Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- >>> MCShield AllScans.txt <<<
- -----------------------------
- MCShield ::Anti-Malware Tool:: http://www.mcshield.net/
- >>> v 3.0.5.28 / DB: 2014.5.25.1 / Windows 7 <<<
- 5/26/2014 8:38:04 PM > Drive C: - scan started (no label ~931 GB, NTFS HDD )...
- => The drive is clean.
- MCShield ::Anti-Malware Tool:: http://www.mcshield.net/
- >>> v 3.0.5.28 / DB: 2014.5.25.1 / Windows 7 <<<
- 5/26/2014 8:38:23 PM > Drive F: - scan started (no label ~7634 MB, NTFS flash drive )...
- ---> Executing generic S&D routine... Searching for files hidden by malware...
- ---> Items to process: 7
- ---> F:\Albys RR 2.5 roster & gameplay.zip > unhidden.
- ---> F:\Albys RR8 daninoz.zip > unhidden.
- ---> F:\All-Time_Greatest_Roster___CF_3.rar > unhidden.
- ---> F:\daninoz portraits v3.7z > unhidden.
- ---> F:\Euroleague 2K14 V2.rar > unhidden.
- ---> F:\K14_Roster___Online_Data_Update__2014.05.21_.rar > unhidden.
- ---> F:\NBA 2K14 Official Roster Update (May 21, 2014).rar > unhidden.
- >>> F:\Albys RR 2.lnk - Malware > Deleted. (14.05.26. 20.38 Albys RR 2.lnk.53982; MD5: 42ad2ad219b42f13433b8d1ac3ee5251)
- >>> F:\Albys RR8 daninoz.lnk - Malware > Deleted. (14.05.26. 20.38 Albys RR8 daninoz.lnk.465065; MD5: 35579ce698e8f7fab92b129913de5966)
- >>> F:\All-Time_Greatest_Roster___CF_3.lnk - Malware > Deleted. (14.05.26. 20.38 All-Time_Greatest_Roster___CF_3.lnk.74163; MD5: 28ec83fddf51cd18ef98278a940b5301)
- >>> F:\daninoz portraits v3.lnk - Malware > Deleted. (14.05.26. 20.38 daninoz portraits v3.lnk.530; MD5: 50602f4ba3d55260422aa96ed271256e)
- >>> F:\Euroleague 2K14 V2.lnk - Malware > Deleted. (14.05.26. 20.38 Euroleague 2K14 V2.lnk.80482; MD5: f095353747061335d2818e4e8995b626)
- >>> F:\K14_Roster___Online_Data_Update__2014.lnk - Malware > Deleted. (14.05.26. 20.38 K14_Roster___Online_Data_Update__2014.lnk.434103; MD5: 6b528f0d59e194c8c2ec852f55b66f81)
- >>> F:\NBA 2K14 Official Roster Update (May 21, 2014).lnk - Malware > Deleted. (14.05.26. 20.38 NBA 2K14 Official Roster Update (May 21, 2014).lnk.29032; MD5: 3d6a7ef2f528bc453549a1d7ff1a7407)
- >>> F:\oky.vbs - Malware > Deleted. (14.05.26. 20.38 oky.vbs.759091; MD5: 5fe41a8aa73c718a75dfcfb42bb2c688)
- >>> F:\Albys RR 2.3 roster & gameplay.lnk - Malware > Deleted. (14.05.26. 20.38 Albys RR 2.3 roster & gameplay.lnk.519980; MD5: c22c1f35557cc654fa6042f206b4edd7)
- >>> F:\Not.Another.Teen.Movie.2001.720p.WEB-DL.H264-HDStar [PublicHD].lnk - Malware > Deleted. (14.05.26. 20.38 Not.Another.Teen.Movie.2001.720p.WEB-DL.H264-HDStar [PublicHD].lnk.44502; MD5: 7f02a5581a416d88f4953ad1af7efe5b)
- >>> F:\She's All That.lnk - Malware > Deleted. (14.05.26. 20.38 She's All That.lnk.329990; MD5: d44501118e2e33153b03f81c7b56e341)
- >>> F:\[ www.UsaBit.com ] - playnow-Forces.of.nature.1999.720p x264-1.lnk - Malware > Deleted. (14.05.26. 20.38 [ www.UsaBit.com ] - playnow-Forces.of.nature.1999.720p x264-1.lnk.332581; MD5: 9476cd8c761d4b1fc95b6b8ed3c6e385)
- > Resetting attributes: F:\Albys RR 2.3 roster & gameplay < Successful.
- > Resetting attributes: F:\Not.Another.Teen.Movie.2001.720p.WEB-DL.H264-HDStar [PublicHD] < Successful.
- > Resetting attributes: F:\She's All That < Successful.
- > Resetting attributes: F:\[ www.UsaBit.com ] - playnow-Forces.of.nature.1999.720p x264-1 < Successful.
- => Malicious files : 12/12 deleted.
- => Hidden folders : 4/4 unhidden.
- => Hidden files : 7/7 unhidden.
- ____________________________________________
- ::::: Scan duration: 6sec ::::::::::::::::::
- ____________________________________________
- MCShield ::Anti-Malware Tool:: http://www.mcshield.net/
- >>> v 3.0.5.28 / DB: 2014.5.25.1 / Windows 7 <<<
- 5/26/2014 8:39:42 PM > Drive F: - scan started (no label ~1929 MB, FAT32 flash drive )...
- => The drive is clean.
- MCShield ::Anti-Malware Tool:: http://www.mcshield.net/
- >>> v 3.0.5.28 / DB: 2014.5.25.1 / Windows 7 <<<
- 5/26/2014 8:40:13 PM > Drive H: - scan started (no label ~1880 MB, FAT32 flash drive )...
- >>> H:\.android_secure.lnk - Malware > Deleted. (14.05.26. 20.40 .android_secure.lnk.903988; MD5: 8d1454df5c97cd4aef71b2202ed9f33d)
- >>> H:\media.lnk - Malware > Deleted. (14.05.26. 20.40 media.lnk.617866; MD5: 887aee1cf41a3be28a88f46b18a4d412)
- >>> H:\LOST.DIR.lnk - Malware > Deleted. (14.05.26. 20.40 LOST.DIR.lnk.459920; MD5: b4ab42ccc2536d328c105b9fe29ce4cc)
- >>> H:\Sounds.lnk - Malware > Deleted. (14.05.26. 20.40 Sounds.lnk.183026; MD5: 387279327b6f73d7d9e64e87322da408)
- >>> H:\.downloadTemp.lnk - Malware > Deleted. (14.05.26. 20.40 .downloadTemp.lnk.561180; MD5: 4a4175b69b83153610dbc9c35a5b2a31)
- >>> H:\.mmsyscache.lnk - Malware > Deleted. (14.05.26. 20.40 .mmsyscache.lnk.649221; MD5: af71f9c7e76e6188d97b5a9cfe74bac5)
- >>> H:\Ringtones.lnk - Malware > Deleted. (14.05.26. 20.40 Ringtones.lnk.244151; MD5: a6422ec13915e9ffa5abf87f446876da)
- >>> H:\.doodlemobile_featureviewnew.lnk - Malware > Deleted. (14.05.26. 20.40 .doodlemobile_featureviewnew.lnk.505368; MD5: df71ad735a4a1b88fa071b38d9be6116)
- >>> H:\.dmplatform.lnk - Malware > Deleted. (14.05.26. 20.40 .dmplatform.lnk.439826; MD5: d470fd45e6aa5aba99089d1c3c78163a)
- >>> H:\Pictures.lnk - Malware > Deleted. (14.05.26. 20.40 Pictures.lnk.994042; MD5: 0bc3ff7244640026b7346f30ec871ce2)
- >>> H:\Android.lnk - Malware > Deleted. (14.05.26. 20.40 Android.lnk.76267; MD5: 1b07dda870e2eacf57acf8cf554e3712)
- >>> H:\bluetooth.lnk - Malware > Deleted. (14.05.26. 20.40 bluetooth.lnk.78858; MD5: b3268468178fc194fe048a2f8afa65dd)
- >>> H:\DCIM.lnk - Malware > Deleted. (14.05.26. 20.40 DCIM.lnk.664560; MD5: 09932535843b8a6a42c511abcb4aacd5)
- >>> H:\Documents.lnk - Malware > Deleted. (14.05.26. 20.40 Documents.lnk.422301; MD5: 3fcbb709ce50c58a0e021dc032161ec9)
- >>> H:\Download.lnk - Malware > Deleted. (14.05.26. 20.40 Download.lnk.430970; MD5: 89282e931b66407320ced9505f0dc872)
- >>> H:\.thinkfree.lnk - Malware > Deleted. (14.05.26. 20.40 .thinkfree.lnk.33990; MD5: f7d8e41f33fe89eb8f886752f3803060)
- >>> H:\MyTracks.lnk - Malware > Deleted. (14.05.26. 20.40 MyTracks.lnk.739778; MD5: 3ecef1683e7cf2def5c30ce319863123)
- >>> H:\com.makonda.blic.lnk - Malware > Deleted. (14.05.26. 20.40 com.makonda.blic.lnk.340523; MD5: 5140dd8ddcd9606c21ad5d8002f413b6)
- >>> H:\fun.lnk - Malware > Deleted. (14.05.26. 20.40 fun.lnk.397341; MD5: 73808a0e546e004a1a851ac7946548cd)
- >>> H:\oky.vbs - Malware > Deleted. (14.05.26. 20.40 oky.vbs.37008; MD5: 5fe41a8aa73c718a75dfcfb42bb2c688)
- > Resetting attributes: H:\.android_secure < Successful.
- > Resetting attributes: H:\media < Successful.
- > Resetting attributes: H:\LOST.DIR < Successful.
- > Resetting attributes: H:\Sounds < Successful.
- > Resetting attributes: H:\.downloadTemp < Successful.
- > Resetting attributes: H:\.mmsyscache < Successful.
- > Resetting attributes: H:\Ringtones < Successful.
- > Resetting attributes: H:\.doodlemobile_featureviewnew < Successful.
- > Resetting attributes: H:\.dmplatform < Successful.
- > Resetting attributes: H:\Pictures < Successful.
- > Resetting attributes: H:\Android < Successful.
- > Resetting attributes: H:\bluetooth < Successful.
- > Resetting attributes: H:\DCIM < Successful.
- > Resetting attributes: H:\Documents < Successful.
- > Resetting attributes: H:\Download < Successful.
- > Resetting attributes: H:\.thinkfree < Successful.
- > Resetting attributes: H:\MyTracks < Successful.
- > Resetting attributes: H:\com.makonda.blic < Successful.
- > Resetting attributes: H:\fun < Successful.
- => Malicious files : 20/20 deleted.
- => Hidden folders : 19/19 unhidden.
- ____________________________________________
- ::::: Scan duration: 34sec :::::::::::::::::
- ____________________________________________
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement