Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Dcom server process launcher terminated unexpectedly


  • This topic is locked This topic is locked
19 replies to this topic

#1 PGrimm

PGrimm

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 22 January 2010 - 12:03 PM

Have Dell laptop with Windows Vista. Keep getting error "dcom server process launcher service terminated unexpectedly". After about a minute the system restarts. If I run "shutdown -a", I can stop the constant restarts. I've run a bunch of scans -- nothing found today. I installed malwarebytes and hijack this. Malwarebytes did not find anything today (yesterday it found and deleted a few files). I don't know what to do the the hijack this log. I've attached it -- can you help?
Thanks!!

Paula
Logfile of Trend Micro HijackThis v2.0.3 (BETA)
Scan saved at 11:37:20 AM, on 1/22/2010
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v8.00 (8.00.6001.18865)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Dell Support Center\bin\sprtcmd.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Program Files\Sony\Reader\Data\bin\launcher\Reader Library Launcher.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer provided by Dell
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5555
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O2 - BHO: Browser Address Error Redirector - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - C:\Program Files\Dell\BAE\BAE.dll
O4 - HKLM\..\Run: [dellsupportcenter] "C:\Program Files\Dell Support Center\bin\sprtcmd.exe" /P dellsupportcenter
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [dscactivate] "C:\Program Files\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [eBook Library Launcher] C:\Program Files\Sony\Reader\Data\bin\launcher\Reader Library Launcher.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\npjpi160.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\npjpi160.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O13 - Gopher Prefix:
O15 - Trusted Zone: http://*.mcafee.com
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Andrea ST Filters Service (AESTFilters) - Andrea Electronics Corporation - C:\Windows\system32\aestsrv.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Intel® Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intuit Update Service (IntuitUpdateService) - Intuit Inc. - C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Sony SCSI Helper Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\Fsk\SonySCSIHelperService.exe
O23 - Service: SupportSoft Sprocket Service (dellsupportcenter) (sprtsvc_dellsupportcenter) - SupportSoft, Inc. - C:\Program Files\Dell Support Center\bin\sprtsvc.exe
O23 - Service: SigmaTel Audio Service (STacSV) - IDT, Inc. - C:\Windows\system32\STacSV.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\Windows\System32\WLTRYSVC.EXE
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 6289 bytes


BC AdBot (Login to Remove)

 


#2 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:05:53 PM

Posted 29 January 2010 - 11:07 AM

Hello and welcome to Bleeping Computer! welcome.gif

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#3 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 29 January 2010 - 03:34 PM

Thank you for getting back to me.

The problem still exits. A few minutes after starting the computer the error "dcom server process launcher service has terminated unexpectedly" appears. If I do nothing the computer restarts and the same thing happens again. My temporary workaround has been to run "shutdown -a" as soon as I get the error message and then I can use the computer. I also noticed that a window pops up that says "host process for windows services stopped working and was closed".

I've run various scans -- norton and malwarebytes. Everything comes up clean.

I've run the DDS software as requested.

I've attached the files.

Thank you.
Paula

Attached Files



#4 Farbar

Farbar

    Just Curious


  • Security Developer
  • 21,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Netherlands
  • Local time:04:53 PM

Posted 30 January 2010 - 05:05 AM

Hi PGrimm,

Welcome to Virus/Trojan/Spyware/Malware Removal (VTSMR) forum. I am going to assist you with your problem.

Please refrain from making any changes to your system (scanning or running other tools, updating Windows, installing applications, removing files, etc.) from now on as it might interfere with our fixes. Please let me know in your next reply if you agree with this.

Download the GMER Rootkit Scanner exe file from here and save it to your desktop.
  • Temporarily disable any real-time active protection so your security program drivers will not conflict with gmer's driver.
  • Click on this link to see a list of programs that should be disabled.
  • Disconnect from the Internet and close all running programs.
  • Right-click GMER.exe and select "Run as administrator". If asked to allow gmer.sys driver to load, please consent .
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO.
  • Then click the Scan button & wait for it to begin. (Please be patient as it can take some time to complete).
  • When the scan is finished, you will see the scan button appears again. Click Save to save the scan results to your Desktop.
  • Save the file as gmer.log and copy/paste the contents in your next reply.


#5 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 30 January 2010 - 07:23 PM

I agree to your requests regarding scans and applications.

Thanks for your help.
Paula

Ran the software you asked. Here is the output:

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-01-30 08:23:45
Windows 6.0.6001 Service Pack 1
Running: m8c0q08c.exe; Driver: C:\Users\GRIMMF~1\AppData\Local\Temp\fxlcyuod.sys


---- System - GMER 1.0.15 ----

SSDT 86E50A08 ZwAlertResumeThread
SSDT 86CEBDE0 ZwAlertThread
SSDT 86E65298 ZwAllocateVirtualMemory
SSDT 86EC6BC8 ZwConnectPort
SSDT 86E65F90 ZwCreateMutant
SSDT 86E660C0 ZwCreateThread
SSDT 86F75A98 ZwFreeVirtualMemory
SSDT 86E8BE28 ZwImpersonateAnonymousToken
SSDT 86E50948 ZwImpersonateThread
SSDT 86F6D6C0 ZwMapViewOfSection
SSDT 86E65ED0 ZwOpenEvent
SSDT 86CE4428 ZwOpenProcessToken
SSDT 86CE1E28 ZwOpenThreadToken
SSDT 86F1C428 ZwResumeThread
SSDT 86CF6548 ZwSetContextThread
SSDT 86E8B1A0 ZwSetInformationProcess
SSDT 86CF6488 ZwSetInformationThread
SSDT 86E51F28 ZwSuspendProcess
SSDT 86E67ED0 ZwSuspendThread
SSDT 86E8E568 ZwTerminateProcess
SSDT 86E67F90 ZwTerminateThread
SSDT 86E8B260 ZwUnmapViewOfSection
SSDT 86F75B58 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!KeSetTimerEx + 350 822D0914 8 Bytes [08, 0A, E5, 86, E0, BD, CE, ...]
.text ntkrnlpa.exe!KeSetTimerEx + 364 822D0928 4 Bytes [98, 52, E6, 86] {CWDE ; PUSH EDX; OUT 0x86, AL}
.text ntkrnlpa.exe!KeSetTimerEx + 3F4 822D09B8 4 Bytes [C8, 6B, EC, 86] {ENTER 0xec6b, 0x86}
.text ntkrnlpa.exe!KeSetTimerEx + 428 822D09EC 4 Bytes [90, 5F, E6, 86] {NOP ; POP EDI; OUT 0x86, AL}
.text ntkrnlpa.exe!KeSetTimerEx + 454 822D0A18 4 Bytes [C0, 60, E6, 86] {SHL BYTE [EAX-0x1a], 0x86}
.text ...
.rsrc C:\Windows\system32\drivers\iastor.sys entry point in ".rsrc" section [0x82CCE024]

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\tdx \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device -> \Driver\iaStor \Device\Harddisk0\DR0 85035856

---- Files - GMER 1.0.15 ----

File C:\Windows\system32\drivers\iastor.sys suspicious modification

---- EOF - GMER 1.0.15 ----


#6 Farbar

Farbar

    Just Curious


  • Security Developer
  • 21,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Netherlands
  • Local time:04:53 PM

Posted 30 January 2010 - 07:46 PM

Good job. the log confirmed my suspicious over the type of infection.

Download ComboFix from one of these locations:

Link 1
Link 2
Link 3

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Information on A/V control HERE)
  • Double click on ComboFix.exe & follow the prompts.

When finished, it shall produce a log for you. Please copy and paste the C:\ComboFix.txt in your next reply.

#7 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 30 January 2010 - 11:16 PM

Disabled antivirus and ran combofix; got as far as scan 2 then the computer hung.
Restarted the computer and tried again; got as far as scan three and then it hung again.
Tried one more time and it hung again.

Any suggestions?

Thanks!
Paula

#8 Farbar

Farbar

    Just Curious


  • Security Developer
  • 21,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Netherlands
  • Local time:04:53 PM

Posted 31 January 2010 - 07:50 AM

Rename ComboFix.exe to far.exe and run it.

#9 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 31 January 2010 - 10:31 AM

Renamed combofix.exe far.exe. Ran it again. After an hour shutdown the computer. Got as far as stage 2.
Tried again. Same result.

Sorry. Is there anything else I can try?
Paula

#10 Farbar

Farbar

    Just Curious


  • Security Developer
  • 21,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Netherlands
  • Local time:04:53 PM

Posted 31 January 2010 - 10:52 AM

Do you have access to another Windows Vista? What we need is a clean copy of iastor.sys. I'll tell you from which directory it should be copied in case you have access to another Vista.

In case you don't have to another Vista please run Notepad (start > All Programs > Accessories > Notepad) and copy and paste the text in the code box into a new file:


CODE
@ECHO OFF
dir /a /s c:\iastor.* >log.txt
start log.txt

  • Go to the File menu at the top of the Notepad and select Save as.
  • Select Save in: desktop
  • Fill in File name: dirlook.bat
  • Save as type: All file types (*.*)
  • Click save.
  • Close the Notepad.
  • Locate and right-click dirlook.bat on the desktop to run it as administrator. It should look like this:
  • A notepad opens, copy and paste the content (log.txt) to your reply.


#11 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 31 January 2010 - 12:31 PM

Unfortunately, I don't have access to another windows vista. My kids have laptops with Windows 7.

Here is the log you requested.
Thanks for not giving up
Paula


Volume in drive C is OS
Volume Serial Number is B41A-0368

Directory of c:\Drivers\storage\R166200

09/06/2007 11:43 AM 11,156 iastor.cat
09/06/2007 11:43 AM 7,678 iastor.inf
09/06/2007 11:43 AM 304,920 iastor.sys
3 File(s) 323,754 bytes

Directory of c:\Program Files\Intel\Intel Matrix Storage Manager\Driver

04/11/2007 01:41 AM 11,156 iastor.cat
04/06/2007 03:31 PM 7,678 iastor.inf
03/21/2007 12:58 PM 304,920 IaStor.sys
3 File(s) 323,754 bytes

Directory of c:\Program Files\Intel\Intel Matrix Storage Manager\Driver64

04/11/2007 01:41 AM 11,156 iastor.cat
04/06/2007 03:35 PM 7,678 iastor.inf
03/21/2007 12:59 PM 381,720 IaStor.sys
3 File(s) 400,554 bytes

Directory of c:\Qoobox\Quarantine\C\Windows\System32\drivers

01/21/2010 06:34 PM 304,920 iaStor.sys.vir
1 File(s) 304,920 bytes


#12 Farbar

Farbar

    Just Curious


  • Security Developer
  • 21,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Netherlands
  • Local time:04:53 PM

Posted 31 January 2010 - 01:10 PM

ComboFix gave you a warning about rootkit and rebooted before it stopped working, isn't it? ComboFix seems to have taken care of the rootkit and we might not need to replace IaStor.sys any more.

Please run Notepad (start > All Programs > Accessories > Notepad) and copy and paste the text in the code box into a new file:


CODE
@ECHO OFF
mbr.exe -t
ping 1.1.1.1 -n 1 -w 1500 >nul
start mbr.log
  • Go to the File menu at the top of the Notepad and select Save as.
  • Select Save in: desktop
  • Fill in File name: look.bat
  • Save as type: All file types (*.*)
  • Click save.
  • Close the Notepad.
  • Locate and right-click look.bat and select "Run as Administrator".
  • A notepad opens, copy and paste the content (mbr.log) to your reply.


#13 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 31 January 2010 - 01:43 PM

Ok. Ran "look"
Here is the ouput.

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys iastor.sys hal.dll
kernel: MBR read successfully
user & kernel MBR OK


#14 Farbar

Farbar

    Just Curious


  • Security Developer
  • 21,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Netherlands
  • Local time:04:53 PM

Posted 31 January 2010 - 02:26 PM

Yes the rootkit is taken care of by ComboFix. thumbup2.gif
  1. Please open HiJackThis and choose do a system scan only. Check the boxes next to ONLY the entries listed below (if present):

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5555

    Now close all windows other than HiJackThis, including browsers, so that nothing other than HijackThis is open, then click Fix Checked. A box will pop up asking you if you wish to fix the selected items. Please choose YES. Once it has fixed them, please exit/close HijackThis.

  2. I see the traces of Browser Address Error Redirector on the log. This is usually preinstalled on Dell computer without the consent of the user. You may uninstall it via Add/Remove programs. If you decide to uninstall it also remove the following folder: C:\Program Files\BAE

  3. If you don't use a Dial-up connection you may uninstall the following program:

    NetWaiting

  4. Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
    • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
    • Look for "JDK 6 Update 18 (JDK or JRE)".
    • Click the Download JRE button to the right.
    • Select your Platform: "Windows".
    • Select your Language: "Multi-language".
    • Read the License Agreement, and then check the box that says: "Accept License Agreement".
    • Click Continue and the page will refresh.
    • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
    • Close any programs you may have running - especially your web browser.
    Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
    • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
    • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
    • Repeat as many times as necessary to remove each Java versions.
    • Reboot your computer once all Java components are removed.
    • Then from your desktop double-click on jre-6u18-windows-i586.exe to install the newest version.

  5. Open your Malwarebytes' Anti-Malware.
    • First update it, to do that under the Update tab press "Check for Updates".
    • Under Scanner tab select "Perform Quick Scan", then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the MBAM log.
    Extra Note:
    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.


  6. Please copy and paste a fresh Hijackthis log to your reply. Also tell me how is your computer running.

Edited by farbar, 31 January 2010 - 02:32 PM.
Added Java update


#15 PGrimm

PGrimm
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Connecticut
  • Local time:09:53 AM

Posted 31 January 2010 - 03:46 PM

Thank you thank you thank you.
I haven't received a "dcom server process" error all day. Computer seems to be working fine.

I really appreciate your help as I could not have fixed this by myself.

Paula

I completed all the steps you requested.
Here are the logs:

Malwarebytes' Anti-Malware 1.44
Database version: 3669
Windows 6.0.6001 Service Pack 1
Internet Explorer 8.0.6001.18882

1/31/2010 3:33:56 PM
mbam-log-2010-01-31 (15-33-56).txt

Scan type: Quick Scan
Objects scanned: 103197
Time elapsed: 7 minute(s), 36 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)







0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users