Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows 7 - Adware and Won't Open Firefox or Chrome


  • This topic is locked This topic is locked
15 replies to this topic

#1 Evil Joe

Evil Joe

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 07 July 2011 - 09:23 PM

The only browser that will open is Internet Explorer. Ads pop up every once in a while while using IE and if you click a link on Google, it takes you to a different website. Have already run a Malwarebytes scan in safe mode along with CCleaner, but problems remain.

Here is the HijackThis log:

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 7:08:06 PM, on 7/7/2011
Platform: Windows 7  (WinNT 6.00.3504)
MSIE: Internet Explorer v8.00 (8.00.7600.16800)
Boot mode: Safe mode

Running processes:
C:\Users\TJ\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = 
R3 - URLSearchHook: UrlSearchHook Class - {00000000-6E41-4FD3-8538-502F5495E5FC} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files (x86)\Google\GoogleToolbarNotifier\5.7.6406.1642\swg.dll
O2 - BHO: Ask Toolbar BHO - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: Ask Toolbar - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [BackupManagerTray] "C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe" -h -k
O4 - HKLM\..\Run: [Hotkey Utility] C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe
O4 - HKLM\..\Run: [Gateway Photo Frame] C:\Program Files (x86)\Gateway Photo Frame\ButtonMonitor.exe -A
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files (x86)\Winamp\winampa.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [ApnUpdater] "C:\Program Files (x86)\Ask.com\Updater\Updater.exe"
O4 - HKCU\..\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [Aim] "C:\Program Files (x86)\AIM\aim.exe" /d locale=en-US
O4 - HKCU\..\Run: [Steam] "C:\Program Files (x86)\Steam\Steam.exe" -silent
O4 - HKCU\..\Run: [TomTomHOME.exe] "C:\Program Files (x86)\TomTom HOME 2\TomTomHOMERunner.exe"
O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files (x86)\BitTorrent\BitTorrent.exe"
O4 - HKCU\..\Run: [Google Update] "C:\Users\TJ\AppData\Local\Google\Update\GoogleUpdate.exe" /c
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
O4 - Global Startup: McAfee Security Scan Plus.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files (x86)\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_43C348BC2E93EB2B.dll/cmsidewiki.html
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~2\MICROS~1\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files (x86)\Gateway Games\Gateway Game Console\GameConsoleService.exe
O23 - Service: GRegService (Greg_Service) - Acer Incorporated - C:\Program Files (x86)\Gateway\Registration\GregHSRW.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: McAfee Security Scan Component Host Service (McComponentHostService) - McAfee, Inc. - C:\Program Files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files (x86)\Common Files\Nero\Nero BackItUp 4\NBService.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: NTI IScheduleSvc - NewTech Infosystems, Inc. - C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\IScheduleSvc.exe
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: TomTomHOMEService - TomTom - C:\Program Files (x86)\TomTom HOME 2\TomTomHOMEService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: Updater Service - Acer Group - C:\Program Files\Gateway\Gateway Updater\UpdaterService.exe
O23 - Service: USBS3S4Detection - Unknown owner - C:\OEM\USBDECTION\USBS3S4Detection.exe
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 10402 bytes


Any help would be greatly appreciated.

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 23 July 2011 - 02:28 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Please take note:

  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step. Then proceed to run aswMbr.exe as noted below.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Note:
If you are unable to run a Gmer scan due the fact you are running a 64bit machine please run the following tool and post its log.

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.



Thanks and again sorry for the delay.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 24 July 2011 - 09:26 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#4 Evil Joe

Evil Joe
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 26 July 2011 - 02:11 AM

Thank you for the response, fireman.

The problems, more specifically, are that certain programs won't work (Firefox, Chrome, GTA IV). Internet Explorer, however, does work, but there are pop-ups and when using Google, the links in the search usually don't go to the right links and instead go to spam links.

The computer is running a 64-bit version of Windows 7 and we do not have the Windows 7 disk. At least, my brother doesn't remember having a Windows 7 disk, but it's entirely possible one came with the computer when he bought it and it is currently floating around somewhere in a storage unit. If it is of utmost importance, then we shall retrieve said disk (if it exists), but if the problems can be easily fixed without the disk, that would be preferable.


Here's the DDS log:
.
DDS (Ver_2011-06-23.01) - NTFSAMD64 
Internet Explorer: 8.0.7600.16385  BrowserJavaVersion: 1.6.0_22
Run by TJ at 22:32:39 on 2011-07-25
Microsoft Windows 7 Home Premium   6.1.7600.0.1252.1.1033.18.4023.2557 [GMT -7:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\atieclxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files (x86)\Gateway\Registration\GregHSRW.exe
C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\IScheduleSvc.exe
C:\Program Files (x86)\TomTom HOME 2\TomTomHOMEService.exe
C:\Program Files\Gateway\Gateway Updater\UpdaterService.exe
C:\OEM\USBDECTION\USBS3S4Detection.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAAnotif.exe
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files (x86)\AIM\aim.exe
C:\Program Files (x86)\Steam\Steam.exe
C:\Program Files (x86)\TomTom HOME 2\TomTomHOMERunner.exe
C:\Program Files (x86)\BitTorrent\BitTorrent.exe
C:\Program Files (x86)\McAfee Security Scan\2.0.181\SSScheduler.exe
C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe
C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe
C:\Program Files (x86)\Gateway Photo Frame\ButtonMonitor.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Program Files (x86)\Winamp\winampa.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files (x86)\Ask.com\Updater\Updater.exe
C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUI.exe
C:\Program Files (x86)\Common Files\Steam\SteamService.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\DllHost.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\REGSVR32.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\conhost.exe
C:\Windows\SysWOW64\cscript.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/imghp?hl=en&tab=wi
uDefault_Page_URL = hxxp://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
mDefault_Page_URL = hxxp://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
mStart Page = hxxp://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
uURLSearchHooks: UrlSearchHook Class: {00000000-6e41-4fd3-8538-502f5495e5fc} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - C:\Program Files (x86)\Google\GoogleToolbarNotifier\5.7.6406.1642\swg.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
TB: {46897C77-E7A6-4C33-BFFB-E9C2E2718942} - No File
uRun: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
uRun: [Aim] "C:\Program Files (x86)\AIM\aim.exe" /d locale=en-US
uRun: [Steam] "C:\Program Files (x86)\Steam\Steam.exe" -silent
uRun: [TomTomHOME.exe] "C:\Program Files (x86)\TomTom HOME 2\TomTomHOMERunner.exe"
uRun: [BitTorrent] "C:\Program Files (x86)\BitTorrent\BitTorrent.exe"
uRun: [Google Update] "C:\Users\TJ\AppData\Local\Google\Update\GoogleUpdate.exe" /c
uRun: [-633060030] C:\Users\TJ\AppData\Local\Temp\tmph2557198224502851298.tmp
mRun: [BackupManagerTray] "C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe" -h -k
mRun: [Hotkey Utility] C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe
mRun: [Gateway Photo Frame] C:\Program Files (x86)\Gateway Photo Frame\ButtonMonitor.exe -A
mRun: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
mRun: [WinampAgent] "C:\Program Files (x86)\Winamp\winampa.exe"
mRun: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime
mRun: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun: [Adobe Reader Speed Launcher] "C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe"
mRun: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun: [<NO NAME>] 
mRun: [ApnUpdater] "C:\Program Files (x86)\Ask.com\Updater\Updater.exe"
StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\MCAFEE~1.LNK - C:\Program Files (x86)\McAfee Security Scan\2.0.181\SSScheduler.exe
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - C:\Program Files (x86)\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_43C348BC2E93EB2B.dll/cmsidewiki.html
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - C:\PROGRA~2\MICROS~1\Office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
TCP: Interfaces\{3CD02F84-8EEE-4D45-8BAF-ED7E23E161D8} : DhcpNameServer = 192.168.1.1 192.168.1.1
TCP: Interfaces\{EE83DBF9-06F9-4BD3-9EF1-C32FE69C84D0} : DhcpNameServer = 192.168.1.1 192.168.1.1
BHO-X64: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO-X64:     AcroIEHelperStub - No File
BHO-X64: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO-X64: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
BHO-X64: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
BHO-X64: Google Toolbar Notifier BHO: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files (x86)\Google\GoogleToolbarNotifier\5.7.6406.1642\swg.dll
BHO-X64: Ask Toolbar: {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
BHO-X64:     Ask Toolbar BHO - No File
BHO-X64: Java(tm) Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
TB-X64: Ask Toolbar: {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
TB-X64: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
TB-X64: {46897C77-E7A6-4C33-BFFB-E9C2E2718942} - No File
mRun-x64: [BackupManagerTray] "C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe" -h -k
mRun-x64: [Hotkey Utility] C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe
mRun-x64: [Gateway Photo Frame] C:\Program Files (x86)\Gateway Photo Frame\ButtonMonitor.exe -A
mRun-x64: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
mRun-x64: [WinampAgent] "C:\Program Files (x86)\Winamp\winampa.exe"
mRun-x64: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime
mRun-x64: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun-x64: [Adobe Reader Speed Launcher] "C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe"
mRun-x64: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun-x64: [(Default)] 
mRun-x64: [ApnUpdater] "C:\Program Files (x86)\Ask.com\Updater\Updater.exe"
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\TJ\AppData\Roaming\Mozilla\Firefox\Profiles\u8uc0z5p.default\
FF - prefs.js: browser.startup.homepage - hxxp://mp3tubetoolbar.com/?tmp=toolbar_Mp3Tube_homepage&prt=pinballtbfour04ff&clid=8d6f16a872f94a3a83cf82ccf205da0d&subid=
FF - prefs.js: keyword.URL - hxxp://mp3tubetoolbar.com/?tmp=nemo_results_removelink2&q=
FF - component: C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_17.1.0.19\coFFPlgn\components\coFFPlgn.dll
FF - component: C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_17.1.0.19\IPSFFPlgn\components\IPSFFPl.dll
FF - component: C:\Users\TJ\AppData\Roaming\Mozilla\Firefox\Profiles\u8uc0z5p.default\extensions\{463F6CA5-EE3C-4be1-B7E6-7FEE11953374}\platform\WINNT\components\FoxyTunes.dll
FF - plugin: C:\Program Files (x86)\Google\Update\1.3.21.57\npGoogleUpdate3.dll
FF - plugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\npctrlui.dll
FF - plugin: C:\Program Files (x86)\Mozilla Firefox\plugins\npdeployJava1.dll
FF - plugin: C:\Program Files (x86)\Mozilla Firefox\plugins\npdnu.dll
FF - plugin: C:\Program Files (x86)\Mozilla Firefox\plugins\npdnupdater2.dll
FF - plugin: C:\Program Files (x86)\Mozilla Firefox\plugins\npwachk.dll
FF - plugin: C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll
FF - plugin: C:\Users\TJ\AppData\Local\Google\Update\1.3.21.57\npGoogleUpdate3.dll
FF - plugin: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll
.
---- FIREFOX POLICIES ----
FF - user.js: keyword.URL - hxxp://mp3tubetoolbar.com/?tmp=nemo_results_removelink2&q=
FF - user.js: keyword.enabled - 1
.
============= SERVICES / DRIVERS ===============
.
R1 vwififlt;Virtual WiFi Filter Driver;C:\Windows\system32\DRIVERS\vwififlt.sys --> C:\Windows\system32\DRIVERS\vwififlt.sys [?]
R2 AMD External Events Utility;AMD External Events Utility;C:\Windows\system32\atiesrxx.exe --> C:\Windows\system32\atiesrxx.exe [?]
R2 Greg_Service;GRegService;C:\Program Files (x86)\Gateway\Registration\GregHSRW.exe [2009-8-28 1150496]
R2 NTI IScheduleSvc;NTI IScheduleSvc;C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\IScheduleSvc.exe [2009-11-17 255744]
R2 TomTomHOMEService;TomTomHOMEService;C:\Program Files (x86)\TomTom HOME 2\TomTomHOMEService.exe [2010-8-24 92008]
R2 Updater Service;Updater Service;C:\Program Files\Gateway\Gateway Updater\UpdaterService.exe [2010-4-12 243232]
R2 USBS3S4Detection;USBS3S4Detection;C:\OEM\USBDECTION\USBS3S4Detection.exe [2009-12-13 76320]
R3 amdkmdag;amdkmdag;C:\Windows\system32\DRIVERS\atikmdag.sys --> C:\Windows\system32\DRIVERS\atikmdag.sys [?]
R3 amdkmdap;amdkmdap;C:\Windows\system32\DRIVERS\atikmpag.sys --> C:\Windows\system32\DRIVERS\atikmpag.sys [?]
R3 AtiHDAudioService;ATI Function Driver for HD Audio Service;C:\Windows\system32\drivers\AtihdW76.sys --> C:\Windows\system32\drivers\AtihdW76.sys [?]
R3 RTL8167;Realtek 8167 NT Driver;C:\Windows\system32\DRIVERS\Rt64win7.sys --> C:\Windows\system32\DRIVERS\Rt64win7.sys [?]
R3 RTL8192su;%RTL8192su.DeviceDesc.DispName%;C:\Windows\system32\DRIVERS\RTL8192su.sys --> C:\Windows\system32\DRIVERS\RTL8192su.sys [?]
R3 vwifimp;Microsoft Virtual WiFi Miniport Service;C:\Windows\system32\DRIVERS\vwifimp.sys --> C:\Windows\system32\DRIVERS\vwifimp.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 gupdate;Google Update Service (gupdate);C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2010-12-16 135664]
S3 gupdatem;Google Update Service (gupdatem);C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2010-12-16 135664]
S3 IntcDAud;Intel(R) Display Audio;C:\Windows\system32\DRIVERS\IntcDAud.sys --> C:\Windows\system32\DRIVERS\IntcDAud.sys [?]
S3 McComponentHostService;McAfee Security Scan Component Host Service;C:\Program Files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
S3 WatAdminSvc;Windows Activation Technologies Service;C:\Windows\system32\Wat\WatAdminSvc.exe --> C:\Windows\system32\Wat\WatAdminSvc.exe [?]
.
=============== File Associations ===============
.
regfile=regedit.exe "%1" %*
scrfile="%1" %*
.
=============== Created Last 30 ================
.
2011-07-24 12:26:26	8578896	----a-w-	C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{A8A8A79F-D92C-4BD3-8FE0-E80D3CA4BBA0}\mpengine.dll
2011-07-07 23:55:33	--------	d-----w-	C:\Windows\SysWow64\AGEIA
2011-07-07 23:55:28	--------	d-----w-	C:\Program Files (x86)\Common Files\Wise Installation Wizard
2011-07-07 23:55:01	520544	----a-w-	C:\Windows\System32\d3dx10_41.dll
2011-07-07 23:55:01	453456	----a-w-	C:\Windows\SysWow64\d3dx10_41.dll
2011-07-07 23:55:01	2430312	----a-w-	C:\Windows\System32\D3DCompiler_41.dll
2011-07-07 23:55:01	1846632	----a-w-	C:\Windows\SysWow64\D3DCompiler_41.dll
2011-07-07 23:55:00	5425496	----a-w-	C:\Windows\System32\D3DX9_41.dll
2011-07-07 03:49:38	--------	d-----w-	C:\Program Files\CCleaner
2011-07-06 06:38:45	--------	d-----w-	C:\Users\TJ\AppData\Roaming\Malwarebytes
2011-07-06 06:38:41	38472	----a-w-	C:\Windows\SysWow64\drivers\mbamswissarmy.sys
2011-07-06 06:38:41	17144	----a-w-	C:\Windows\SysWow64\drivers\mbam.sys
2011-07-06 06:38:40	--------	d-----w-	C:\ProgramData\Malwarebytes
2011-07-06 06:38:40	--------	d-----w-	C:\Program Files (x86)\Malwarebytes' Anti-Malware
2011-07-06 06:38:19	--------	d--h--w-	C:\ProgramData\Common Files
2011-07-06 06:36:05	--------	d-----w-	C:\ProgramData\MFAData
2011-07-05 21:33:57	--------	d-----w-	C:\Program Files (x86)\Blinkx
2011-07-04 06:00:51	--------	d-----w-	C:\Program Files (x86)\Microsoft Security Client
2011-07-04 06:00:40	--------	d-----w-	C:\Program Files\Microsoft Security Client
2011-07-04 05:53:38	0	---ha-w-	C:\Users\TJ\AppData\Local\Tfapimovumaxagaw.bin
2011-07-04 05:53:36	--------	d--h--w-	C:\Users\TJ\AppData\Local\{301796A4-EE80-46AA-91B5-C03700635F48}
2011-06-29 18:30:04	404640	----a-w-	C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2011-06-26 19:53:19	--------	d-----w-	C:\Grizli777
.
==================== Find3M  ====================
.
2011-05-28 03:25:16	1638912	----a-w-	C:\Windows\System32\mshtml.tlb
2011-05-28 03:07:01	3133952	----a-w-	C:\Windows\System32\win32k.sys
2011-05-28 03:00:02	1638912	----a-w-	C:\Windows\SysWow64\mshtml.tlb
2011-05-25 02:14:10	270720	------w-	C:\Windows\System32\MpSigStub.exe
2011-05-04 02:51:08	287744	----a-w-	C:\Windows\System32\drivers\mrxsmb10.sys
2011-05-04 02:51:08	157696	----a-w-	C:\Windows\System32\drivers\mrxsmb.sys
2011-05-04 02:51:05	126464	----a-w-	C:\Windows\System32\drivers\mrxsmb20.sys
2011-05-03 05:21:22	976896	----a-w-	C:\Windows\System32\inetcomm.dll
2011-05-03 04:50:29	740864	----a-w-	C:\Windows\SysWow64\inetcomm.dll
2011-04-29 03:13:10	461312	----a-w-	C:\Windows\System32\drivers\srv.sys
2011-04-29 03:12:54	399872	----a-w-	C:\Windows\System32\drivers\srv2.sys
2011-04-29 03:12:37	161792	----a-w-	C:\Windows\System32\drivers\srvnet.sys
.
============= FINISH: 22:41:02.38 ===============

And the Attach.txt is in a .zip folder and attached to this post.


Didn't run the GMER program because it's a 64-bit version of Windows.

Here's the aswMBR log:
aswMBR version 0.9.8.977 Copyright(c) 2011 AVAST Software
Run date: 2011-07-25 23:35:37
-----------------------------
23:35:37.155    OS Version: Windows x64 6.1.7600 
23:35:37.155    Number of processors: 4 586 0x2502
23:35:37.155    ComputerName: TJ-PC  UserName: TJ
23:35:38.278    Initialize success
23:35:41.726    AVAST engine defs: 11072501
23:35:44.487    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
23:35:44.487    Disk 0 Vendor: WDC_WD64 01.0 Size: 610480MB BusType: 3
23:35:44.503    Disk 0 MBR read successfully
23:35:44.503    Disk 0 MBR scan
23:35:44.518    Disk 0 Windows 7 default MBR code
23:35:44.518    Service scanning
23:35:45.517    Modules scanning
23:35:45.517    Disk 0 trace - called modules:
23:35:45.517    ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xfffffa8004cc1254]<<
23:35:45.532    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8004ca9060]
23:35:45.532    3 CLASSPNP.SYS[fffff880013b043f] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0xfffffa80049e3050]
23:35:45.532    \Driver\iaStor[0xfffffa800499d4a0] -> IRP_MJ_INTERNAL_DEVICE_CONTROL -> 0xfffffa8004cc1254
23:35:46.890    AVAST engine scan C:\Windows
23:35:48.964    AVAST engine scan C:\Windows\system32
23:36:40.179    AVAST engine scan C:\Windows\system32\drivers
23:36:45.967    AVAST engine scan C:\Users\TJ
23:42:42.895    File: C:\Users\TJ\AppData\Local\Temp\tmph2557198224502851298.tmp  **INFECTED** Win32:Tracur-CB [Trj]
23:44:22.127    AVAST engine scan C:\ProgramData
23:45:11.142    Scan finished successfully
23:51:44.559    Disk 0 MBR has been saved successfully to "J:\MBR.dat"
23:51:44.575    The log file has been saved successfully to "J:\aswMBR.txt"



And here's an updated HijackThis log:
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 10:10:48 PM, on 7/25/2011
Platform: Windows 7  (WinNT 6.00.3504)
MSIE: Internet Explorer v8.00 (8.00.7600.16800)
Boot mode: Normal

Running processes:
C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAAnotif.exe
C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files (x86)\AIM\aim.exe
C:\Program Files (x86)\Steam\Steam.exe
C:\Program Files (x86)\TomTom HOME 2\TomTomHOMERunner.exe
C:\Program Files (x86)\BitTorrent\BitTorrent.exe
C:\Program Files (x86)\McAfee Security Scan\2.0.181\SSScheduler.exe
C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe
C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe
C:\Program Files (x86)\Gateway Photo Frame\ButtonMonitor.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Program Files (x86)\Winamp\winampa.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files (x86)\Ask.com\Updater\Updater.exe
C:\Users\TJ\AppData\Local\Temp\tmph2557198224502851298.tmp
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Users\TJ\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = 
R3 - URLSearchHook: UrlSearchHook Class - {00000000-6E41-4FD3-8538-502F5495E5FC} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files (x86)\Google\GoogleToolbarNotifier\5.7.6406.1642\swg.dll
O2 - BHO: Ask Toolbar BHO - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: Ask Toolbar - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [BackupManagerTray] "C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe" -h -k
O4 - HKLM\..\Run: [Hotkey Utility] C:\Program Files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe
O4 - HKLM\..\Run: [Gateway Photo Frame] C:\Program Files (x86)\Gateway Photo Frame\ButtonMonitor.exe -A
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files (x86)\Winamp\winampa.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [ApnUpdater] "C:\Program Files (x86)\Ask.com\Updater\Updater.exe"
O4 - HKCU\..\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [Aim] "C:\Program Files (x86)\AIM\aim.exe" /d locale=en-US
O4 - HKCU\..\Run: [Steam] "C:\Program Files (x86)\Steam\Steam.exe" -silent
O4 - HKCU\..\Run: [TomTomHOME.exe] "C:\Program Files (x86)\TomTom HOME 2\TomTomHOMERunner.exe"
O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files (x86)\BitTorrent\BitTorrent.exe"
O4 - HKCU\..\Run: [Google Update] "C:\Users\TJ\AppData\Local\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [-633060030] C:\Users\TJ\AppData\Local\Temp\tmph2557198224502851298.tmp
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
O4 - Global Startup: McAfee Security Scan Plus.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files (x86)\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_43C348BC2E93EB2B.dll/cmsidewiki.html
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~2\MICROS~1\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files (x86)\Gateway Games\Gateway Game Console\GameConsoleService.exe
O23 - Service: GRegService (Greg_Service) - Acer Incorporated - C:\Program Files (x86)\Gateway\Registration\GregHSRW.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: McAfee Security Scan Component Host Service (McComponentHostService) - McAfee, Inc. - C:\Program Files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files (x86)\Common Files\Nero\Nero BackItUp 4\NBService.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: NTI IScheduleSvc - NewTech Infosystems, Inc. - C:\Program Files (x86)\NewTech Infosystems\Gateway MyBackup\IScheduleSvc.exe
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: TomTomHOMEService - TomTom - C:\Program Files (x86)\TomTom HOME 2\TomTomHOMEService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: Updater Service - Acer Group - C:\Program Files\Gateway\Gateway Updater\UpdaterService.exe
O23 - Service: USBS3S4Detection - Unknown owner - C:\OEM\USBDECTION\USBS3S4Detection.exe
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 11502 bytes


Thanks for the assistance.

#5 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 26 July 2011 - 03:23 PM

Hello,


Lets run some tools and see what they come up with.

1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.5.6.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.

2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TDSSKILLER log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#6 Evil Joe

Evil Joe
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 26 July 2011 - 11:08 PM

TDSS log:

2011/07/26 19:21:28.0263 5080	TDSS rootkit removing tool 2.5.11.0 Jul 11 2011 16:56:56
2011/07/26 19:21:28.0996 5080	================================================================================
2011/07/26 19:21:28.0996 5080	SystemInfo:
2011/07/26 19:21:28.0996 5080	
2011/07/26 19:21:28.0996 5080	OS Version: 6.1.7600 ServicePack: 0.0
2011/07/26 19:21:28.0996 5080	Product type: Workstation
2011/07/26 19:21:28.0996 5080	ComputerName: TJ-PC
2011/07/26 19:21:28.0996 5080	UserName: TJ
2011/07/26 19:21:28.0996 5080	Windows directory: C:\Windows
2011/07/26 19:21:28.0996 5080	System windows directory: C:\Windows
2011/07/26 19:21:28.0996 5080	Running under WOW64
2011/07/26 19:21:28.0996 5080	Processor architecture: Intel x64
2011/07/26 19:21:28.0996 5080	Number of processors: 4
2011/07/26 19:21:28.0996 5080	Page size: 0x1000
2011/07/26 19:21:28.0996 5080	Boot type: Normal boot
2011/07/26 19:21:28.0996 5080	================================================================================
2011/07/26 19:21:29.0277 5080	Initialize success
2011/07/26 19:22:11.0522 3448	================================================================================
2011/07/26 19:22:11.0522 3448	Scan started
2011/07/26 19:22:11.0522 3448	Mode: Manual; 
2011/07/26 19:22:11.0522 3448	================================================================================
2011/07/26 19:22:11.0772 3448	1394ohci        (1b00662092f9f9568b995902f0cc40d5) C:\Windows\system32\DRIVERS\1394ohci.sys
2011/07/26 19:22:11.0834 3448	ACPI            (6f11e88748cdefd2f76aa215f97ddfe5) C:\Windows\system32\DRIVERS\ACPI.sys
2011/07/26 19:22:11.0850 3448	AcpiPmi         (63b05a0420ce4bf0e4af6dcc7cada254) C:\Windows\system32\DRIVERS\acpipmi.sys
2011/07/26 19:22:11.0897 3448	adp94xx         (2f6b34b83843f0c5118b63ac634f5bf4) C:\Windows\system32\DRIVERS\adp94xx.sys
2011/07/26 19:22:11.0928 3448	adpahci         (597f78224ee9224ea1a13d6350ced962) C:\Windows\system32\DRIVERS\adpahci.sys
2011/07/26 19:22:11.0959 3448	adpu320         (e109549c90f62fb570b9540c4b148e54) C:\Windows\system32\DRIVERS\adpu320.sys
2011/07/26 19:22:12.0021 3448	AFD             (6ef20ddf3172e97d69f596fb90602f29) C:\Windows\system32\drivers\afd.sys
2011/07/26 19:22:12.0053 3448	agp440          (608c14dba7299d8cb6ed035a68a15799) C:\Windows\system32\DRIVERS\agp440.sys
2011/07/26 19:22:12.0068 3448	aliide          (5812713a477a3ad7363c7438ca2ee038) C:\Windows\system32\DRIVERS\aliide.sys
2011/07/26 19:22:12.0084 3448	amdide          (1ff8b4431c353ce385c875f194924c0c) C:\Windows\system32\DRIVERS\amdide.sys
2011/07/26 19:22:12.0099 3448	AmdK8           (7024f087cff1833a806193ef9d22cda9) C:\Windows\system32\DRIVERS\amdk8.sys
2011/07/26 19:22:12.0271 3448	amdkmdag        (dcc8177244fe79c61c4e73c65e63922a) C:\Windows\system32\DRIVERS\atikmdag.sys
2011/07/26 19:22:12.0427 3448	amdkmdap        (7fe67d107329dc2cf89136a8e19bceb7) C:\Windows\system32\DRIVERS\atikmpag.sys
2011/07/26 19:22:12.0443 3448	AmdPPM          (1e56388b3fe0d031c44144eb8c4d6217) C:\Windows\system32\DRIVERS\amdppm.sys
2011/07/26 19:22:12.0474 3448	amdsata         (ec7ebab00a4d8448bab68d1e49b4beb9) C:\Windows\system32\drivers\amdsata.sys
2011/07/26 19:22:12.0489 3448	amdsbs          (f67f933e79241ed32ff46a4f29b5120b) C:\Windows\system32\DRIVERS\amdsbs.sys
2011/07/26 19:22:12.0505 3448	amdxata         (db27766102c7bf7e95140a2aa81d042e) C:\Windows\system32\drivers\amdxata.sys
2011/07/26 19:22:12.0521 3448	AppID           (42fd751b27fa0e9c69bb39f39e409594) C:\Windows\system32\drivers\appid.sys
2011/07/26 19:22:12.0552 3448	arc             (c484f8ceb1717c540242531db7845c4e) C:\Windows\system32\DRIVERS\arc.sys
2011/07/26 19:22:12.0567 3448	arcsas          (019af6924aefe7839f61c830227fe79c) C:\Windows\system32\DRIVERS\arcsas.sys
2011/07/26 19:22:12.0583 3448	AsyncMac        (769765ce2cc62867468cea93969b2242) C:\Windows\system32\DRIVERS\asyncmac.sys
2011/07/26 19:22:12.0614 3448	atapi           (02062c0b390b7729edc9e69c680a6f3c) C:\Windows\system32\DRIVERS\atapi.sys
2011/07/26 19:22:12.0677 3448	AtiHDAudioService (4bf5bca6e2608cd8a00bc4a6673a9f47) C:\Windows\system32\drivers\AtihdW76.sys
2011/07/26 19:22:12.0708 3448	b06bdrv         (3e5b191307609f7514148c6832bb0842) C:\Windows\system32\DRIVERS\bxvbda.sys
2011/07/26 19:22:12.0739 3448	b57nd60a        (b5ace6968304a3900eeb1ebfd9622df2) C:\Windows\system32\DRIVERS\b57nd60a.sys
2011/07/26 19:22:12.0770 3448	Beep            (16a47ce2decc9b099349a5f840654746) C:\Windows\system32\drivers\Beep.sys
2011/07/26 19:22:12.0801 3448	blbdrive        (61583ee3c3a17003c4acd0475646b4d3) C:\Windows\system32\DRIVERS\blbdrive.sys
2011/07/26 19:22:12.0833 3448	bowser          (19d20159708e152267e53b66677a4995) C:\Windows\system32\DRIVERS\bowser.sys
2011/07/26 19:22:12.0848 3448	BrFiltLo        (f09eee9edc320b5e1501f749fde686c8) C:\Windows\system32\DRIVERS\BrFiltLo.sys
2011/07/26 19:22:12.0864 3448	BrFiltUp        (b114d3098e9bdb8bea8b053685831be6) C:\Windows\system32\DRIVERS\BrFiltUp.sys
2011/07/26 19:22:12.0895 3448	Brserid         (43bea8d483bf1870f018e2d02e06a5bd) C:\Windows\System32\Drivers\Brserid.sys
2011/07/26 19:22:12.0911 3448	BrSerWdm        (a6eca2151b08a09caceca35c07f05b42) C:\Windows\System32\Drivers\BrSerWdm.sys
2011/07/26 19:22:12.0926 3448	BrUsbMdm        (b79968002c277e869cf38bd22cd61524) C:\Windows\System32\Drivers\BrUsbMdm.sys
2011/07/26 19:22:12.0957 3448	BrUsbSer        (a87528880231c54e75ea7a44943b38bf) C:\Windows\System32\Drivers\BrUsbSer.sys
2011/07/26 19:22:12.0973 3448	BTHMODEM        (9da669f11d1f894ab4eb69bf546a42e8) C:\Windows\system32\DRIVERS\bthmodem.sys
2011/07/26 19:22:13.0004 3448	cdfs            (b8bd2bb284668c84865658c77574381a) C:\Windows\system32\DRIVERS\cdfs.sys
2011/07/26 19:22:13.0035 3448	cdrom           (83d2d75e1efb81b3450c18131443f7db) C:\Windows\system32\DRIVERS\cdrom.sys
2011/07/26 19:22:13.0067 3448	circlass        (d7cd5c4e1b71fa62050515314cfb52cf) C:\Windows\system32\DRIVERS\circlass.sys
2011/07/26 19:22:13.0082 3448	CLFS            (fe1ec06f2253f691fe36217c592a0206) C:\Windows\system32\CLFS.sys
2011/07/26 19:22:13.0113 3448	CmBatt          (0840155d0bddf1190f84a663c284bd33) C:\Windows\system32\DRIVERS\CmBatt.sys
2011/07/26 19:22:13.0129 3448	cmdide          (e19d3f095812725d88f9001985b94edd) C:\Windows\system32\DRIVERS\cmdide.sys
2011/07/26 19:22:13.0160 3448	CNG             (f95fd4cb7da00ba2a63ce9f6b5c053e1) C:\Windows\system32\Drivers\cng.sys
2011/07/26 19:22:13.0176 3448	Compbatt        (102de219c3f61415f964c88e9085ad14) C:\Windows\system32\DRIVERS\compbatt.sys
2011/07/26 19:22:13.0191 3448	CompositeBus    (f26b3a86f6fa87ca360b879581ab4123) C:\Windows\system32\DRIVERS\CompositeBus.sys
2011/07/26 19:22:13.0207 3448	crcdisk         (1c827878a998c18847245fe1f34ee597) C:\Windows\system32\DRIVERS\crcdisk.sys
2011/07/26 19:22:13.0254 3448	DfsC            (9c253ce7311ca60fc11c774692a13208) C:\Windows\system32\Drivers\dfsc.sys
2011/07/26 19:22:13.0285 3448	discache        (13096b05847ec78f0977f2c0f79e9ab3) C:\Windows\system32\drivers\discache.sys
2011/07/26 19:22:13.0301 3448	Disk            (9819eee8b5ea3784ec4af3b137a5244c) C:\Windows\system32\DRIVERS\disk.sys
2011/07/26 19:22:13.0332 3448	drmkaud         (9b19f34400d24df84c858a421c205754) C:\Windows\system32\drivers\drmkaud.sys
2011/07/26 19:22:13.0379 3448	DXGKrnl         (1633b9abf52784a1331476397a48cbef) C:\Windows\System32\drivers\dxgkrnl.sys
2011/07/26 19:22:13.0441 3448	ebdrv           (dc5d737f51be844d8c82c695eb17372f) C:\Windows\system32\DRIVERS\evbda.sys
2011/07/26 19:22:13.0550 3448	elxstor         (0e5da5369a0fcaea12456dd852545184) C:\Windows\system32\DRIVERS\elxstor.sys
2011/07/26 19:22:13.0566 3448	ErrDev          (34a3c54752046e79a126e15c51db409b) C:\Windows\system32\DRIVERS\errdev.sys
2011/07/26 19:22:13.0597 3448	exfat           (a510c654ec00c1e9bdd91eeb3a59823b) C:\Windows\system32\drivers\exfat.sys
2011/07/26 19:22:13.0613 3448	fastfat         (0adc83218b66a6db380c330836f3e36d) C:\Windows\system32\drivers\fastfat.sys
2011/07/26 19:22:13.0628 3448	fdc             (d765d19cd8ef61f650c384f62fac00ab) C:\Windows\system32\DRIVERS\fdc.sys
2011/07/26 19:22:13.0659 3448	FileInfo        (655661be46b5f5f3fd454e2c3095b930) C:\Windows\system32\drivers\fileinfo.sys
2011/07/26 19:22:13.0675 3448	Filetrace       (5f671ab5bc87eea04ec38a6cd5962a47) C:\Windows\system32\drivers\filetrace.sys
2011/07/26 19:22:13.0691 3448	flpydisk        (c172a0f53008eaeb8ea33fe10e177af5) C:\Windows\system32\DRIVERS\flpydisk.sys
2011/07/26 19:22:13.0706 3448	FltMgr          (f7866af72abbaf84b1fa5aa195378c59) C:\Windows\system32\drivers\fltmgr.sys
2011/07/26 19:22:13.0737 3448	FsDepends       (d43703496149971890703b4b1b723eac) C:\Windows\system32\drivers\FsDepends.sys
2011/07/26 19:22:13.0753 3448	Fs_Rec          (e95ef8547de20cf0603557c0cf7a9462) C:\Windows\system32\drivers\Fs_Rec.sys
2011/07/26 19:22:13.0784 3448	fvevol          (ae87ba80d0ec3b57126ed2cdc15b24ed) C:\Windows\system32\DRIVERS\fvevol.sys
2011/07/26 19:22:13.0815 3448	gagp30kx        (8c778d335c9d272cfd3298ab02abe3b6) C:\Windows\system32\DRIVERS\gagp30kx.sys
2011/07/26 19:22:13.0878 3448	hcw85cir        (f2523ef6460fc42405b12248338ab2f0) C:\Windows\system32\drivers\hcw85cir.sys
2011/07/26 19:22:13.0909 3448	HdAudAddService (6410f6f415b2a5a9037224c41da8bf12) C:\Windows\system32\drivers\HdAudio.sys
2011/07/26 19:22:13.0940 3448	HDAudBus        (0a49913402747a0b67de940fb42cbdbb) C:\Windows\system32\DRIVERS\HDAudBus.sys
2011/07/26 19:22:13.0956 3448	HidBatt         (78e86380454a7b10a5eb255dc44a355f) C:\Windows\system32\DRIVERS\HidBatt.sys
2011/07/26 19:22:13.0956 3448	HidBth          (7fd2a313f7afe5c4dab14798c48dd104) C:\Windows\system32\DRIVERS\hidbth.sys
2011/07/26 19:22:13.0971 3448	HidIr           (0a77d29f311b88cfae3b13f9c1a73825) C:\Windows\system32\DRIVERS\hidir.sys
2011/07/26 19:22:14.0018 3448	HidUsb          (b3bf6b5b50006def50b66306d99fcf6f) C:\Windows\system32\DRIVERS\hidusb.sys
2011/07/26 19:22:14.0034 3448	HpSAMD          (0886d440058f203eba0e1825e4355914) C:\Windows\system32\DRIVERS\HpSAMD.sys
2011/07/26 19:22:14.0065 3448	HTTP            (cee049cac4efa7f4e1e4ad014414a5d4) C:\Windows\system32\drivers\HTTP.sys
2011/07/26 19:22:14.0096 3448	hwpolicy        (f17766a19145f111856378df337a5d79) C:\Windows\system32\drivers\hwpolicy.sys
2011/07/26 19:22:14.0112 3448	i8042prt        (fa55c73d4affa7ee23ac4be53b4592d3) C:\Windows\system32\DRIVERS\i8042prt.sys
2011/07/26 19:22:14.0159 3448	iaStor          (be7d72fcf442c26975942007e0831241) C:\Windows\system32\DRIVERS\iaStor.sys
2011/07/26 19:22:14.0190 3448	iaStorV         (b75e45c564e944a2657167d197ab29da) C:\Windows\system32\drivers\iaStorV.sys
2011/07/26 19:22:14.0393 3448	igfx            (677aa5991026a65ada128c4b59cf2bad) C:\Windows\system32\DRIVERS\igdkmd64.sys
2011/07/26 19:22:14.0564 3448	iirsp           (5c18831c61933628f5bb0ea2675b9d21) C:\Windows\system32\DRIVERS\iirsp.sys
2011/07/26 19:22:14.0642 3448	IntcAzAudAddService (2e3b99e8c23be2bf32ebe1db5261f275) C:\Windows\system32\drivers\RTKVHD64.sys
2011/07/26 19:22:14.0673 3448	IntcDAud        (da24c1f66ee1b5a92e045376d7a44b58) C:\Windows\system32\DRIVERS\IntcDAud.sys
2011/07/26 19:22:14.0673 3448	intelide        (f00f20e70c6ec3aa366910083a0518aa) C:\Windows\system32\DRIVERS\intelide.sys
2011/07/26 19:22:14.0705 3448	intelppm        (ada036632c664caa754079041cf1f8c1) C:\Windows\system32\DRIVERS\intelppm.sys
2011/07/26 19:22:14.0720 3448	IpFilterDriver  (722dd294df62483cecaae6e094b4d695) C:\Windows\system32\DRIVERS\ipfltdrv.sys
2011/07/26 19:22:14.0736 3448	IPMIDRV         (e2b4a4494db7cb9b89b55ca268c337c5) C:\Windows\system32\DRIVERS\IPMIDrv.sys
2011/07/26 19:22:14.0767 3448	IPNAT           (af9b39a7e7b6caa203b3862582e9f2d0) C:\Windows\system32\drivers\ipnat.sys
2011/07/26 19:22:14.0798 3448	IRENUM          (3abf5e7213eb28966d55d58b515d5ce9) C:\Windows\system32\drivers\irenum.sys
2011/07/26 19:22:14.0798 3448	isapnp          (2f7b28dc3e1183e5eb418df55c204f38) C:\Windows\system32\DRIVERS\isapnp.sys
2011/07/26 19:22:14.0829 3448	iScsiPrt        (fa4d2557de56d45b0a346f93564be6e1) C:\Windows\system32\DRIVERS\msiscsi.sys
2011/07/26 19:22:14.0845 3448	kbdclass        (bc02336f1cba7dcc7d1213bb588a68a5) C:\Windows\system32\DRIVERS\kbdclass.sys
2011/07/26 19:22:14.0876 3448	kbdhid          (6def98f8541e1b5dceb2c822a11f7323) C:\Windows\system32\DRIVERS\kbdhid.sys
2011/07/26 19:22:14.0892 3448	KSecDD          (e8b6fcc9c83535c67f835d407620bd27) C:\Windows\system32\Drivers\ksecdd.sys
2011/07/26 19:22:14.0923 3448	KSecPkg         (a8c63880ef6f4d3fec7b616b9c060215) C:\Windows\system32\Drivers\ksecpkg.sys
2011/07/26 19:22:14.0954 3448	ksthunk         (6869281e78cb31a43e969f06b57347c4) C:\Windows\system32\drivers\ksthunk.sys
2011/07/26 19:22:14.0985 3448	lltdio          (1538831cf8ad2979a04c423779465827) C:\Windows\system32\DRIVERS\lltdio.sys
2011/07/26 19:22:15.0017 3448	LSI_FC          (1a93e54eb0ece102495a51266dcdb6a6) C:\Windows\system32\DRIVERS\lsi_fc.sys
2011/07/26 19:22:15.0032 3448	LSI_SAS         (1047184a9fdc8bdbff857175875ee810) C:\Windows\system32\DRIVERS\lsi_sas.sys
2011/07/26 19:22:15.0048 3448	LSI_SAS2        (30f5c0de1ee8b5bc9306c1f0e4a75f93) C:\Windows\system32\DRIVERS\lsi_sas2.sys
2011/07/26 19:22:15.0063 3448	LSI_SCSI        (0504eacaff0d3c8aed161c4b0d369d4a) C:\Windows\system32\DRIVERS\lsi_scsi.sys
2011/07/26 19:22:15.0095 3448	luafv           (43d0f98e1d56ccddb0d5254cff7b356e) C:\Windows\system32\drivers\luafv.sys
2011/07/26 19:22:15.0110 3448	megasas         (a55805f747c6edb6a9080d7c633bd0f4) C:\Windows\system32\DRIVERS\megasas.sys
2011/07/26 19:22:15.0141 3448	MegaSR          (baf74ce0072480c3b6b7c13b2a94d6b3) C:\Windows\system32\DRIVERS\MegaSR.sys
2011/07/26 19:22:15.0157 3448	Modem           (800ba92f7010378b09f9ed9270f07137) C:\Windows\system32\drivers\modem.sys
2011/07/26 19:22:15.0173 3448	monitor         (b03d591dc7da45ece20b3b467e6aadaa) C:\Windows\system32\DRIVERS\monitor.sys
2011/07/26 19:22:15.0204 3448	mouclass        (7d27ea49f3c1f687d357e77a470aea99) C:\Windows\system32\DRIVERS\mouclass.sys
2011/07/26 19:22:15.0235 3448	mouhid          (d3bf052c40b0c4166d9fd86a4288c1e6) C:\Windows\system32\DRIVERS\mouhid.sys
2011/07/26 19:22:15.0251 3448	mountmgr        (791af66c4d0e7c90a3646066386fb571) C:\Windows\system32\drivers\mountmgr.sys
2011/07/26 19:22:15.0266 3448	mpio            (609d1d87649ecc19796f4d76d4c15cea) C:\Windows\system32\DRIVERS\mpio.sys
2011/07/26 19:22:15.0282 3448	mpsdrv          (6c38c9e45ae0ea2fa5e551f2ed5e978f) C:\Windows\system32\drivers\mpsdrv.sys
2011/07/26 19:22:15.0297 3448	MRxDAV          (30524261bb51d96d6fcbac20c810183c) C:\Windows\system32\drivers\mrxdav.sys
2011/07/26 19:22:15.0329 3448	mrxsmb          (040d62a9d8ad28922632137acdd984f2) C:\Windows\system32\DRIVERS\mrxsmb.sys
2011/07/26 19:22:15.0360 3448	mrxsmb10        (a8c2d7673c8a010569390c826a0efaf4) C:\Windows\system32\DRIVERS\mrxsmb10.sys
2011/07/26 19:22:15.0375 3448	mrxsmb20        (3c142d31de9f2f193218a53fe2632051) C:\Windows\system32\DRIVERS\mrxsmb20.sys
2011/07/26 19:22:15.0391 3448	msahci          (5c37497276e3b3a5488b23a326a754b7) C:\Windows\system32\DRIVERS\msahci.sys
2011/07/26 19:22:15.0407 3448	msdsm           (8d27b597229aed79430fb9db3bcbfbd0) C:\Windows\system32\DRIVERS\msdsm.sys
2011/07/26 19:22:15.0422 3448	Msfs            (aa3fb40e17ce1388fa1bedab50ea8f96) C:\Windows\system32\drivers\Msfs.sys
2011/07/26 19:22:15.0453 3448	mshidkmdf       (f9d215a46a8b9753f61767fa72a20326) C:\Windows\System32\drivers\mshidkmdf.sys
2011/07/26 19:22:15.0469 3448	msisadrv        (d916874bbd4f8b07bfb7fa9b3ccae29d) C:\Windows\system32\DRIVERS\msisadrv.sys
2011/07/26 19:22:15.0500 3448	MSKSSRV         (49ccf2c4fea34ffad8b1b59d49439366) C:\Windows\system32\drivers\MSKSSRV.sys
2011/07/26 19:22:15.0516 3448	MSPCLOCK        (bdd71ace35a232104ddd349ee70e1ab3) C:\Windows\system32\drivers\MSPCLOCK.sys
2011/07/26 19:22:15.0547 3448	MSPQM           (4ed981241db27c3383d72092b618a1d0) C:\Windows\system32\drivers\MSPQM.sys
2011/07/26 19:22:15.0563 3448	MsRPC           (89cb141aa8616d8c6a4610fa26c60964) C:\Windows\system32\drivers\MsRPC.sys
2011/07/26 19:22:15.0594 3448	mssmbios        (0eed230e37515a0eaee3c2e1bc97b288) C:\Windows\system32\DRIVERS\mssmbios.sys
2011/07/26 19:22:15.0609 3448	MSTEE           (2e66f9ecb30b4221a318c92ac2250779) C:\Windows\system32\drivers\MSTEE.sys
2011/07/26 19:22:15.0641 3448	MTConfig        (7ea404308934e675bffde8edf0757bcd) C:\Windows\system32\DRIVERS\MTConfig.sys
2011/07/26 19:22:15.0656 3448	Mup             (f9a18612fd3526fe473c1bda678d61c8) C:\Windows\system32\Drivers\mup.sys
2011/07/26 19:22:15.0687 3448	NativeWifiP     (1ea3749c4114db3e3161156ffffa6b33) C:\Windows\system32\DRIVERS\nwifi.sys
2011/07/26 19:22:15.0734 3448	NDIS            (cad515dbd07d082bb317d9928ce8962c) C:\Windows\system32\drivers\ndis.sys
2011/07/26 19:22:15.0750 3448	NdisCap         (9f9a1f53aad7da4d6fef5bb73ab811ac) C:\Windows\system32\DRIVERS\ndiscap.sys
2011/07/26 19:22:15.0781 3448	NdisTapi        (30639c932d9fef22b31268fe25a1b6e5) C:\Windows\system32\DRIVERS\ndistapi.sys
2011/07/26 19:22:15.0797 3448	Ndisuio         (f105ba1e22bf1f2ee8f005d4305e4bec) C:\Windows\system32\DRIVERS\ndisuio.sys
2011/07/26 19:22:15.0812 3448	NdisWan         (557dfab9ca1fcb036ac77564c010dad3) C:\Windows\system32\DRIVERS\ndiswan.sys
2011/07/26 19:22:15.0828 3448	NDProxy         (659b74fb74b86228d6338d643cd3e3cf) C:\Windows\system32\drivers\NDProxy.sys
2011/07/26 19:22:15.0859 3448	NetBIOS         (86743d9f5d2b1048062b14b1d84501c4) C:\Windows\system32\DRIVERS\netbios.sys
2011/07/26 19:22:15.0875 3448	NetBT           (9162b273a44ab9dce5b44362731d062a) C:\Windows\system32\DRIVERS\netbt.sys
2011/07/26 19:22:15.0906 3448	nfrd960         (77889813be4d166cdab78ddba990da92) C:\Windows\system32\DRIVERS\nfrd960.sys
2011/07/26 19:22:15.0937 3448	Npfs            (1e4c4ab5c9b8dd13179bbdc75a2a01f7) C:\Windows\system32\drivers\Npfs.sys
2011/07/26 19:22:15.0953 3448	nsiproxy        (e7f5ae18af4168178a642a9247c63001) C:\Windows\system32\drivers\nsiproxy.sys
2011/07/26 19:22:15.0999 3448	Ntfs            (378e0e0dfea67d98ae6ea53adbbd76bc) C:\Windows\system32\drivers\Ntfs.sys
2011/07/26 19:22:16.0077 3448	NTIDrvr         (64ddd0dee976302f4bd93e5efcc2f013) C:\Windows\system32\drivers\NTIDrvr.sys
2011/07/26 19:22:16.0093 3448	Null            (9899284589f75fa8724ff3d16aed75c1) C:\Windows\system32\drivers\Null.sys
2011/07/26 19:22:16.0140 3448	nvraid          (a4d9c9a608a97f59307c2f2600edc6a4) C:\Windows\system32\drivers\nvraid.sys
2011/07/26 19:22:16.0155 3448	nvstor          (6c1d5f70e7a6a3fd1c90d840edc048b9) C:\Windows\system32\drivers\nvstor.sys
2011/07/26 19:22:16.0187 3448	nv_agp          (270d7cd42d6e3979f6dd0146650f0e05) C:\Windows\system32\DRIVERS\nv_agp.sys
2011/07/26 19:22:16.0202 3448	ohci1394        (3589478e4b22ce21b41fa1bfc0b8b8a0) C:\Windows\system32\DRIVERS\ohci1394.sys
2011/07/26 19:22:16.0218 3448	Parport         (0086431c29c35be1dbc43f52cc273887) C:\Windows\system32\DRIVERS\parport.sys
2011/07/26 19:22:16.0249 3448	partmgr         (7daa117143316c4a1537e074a5a9eaf0) C:\Windows\system32\drivers\partmgr.sys
2011/07/26 19:22:16.0265 3448	pci             (f36f6504009f2fb0dfd1b17a116ad74b) C:\Windows\system32\DRIVERS\pci.sys
2011/07/26 19:22:16.0280 3448	pciide          (b5b8b5ef2e5cb34df8dcf8831e3534fa) C:\Windows\system32\DRIVERS\pciide.sys
2011/07/26 19:22:16.0296 3448	pcmcia          (b2e81d4e87ce48589f98cb8c05b01f2f) C:\Windows\system32\DRIVERS\pcmcia.sys
2011/07/26 19:22:16.0327 3448	pcw             (d6b9c2e1a11a3a4b26a182ffef18f603) C:\Windows\system32\drivers\pcw.sys
2011/07/26 19:22:16.0343 3448	PEAUTH          (68769c3356b3be5d1c732c97b9a80d6e) C:\Windows\system32\drivers\peauth.sys
2011/07/26 19:22:16.0421 3448	PptpMiniport    (27cc19e81ba5e3403c48302127bda717) C:\Windows\system32\DRIVERS\raspptp.sys
2011/07/26 19:22:16.0436 3448	Processor       (0d922e23c041efb1c3fac2a6f943c9bf) C:\Windows\system32\DRIVERS\processr.sys
2011/07/26 19:22:16.0483 3448	Psched          (ee992183bd8eaefd9973f352e587a299) C:\Windows\system32\DRIVERS\pacer.sys
2011/07/26 19:22:16.0514 3448	ql2300          (a53a15a11ebfd21077463ee2c7afeef0) C:\Windows\system32\DRIVERS\ql2300.sys
2011/07/26 19:22:16.0577 3448	ql40xx          (4f6d12b51de1aaeff7dc58c4d75423c8) C:\Windows\system32\DRIVERS\ql40xx.sys
2011/07/26 19:22:16.0608 3448	QWAVEdrv        (76707bb36430888d9ce9d705398adb6c) C:\Windows\system32\drivers\qwavedrv.sys
2011/07/26 19:22:16.0623 3448	RasAcd          (5a0da8ad5762fa2d91678a8a01311704) C:\Windows\system32\DRIVERS\rasacd.sys
2011/07/26 19:22:16.0639 3448	RasAgileVpn     (7ecff9b22276b73f43a99a15a6094e90) C:\Windows\system32\DRIVERS\AgileVpn.sys
2011/07/26 19:22:16.0670 3448	Rasl2tp         (87a6e852a22991580d6d39adc4790463) C:\Windows\system32\DRIVERS\rasl2tp.sys
2011/07/26 19:22:16.0686 3448	RasPppoe        (855c9b1cd4756c5e9a2aa58a15f58c25) C:\Windows\system32\DRIVERS\raspppoe.sys
2011/07/26 19:22:16.0701 3448	RasSstp         (e8b1e447b008d07ff47d016c2b0eeecb) C:\Windows\system32\DRIVERS\rassstp.sys
2011/07/26 19:22:16.0717 3448	rdbss           (3bac8142102c15d59a87757c1d41dce5) C:\Windows\system32\DRIVERS\rdbss.sys
2011/07/26 19:22:16.0748 3448	rdpbus          (302da2a0539f2cf54d7c6cc30c1f2d8d) C:\Windows\system32\DRIVERS\rdpbus.sys
2011/07/26 19:22:16.0779 3448	RDPCDD          (cea6cc257fc9b7715f1c2b4849286d24) C:\Windows\system32\DRIVERS\RDPCDD.sys
2011/07/26 19:22:16.0795 3448	RDPENCDD        (bb5971a4f00659529a5c44831af22365) C:\Windows\system32\drivers\rdpencdd.sys
2011/07/26 19:22:16.0811 3448	RDPREFMP        (216f3fa57533d98e1f74ded70113177a) C:\Windows\system32\drivers\rdprefmp.sys
2011/07/26 19:22:16.0826 3448	RDPWD           (8a3e6bea1c53ea6177fe2b6eba2c80d7) C:\Windows\system32\drivers\RDPWD.sys
2011/07/26 19:22:16.0842 3448	rdyboost        (634b9a2181d98f15941236886164ec8b) C:\Windows\system32\drivers\rdyboost.sys
2011/07/26 19:22:16.0873 3448	rspndr          (ddc86e4f8e7456261e637e3552e804ff) C:\Windows\system32\DRIVERS\rspndr.sys
2011/07/26 19:22:16.0904 3448	RTL8167         (7ea8d2eb9bbfd2ab8a3117a1e96d3b3a) C:\Windows\system32\DRIVERS\Rt64win7.sys
2011/07/26 19:22:16.0935 3448	RTL8192su       (fc00c0de6dc83de1b2b01420e2195b21) C:\Windows\system32\DRIVERS\RTL8192su.sys
2011/07/26 19:22:16.0967 3448	sbp2port        (e3bbb89983daf5622c1d50cf49f28227) C:\Windows\system32\DRIVERS\sbp2port.sys
2011/07/26 19:22:16.0998 3448	scfilter        (c94da20c7e3ba1dca269bc8460d98387) C:\Windows\system32\DRIVERS\scfilter.sys
2011/07/26 19:22:17.0029 3448	secdrv          (3ea8a16169c26afbeb544e0e48421186) C:\Windows\system32\drivers\secdrv.sys
2011/07/26 19:22:17.0045 3448	Serenum         (cb624c0035412af0debec78c41f5ca1b) C:\Windows\system32\DRIVERS\serenum.sys
2011/07/26 19:22:17.0060 3448	Serial          (c1d8e28b2c2adfaec4ba89e9fda69bd6) C:\Windows\system32\DRIVERS\serial.sys
2011/07/26 19:22:17.0076 3448	sermouse        (1c545a7d0691cc4a027396535691c3e3) C:\Windows\system32\DRIVERS\sermouse.sys
2011/07/26 19:22:17.0107 3448	sffdisk         (a554811bcd09279536440c964ae35bbf) C:\Windows\system32\DRIVERS\sffdisk.sys
2011/07/26 19:22:17.0123 3448	sffp_mmc        (ff414f0baefeba59bc6c04b3db0b87bf) C:\Windows\system32\DRIVERS\sffp_mmc.sys
2011/07/26 19:22:17.0138 3448	sffp_sd         (5588b8c6193eb1522490c122eb94dffa) C:\Windows\system32\DRIVERS\sffp_sd.sys
2011/07/26 19:22:17.0154 3448	sfloppy         (a9d601643a1647211a1ee2ec4e433ff4) C:\Windows\system32\DRIVERS\sfloppy.sys
2011/07/26 19:22:17.0169 3448	SiSRaid2        (843caf1e5fde1ffd5ff768f23a51e2e1) C:\Windows\system32\DRIVERS\SiSRaid2.sys
2011/07/26 19:22:17.0185 3448	SiSRaid4        (6a6c106d42e9ffff8b9fcb4f754f6da4) C:\Windows\system32\DRIVERS\sisraid4.sys
2011/07/26 19:22:17.0216 3448	Smb             (548260a7b8654e024dc30bf8a7c5baa4) C:\Windows\system32\DRIVERS\smb.sys
2011/07/26 19:22:17.0247 3448	spldr           (b9e31e5cacdfe584f34f730a677803f9) C:\Windows\system32\drivers\spldr.sys
2011/07/26 19:22:17.0294 3448	srv             (2408c0366d96bcdf63e8f1c78e4a29c5) C:\Windows\system32\DRIVERS\srv.sys
2011/07/26 19:22:17.0341 3448	srv2            (76548f7b818881b47d8d1ae1be9c11f8) C:\Windows\system32\DRIVERS\srv2.sys
2011/07/26 19:22:17.0388 3448	srvnet          (0af6e19d39c70844c5caa8fb0183c36e) C:\Windows\system32\DRIVERS\srvnet.sys
2011/07/26 19:22:17.0435 3448	stexstor        (f3817967ed533d08327dc73bc4d5542a) C:\Windows\system32\DRIVERS\stexstor.sys
2011/07/26 19:22:17.0466 3448	swenum          (d01ec09b6711a5f8e7e6564a4d0fbc90) C:\Windows\system32\DRIVERS\swenum.sys
2011/07/26 19:22:17.0544 3448	Tcpip           (61dc720bb065d607d5823f13d2a64321) C:\Windows\system32\drivers\tcpip.sys
2011/07/26 19:22:17.0637 3448	TCPIP6          (61dc720bb065d607d5823f13d2a64321) C:\Windows\system32\DRIVERS\tcpip.sys
2011/07/26 19:22:17.0669 3448	tcpipreg        (76d078af6f587b162d50210f761eb9ed) C:\Windows\system32\drivers\tcpipreg.sys
2011/07/26 19:22:17.0700 3448	TDPIPE          (3371d21011695b16333a3934340c4e7c) C:\Windows\system32\drivers\tdpipe.sys
2011/07/26 19:22:17.0715 3448	TDTCP           (e4245bda3190a582d55ed09e137401a9) C:\Windows\system32\drivers\tdtcp.sys
2011/07/26 19:22:17.0731 3448	tdx             (079125c4b17b01fcaeebce0bcb290c0f) C:\Windows\system32\DRIVERS\tdx.sys
2011/07/26 19:22:17.0747 3448	TermDD          (c448651339196c0e869a355171875522) C:\Windows\system32\DRIVERS\termdd.sys
2011/07/26 19:22:17.0778 3448	tssecsrv        (61b96c26131e37b24e93327a0bd1fb95) C:\Windows\system32\DRIVERS\tssecsrv.sys
2011/07/26 19:22:17.0825 3448	tunnel          (3836171a2cdf3af8ef10856db9835a70) C:\Windows\system32\DRIVERS\tunnel.sys
2011/07/26 19:22:17.0840 3448	uagp35          (b4dd609bd7e282bfc683cec7eaaaad67) C:\Windows\system32\DRIVERS\uagp35.sys
2011/07/26 19:22:17.0871 3448	UBHelper        (2e22c1fd397a5a9ffef55e9d1fc96c00) C:\Windows\system32\drivers\UBHelper.sys
2011/07/26 19:22:17.0903 3448	udfs            (d47baead86c65d4f4069d7ce0a4edceb) C:\Windows\system32\DRIVERS\udfs.sys
2011/07/26 19:22:17.0934 3448	uliagpkx        (4bfe1bc28391222894cbf1e7d0e42320) C:\Windows\system32\DRIVERS\uliagpkx.sys
2011/07/26 19:22:17.0965 3448	umbus           (eab6c35e62b1b0db0d1b48b671d3a117) C:\Windows\system32\DRIVERS\umbus.sys
2011/07/26 19:22:17.0981 3448	UmPass          (b2e8e8cb557b156da5493bbddcc1474d) C:\Windows\system32\DRIVERS\umpass.sys
2011/07/26 19:22:18.0012 3448	usbccgp         (7b6a127c93ee590e4d79a5f2a76fe46f) C:\Windows\system32\DRIVERS\usbccgp.sys
2011/07/26 19:22:18.0027 3448	usbcir          (af0892a803fdda7492f595368e3b68e7) C:\Windows\system32\DRIVERS\usbcir.sys
2011/07/26 19:22:18.0074 3448	usbehci         (92969ba5ac44e229c55a332864f79677) C:\Windows\system32\drivers\usbehci.sys
2011/07/26 19:22:18.0105 3448	usbhub          (e7df1cfd28ca86b35ef5add0735ceef3) C:\Windows\system32\DRIVERS\usbhub.sys
2011/07/26 19:22:18.0137 3448	usbohci         (f1bb1e55f1e7a65c5839ccc7b36d773e) C:\Windows\system32\drivers\usbohci.sys
2011/07/26 19:22:18.0168 3448	usbprint        (73188f58fb384e75c4063d29413cee3d) C:\Windows\system32\DRIVERS\usbprint.sys
2011/07/26 19:22:18.0199 3448	USBSTOR         (f39983647bc1f3e6100778ddfe9dce29) C:\Windows\system32\drivers\USBSTOR.SYS
2011/07/26 19:22:18.0230 3448	usbuhci         (bc3070350a491d84b518d7cca9abd36f) C:\Windows\system32\drivers\usbuhci.sys
2011/07/26 19:22:18.0277 3448	usb_rndisx      (70d05ee263568a742d14e1876df80532) C:\Windows\system32\DRIVERS\usb8023x.sys
2011/07/26 19:22:18.0308 3448	vdrvroot        (c5c876ccfc083ff3b128f933823e87bd) C:\Windows\system32\DRIVERS\vdrvroot.sys
2011/07/26 19:22:18.0324 3448	vga             (da4da3f5e02943c2dc8c6ed875de68dd) C:\Windows\system32\DRIVERS\vgapnp.sys
2011/07/26 19:22:18.0339 3448	VgaSave         (53e92a310193cb3c03bea963de7d9cfc) C:\Windows\System32\drivers\vga.sys
2011/07/26 19:22:18.0355 3448	vhdmp           (c82e748660f62a242b2dfac1442f22a4) C:\Windows\system32\DRIVERS\vhdmp.sys
2011/07/26 19:22:18.0371 3448	viaide          (e5689d93ffe4e5d66c0178761240dd54) C:\Windows\system32\DRIVERS\viaide.sys
2011/07/26 19:22:18.0402 3448	volmgr          (2b1a3dae2b4e70dbba822b7a03fbd4a3) C:\Windows\system32\DRIVERS\volmgr.sys
2011/07/26 19:22:18.0417 3448	volmgrx         (99b0cbb569ca79acaed8c91461d765fb) C:\Windows\system32\drivers\volmgrx.sys
2011/07/26 19:22:18.0433 3448	volsnap         (58f82eed8ca24b461441f9c3e4f0bf5c) C:\Windows\system32\DRIVERS\volsnap.sys
2011/07/26 19:22:18.0464 3448	vsmraid         (5e2016ea6ebaca03c04feac5f330d997) C:\Windows\system32\DRIVERS\vsmraid.sys
2011/07/26 19:22:18.0480 3448	vwifibus        (36d4720b72b5c5d9cb2b9c29e9df67a1) C:\Windows\System32\drivers\vwifibus.sys
2011/07/26 19:22:18.0511 3448	vwififlt        (6a3d66263414ff0d6fa754c646612f3f) C:\Windows\system32\DRIVERS\vwififlt.sys
2011/07/26 19:22:18.0542 3448	vwifimp         (6a638fc4bfddc4d9b186c28c91bd1a01) C:\Windows\system32\DRIVERS\vwifimp.sys
2011/07/26 19:22:18.0573 3448	WacomPen        (4e9440f4f152a7b944cb1663d3935a3e) C:\Windows\system32\DRIVERS\wacompen.sys
2011/07/26 19:22:18.0620 3448	WANARP          (47ca49400643effd3f1c9a27e1d69324) C:\Windows\system32\DRIVERS\wanarp.sys
2011/07/26 19:22:18.0620 3448	Wanarpv6        (47ca49400643effd3f1c9a27e1d69324) C:\Windows\system32\DRIVERS\wanarp.sys
2011/07/26 19:22:18.0667 3448	Wd              (72889e16ff12ba0f235467d6091b17dc) C:\Windows\system32\DRIVERS\wd.sys
2011/07/26 19:22:18.0683 3448	Wdf01000        (441bd2d7b4f98134c3a4f9fa570fd250) C:\Windows\system32\drivers\Wdf01000.sys
2011/07/26 19:22:18.0745 3448	WfpLwf          (611b23304bf067451a9fdee01fbdd725) C:\Windows\system32\DRIVERS\wfplwf.sys
2011/07/26 19:22:18.0761 3448	WIMMount        (05ecaec3e4529a7153b3136ceb49f0ec) C:\Windows\system32\drivers\wimmount.sys
2011/07/26 19:22:18.0807 3448	WmiAcpi         (f6ff8944478594d0e414d3f048f0d778) C:\Windows\system32\DRIVERS\wmiacpi.sys
2011/07/26 19:22:18.0839 3448	ws2ifsl         (6bcc1d7d2fd2453957c5479a32364e52) C:\Windows\system32\drivers\ws2ifsl.sys
2011/07/26 19:22:18.0870 3448	WudfPf          (7cadc74271dd6461c452c271b30bd378) C:\Windows\system32\drivers\WudfPf.sys
2011/07/26 19:22:18.0885 3448	WUDFRd          (3b197af0fff08aa66b6b2241ca538d64) C:\Windows\system32\DRIVERS\WUDFRd.sys
2011/07/26 19:22:18.0932 3448	xusb21          (38f55d07b1d3391065c40ec065f984e2) C:\Windows\system32\DRIVERS\xusb21.sys
2011/07/26 19:22:18.0963 3448	MBR (0x1B8)     (a36c5e4f47e84449ff07ed3517b43a31) \Device\Harddisk0\DR0
2011/07/26 19:22:18.0979 3448	Boot (0x1200)   (67885e261a2855ca3c2b68624ca1d9c8) \Device\Harddisk0\DR0\Partition0
2011/07/26 19:22:18.0995 3448	Boot (0x1200)   (58e36d94f622315373dc41ce9029d0e4) \Device\Harddisk0\DR0\Partition1
2011/07/26 19:22:18.0995 3448	================================================================================
2011/07/26 19:22:18.0995 3448	Scan finished
2011/07/26 19:22:18.0995 3448	================================================================================
2011/07/26 19:22:18.0995 3748	Detected object count: 0
2011/07/26 19:22:18.0995 3748	Actual detected object count: 0
2011/07/26 19:22:28.0027 4008	Deinitialize success

ComboFix log:

ComboFix 11-07-26.03 - TJ 07/26/2011  19:37:23.1.4 - x64
Microsoft Windows 7 Home Premium   6.1.7600.0.1252.1.1033.18.4023.2553 [GMT -7:00]
Running from: c:\users\TJ\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\TJ\AppData\Local\{301796A4-EE80-46AA-91B5-C03700635F48}
c:\users\TJ\AppData\Local\{301796A4-EE80-46AA-91B5-C03700635F48}\chrome\content\overlay.xul
c:\users\TJ\AppData\Local\{301796A4-EE80-46AA-91B5-C03700635F48}\install.rdf
c:\users\TJ\AppData\Roaming\Adobe\plugs
c:\users\TJ\AppData\Roaming\Adobe\plugs\mmc149.exe
c:\users\TJ\AppData\Roaming\Adobe\plugs\mmc73642752.txt
c:\users\TJ\AppData\Roaming\Adobe\shed
c:\users\TJ\AppData\Roaming\Adobe\shed\thr1.chm
c:\users\TJ\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows 7 Repair
c:\users\TJ\Desktop\Setup.exe
.
.
(((((((((((((((((((((((((   Files Created from 2011-06-27 to 2011-07-27  )))))))))))))))))))))))))))))))
.
.
2011-07-27 03:05 . 2011-07-27 03:05	--------	d-----w-	c:\users\Default\AppData\Local\temp
2011-07-27 02:26 . 2011-07-27 02:29	--------	d-----w-	C:\32788R22FWJFW
2011-07-26 12:48 . 2011-07-13 04:53	8578896	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{590993BA-AE7D-4F01-8E78-C255DF94F789}\mpengine.dll
2011-07-07 23:55 . 2011-07-07 23:55	--------	d-----w-	c:\program files (x86)\AGEIA Technologies
2011-07-07 23:55 . 2011-07-07 23:55	--------	d-----w-	c:\windows\SysWow64\AGEIA
2011-07-07 23:55 . 2011-07-07 23:55	--------	d-----w-	c:\program files (x86)\Common Files\Wise Installation Wizard
2011-07-07 23:55 . 2009-03-09 22:27	520544	----a-w-	c:\windows\system32\d3dx10_41.dll
2011-07-07 23:55 . 2009-03-09 22:27	453456	----a-w-	c:\windows\SysWow64\d3dx10_41.dll
2011-07-07 23:55 . 2009-03-09 22:27	2430312	----a-w-	c:\windows\system32\D3DCompiler_41.dll
2011-07-07 23:55 . 2009-03-09 22:27	1846632	----a-w-	c:\windows\SysWow64\D3DCompiler_41.dll
2011-07-07 23:55 . 2009-03-09 22:27	5425496	----a-w-	c:\windows\system32\D3DX9_41.dll
2011-07-07 03:49 . 2011-07-07 03:49	--------	d-----w-	c:\program files\CCleaner
2011-07-06 06:38 . 2011-07-06 06:38	--------	d-----w-	c:\users\TJ\AppData\Roaming\Malwarebytes
2011-07-06 06:38 . 2008-08-17 22:01	38472	----a-w-	c:\windows\SysWow64\drivers\mbamswissarmy.sys
2011-07-06 06:38 . 2008-08-17 22:01	17144	----a-w-	c:\windows\SysWow64\drivers\mbam.sys
2011-07-06 06:38 . 2011-07-06 06:38	--------	d-----w-	c:\program files (x86)\Malwarebytes' Anti-Malware
2011-07-06 06:38 . 2011-07-06 06:38	--------	d-----w-	c:\programdata\Malwarebytes
2011-07-06 06:38 . 2011-07-06 06:38	--------	d--h--w-	c:\programdata\Common Files
2011-07-06 06:36 . 2011-07-06 06:38	--------	d-----w-	c:\programdata\MFAData
2011-07-04 06:00 . 2011-07-04 06:00	--------	d-----w-	c:\program files (x86)\Microsoft Security Client
2011-07-04 06:00 . 2011-07-04 06:17	--------	d-----w-	c:\program files\Microsoft Security Client
2011-07-04 05:53 . 2011-07-04 05:53	0	---ha-w-	c:\users\TJ\AppData\Local\Tfapimovumaxagaw.bin
2011-06-29 18:30 . 2011-06-29 18:30	404640	----a-w-	c:\windows\SysWow64\FlashPlayerCPLApp.cpl
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-05-28 03:25 . 2011-06-16 05:14	1638912	----a-w-	c:\windows\system32\mshtml.tlb
2011-05-28 03:07 . 2011-06-16 05:14	3133952	----a-w-	c:\windows\system32\win32k.sys
2011-05-28 03:00 . 2011-06-16 05:14	1638912	----a-w-	c:\windows\SysWow64\mshtml.tlb
2011-05-25 02:14 . 2010-11-29 03:51	270720	------w-	c:\windows\system32\MpSigStub.exe
2011-05-04 02:51 . 2011-06-16 05:14	287744	----a-w-	c:\windows\system32\drivers\mrxsmb10.sys
2011-05-04 02:51 . 2011-06-16 05:14	157696	----a-w-	c:\windows\system32\drivers\mrxsmb.sys
2011-05-04 02:51 . 2011-06-16 05:14	126464	----a-w-	c:\windows\system32\drivers\mrxsmb20.sys
2011-05-03 05:21 . 2011-06-16 05:14	976896	----a-w-	c:\windows\system32\inetcomm.dll
2011-05-03 04:50 . 2011-06-16 05:14	740864	----a-w-	c:\windows\SysWow64\inetcomm.dll
2011-04-29 03:13 . 2011-06-16 05:14	461312	----a-w-	c:\windows\system32\drivers\srv.sys
2011-04-29 03:12 . 2011-06-16 05:14	399872	----a-w-	c:\windows\system32\drivers\srv2.sys
2011-04-29 03:12 . 2011-06-16 05:14	161792	----a-w-	c:\windows\system32\drivers\srvnet.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{00000000-6E41-4FD3-8538-502F5495E5FC}"= "c:\program files (x86)\Ask.com\GenericAskToolbar.dll" [2011-05-17 1490312]
.
[HKEY_CLASSES_ROOT\clsid\{00000000-6e41-4fd3-8538-502f5495e5fc}]
.
[HKEY_LOCAL_MACHINE\Wow6432Node\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2011-05-17 20:29	1490312	----a-w-	c:\program files (x86)\Ask.com\GenericAskToolbar.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files (x86)\Ask.com\GenericAskToolbar.dll" [2011-05-17 1490312]
.
[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2010-04-12 39408]
"Aim"="c:\program files (x86)\AIM\aim.exe" [2010-10-12 4258136]
"Steam"="c:\program files (x86)\Steam\Steam.exe" [2010-12-02 1242448]
"TomTomHOME.exe"="c:\program files (x86)\TomTom HOME 2\TomTomHOMERunner.exe" [2010-08-24 247144]
"BitTorrent"="c:\program files (x86)\BitTorrent\BitTorrent.exe" [2011-04-16 400760]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"BackupManagerTray"="c:\program files (x86)\NewTech Infosystems\Gateway MyBackup\BackupManagerTray.exe" [2009-11-17 244480]
"Hotkey Utility"="c:\program files (x86)\Gateway\Hotkey Utility\HotkeyUtility.exe" [2010-03-26 563744]
"Gateway Photo Frame"="c:\program files (x86)\Gateway Photo Frame\ButtonMonitor.exe" [2009-07-20 124416]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"WinampAgent"="c:\program files (x86)\Winamp\winampa.exe" [2010-12-02 74752]
"QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2010-11-30 421888]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2011-01-27 336384]
"Adobe Reader Speed Launcher"="c:\program files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-01-30 35736]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-11-10 932288]
"ApnUpdater"="c:\program files (x86)\Ask.com\Updater\Updater.exe" [2011-05-17 395144]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
McAfee Security Scan Plus.lnk - c:\program files (x86)\McAfee Security Scan\2.0.181\SSScheduler.exe [2010-1-15 255536]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Security Packages	REG_MULTI_SZ   	kerberos msv1_0 schannel wdigest tspkg pku2u livessp
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 gupdate;Google Update Service (gupdate);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2010-12-16 135664]
R3 gupdatem;Google Update Service (gupdatem);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2010-12-16 135664]
R3 IntcDAud;Intel(R) Display Audio;c:\windows\system32\DRIVERS\IntcDAud.sys [x]
R3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe [2010-01-15 227232]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [x]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [x]
S2 Greg_Service;GRegService;c:\program files (x86)\Gateway\Registration\GregHSRW.exe [2009-08-28 1150496]
S2 NTI IScheduleSvc;NTI IScheduleSvc;c:\program files (x86)\NewTech Infosystems\Gateway MyBackup\IScheduleSvc.exe [2009-11-17 255744]
S2 TomTomHOMEService;TomTomHOMEService;c:\program files (x86)\TomTom HOME 2\TomTomHOMEService.exe [2010-08-24 92008]
S2 Updater Service;Updater Service;c:\program files\Gateway\Gateway Updater\UpdaterService.exe [2010-01-28 243232]
S2 USBS3S4Detection;USBS3S4Detection;c:\oem\USBDECTION\USBS3S4Detection.exe [2009-12-09 76320]
S3 amdkmdag;amdkmdag;c:\windows\system32\DRIVERS\atikmdag.sys [x]
S3 amdkmdap;amdkmdap;c:\windows\system32\DRIVERS\atikmpag.sys [x]
S3 AtiHDAudioService;ATI Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW76.sys [x]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [x]
S3 RTL8192su;%RTL8192su.DeviceDesc.DispName%;c:\windows\system32\DRIVERS\RTL8192su.sys [x]
S3 vwifimp;Microsoft Virtual WiFi Miniport Service;c:\windows\system32\DRIVERS\vwifimp.sys [x]
.
.
Contents of the 'Scheduled Tasks' folder
.
2011-07-27 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2010-12-16 10:28]
.
2011-07-27 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2010-12-16 10:28]
.
2011-07-26 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2650567876-99943698-2831323205-1000Core.job
- c:\users\TJ\AppData\Local\Google\Update\GoogleUpdate.exe [2011-07-04 15:44]
.
2011-07-27 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2650567876-99943698-2831323205-1000UA.job
- c:\users\TJ\AppData\Local\Google\Update\GoogleUpdate.exe [2011-07-04 15:44]
.
.
--------- x86-64 -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IAAnotif"="c:\program files (x86)\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2009-10-13 186904]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2010-02-09 10060320]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-08-26 161304]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-08-26 386584]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-08-26 415256]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"LoadAppInit_DLLs"=0x0
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/imghp?hl=en&tab=wi
uLocal Page = c:\windows\system32\blank.htm
mStart Page = hxxp://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&m=dx4840&r=17361110a616p0405v135k4571r38q
mLocal Page = c:\windows\SysWOW64\blank.htm
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~1\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files (x86)\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_43C348BC2E93EB2B.dll/cmsidewiki.html
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
FF - ProfilePath - c:\users\TJ\AppData\Roaming\Mozilla\Firefox\Profiles\u8uc0z5p.default\
FF - prefs.js: browser.startup.homepage - hxxp://mp3tubetoolbar.com/?tmp=toolbar_Mp3Tube_homepage&prt=pinballtbfour04ff&clid=8d6f16a872f94a3a83cf82ccf205da0d&subid=
FF - prefs.js: keyword.URL - hxxp://mp3tubetoolbar.com/?tmp=nemo_results_removelink2&q=
FF - user.js: keyword.URL - hxxp://mp3tubetoolbar.com/?tmp=nemo_results_removelink2&q=
FF - user.js: keyword.enabled - 1
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
Toolbar-Locked - (no file)
WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-2650567876-99943698-2831323205-1000\Software\SecuROM\License information*]
"datasecu"=hex:85,b8,f3,e6,d2,57,d1,39,13,45,71,4f,91,21,75,50,f1,a1,dc,01,d7,
   23,78,b2,ee,62,af,8c,63,49,b0,cc,50,9f,0f,44,7e,06,27,63,bb,93,76,b8,b7,ed,\
"rkeysecu"=hex:2f,0f,d5,3e,02,2b,06,63,b1,0b,dd,b6,71,e2,54,98
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10c.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\LocalServer32]
@="c:\\Windows\\SysWow64\\Macromed\\Flash\\FlashUtil10c.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWow64\\Macromed\\Flash\\Flash10c.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.10"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWow64\\Macromed\\Flash\\Flash10c.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWow64\\Macromed\\Flash\\Flash10c.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWow64\\Macromed\\Flash\\Flash10c.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}]
@Denied: (A 2) (Everyone)
@="IFlashBroker3"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ Other Running Processes ------------------------
.
c:\program files (x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe
.
**************************************************************************
.
Completion time: 2011-07-26  21:01:41 - machine was rebooted
ComboFix-quarantined-files.txt  2011-07-27 04:01
.
Pre-Run: 497,225,580,544 bytes free
Post-Run: 496,956,276,736 bytes free
.
- - End Of File - - 0542A8CAF43663200BEB7981DD352FE7

The computer seems to be running the same. Firefox and Chrome still crash when trying to open them.

#7 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 27 July 2011 - 05:25 PM

Hello,


Are you getting redirected when using Internet Explorer? I don't see any Malware present on your machine.

1.
  • Download RogueKiller on the desktop
  • Close all the running processes
  • Under Vista/Seven, right click -> Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • When prompted, type 1 (SCAN) then Enter
  • A report should open, give its content to your helper. (RKreport could also be found next to the executable)
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename in winlogon.exe (or winlogon.com) and try again


2.
Please download Malwarebytes' Anti-Malware (v1.50) and save it to your desktop.
Download Link 1
Download Link 2Malwarebytes' may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes' when done.
Note: If Malwarebytes' encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes' from removing all the malware.

3.
Click here to download Kaspersky Virus Removal Tool.
  • Double click on the file you just downloaded and let it install.
  • It will install to your desktop.
  • After that leave what is selected and put a check next to My Computer.
  • Click on the option that says Threat Detection and change it to Disinfect => Do not select, delete if disinfection fails.
  • Then click on Start Scan.
  • Before it is done it may prompt for action regardless of the setting so choose skip if prompted.
  • When the scan is done no log will be produced.
  • Click on the bottom where it says Report to open the report.
  • Then highlight of of the items found by using ctrl + a on your keyboard to select all or use your mouse to select all then right click and choose copy.
  • This will copy the items that it found to the clipboard you can then open notepad (go to start then run then type in notepad) and choose paste to paste the contents into Notepad.
  • You can save this on the desktop.
  • Post the contents of the document in your next reply.

4.
If Firefox still wont open try it this way. Try starting it up in Safemode:
This can be done by holding down the shift key while starting Firefox.

Things to include in your next reply::
RogueKiller log
MBAM log
KAspersky log.
How is your machine running now? Still getting redirected in IE?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#8 Evil Joe

Evil Joe
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 28 July 2011 - 01:43 AM

RogueKiller:

RogueKiller V5.2.8 [07/23/2011] by Tigzy
contact at http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html

Operating System: Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User: TJ [Admin rights]
Mode: Scan -- Date : 07/27/2011 19:19:38

Bad processes: 0

Registry Entries: 2
[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

HOSTS File:
127.0.0.1       localhost


Finished : << RKreport[1].txt >>
RKreport[1].txt






MBAM:

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7305

Windows 6.1.7600
Internet Explorer 8.0.7600.16385

7/27/2011 7:26:11 PM
mbam-log-2011-07-27 (19-26-11).txt

Scan type: Quick scan
Objects scanned: 183894
Time elapsed: 2 minute(s), 25 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Typelib\{B035BA6B-57CD-4F72-B545-65BE465FCAF6} (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{D44FD6F0-9746-484E-B5C4-C66688393872} (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0EB3F101-224A-4B2B-9E5B-DF720857529C} (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A078F691-9C07-4AF2-BF43-35E79EECF8B7} (Adware.Softomate) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Associations\bak_Application (Hijacker.Application) -> Value: bak_Application -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Associations\Application (Hijacker.Application) -> Bad: (http://www.helpmeopen.com/?n=app&ext=%s) Good: (http://shell.windows.com/fileassoc/%04x/xml/redir.asp?Ext=%s) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\program files (x86)\mozilla firefox\searchplugins\Mp3Tube.xml (Adware.Mp3Tube) -> Quarantined and deleted successfully.



For some reason, the KAsperksy log won't attach to this post and Notepad wont let me copy it because it's too long (that's what she said), so I'm temporarily hosting the file on my website: www.eviljoe.com/KScan.txt


Firefox and Google Chrome still crash when trying to open (even in safemode) and the redirection links on google and popups are still happening in IE.

#9 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 28 July 2011 - 03:33 PM

Hello,


Are you connected to the internet through a Router? IF so we need to reset that router.
How to reset your Router.


1.
  • Download RogueKiller on the desktop
  • Close all the running processes
  • Under Vista/Seven, right click -> Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • When prompted, type 2 (REMOVE) then Enter
  • A report should open, give its content to your helper. (RKreport could also be found next to the executable)
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename in winlogon.exe (or winlogon.com) and try again

2.
  • Download RogueKiller on the desktop
  • Close all the running processes
  • Under Vista/Seven, right click -> Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • When prompted, type 5 (DNSFIX) then Enter
  • A report should open, give its content to your helper. (RKreport could also be found next to the executable)
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename in winlogon.exe (or winlogon.com) and try again


3.
Ask Toolbar is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This changed from what we know as stated in the following Articles:

http://www.benedelman.org/spyware/ask-toolbars/
http://vil.nai.com/vil/content/v_185490.htm


I suggest you remove the program now. Click on start > run > and then paste the following into the "open" field: appwiz.cpl and press OK. From within Add or Remove Programs uninstall the following if they exist: Ask Toolbar or Ask.com.

4.
Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

5.
Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.




Things to include in your next reply::
Both of the logs for Roguekiller
Dr Web log
SAS log
Are you able to Burn CD's and have access to a USB Flash Drive.
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#10 Evil Joe

Evil Joe
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 29 July 2011 - 10:25 PM

RK Logs:

RogueKiller V5.2.8 [07/23/2011] by Tigzy
contact at http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html

Operating System: Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User: TJ [Admin rights]
Mode: Remove -- Date : 07/28/2011 19:16:06

Bad processes: 0

Registry Entries: 2
[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

HOSTS File:
127.0.0.1       localhost


Finished : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt






RogueKiller V5.2.8 [07/23/2011] by Tigzy
contact at http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html

Operating System: Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User: TJ [Admin rights]
Mode: DNSFix -- Date : 07/28/2011 19:17:14

Bad processes: 0

Registry Entries: 0

Finished : << RKreport[3].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt





DrWeb Log:

Setup.exe.vir;C:\Qoobox\Quarantine\C\Users\TJ\Desktop;Trojan.DownLoader3.57467;Deleted.;



Super AntiSpyware Log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/29/2011 at 08:04 PM

Application Version : 4.55.1000

Core Rules Database Version : 7483
Trace Rules Database Version: 5295

Scan type       : Complete Scan
Total Scan Time : 01:19:39

Memory items scanned      : 319
Memory threats detected   : 0
Registry items scanned    : 12788
Registry threats detected : 0
File items scanned        : 248890
File threats detected     : 314

Adware.Tracking Cookie
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ar.atwola[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.bleepingcomputer[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ru4[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@lucidmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@fastclick[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@media.adfrontiers[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@imrworldwide[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tribalfusion[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.financialcontent[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@revenue[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@revnewmedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@glammedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.orfind[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.bighealthtree[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.findtopresults[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@insightexpressai[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@revsci[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mtvn.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.lycos[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@theclickcheck[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@enhance[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.burstbeacon[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@trafficmp[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.undertone[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.xxxbook[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@findtopresults[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@weborama[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tacoda.at.atwola[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ad.wsod[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.teennick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adserver.adtechus[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@r1-ads.ace.advertising[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ero-advertising[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@yieldmanager[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[5].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adbrite[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.pointroll[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@dc.tremormedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@kantarmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@doubleclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.blogtalkradio[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediabrandsww[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@overture[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@sex.healthguru[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.findxml[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.find-quick-results[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@247realmedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediaplex[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@2o7[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@jmp.clickbooth[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@media6degrees[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.cnn[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@googleads.g.doubleclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@advertising[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@interclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@admarketplace[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@xxxbook[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.pubmatic[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@at.atwola[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@specificclick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@clicks.thespecialsearch[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adxpose[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionmarket[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.cpxadroit[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@bridge2.admarketplace[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@burstbeacon[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionmarket[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ad.yieldmanager[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@network.realmedia[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@gettyimages.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@cracked[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@advertise[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pointroll[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@cdn.jemamedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.burstnet[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@wt.xxxbookcom[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@specificmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@atdmt[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediaplex[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@eciopencor.solution.weborama[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@realmedia[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@serving-sys[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@teennick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@a1.interclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[6].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@bookofsex[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@viacom.adbureau[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pro-market[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@bs.serving-sys[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@dmtracker[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@citi.bridgetrack[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clicksclick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@azjmp[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@apmebf[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@zedo[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@counter.surfcounters[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@invitemedia[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@content.yieldmanager[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@newmusiccountdown.mevio[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.tracklead[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@geeksaresexy[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@statcounter[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www9.addfreestats[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@casalemedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@hitbox[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@xml.prostreammedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@uk.sitestat[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@msnbc.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@server.cpmstar[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@bizrate[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@stattest.dealtime[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@track.adform[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@chitika[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@shopica[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@uk.sitestat[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.hippofind[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ehg-wss.hitbox[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@c.gigcount[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionduck.smackjeeves[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@legolas-media[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@hpi.rotator.hadj7.adjuggler[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@lfstmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.bridgetrack[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@surveyfindweb[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clicksfind[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.seekfinds[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@in.getclicky[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@rotator.hadj7.adjuggler[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ybdev.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@eyewonder[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@xiti[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mm.chitika[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.toseeking[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@findology[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@solvemedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediamatters[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.321findit[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.amazeclick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.glammedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adserver.twitpic[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@indieclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@homestore.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@track.clickpayz[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@stpetersburgtimes.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionduck.smackjeeves[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clicksthis[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@trafficking.nabbr[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@statse.webtrendslive[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@stat.collar6[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adform[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@linksynergy[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@jmp.clickbooth[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.googleadservices[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@rtst.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ad.doubleclick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@paypal.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionduck.smackjeeves[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@onetoone.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.shorttail[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@themis-media[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clickbowl[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionduck.smackjeeves[6].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@toseeka[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adultfriendfinder[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@redlettermedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@rudefinder[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@cdn.at.atwola[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@account.optionsxpress[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@beacon.dmsinsights[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adinterax[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@atlanticmedia.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.nj[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@martiniadnetwork[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@miva.cinomedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@youporn[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.zeusclicks[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@smartadserver[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@clickbooth[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@sales.liveperson[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@content.yieldmanager[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.react2media[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adlegend[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@nationalassociationofrealtors.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clickwhale[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@serving.xxxwebtraffic[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.find-fast-answers[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[7].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@yadro[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@msnportal.112.2o7[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adxpansion[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.whaleads[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@clicksor[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ad.e-kolay[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clickcheer[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@accounts.youtube[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@cdn1.trafficmp[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@centurymediapodcast.mevio[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@about.bizrate[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionduck.smackjeeves[5].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@secure.wikimedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.findsmy[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediaforge[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.crakmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.geeksaresexy[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@counter6.sextracker[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@sextracker[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@banners.bookofsex[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@gostats[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@webleadermedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.boltfind[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pornhub[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@media01.linkedin[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clicksthe[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@xml.happytofind[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tns-counter[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@viewablemedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@usatoday1.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@anrtx.tacoda[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.googleadservices[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@kaspersky.122.2o7[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@burstnet[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@gsimedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@myroitracking[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@naked[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@static.freewebs.getclicky[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tradedoubler[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionduck.smackjeeves[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@link.mercent[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.fling[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@intermundomedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@trafficmack[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@media2.legacy[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.dothads[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adtech[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionablecontent[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pornstarmethods[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@dealtime[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@search.clicksare[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@adserver2.exgfnetwork[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@exoclick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[8].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.advance[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tribalfusion[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.bleepingcomputer[5].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@optimize.indieclick[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@d.mediaforge[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@wpninewsweek.112.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@traveladvertising[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.pulse360[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@rambler[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@hentaicounter[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@atwola[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@collective-media[5].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@hugeidastat[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@xml.mediality[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pornsource[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@w00tpublishers.wootmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.worldstarhiphop[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@click.scour[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.ad4game[2].txt
	ad.insightexpressai.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	cdn2.themis-media.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	cloudfront.mediamatters.org [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	content.yieldmanager.edgesuite.net [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	ia.media-imdb.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	media.mtvnservices.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	media1.break.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	s0.2mdn.net [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	secure-us.imrworldwide.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	spe.atdmt.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	www.pornhub.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	wwwstatic.megaporn.com [ C:\Users\TJ\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4HBXARWC ]
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ad.yieldmanager[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.addynamix[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.bleepingcomputer[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@ads.bleepingcomputer[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@advertising[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@apmebf[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@atwola[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@burstnet[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@collective-media[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@collective-media[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@collective-media[4].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@content.yieldmanager[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@fastclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@invitemedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@invitemedia[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@kaspersky.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@kontera[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@liveperson[9].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@lucidmedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@media6degrees[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediaplex[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mediaplex[3].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@mm.chitika[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@network.realmedia[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@optimize.indieclick[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pointroll[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@prnewswire.122.2o7[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@pro-market[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@questionmarket[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@realmedia[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@revsci[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@s.clickability[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@server.iad.liveperson[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@statse.webtrendslive[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tacoda.at.atwola[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tribalfusion[1].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@tribalfusion[2].txt
	C:\Users\TJ\AppData\Roaming\Microsoft\Windows\Cookies\tj@www.googleadservices[3].txt





USBs work and Firefox/Chrome still crashes when opening as well as redirection on Google on IE.

#11 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 31 July 2011 - 09:21 AM

Hello,


USBs work and Firefox/Chrome still crashes when opening as well as redirection on Google on IE.



Can you burn Cd's and have access to a USB Flash Drive?


If you can burn Cd's please follow the direction for burning a repair CD for Windows7
How to Create a Windows 7 Repair Disc if You Don’t Have One

Don't use the disc. Just burn it and let me know if you have it burned.

Edited by fireman4it, 31 July 2011 - 09:21 AM.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#12 Evil Joe

Evil Joe
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 01 August 2011 - 10:59 PM

Disc has been burnt. Awaiting further instructions.

#13 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 02 August 2011 - 03:49 PM

1. Start PC, Insert Windows 7 DVD and hit a key when asked to. You may have to change your boot order to boot from DVD!

2. Click on ôRepair your computerô:

Posted Image

3.The installer will scan your PC for previous Windows installations:


Posted Image


Posted Image

4. Click on Command Prompt

Posted Image


5. Enter the following command on one line:
bootrec.exe /fixmbr


Your system should reboot or ask you to reboot. Please do so and tell me if the redirects have gone.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#14 Evil Joe

Evil Joe
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 PM

Posted 02 August 2011 - 10:47 PM

After typing "bootrec.exe /fixmbr", a message says "operation was completed successfully", but does not ask me to reboot. However, after rebooting, there is no more redirection problems on IE and Firefox and Chrome are working again. Thank you very much, fireman. Is there anything else that should be done?

#15 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:09:07 PM

Posted 03 August 2011 - 04:14 PM

Hello, Evil Joe.
Congratulations! You now appear clean! :cool:


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".



Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.



I don't see an Anti Virus Program running on your machine
  • Download and install an antivirus program, and make sure that you keep it updated
    New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
    Two good antivirus programs free for non-commercial home use are Avast! and Antivir
    Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.


Recommendations
Below are some recommendations to lower your chances of (re)infection.
  • Install and maintain an outbound firewall
  • Install Spyware Blaster and update it regularly
    If you wish, the commercial version provides automatic updating.
  • Install the MVPs hosts file, and update it regularly
    You can use the HostMan host file manager to do this automaticly if you wish.
    For more information on the hosts file, and what it can do for you, you can view the Tutorial on the Hosts file
  • Install an Anti-Spyware program, and update it regularly
    Malware Byte's Anti Malware is an excellent Anti-Spyware scanner. It's scan times are usually under ten minutes, and has excellent detection and removal rates.
    SUPERAntiSpyware is another good scanner with high detection and removal rates.
    Both programs are free for non commercial home use but provide a resident and do not nag if you purchase the paid versions.
  • Keep Windows (and your other Microsoft software) up to date!
    I cannot stress how important this is enough. Often holes are found in Internet Explorer or Windows itself that require patching. Sometimes these holes will allow an attacker unrestricted access to your computer.

    If you are using Windows XP or earlier
    Visit the Microsoft Update Website and follow the on screen instructions to setup Microsoft Update. Also follow the instructions to update your system. Please REBOOT and repeat this process until there are no more updates to install!!

    If you are using Windows Vista
    • Click the "Start Menu" (or Windows Orb)
    • Click "All Programs"
    • Click "Windows Update"
    • On the left, choose "Change Settings"
    • Ensure that the checkbox "Use Microsoft Update" at the bottom of the window is checked.
    • Press OK and accept the UAC prompt.
      Note: You shouldn't need to check this checkbox every single time you update, only the first time.
    • Click "Check for Updates" in the upper left corner.
    • Follow the instructions to install the latest updates.
    • Reboot and repeat the "Check for Updates" until there are no more critical updates to install
  • Keep your other software up to date as well
    Software does not need to be made by Microsoft to be insecure. You can use the Secunia Online Software occasionally to help you check for out of date software on your machine.
  • Stay up to date!
    The MOST IMPORTANT part of any security setup is keeping the software up to date. Malware writers release new variants every single day. If your software updates don't keep up, then the malware will always be one step ahead. Not a good thing :(.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users