCVHSVC.EXE
C:Windowssystem32svchost.exe -k LocalServiceAndNoImpersonation
C:Windowssystem32svchost.exe -k NetworkServiceNetworkRestricted
C:Program FilesMalwarebytes’ Anti-Malwarembamservice.exe
C:Program FilesCACA Internet Security Suiteccprovsp.exe
C:Program FileseMachinesHotkey UtilityHotkeyUtility.exe
C:Program FilesRealtekAudioHDARtHDVCpl.exe
C:Program FilesCACA Internet Security Suitecasc.exe
C:WindowsSystem32spooldriversw32x863CNAP2LAK.EXE
C:Windowssystem32spoolDRIVERSW32X863CNAP2RPK.EXE
C:Windowssystem32spoolDRIVERSW32X863CNAC9SWK.EXE
C:Windowssystem32mdmcls32.exe
C:Windowssystem32SearchIndexer.exe
C:WindowsSystem32svchost.exe -k LocalServicePeerNet
C:Program FilesWindows Media Playerwmpnetwk.exe
C:Program FilesCACA Internet Security Suiteccprovep.exe
C:Windowssystem32wbemwmiprvse.exe
C:Windowssystem32SearchProtocolHost.exe
C:Windowssystem32SearchFilterHost.exe
C:Windowssystem32DllHost.exe
C:Windowssystem32DllHost.exe
C:Windowssystem32conhost.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.iinet.net.au/index.html
uDefault_Page_URL = hxxp://emachines.msn.com
uSearch Page =
uSearch Bar =
mDefault_Page_URL = hxxp://emachines.msn.com
mStart Page = hxxp://www.bigseekpro.com/pdfcreator1/{B50E16FD-C2E6-4036-A9A0-1583447D01F1}
uURLSearchHooks: pdfforge Toolbar: {b922d405-6d13-4a2b-ae89-08a030da4402} — c:program filespdfforge toolbarie5.8pdfforgeToolbarIE.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} — c:program filescommon filesadobeacrobatactivexAcroIEHelperShim.dll
BHO: CA Anti-Phishing Toolbar Helper: {45011cf5-e4a9-4f13-9093-f30a784eb9b2} — c:program filescaca internet security suiteca anti-phishingtoolbarcaIEToolbar.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} — c:program filescommon filesmicrosoft sharedwindows liveWindowsLiveLogin.dll
BHO: pdfforge Toolbar: {b922d405-6d13-4a2b-ae89-08a030da4402} — c:program filespdfforge toolbarie5.8pdfforgeToolbarIE.dll
TB: CA Anti-Phishing Toolbar: {0123b506-0ad9-43aa-b0cf-916c122ad4c5} — c:program filescaca internet security suiteca anti-phishingtoolbarcaIEToolbar.dll
TB: pdfforge Toolbar: {b922d405-6d13-4a2b-ae89-08a030da4402} — c:program filespdfforge toolbarie5.8pdfforgeToolbarIE.dll
TB: {10134636-E7AF-4AC5-A1DC-C7C44BB97D81} — No File
mRun: [Hotkey Utility] c:program filesemachineshotkey utilityHotkeyUtility.exe
mRun: [RtHDVCpl] c:program filesrealtekaudiohdaRtHDVCpl.exe -s
mRun: [cctray] «c:program filescaca internet security suitecasc.exe»
mRun: [CNAP2 Launcher] c:windowssystem32spooldriversw32x863CNAP2LAK.EXE
mRun: [<NO NAME>]
mRun: [Malwarebytes’ Anti-Malware] «c:program filesmalwarebytes’ anti-malwarembamgui.exe» /starttray
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: PromptOnSecureDesktop = 0 (0x0)
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} — {5F7B1267-94A9-47F5-98DB-E99415F33AEC} — c:program fileswindows livewriterWriterBrowserExtension.dll
LSP: winsflt.dll
LSP: c:windowssystem32VetRedir.dll
DPF: {070DC617-E3B7-468B-A29C-D4E84FAE938C} — hxxp://utilities.pcpitstop.com/pctuneup2/controls/pctuneup.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} — hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
TCP: DhcpNameServer = 10.1.1.1
TCP: Interfaces{C188FFB2-F633-4F89-B6FE-D6B968E6CBAA} : NameServer = 198.142.0.51 61.88.88.88
TCP: Interfaces{E2F07A0A-CC9D-4DAE-A92C-031BCC389E0F} : DhcpNameServer = 10.1.1.1
Handler: wlpg — {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} — c:program fileswindows livephoto galleryAlbumDownloadProtocolHandler.dll
Notify: igfxcui — igfxdev.dll
AppInit_DLLs: UmxSbxExw.dll
.
============= SERVICES / DRIVERS ===============
.
R0 KmxAMRT;KmxAMRT;c:windowssystem32driversKmxAMRT.sys [2011-7-29 164944]
R0 KmxFw;KmxFw;c:windowssystem32driversKmxFw.sys [2011-7-28 107088]
R1 KmxAgent;KmxAgent;c:windowssystem32driversKmxAgent.sys [2011-7-29 83536]
R1 KmxFile;KmxFile;c:windowssystem32driversKmxFile.sys [2011-7-29 63056]
R1 KmxFilter;HIPS Core Filter Driver;c:windowssystem32driversKmxFilter.sys [2011-7-28 66128]
R2 Application Updater;Application Updater;c:program filesapplication updaterApplicationUpdater.exe [2012-5-25 785344]
R2 CAAMSvc;CAAMSvc;c:program filescaca internet security suiteca anti-virus plusCAAMSvc.exe [2011-8-19 206152]
R2 CAISafe;CAISafe;c:program filescaca internet security suiteca anti-virus plusisafe.exe [2011-8-19 222544]
R2 ccSchedulerSVC;CA Common Scheduler Service;c:program filescaca internet security suiteccschedulersvc.exe [2011-8-19 206160]
R2 cvhsvc;Client Virtualization Handler;c:program filescommon filesmicrosoft sharedvirtualization handlerCVHSVC.EXE [2012-1-4 822624]
R2 KmxCF;KmxCF;c:windowssystem32driversKmxCF.sys [2011-7-29 152656]
R2 KmxSbx;KmxSbx;c:windowssystem32driversKmxSbx.sys [2011-7-29 82000]
R2 MBAMService;MBAMService;c:program filesmalwarebytes’ anti-malwarembamservice.exe [2012-6-18 654408]
R2 PCPitstop Scheduling;PCPitstop Scheduling;c:program filescaPCPitstopScheduleService.exe [2011-8-18 90296]
R2 sftlist;Application Virtualization Client;c:program filesmicrosoft application virtualization clientsftlist.exe [2011-10-1 508776]
R2 UmxEngine;TM Engine;c:program filescasharedcomponentstmengineUmxEngine.exe [2011-4-4 662096]
R3 KmxCfg;KmxCfg;c:windowssystem32driversKmxCfg.sys [2011-7-29 331344]
R3 MBAMProtector;MBAMProtector;c:windowssystem32driversmbam.sys [2012-6-18 22344]
R3 RTL8167;Realtek 8167 NT Driver;c:windowssystem32driversRt86win7.sys [2012-4-10 491112]
R3 Sftfs;Sftfs;c:windowssystem32driversSftfslh.sys [2011-10-1 579944]
R3 Sftplay;Sftplay;c:windowssystem32driversSftplaylh.sys [2011-10-1 194408]
R3 Sftredir;Sftredir;c:windowssystem32driversSftredirlh.sys [2011-10-1 21864]
R3 Sftvol;Sftvol;c:windowssystem32driversSftvollh.sys [2011-10-1 19304]
R3 sftvsa;Application Virtualization Service Agent;c:program filesmicrosoft application virtualization clientsftvsa.exe [2011-10-1 219496]
R3 WinExtManager;WinSock Extention Manager;c:windowssystem32mdmcls32.exe [2011-8-19 3207184]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:windowsmicrosoft.netframeworkv4.0.30319mscorsvw.exe [2010-3-18 130384]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:windowssystem32macromedflashFlashPlayerUpdateService.exe [2012-6-5 257696]
S3 aver7700;AVerMedia aver7700 DVB-T;c:windowssystem32driversaver7700.sys [2011-5-14 165504]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet — NDIS 6.0;c:windowssystem32driversb57nd60x.sys [2009-7-14 229888]
S3 ExtremeVSSService;Extreme VSS Service;c:program filessuperflexibleExtremeVSS.exe [2011-5-14 3196800]
S3 GREGService;GREGService;c:program filesemachinesregistrationGREGsvc.exe [2010-1-8 23584]
S3 osppsvc;Office Software Protection Platform;c:program filescommon filesmicrosoft sharedofficesoftwareprotectionplatformOSPPSVC.EXE [2010-1-9 4640000]
S3 TsUsbFlt;TsUsbFlt;c:windowssystem32driversTsUsbFlt.sys [2011-6-23 52224]
S3 Updater Service;Updater Service;c:program filesemachinesemachines updaterUpdaterService.exe [2010-9-3 243232]
S3 WatAdminSvc;Windows Activation Technologies Service;c:windowssystem32watWatAdminSvc.exe [2011-6-20 1343400]
S3 WinSvchostManager;WinSock Svchost Manager;c:windowssystem32svcprs32.exe [2011-8-19 2760720]
S4 wlcrasvc;Windows Live Mesh remote connections service;c:program fileswindows livemeshwlcrasvc.exe [2010-9-23 51040]
.
=============== Created Last 30 ================
.
2012-06-18 08:48:19 22344 —-a-w- c:windowssystem32driversmbam.sys
2012-06-18 08:48:19 ——— d——w- c:program filesMalwarebytes’ Anti-Malware
2012-06-18 08:37:25 ——— d——w- c:usersownerappdataroamingMalwarebytes
2012-06-18 08:37:18 ——— d——w- c:programdataMalwarebytes
2012-06-15 00:14:20 183808 —-a-w- c:windowssystem32driversrdpwd.sys
2012-06-15 00:14:19 2342400 —-a-w- c:windowssystem32msi.dll
2012-06-15 00:14:18 2343936 —-a-w- c:windowssystem32win32k.sys
2012-06-15 00:14:17 8192 —-a-w- c:windowssystem32rdrmemptylst.exe

2012-06-15 00:14:17 58880 —-a-w- c:windowssystem32rdpwsx.dll
2012-06-15 00:14:17 129536 —-a-w- c:windowssystem32rdpcorekmts.dll
2012-06-15 00:14:16 164352 —-a-w- c:windowssystem32profsvc.dll
2012-06-15 00:14:11 140288 —-a-w- c:windowssystem32cryptsvc.dll
2012-06-15 00:14:11 1158656 —-a-w- c:windowssystem32crypt32.dll
2012-06-15 00:14:11 103936 —-a-w- c:windowssystem32cryptnet.dll
2012-06-05 04:01:28 419488 —-a-w- c:windowssystem32FlashPlayerApp.exe
2012-05-26 06:56:20 ——— d——w- c:program filespdfforge Toolbar
2012-05-26 06:56:20 ——— d——w- c:program filescommon filesSpigot
2012-05-26 06:56:20 ——— d——w- c:program filesApplication Updater
.
==================== Find3M ====================
.
2012-06-05 04:01:28 70304 —-a-w- c:windowssystem32FlashPlayerCPLApp.cpl
2012-05-17 22:45:37 1800192 —-a-w- c:windowssystem32jscript9.dll
2012-05-17 22:35:47 1129472 —-a-w- c:windowssystem32wininet.dll
2012-05-17 22:35:39 1427968 —-a-w- c:windowssystem32inetcpl.cpl
2012-05-17 22:29:45 142848 —-a-w- c:windowssystem32ieUnatt.exe
2012-05-17 22:24:45 2382848 —-a-w- c:windowssystem32mshtml.tlb
2012-03-31 04:39:37 3968368 —-a-w- c:windowssystem32ntkrnlpa.exe
2012-03-31 04:39:37 3913072 —-a-w- c:windowssystem32ntoskrnl.exe
2012-03-30 10:23:11 1291632 —-a-w- c:windowssystem32driverstcpip.sys
2012-03-27 09:03:36 3204200 —-a-w- c:windowssystem32driversRTKVHDA.sys
2012-03-21 07:55:24 2886656 —-a-w- c:windowssystem32RCoRes.dat
.
============= FINISH: 22:20:05.60 ===============

  • #5

Attach log

.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2011-08-26.01)
.
Microsoft Windows 7 Home Premium
Boot Device: DeviceHarddiskVolume2
Install Date: 14/05/2011 4:21:26 AM
System Uptime: 18/06/2012 7:34:31 PM (3 hours ago)
.
Motherboard: eMachines | | EL1850
Processor: Intel(R) Celeron(R) CPU E3400 @ 2.60GHz | CPU 1 | 2603/200mhz
.
==== Disk Partitions =========================
.
C: is FIXED (NTFS) — 283 GiB total, 243.178 GiB free.
D: is CDROM ()
F: is Removable
G: is Removable
.
==== Disabled Device Manager Items =============
.
Class GUID: {eec5ad98-8080-425f-922a-dabf3de3f69a}
Description: Flash Reader
Device ID: WPDBUSENUMROOTUMB2&37C186B&1&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_MULTIPLE&PROD_FLASH_READER&REV_1.05#058F63616420&1#
Manufacturer: Multiple
Name: G:
PNP Device ID: WPDBUSENUMROOTUMB2&37C186B&1&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_MULTIPLE&PROD_FLASH_READER&REV_1.05#058F63616420&1#
Service: WUDFRd
.
Class GUID: {eec5ad98-8080-425f-922a-dabf3de3f69a}
Description: Compact Flash
Device ID: WPDBUSENUMROOTUMB2&37C186B&1&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_GENERIC-&PROD_COMPACT_FLASH&REV_1.01#058F63616420&0#
Manufacturer: Generic-
Name: F:
PNP Device ID: WPDBUSENUMROOTUMB2&37C186B&1&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_GENERIC-&PROD_COMPACT_FLASH&REV_1.01#058F63616420&0#
Service: WUDFRd
.
Class GUID: {36fc9e60-c465-11cf-8056-444553540000}
Description: Unknown Device
Device ID: USBVID_0000&PID_00005&13318B5&0&2
Manufacturer: (Standard USB Host Controller)
Name: Unknown Device
PNP Device ID: USBVID_0000&PID_00005&13318B5&0&2
Service:
.
==== System Restore Points ===================
.
RP100: 20/04/2012 1:53:23 PM — Scheduled Checkpoint
RP101: 1/05/2012 2:39:20 PM — Scheduled Checkpoint
RP102: 9/05/2012 9:24:59 AM — Scheduled Checkpoint
RP103: 14/05/2012 6:00:16 PM — Windows Update
RP104: 22/05/2012 12:00:04 AM — Scheduled Checkpoint
RP105: 29/05/2012 10:58:54 AM — Scheduled Checkpoint
RP106: 4/06/2012 6:00:14 PM — Windows Update
RP107: 11/06/2012 7:05:13 PM — Scheduled Checkpoint
RP108: 15/06/2012 6:00:16 PM — Windows Update
.
==== Installed Programs ======================
.
.
Acrobat.com
Adobe AIR
Adobe Flash Player 11 ActiveX
Adobe Reader 9.1 MUI
Advertising Center
Agatha Christie — Death on the Nile
APH placeholder
AVerMedia A808 (USB, DVB-T) 3.10.0.29
Bejeweled 2 Deluxe
Build-a-lot 2
CA Anti-Phishing
CA Anti-Spam
CA Anti-Virus Plus
CA Backup and Migration
CA Internet Security Suite
CA Parental Controls
CA PC Tune-Up 2.0.0.6
CA Personal Firewall
Canon LBP7200C
Canon MF Toolbox 4.9.1.1.mf03
Canon MF4100 Series
Chuzzle Deluxe
D3DX10
Diner Dash 2 Restaurant Rescue
DNAMigrator
eMachines Game Console
eMachines Games
eMachines Recovery Management
eMachines Registration
eMachines ScreenSaver
eMachines Updater
Exterminate3
Farm Frenzy
FATE
Final Drive Nitro
HIPS
Hotkey Utility
Identity Card
ImagXpress
Insaniquarium Deluxe
Intel(R) Control Center
Intel(R) Graphics Media Accelerator Driver
Intel(R) TV Wizard
Jewel Quest Solitaire 2
John Deere Drive Green
Junk Mail filter update
Malwarebytes Anti-Malware version 1.61.0.1400
Mesh Runtime
Microsoft .NET Framework 4 Client Profile
Microsoft Application Error Reporting
Microsoft Office 2010
Microsoft Office Click-to-Run 2010
Microsoft Office Starter 2010 — English
Microsoft Silverlight
Microsoft SQL Server 2005 Compact Edition [ENU]
Microsoft Visual C++ 2005 ATL Update kb973923 — x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable — x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable — x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable — x86 9.0.30729.6161
MSVCRT
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
Nero 9 Essentials
Nero ControlCenter
Nero DiscSpeed
Nero DiscSpeed Help
Nero DriveSpeed
Nero DriveSpeed Help
Nero Express Help
Nero InfoTool
Nero InfoTool Help
Nero Installer
Nero Online Upgrade
Nero StartSmart
Nero StartSmart Help
Nero StartSmart OEM
NeroExpress
neroxml
Optus Wireless Broadband
PDFCreator
pdfforge Toolbar v5.8
Penguins!
Plants vs. Zombies
Polar Bowler
Polar Golfer
Presto! PageManager 7.15.11
Realtek Ethernet Controller Driver For Windows Vista and Later
Realtek High Definition Audio Driver
Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2478663)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2539636)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2633870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)
Super Flexible File Synchronizer 5.40b
Update for Microsoft .NET Framework 4 Client Profile (KB2468871)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217)
Virtual Villagers 4 — The Tree of Life
Welcome Center
Windows Driver Package — Realtek (RTL8167) Net (08/23/2011 7.048.0823.2011)
Windows Driver Package — Realtek (RTL8167) Net (11/23/2011 7.050.1123.2011)
Windows Driver Package — Realtek Semiconductor Corp. HD Audio Driver (03/27/2012 6.0.1.6602)
Windows Driver Package — Realtek Semiconductor Corp. HD Audio Driver (06/14/2011 6.0.1.6392)
Windows Driver Package — Realtek Semiconductor Corp. HD Audio Driver (07/07/2011 6.0.1.6410)
Windows Driver Package — Realtek Semiconductor Corp. HD Audio Driver (10/18/2011 6.0.1.6482)
Windows Driver Package — Realtek Semiconductor Corp. HD Audio Driver (12/13/2011 6.0.1.6526)
Windows Live Communications Platform
Windows Live Essentials
Windows Live ID Sign-in Assistant
Windows Live Installer
Windows Live Mail
Windows Live Mesh
Windows Live Mesh ActiveX Control for Remote Connections
Windows Live Messenger
Windows Live MIME IFilter
Windows Live Movie Maker
Windows Live Photo Common
Windows Live Photo Gallery
Windows Live PIMT Platform
Windows Live Remote Client
Windows Live Remote Client Resources
Windows Live Remote Service
Windows Live Remote Service Resources
Windows Live SOXE
Windows Live SOXE Definitions
Windows Live UX Platform
Windows Live UX Platform Language Pack
Windows Live Writer
Windows Live Writer Resources
Zuma’s Revenge
Zuma Deluxe
.
==== Event Viewer Messages From Past Week ========
.
18/06/2012 8:55:13 PM, Error: Microsoft-Windows-DistributedCOM [10016] — The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID {5F36DC27-B076-4D0C-BD8C-7AEE14022193} and APPID {D3D96827-F7A7-4C54-A65F-EDC42D9EBB5E} to the user NT AUTHORITYNETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.
18/06/2012 4:52:38 PM, Error: Disk [11] — The driver detected a controller error on DeviceHarddisk3DR3.
18/06/2012 4:36:25 PM, Error: Disk [11] — The driver detected a controller error on DeviceHarddisk1DR4.
18/06/2012 3:27:54 PM, Error: Microsoft-Windows-DistributedCOM [10016] — The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID {5F36DC27-B076-4D0C-BD8C-7AEE14022193} and APPID {D3D96827-F7A7-4C54-A65F-EDC42D9EBB5E} to the user WESTOwner SID (S-1-5-21-2657109753-3204081971-2238376874-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.
.
==== End Of File ===========================

  • #6

I really appreciate your help.:)

  • #7

Download Bootkit Remover to your desktop.

  • Unzip downloaded file to your Desktop.
  • Double-click on boot_cleaner.exe to run the program (Vista/7 users,right click on boot_cleaner.exe and click Run As Administrator).
  • It will show a Black screen with some data on it.
  • Right click on the screen and click Select All.
  • Press CTRL+C
  • Open a Notepad and press CTRL+V
  • Post the output back here.

===================================================

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
If you see this question: Would you like to download latest Avast! virus definitions?» say «Yes».
Click the «Scan» button to start scan.
On completion of the scan click «Save log«, save it to your desktop and post in your next reply.

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

  • #8

Broni, thought I should send this through before I log off as it just finished. This is the machine that the MalwareBytes signatures would not update upon. Thanks for all your help in advance…….:)

bootkit log
Bootkit Remover
(c) 2009 Esage Lab
www.esagelab.com
Program version: 1.2.0.1
OS Version: Microsoft Windows 7 Home Premium Edition Service Pack 1 (build 7601)
, 32-bit
System volume is \.C:
\.C: -> \.PhysicalDrive0 at offset 0x00000003`a6500000
Boot sector MD5 is: bb4f1627d8b9beda49ac0d010229f3ff
Size Device Name MBR Status
———————————————
298 GB \.PhysicalDrive0 OK (DOS/Win32 Boot code found)

Done;
Press any key to quit…
aswMBR log
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-06-19 01:07:56
——————————
01:07:56.193 OS Version: Windows 6.1.7601 Service Pack 1
01:07:56.193 Number of processors: 2 586 0x170A
01:07:56.208 ComputerName: WEST UserName:
01:07:56.817 Initialize success
01:21:16.901 Disk 0 (boot) DeviceHarddisk0DR0 -> DeviceIdeIdeDeviceP2T0L0-2
01:21:16.901 Disk 0 Vendor: WDC_WD3200AAJS-22L7A0 01.03E01 Size: 305245MB BusType: 3
01:21:17.400 Disk 0 MBR read successfully
01:21:17.400 Disk 0 MBR scan
01:21:17.400 Disk 0 Windows 7 default MBR code
01:21:17.447 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 14848 MB offset 2048
01:21:17.494 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 30410752
01:21:17.541 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 290295 MB offset 30615552
01:21:18.056 Disk 0 scanning sectors +625140400
01:21:18.383 Disk 0 scanning C:Windowssystem32drivers
01:22:19.021 Service scanning
01:22:34.731 Modules scanning
01:24:07.832 Disk 0 trace — called modules:
01:24:07.878 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys halmacpi.dll ataport.SYS intelide.sys PCIIDEX.SYS atapi.sys dxgkrnl.sys igdkmd32.sys dxgmms1.sys
01:24:07.910 1 nt!IofCallDriver -> DeviceHarddisk0DR0[0x860bbac8]
01:24:07.910 3 CLASSPNP.SYS[8927759e] -> nt!IofCallDriver -> [0x85b2f918]
01:24:07.910 5 ACPI.sys[88ac13d4] -> nt!IofCallDriver -> DeviceIdeIdeDeviceP2T0L0-2[0x85b35030]
01:24:07.925 Scan finished successfully
01:28:16.570 Disk 0 MBR has been saved successfully to «C:UsersOwnerDesktopWESTlogsMBR.dat»
01:28:16.570 The log file has been saved successfully to «C:UsersOwnerDesktopWESTlogsaswMBR.txt»

  • #9

Please download ComboFix from Here, Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**

  • Never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause «unpredictable results».
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don’t know how to disable it, please ask.
  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
  • Double click on combofix.exe & follow the prompts.
  • NOTE1. If Combofix asks you to install Recovery Console, please allow it.
    NOTE 2. If Combofix asks you to update the program, always do so.
  • When finished, it will produce a report for you.
  • Please post the «C:ComboFix.txt»

**Note 1: Do not mouseclick combofix’s window while it’s running. That may cause it to stall
**Note 2 for AVG and CA Internet Security (Total Defense Internet Security) users: ComboFix will not run until AVG/CA Internet Security is uninstalled as a protective measure against the anti-virus. This is because AVG/CA Internet Security «falsely» detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause «unpredictable results». Since AVG/CA Internet Security cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG/CA Internet Security first.
Use AppRemover to uninstall it: https://www.techspot.com/downloads/5514-appremover.html
We can reinstall it when we’re done with CF.
**Note 3: If you receive an error «Illegal operation attempted on a registery key that has been marked for deletion», restart computer to fix the issue.
**Note 4: Some infections may take some significant time to be cured. As long as your computer clock is running Combofix is still working. Be patient.

Make sure, you re-enable your security programs, when you’re done with Combofix.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

NOTE.

If, for some reason, Combofix refuses to run

, try one of the following:

1. Run Combofix from Safe Mode.

2. Delete Combofix file, download fresh one, but rename combofix.exe to your_name.exe BEFORE saving it to your desktop.
Do NOT run it yet.
Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.
There are 4 different versions. If one of them won’t run then download and try to run the other one.

Vista and Win7 users need to right click Rkill and choose Run as Administrator

You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

* Rkill.com
* Rkill.scr
* Rkill.exe

  • Double-click on the Rkill icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.

Once you’ve gotten one of them to run, immediately run your_name.exe by double clicking on it.

If normal mode still doesn’t work, run BOTH tools from safe mode.

In case #2, please post BOTH logs, rKill and Combofix.

DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it’s officially declared clean!!!

  • #10

Broni, what a saga! We had to disable CA antivirus — took three attempts and 12 hours….here is the combo log…at last.!.. Not sure how to reinstall CA now, so sending this on a non-networked ‘clean machine’ :confused: DL PS by the time you get this I will probably be off line bec of thetime difference but will attend in the morning Aus time.

ComboFix 12-06-16.02 — Owner 19/06/2012 10:47:17.2.2 — x86
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.61.1033.18.2013.1256 [GMT 8:00]
Running from: c:usersOwnerDesktopComboFix.exe
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2012-05-19 to 2012-06-19 )))))))))))))))))))))))))))))))
.
.
2012-06-19 02:51 . 2012-06-19 02:51 ——— d——w- c:usersDefaultAppDataLocaltemp
2012-06-18 18:11 . 2012-06-19 02:55 ——— d——w- c:usersOwnerAppDataLocaltemp
2012-06-18 08:48 . 2012-06-18 08:48 ——— d——w- c:program filesMalwarebytes’ Anti-Malware
2012-06-18 08:48 . 2012-04-04 07:56 22344 —-a-w- c:windowssystem32driversmbam.sys
2012-06-18 08:37 . 2012-06-18 08:37 ——— d——w- c:usersOwnerAppDataRoamingMalwarebytes
2012-06-18 08:37 . 2012-06-18 08:53 ——— d——w- c:programdataMalwarebytes
2012-06-15 00:14 . 2012-04-28 03:17 183808 —-a-w- c:windowssystem32driversrdpwd.sys
2012-06-15 00:14 . 2012-04-07 11:26 2342400 —-a-w- c:windowssystem32msi.dll
2012-06-15 00:14 . 2012-05-15 01:05 2343936 —-a-w- c:windowssystem32win32k.sys
2012-06-15 00:14 . 2012-04-26 04:45 58880 —-a-w- c:windowssystem32rdpwsx.dll
2012-06-15 00:14 . 2012-04-26 04:45 129536 —-a-w- c:windowssystem32rdpcorekmts.dll
2012-06-15 00:14 . 2012-04-26 04:41 8192 —-a-w- c:windowssystem32rdrmemptylst.exe
2012-06-15 00:14 . 2012-05-01 04:44 164352 —-a-w- c:windowssystem32profsvc.dll
2012-06-15 00:14 . 2012-04-24 04:36 140288 —-a-w- c:windowssystem32cryptsvc.dll
2012-06-15 00:14 . 2012-04-24 04:36 1158656 —-a-w- c:windowssystem32crypt32.dll
2012-06-15 00:14 . 2012-04-24 04:36 103936 —-a-w- c:windowssystem32cryptnet.dll
2012-06-05 04:01 . 2012-06-05 04:01 419488 —-a-w- c:windowssystem32FlashPlayerApp.exe
2012-05-26 06:56 . 2012-05-26 06:56 ——— d——w- c:program filespdfforge Toolbar
2012-05-26 06:56 . 2012-05-26 06:56 ——— d——w- c:program filesCommon FilesSpigot
2012-05-26 06:56 . 2012-05-26 06:56 ——— d——w- c:program filesApplication Updater
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-06-05 04:01 . 2011-06-18 15:39 70304 —-a-w- c:windowssystem32FlashPlayerCPLApp.cpl
2012-03-31 04:39 . 2012-05-14 08:20 3968368 —-a-w- c:windowssystem32ntkrnlpa.exe
2012-03-31 04:39 . 2012-05-14 08:20 3913072 —-a-w- c:windowssystem32ntoskrnl.exe
2012-03-30 10:23 . 2012-05-14 08:20 1291632 —-a-w- c:windowssystem32driverstcpip.sys
2012-03-27 09:03 . 2012-04-10 10:18 3204200 —-a-w- c:windowssystem32driversRTKVHDA.sys
2012-03-21 07:55 . 2012-04-10 10:18 2886656 —-a-w- c:windowssystem32RCoRes.dat
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
«Hotkey Utility»=»c:program fileseMachinesHotkey UtilityHotkeyUtility.exe» [2010-08-04 611872]
«RtHDVCpl»=»c:program filesRealtekAudioHDARtHDVCpl.exe» [2012-03-27 10967656]
«CNAP2 Launcher»=»c:windowssystem32spoolDRIVERSW32X863CNAP2LAK.EXE» [2008-09-05 406944]
«Malwarebytes’ Anti-Malware»=»c:program filesMalwarebytes’ Anti-Malwarembamgui.exe» [2012-04-04 462408]
.
[HKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionpoliciessystem]
«ConsentPromptBehaviorAdmin»= 5 (0x5)
«ConsentPromptBehaviorUser»= 3 (0x3)
«EnableUIADesktopToggle»= 0 (0x0)
«PromptOnSecureDesktop»= 0 (0x0)
.
[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetcontrollsa]
Security Packages REG_MULTI_SZ kerberos msv1_0 schannel wdigest tspkg pku2u livessp
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:windowsMicrosoft.NETFrameworkv4.0.30319mscorsvw.exe [2010-03-18 130384]
R2 cvhsvc;Client Virtualization Handler;c:program filesCommon FilesMicrosoft SharedVirtualization HandlerCVHSVC.EXE [2012-01-04 822624]
R2 MBAMService;MBAMService;c:program filesMalwarebytes’ Anti-Malwarembamservice.exe [2012-04-04 654408]
R2 PCPitstop Scheduling;PCPitstop Scheduling;c:program filesCAPCPitstopScheduleService.exe [x]
R2 sftlist;Application Virtualization Client;c:program filesMicrosoft Application Virtualization Clientsftlist.exe [2011-10-01 508776]
R3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:windowssystem32MacromedFlashFlashPlayerUpdateService.exe [2012-06-05 257696]
R3 aver7700;AVerMedia aver7700 DVB-T;c:windowssystem32Driversaver7700.sys [2006-10-24 165504]
R3 ExtremeVSSService;Extreme VSS Service;c:program filesSuperFlexibleExtremeVSS.exe [2011-02-18 3196800]
R3 GREGService;GREGService;c:program fileseMachinesRegistrationGREGsvc.exe [2010-01-08 23584]
R3 MBAMProtector;MBAMProtector;c:windowssystem32driversmbam.sys [2012-04-04 22344]
R3 osppsvc;Office Software Protection Platform;c:program filesCommon FilesMicrosoft SharedOfficeSoftwareProtectionPlatformOSPPSVC.EXE [2010-01-09 4640000]
R3 RTL8167;Realtek 8167 NT Driver;c:windowssystem32DRIVERSRt86win7.sys [2011-11-23 491112]
R3 Sftredir;Sftredir;c:windowssystem32DRIVERSSftredirlh.sys [2011-10-01 21864]
R3 sftvsa;Application Virtualization Service Agent;c:program filesMicrosoft Application Virtualization Clientsftvsa.exe [2011-10-01 219496]
R3 TsUsbFlt;TsUsbFlt;c:windowssystem32driverstsusbflt.sys [2010-11-20 52224]
R3 Updater Service;Updater Service;c:program fileseMachineseMachines UpdaterUpdaterService.exe [2010-01-28 243232]
R3 WatAdminSvc;Windows Activation Technologies Service;c:windowssystem32WatWatAdminSvc.exe [2011-06-20 1343400]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:program filesWindows LiveMeshwlcrasvc.exe [2010-09-23 51040]
S2 Application Updater;Application Updater;c:program filesApplication UpdaterApplicationUpdater.exe [2012-05-25 785344]
S3 Sftfs;Sftfs;c:windowssystem32DRIVERSSftfslh.sys [2011-10-01 579944]
S3 Sftplay;Sftplay;c:windowssystem32DRIVERSSftplaylh.sys [2011-10-01 194408]
S3 Sftvol;Sftvol;c:windowssystem32DRIVERSSftvollh.sys [2011-10-01 19304]
.
.
Contents of the ‘Scheduled Tasks’ folder
.
2012-06-18 c:windowsTasksAdobe Flash Player Updater.job
— c:windowssystem32MacromedFlashFlashPlayerUpdateService.exe [2012-06-05 04:01]
.
.
——- Supplementary Scan ——-
.
uStart Page = hxxp://www.iinet.net.au/index.html
mStart Page = hxxp://www.bigseekpro.com/pdfcreator1/{B50E16FD-C2E6-4036-A9A0-1583447D01F1}
TCP: DhcpNameServer = 10.1.1.1
TCP: Interfaces{C188FFB2-F633-4F89-B6FE-D6B968E6CBAA}: NameServer = 198.142.0.51 61.88.88.88
DPF: {070DC617-E3B7-468B-A29C-D4E84FAE938C} — hxxp://utilities.pcpitstop.com/pctuneup2/controls/pctuneup.cab
.
.
——————— LOCKED REGISTRY KEYS ———————
.
[HKEY_LOCAL_MACHINEsystemControlSet001ControlClass{4D36E96D-E325-11CE-BFC1-08002BE10318}000AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
«BlindDial»=dword:00000000
.
[HKEY_LOCAL_MACHINEsystemControlSet001ControlPCWSecurity]
@Denied: (Full) (Everyone)
.
———————— Other Running Processes ————————
.
c:program filesCommon FilesMicrosoft SharedWindows LiveWLIDSVC.EXE
c:program filesCommon FilesMicrosoft SharedWindows LiveWLIDSvcM.exe
c:windowssystem32WUDFHost.exe
c:windowssystem32conhost.exe
c:windowssystem32spoolDRIVERSW32X863CNAP2RPK.EXE
c:windowssystem32spoolDRIVERSW32X863CNAC9SWK.EXE
c:windowssystem32sppsvc.exe
.
**************************************************************************
.
Completion time: 2012-06-19 10:57:35 — machine was rebooted
ComboFix-quarantined-files.txt 2012-06-19 02:57
ComboFix2.txt 2012-06-18 18:17
.
Pre-Run: 270,063,321,088 bytes free
Post-Run: 269,668,249,600 bytes free
.
— — End Of File — — 46C1EC84768EA904FA76CD2943A35610

  • #11

I don’t see anything malicious there.

1. Uninstall Malwarebytes’ Anti-Malware using Add/Remove programs in the control panel.
2. Restart your computer (very important).
3. Download and run this utility.
4. It will ask to restart your computer (please allow it to).
5. After the computer restarts, install the latest version from here.

Install fresh copy and see how it goes.

  • #12

Broni, the computer will not reconnect to the internet….I had taken out the line. Have rebooted with line in but not connecting….so can’t update new malware bytes or antivirus (which eventually did reinstall). Any suggestions? (Tearing hair out with frustration, DL)

  • #13

Please download Farbar Service Scanner Download Link and run it on the computer with the issue.

  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
  • Press «Scan«.
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

  • #14

Hi Broni,
FSS log below. cheers, DL (thanks in advance…..)

FFS Log
Farbar Service Scanner Version: 19-06-2012 01
Ran by Owner (administrator) on 23-06-2012 at 10:40:58
Running from «C:UsersOwnerDesktopbroni-west»
Microsoft Windows 7 Home Premium Service Pack 1 (X86)
Boot Mode: Normal
****************************************************************
Internet Services:
============
Dnscache Service is not running. Checking service configuration:
The start type of Dnscache service is OK.
The ImagePath of Dnscache service is OK.
The ServiceDll of Dnscache service is OK.
Dhcp Service is not running. Checking service configuration:
The start type of Dhcp service is OK.
The ImagePath of Dhcp service is OK.
The ServiceDll of Dhcp service is OK.

Connection Status:
==============
Attempt to access Local Host IP returned error: Localhost is blokked: Other errors
LAN connected.
Attempt to access Google IP returned error: Other errors
Attempt to access Google.com returned error: Other errors
Attempt to access Yahoo IP returned error: Other errors
Attempt to access Yahoo.com returned error: Other errors

Windows Firewall:
=============
MpsSvc Service is not running. Checking service configuration:
The start type of MpsSvc service is OK.
The ImagePath of MpsSvc service is OK.
The ServiceDll of MpsSvc service is OK.

Firewall Disabled Policy:
==================

System Restore:
============
System Restore Disabled Policy:
========================

Action Center:
============
Windows Update:
============
wuauserv Service is not running. Checking service configuration:
The start type of wuauserv service is OK.
The ImagePath of wuauserv service is OK.
The ServiceDll of wuauserv service is OK.
BITS Service is not running. Checking service configuration:
The start type of BITS service is OK.
The ImagePath of BITS service is OK.
The ServiceDll of BITS service is OK.

Windows Autoupdate Disabled Policy:
============================

Windows Defender:
==============
File Check:
========
C:Windowssystem32nsisvc.dll => MD5 is legit
C:Windowssystem32Driversnsiproxy.sys => MD5 is legit
C:Windowssystem32dhcpcore.dll => MD5 is legit
C:Windowssystem32Driversafd.sys => MD5 is legit
C:Windowssystem32Driverstdx.sys => MD5 is legit
C:Windowssystem32Driverstcpip.sys => MD5 is legit
C:Windowssystem32dnsrslvr.dll => MD5 is legit
C:Windowssystem32mpssvc.dll => MD5 is legit
C:Windowssystem32bfe.dll => MD5 is legit
C:Windowssystem32Driversmpsdrv.sys => MD5 is legit
C:Windowssystem32SDRSVC.dll => MD5 is legit
C:Windowssystem32vssvc.exe => MD5 is legit
C:Windowssystem32wscsvc.dll => MD5 is legit
C:Windowssystem32wbemWMIsvc.dll => MD5 is legit
C:Windowssystem32wuaueng.dll => MD5 is legit
C:Windowssystem32qmgr.dll => MD5 is legit
C:Windowssystem32es.dll => MD5 is legit
C:Windowssystem32cryptsvc.dll => MD5 is legit
C:Program FilesWindows DefenderMpSvc.dll => MD5 is legit
C:Windowssystem32svchost.exe => MD5 is legit
C:Windowssystem32rpcss.dll => MD5 is legit

**** End of log ****

  • #15

Something is not right but we’re not dealing with any infection here.

In this forum, we make sure, your computer is free of malware and your computer is clean :)
Because the access to malware forum is very limited, your best option is to create new topic about your current issue, at Windows section.
You’ll get more attention.

Понравилась статья? Поделить с друзьями:
  • Program error invalid path or file name
  • Program error 7003 prolog
  • Profuis282u dll ошибка windows 7 как исправить
  • Profile server db version is unsupported due to being too high как исправить
  • Professional treatment in each sentence find one spelling error