Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org
Database version: v2014.03.07.10
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 11.0.9600.16518
Tonya :: TONYA-PC [administrator]
Protection: Enabled
3/7/2014 6:17:36 PM
mbam-log-2014-03-07 (18-17-36).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 220208
Time elapsed: 7 minute(s), 35 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 3
HKCU\Software\AppDataLow\Software\Savings Bull (PUP.Optional.SavingsBull.A) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\SEARCHPROTECTINT (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\SavingsbullFilter (PUP.Optional.SavingsBull.A) -> Quarantined and deleted successfully.
Registry Values Detected: 1
HKCU\Software\SearchProtectINT|Install (PUP.Optional.SearchProtect.A) -> Data: 1 -> Quarantined and deleted successfully.
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 1
C:\Users\Tonya\Downloads\Adobe_Flash.exe (PUP.Optional.Outbrowse) -> Quarantined and deleted successfully.
(end)
ESETSmartInstaller@High as downloader log:
all ok
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6920
# api_version=3.0.2
# EOSSerial=a15cc1f4d0b03a418fdb31fac18a81a6
# engine=17289
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-03-03 09:05:57
# local_time=2014-03-03 04:05:57 (-0500, Eastern Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=1043 16777213 100 87 0 80028341 0 0
# compatibility_mode=5893 16776574 100 94 19355320 145381007 0 0
# scanned=223150
# found=19
# cleaned=0
# scan_time=8800
sh=CA248F6B8BAB3D74DF178518F23AACBFFE96C0FF ft=1 fh=ff147e3ab0aab30a vn="Win32/TrojanDownloader.Zortob.F trojan" ac=I fn="C:\FRST\Quarantine\fbtdmgtk.exe02-03-2014_17-33-37"
sh=BDCDE0039CC1843FC092456A34C2C67F06F4F6C4 ft=1 fh=aa79b23cba164300 vn="Win32/Injector.AYUU trojan" ac=I fn="C:\FRST\Quarantine\icppaxrj.exe02-03-2014_17-33-43"
sh=BDCDE0039CC1843FC092456A34C2C67F06F4F6C4 ft=1 fh=aa79b23cba164300 vn="Win32/Injector.AYUU trojan" ac=I fn="C:\FRST\Quarantine\incjxaph.exe02-03-2014_17-33-45"
sh=38F70B055DA68396D8D7BF3F0DDB45B0D1E40F2D ft=1 fh=8796bfdd1863d02d vn="a variant of Win32/Injector.AYES trojan" ac=I fn="C:\FRST\Quarantine\kjudtmpn.exe02-03-2014_17-33-47"
sh=7AE6AF194181409CE3BAAC29AC87ACCCF96356F1 ft=1 fh=f42213fdedce7160 vn="a variant of Win32/Wajam.F potentially unwanted application" ac=I fn="C:\FRST\Quarantine\Video_Converter_TSV2382ZX.exe02-03-2014_17-33-50"
sh=18F5DBBEEC487515314106A13B6FACB16FB27E4C ft=1 fh=ff147e3afb8fd20c vn="a variant of Win32/Kryptik.BVKP trojan" ac=I fn="C:\FRST\Quarantine\xgmuxkgb.exe02-03-2014_17-33-39"
sh=8751D16071C4E65C93D9F9631BD788BFD9C36644 ft=1 fh=c70610e421d5bbdf vn="a variant of Win32/Toolbar.MyWebSearch.W potentially unwanted application" ac=I fn="C:\FRST\Quarantine\RadioRage_4j02-03-2014_17-33-32\bar\1.bin\4jbar.dll"
sh=0F78FE90AF015B0A511EDE007BD1791A341E891E ft=1 fh=d4fd6df3b7cf992d vn="Win32/Toolbar.MyWebSearch.W potentially unwanted application" ac=I fn="C:\FRST\Quarantine\RadioRage_4j02-03-2014_17-33-32\bar\1.bin\4jbrmon.exe"
sh=374E378A91209732B48C8416D1E9805E98FDCFA9 ft=1 fh=6da58ad1308c1c96 vn="Win64/Toolbar.MyWebSearch.A potentially unwanted application" ac=I fn="C:\FRST\Quarantine\RadioRage_4j02-03-2014_17-33-32\bar\1.bin\AppIntegratorStub64.dll"
sh=3D7CD376DFDB97512A376E85FBB7F04344C051B6 ft=1 fh=e0ed2601e18686d8 vn="Win64/Toolbar.MyWebSearch.A potentially unwanted application" ac=I fn="C:\FRST\Quarantine\RadioRage_4j02-03-2014_17-33-32\bar\1.bin\Hpg64.dll"
sh=0F97FB08E6FC4500F86E64D3285C171C6462BD61 ft=1 fh=acbbffe185c36761 vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Users\Tonya\Downloads\ccsetup410.exe"
sh=D6017D77664585F90D404A444351996AB953C11F ft=1 fh=a8042a05c167d9b1 vn="a variant of Win32/AdInstaller potentially unwanted application" ac=I fn="C:\Users\Tonya\Downloads\CouponAlert.exe"
sh=B794727FD00DE9D98B8DBD000D0D8D522E6BC314 ft=1 fh=37df74da43563a86 vn="Win32/AdInstaller potentially unwanted application" ac=I fn="C:\Users\Tonya\Downloads\MyFunCards(2).exe"
sh=B794727FD00DE9D98B8DBD000D0D8D522E6BC314 ft=1 fh=37df74da43563a86 vn="Win32/AdInstaller potentially unwanted application" ac=I fn="C:\Users\Tonya\Downloads\MyFunCards.exe"
sh=39EC0A716440469F45F25447DD6D2961AD3FE45B ft=0 fh=0000000000000000 vn="a variant of Win32/Kryptik.BVUB trojan" ac=I fn="C:\Users\Tonya\Downloads\Record_Milford_(302)4587378.zip"
sh=CB20DFD703B61B9470BBB3B1BE157D47A8C0849A ft=1 fh=63788d9fe9c2f077 vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Users\Tonya\Downloads\Shockwave_Installer_Slim.exe"
sh=C5DDCD82C8258716E8C81A5CF34B9843DAA66A62 ft=1 fh=d361263e103ce75a vn="a variant of Win32/AdInstaller potentially unwanted application" ac=I fn="C:\Users\Tonya\Downloads\Webfetti.exe"
sh=B5B41E946960F17050C00A4891CFF46B08486A4D ft=1 fh=79895fd74f1827db vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Windows\System32\Adobe\Shockwave 12\gt.exe"
sh=B5B41E946960F17050C00A4891CFF46B08486A4D ft=1 fh=79895fd74f1827db vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Windows\SysWOW64\Adobe\Shockwave 12\gt.exe"
ESETSmartInstaller@High as downloader log:
all ok
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6920
# api_version=3.0.2
# EOSSerial=a15cc1f4d0b03a418fdb31fac18a81a6
# engine=17364
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-03-08 02:22:03
# local_time=2014-03-07 09:22:03 (-0500, Eastern Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=5893 16776574 100 94 19763086 145788773 0 0
# scanned=204472
# found=16
# cleaned=0
# scan_time=9339
sh=123041555D1636D53F2A484789A866C88E47C6FF ft=1 fh=15f8eda88615b937 vn="a variant of Win32/Injector.AYUE trojan" ac=I fn="C:\FRST\Quarantine\ajcpvvoe.exe06-03-2014_22-35-15"
sh=123041555D1636D53F2A484789A866C88E47C6FF ft=1 fh=15f8eda88615b937 vn="a variant of Win32/Injector.AYUE trojan" ac=I fn="C:\FRST\Quarantine\bfmelspa.exe06-03-2014_22-35-14"
sh=D1679F1D38A78ACCC9AF0395231845B050780D68 ft=1 fh=8843105b30913fde vn="Win32/Injector.AYTR trojan" ac=I fn="C:\FRST\Quarantine\fqicqolt.exe06-03-2014_22-35-09"
sh=123041555D1636D53F2A484789A866C88E47C6FF ft=1 fh=15f8eda88615b937 vn="a variant of Win32/Injector.AYUE trojan" ac=I fn="C:\FRST\Quarantine\gamnbprj.exe06-03-2014_22-35-13"
sh=109A8FD01A5971B6A40082433364D2BBD87DB586 ft=1 fh=bfa7679ea14c60ef vn="a variant of Win32/Injector.AZDB trojan" ac=I fn="C:\FRST\Quarantine\jgudehox.exe06-03-2014_22-35-13"
sh=109A8FD01A5971B6A40082433364D2BBD87DB586 ft=1 fh=bfa7679ea14c60ef vn="a variant of Win32/Injector.AZDB trojan" ac=I fn="C:\FRST\Quarantine\nglscrjo.exe06-03-2014_22-35-12"
sh=109A8FD01A5971B6A40082433364D2BBD87DB586 ft=1 fh=bfa7679ea14c60ef vn="a variant of Win32/Injector.AZDB trojan" ac=I fn="C:\FRST\Quarantine\nvqtgrgj.exe06-03-2014_22-35-11"
sh=D1679F1D38A78ACCC9AF0395231845B050780D68 ft=1 fh=8843105b30913fde vn="Win32/Injector.AYTR trojan" ac=I fn="C:\FRST\Quarantine\oeuehmkg.exe06-03-2014_22-35-08"
sh=D1679F1D38A78ACCC9AF0395231845B050780D68 ft=1 fh=8843105b30913fde vn="Win32/Injector.AYTR trojan" ac=I fn="C:\FRST\Quarantine\prcswgxt.exe06-03-2014_22-35-07"
sh=109A8FD01A5971B6A40082433364D2BBD87DB586 ft=1 fh=bfa7679ea14c60ef vn="a variant of Win32/Injector.AZDB trojan" ac=I fn="C:\FRST\Quarantine\puqhghcs.exe06-03-2014_22-35-10"
sh=109A8FD01A5971B6A40082433364D2BBD87DB586 ft=1 fh=bfa7679ea14c60ef vn="a variant of Win32/Injector.AZDB trojan" ac=I fn="C:\FRST\Quarantine\skhfbkcm.exe06-03-2014_22-35-10"
sh=D1679F1D38A78ACCC9AF0395231845B050780D68 ft=1 fh=8843105b30913fde vn="Win32/Injector.AYTR trojan" ac=I fn="C:\FRST\Quarantine\xdfmjlwf.exe06-03-2014_22-35-06"
sh=80DC1B8044FE7F2BC57777F9559C5050B1DF5736 ft=1 fh=3a2e66d2f7d1673f vn="a variant of Win32/AdWare.Adpeak.D application" ac=I fn="C:\FRST\Quarantine\Level Quality Watcher06-03-2014_22-35-06\v1.01\levelqualitywatcher32.exe"
sh=408E4906C3F215C0E44282D24B340DAF03D014A4 ft=1 fh=94d81bcdb603e2f9 vn="a variant of Win64/Adware.Adpeak.C application" ac=I fn="C:\FRST\Quarantine\Level Quality Watcher06-03-2014_22-35-06\v1.01\levelqualitywatcher64.exe"
sh=6205DDE47C041E3B67EFC540F89F24344835EE11 ft=0 fh=0000000000000000 vn="Win32/AdWare.Adpeak.B application" ac=I fn="C:\temp\t.msi"
sh=C662A89E2318810A6012EF702A9C39F6E0AC3B36 ft=1 fh=e8789dd77b481b56 vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application" ac=I fn="C:\Users\Tonya\Downloads\ccsetup411.exe"