Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Yahoo Mail redirect virus


  • Please log in to reply
15 replies to this topic

#1 jakozel

jakozel

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 05 June 2011 - 10:15 AM

?
In the last few days I have been unable to access my Yahoo Mail account. Sometimes I can get to the email account page safely and can view emails. However, if I try to open any email it opens, and then within a few seconds I get redirected to an inactive Google search page.



What's This?

Sorry, we couldn't find http://l.yimg.comnofiledartiframe.html/%3FadParams%3D53B241688640%25253B0-0%25253B0%25253B64626173%25253B2321-160/600%25253B42328888/42346675/1%25253B%25253B%25257Esscs%25253D%25253f%26clickN%26type%3DExpandingFlash%26uniqueId%3D1306267149566%26thirdPartyImpUrl%26thirdPartyFlashDisplayUrl%26thirdPartyBackupImpUrl%26surveyUrl%26googleContextDiscoveryUrl%3Dhttp://pagead2.googlesyndication.com/pagead/ads%3Fclient%253Ddclk-3pas-query%2526output%253Dxml%2526geo%253Dtrue%26livePreviewSiteUrl%3D%2525LivePreviewSiteUrl%26customScriptFileUrl%26servingMethod%3Di%26mode%3DFlash%26isHTML5Creative%3Dfalse%26isHTML5PreviewMode%3Dfalse%26forceHTML5Creative%3Dfalse%26macro_j%3D0-2671308703%26macro_eenv%3Di%26macro_g%3Dct%253DUS%2526st%253DTX%2526ac%253D713%2526zp%253D77036%2526bw%253D2%2526dma%253D99%2526city%253D13248%26macro_s%3DN3550.Yahoo.com%26macro_eaid%3D241688640%26macro_n%3D3731359%26macro_m%3D0%26macro_erid%3D42346675%26macro_ebuy%3D5293574%26macro_ecid%3D42328888%26macro_erv%3D1%26macro_epid%3D64626173%26macro_eadv%3D2812300%26macro_esid%3D889713%26macro_ekid%3D0%26csiBaseline%3D1307286287393%26csiAdRespTime%3DNaN%26shouldDisplayFlashAsset%3Dtrue%26globalTemplateJs%3Dhttp://s0.2mdn.net/879366/expandingIframeGlobalTemplate_v2_60_08.js.
Here are some related websites:


I am using Internet Explorer, and it's on Windows Vista.
This does not happen when my computer is operating in Safe Mode.
Thanks in advance for the help

Edited by hamluis, 05 June 2011 - 11:33 AM.
Disahled link posted.


BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 12 June 2011 - 04:09 PM

?
In the last few days I have been unable to access my Yahoo Mail account. Sometimes I can get to the email account page safely and can view emails. However, if I try to open any email it opens, and then within a few seconds I get redirected to an inactive Google search page.



What's This?

Sorry, we couldn't find http://l.yimg.comnofiledartiframe.html/%3FadParams%3D53B241688640%25253B0-0%25253B0%25253B64626173%25253B2321-160/600%25253B42328888/42346675/1%25253B%25253B%25257Esscs%25253D%25253f%26clickN%26type%3DExpandingFlash%26uniqueId%3D1306267149566%26thirdPartyImpUrl%26thirdPartyFlashDisplayUrl%26thirdPartyBackupImpUrl%26surveyUrl%26googleContextDiscoveryUrl%3Dhttp://pagead2.googlesyndication.com/pagead/ads%3Fclient%253Ddclk-3pas-query%2526output%253Dxml%2526geo%253Dtrue%26livePreviewSiteUrl%3D%2525LivePreviewSiteUrl%26customScriptFileUrl%26servingMethod%3Di%26mode%3DFlash%26isHTML5Creative%3Dfalse%26isHTML5PreviewMode%3Dfalse%26forceHTML5Creative%3Dfalse%26macro_j%3D0-2671308703%26macro_eenv%3Di%26macro_g%3Dct%253DUS%2526st%253DTX%2526ac%253D713%2526zp%253D77036%2526bw%253D2%2526dma%253D99%2526city%253D13248%26macro_s%3DN3550.Yahoo.com%26macro_eaid%3D241688640%26macro_n%3D3731359%26macro_m%3D0%26macro_erid%3D42346675%26macro_ebuy%3D5293574%26macro_ecid%3D42328888%26macro_erv%3D1%26macro_epid%3D64626173%26macro_eadv%3D2812300%26macro_esid%3D889713%26macro_ekid%3D0%26csiBaseline%3D1307286287393%26csiAdRespTime%3DNaN%26shouldDisplayFlashAsset%3Dtrue%26globalTemplateJs%3Dhttp://s0.2mdn.net/879366/expandingIframeGlobalTemplate_v2_60_08.js.
Here are some related websites:


I am using Internet Explorer, and it's on Windows Vista.
This does not happen when my computer is operating in Safe Mode.
Thanks in advance for the help



Please perform the following, so that we can get the exact specs of your computer. This will better assist us in helping you more.

Publish a Snapshot using Speccy

The below is for those who cannot get online

Please take caution when attaching a text file to your post if you cannot copy/paste the link to your post, you will need to edit it to make sure that your Windows Key is not present.

Also

Hello,

And welcome to BleepingComputer.com, before we can assist you with your question of: Am I infected? You will need to perform the following tasks and post the logs of each if you can.

Malwarebytes Anti-Malware

NOTEMalwarebytes is now offering a free trial of their program, if you want to accept it you will need to enter some billing information, so that at the end of the trial you would be charged the cost of the product. Please decline this offer, if you are unable to provide billing information. If you want to try it out, then provide the billing information.

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Full Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


SUPERAntiSpyware:

Please download and scan with SUPERAntiSpyware Free

  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

Instructions:

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now GMER

GMER does not work in 64bit Mode!!!!!!

Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic Full Scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.



#3 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 12 June 2011 - 08:16 PM

http://speccy.piriform.com/results/H3yWXnt3m3WpCGr8OxKJUmn


MBAM log

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6845

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

6/12/2011 9:45:07 PM
mbam-log-2011-06-12 (21-45-07).txt

Scan type: Full scan (A:\|C:\|D:\|E:\|F:\|G:\|H:\|I:\|J:\|)
Objects scanned: 342398
Time elapsed: 1 hour(s), 22 minute(s), 31 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Edited by jakozel, 12 June 2011 - 09:46 PM.


#4 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 12 June 2011 - 08:53 PM

Any reason why there is no detected anti-virus?

#5 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 13 June 2011 - 07:24 AM

Actually I'm not sure why it didn't detect an anti-virus.
I am running McAfee Security Center for dell - It's up and running as of when I ran the MBAM scan. Shows that I am up to date.
Full Scan with McAfee found no threats













SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/12/2011 at 11:40 PM

Application Version : 4.54.1000

Core Rules Database Version : 7207
Trace Rules Database Version: 5019

Scan type : Complete Scan
Total Scan Time : 01:39:17

Memory items scanned : 314
Memory threats detected : 0
Registry items scanned : 8452
Registry threats detected : 0
File items scanned : 191521
File threats detected : 83

Adware.Tracking Cookie
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@lucidmedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@eyewonder[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@segment-pixel.invitemedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@interclick[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@media.adfrontiers[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@liveperson[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@www.googleadservices[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ads.bleepingcomputer[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@insightexpressai[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@content.yieldmanager[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@liveperson[3].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@fastclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@pro-market[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@adbrite[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@pointroll[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@serving-sys[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@sales.liveperson[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@tracking.servedbyy[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@at.atwola[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@clickfuse[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@doubleclick[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@advertising[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ads.pointroll[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ar.atwola[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@a1.interclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@content.yieldmanager[3].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@legolas-media[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ad.yieldmanager[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ru4[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@surveymonkey.122.2o7[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@media6degrees[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@invitemedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ads.undertone[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@imrworldwide[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@tribalfusion[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@www.burstnet[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@ehg-aig.hitbox[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@hitbox[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@statse.webtrendslive[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@trafficmp[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@collective-media[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@lfstmedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@revsci[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@specificclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@mediaplex[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@atdmt[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@apmebf[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@adknowledge[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@tacoda.at.atwola[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@zedo[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@realmedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@yieldmanager[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@intermundomedia[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@mediabrandsww[1].txt
secure-us.imrworldwide.com [ C:\Users\Jason\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\B4HE27GF ]
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\jason@enhancedrewards.wellsfargorewards[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ad.yieldmanager[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@adbrite[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ads.bleepingcomputer[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ads.pointroll[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ads.pointroll[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@advertising[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@apmebf[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@atdmt[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@casalemedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@collective-media[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@content.yieldmanager[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@doubleclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@enhancedrewards.wellsfargorewards[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@eyewonder[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@fastclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@imrworldwide[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@insightexpressai[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@interclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@invitemedia[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@media6degrees[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@pointroll[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@questionmarket[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@reliantenergy.112.2o7[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@ru4[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@serving-sys[2].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@specificclick[1].txt
C:\Users\Jason\AppData\Roaming\Microsoft\Windows\Cookies\Low\jason@zedo[2].txt

#6 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 13 June 2011 - 02:17 PM

What internet Browser do you use?

#7 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 13 June 2011 - 06:56 PM

I am using Internet Explorer.

I downloaded and tried to run GMER twice. The first time it closed due to a problem. I tried to re-run it and got the blue screen and a re-boot.
So I have now tried it in Safe Mode 3 times and gotten the same result - either it closes early or I get the blue screen.
I have turned off all my McAfee scanning, firewall, etc. and disconnected from the internet. Maybe I'm still missing something as far as disabling McAfee?
GMER is able to run the initial scan when I double click on the icon. I then click the scan button again - it runs for about 30-45 seconds and then freezes. The status area below the box that shows what areas it is currently scanning always stops when displaying the following: \Device\HarddiskVolumeShadowCopy1
It gets "stuck" at this display for about 10 seconds, and this is when it then says the program was stopped and needs to close.

Sorry for being difficult :)

Edited by jakozel, 13 June 2011 - 10:55 PM.


#8 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 18 June 2011 - 06:36 PM

ok finally got GMER to work in safe mode.

GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-06-18 18:16:39
Windows 6.0.6002 Service Pack 2
Running: GMER.exe


---- Files - GMER 1.0.15 ----

File C:\System Volume Information\MountPointManagerRemoteDatabase 0 bytes
File C:\System Volume Information\SPP 0 bytes
File C:\System Volume Information\SystemRestore 0 bytes
File C:\System Volume Information\{a02bb26b-8e68-11e0-b158-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} -2023243776 bytes
File C:\System Volume Information\{c73c2244-8f08-11e0-b4ca-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 2059894784 bytes
File C:\System Volume Information\{d44d5b03-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1207173120 bytes
File C:\System Volume Information\{d44d5b0e-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1547665408 bytes
File C:\System Volume Information\{d44d5b17-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1378320384 bytes
File C:\System Volume Information\{d44d5b20-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1224343552 bytes
File C:\System Volume Information\{d44d5b29-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1344864256 bytes
File C:\System Volume Information\{d44d5b32-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1364115456 bytes
File C:\System Volume Information\{d44d5b3c-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1404436480 bytes
File C:\System Volume Information\{d44d5b45-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1673838592 bytes
File C:\System Volume Information\{d44d5b4e-84d3-11e0-8bbb-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1278033920 bytes
File C:\System Volume Information\{3951ccac-90b1-11e0-bc0a-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1797210112 bytes
File C:\System Volume Information\{3951ccb6-90b1-11e0-bc0a-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1303642112 bytes
File C:\System Volume Information\{3951ccbf-90b1-11e0-bc0a-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1327726592 bytes
File C:\System Volume Information\{3951ccc8-90b1-11e0-bc0a-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1818427392 bytes
File C:\System Volume Information\{94d6d242-75ed-11e0-8f18-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1234157568 bytes
File C:\System Volume Information\{94d6d24b-75ed-11e0-8f18-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1323237376 bytes
File C:\System Volume Information\{94d6d254-75ed-11e0-8f18-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1422704640 bytes
File C:\System Volume Information\{99236064-9702-11e0-999d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} -834666496 bytes
File C:\System Volume Information\tracking.log 20480 bytes
File C:\System Volume Information\{1b0ed586-7e82-11e0-b38d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1598291968 bytes
File C:\System Volume Information\{1b0ed599-7e82-11e0-b38d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1382121472 bytes
File C:\System Volume Information\{1b0ed5a3-7e82-11e0-b38d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1190084608 bytes
File C:\System Volume Information\{1b0ed5ac-7e82-11e0-b38d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1299038208 bytes
File C:\System Volume Information\{1b0ed5b5-7e82-11e0-b38d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1461075968 bytes
File C:\System Volume Information\{1b0ed5c8-7e82-11e0-b38d-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1577893888 bytes
File C:\System Volume Information\{2a697efd-8bf5-11e0-82a1-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} -156975104 bytes
File C:\System Volume Information\{34699d06-8c4a-11e0-95c1-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1185185792 bytes
File C:\System Volume Information\{34699d3e-8c4a-11e0-95c1-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 1167589376 bytes
File C:\System Volume Information\{34699d4f-8c4a-11e0-95c1-000f666f2b44}{3808876b-c176-4e48-b7ae-04046e6cc752} 568311808 bytes
File C:\System Volume Information\{3808876b-c176-4e48-b7ae-04046e6cc752} 65536 bytes
File C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagLog.etl 117208 bytes
File C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-Application.etl 0 bytes
File C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl 64 bytes
File C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-System.etl 64 bytes
File D:\System Volume Information\tracking.log 20480 bytes

---- EOF - GMER 1.0.15 ----

#9 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 26 June 2011 - 08:42 PM

Does it happen in other internet browsers?

#10 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 26 June 2011 - 10:09 PM

I just downloaded Google Chrome and went back into my Yahoo acct.
I am able to access my emails without any problem so far, so it looks like it's only happening with IE.

When using IE it also happens with attempting to access Yahoo Sports - the tab gets re-directed to google.com then quickly to the Dell Search Page I listed in the first post.
But it doesn't re-redirect in IE when I open Yahoo Autos, Health, Shopping, Etc - only sports and when selecting an email to read

#11 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 27 June 2011 - 01:08 AM

Lets try this which will remove all your Temp files and see if its a corrupted temp file or cookie.

I am sorry that I forgot about your post, I have been fighting a terrible cold.

#12 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 07 July 2011 - 11:18 PM

Ok so I had some initial trouble getting the above program to complete without freezing the computer. I eventually got it to finish, but had trouble restarting the computer so I'm not sure if the program finished removing the temp files.
After multiple tries I finally got it to finish and get to the screen where it informed me it needed to reboot. Upon clicking ok, my computer shut down and restarted, getting past the black screen with the "Microsoft Corporation" at the bottom with the rolling bar going left to right. Then another black screen, followed by the mouse cursor popping up for a few seconds and then disappearing.
But then the startup "stalled" and left me on a blank black screen. It never got to the screen displaying the windows logo in the center of the screen or the password page.
I had to manually shut down my computer and restart it again, aat which time the startup progressed through all the steps and I got back to the desktop. I did re-run the program a few times to see if it would work and get all the way back through the restart, but it stalled at the exact same point each time. When I run the program now, it doesn't have much files to clear out, so I assume that the previous attempts did clear out the temp files / cookies.
When I get back to yahoo mail, unfortunately I still run into the same problem. I can get to the inbox and see my mail inbox list fine, but if I click on a mail message to view it, it still redirects me (about half the time) - sometimes I am actually able to view the body of the mail message (which seems to be a slight step up from previous weeks), just not consistently

#13 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 08 July 2011 - 04:46 AM

Please download MiniToolBox, save it to your desktop and run it.

Checkmark following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size.
  • List Minidump Files.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

#14 jakozel

jakozel
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:06:32 PM

Posted 10 July 2011 - 09:21 PM

MiniToolBox by Farbar
Ran by Jason (administrator) on 10-07-2011 at 21:20:07
Windows Vista ™ Home Premium Service Pack 2 (X86)

***************************************************************************


================= Flush DNS: ==============================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

================= End of Flush DNS ========================================

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= End of IE Proxy Settings ========================

"Reset IE Proxy Settings": Proxy Settings were reset.

=============== Hosts content: ============================================

# Copyright © 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost
::1 localhost

=============== End of Hosts ==============================================

================= IP Configuration: =======================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : Jason-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : gateway.2wire.net

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . : gateway.2wire.net
Description . . . . . . . . . . . : Linksys Wireless-G PCI Adapter
Physical Address. . . . . . . . . : 00-0F-66-6F-2B-44
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::9501:a2d4:17ca:8848%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.66(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Thursday, July 07, 2011 11:00:05 PM
Lease Expires . . . . . . . . . . : Monday, July 11, 2011 8:16:59 PM
Default Gateway . . . . . . . . . : 192.168.1.254
DHCP Server . . . . . . . . . . . : 192.168.1.254
DHCPv6 IAID . . . . . . . . . . . : 234884966
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-0D-C0-0C-7D-00-19-D1-5F-4B-7D
DNS Servers . . . . . . . . . . . : 192.168.1.254
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : us.dell.com
Description . . . . . . . . . . . : Intel® 82566DC Gigabit Network Connection
Physical Address. . . . . . . . . : 00-19-D1-5F-4B-7D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:30d7:1b37:9c94:196(Preferred)
Link-local IPv6 Address . . . . . : fe80::30d7:1b37:9c94:196%8(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.us.dell.com
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 9:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{0C379853-26E2-4AD2-AD85-48623E051341}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : gateway.2wire.net
Description . . . . . . . . . . . : isatap.gateway.2wire.net
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: homeportal
Address: 192.168.1.254

Name: google.com
Addresses: 74.125.227.18
74.125.227.20
74.125.227.17
74.125.227.16
74.125.227.19



Pinging google.com [74.125.227.16] with 32 bytes of data:

Reply from 74.125.227.16: bytes=32 time=33ms TTL=55

Reply from 74.125.227.16: bytes=32 time=31ms TTL=55



Ping statistics for 74.125.227.16:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 31ms, Maximum = 33ms, Average = 32ms

Server: homeportal
Address: 192.168.1.254

Name: yahoo.com
Addresses: 98.137.149.56
209.191.122.70
67.195.160.76
69.147.125.65
72.30.2.43



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:

Reply from 209.191.122.70: bytes=32 time=34ms TTL=54

Reply from 209.191.122.70: bytes=32 time=32ms TTL=54



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 32ms, Maximum = 34ms, Average = 33ms



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
11 ...00 0f 66 6f 2b 44 ...... Linksys Wireless-G PCI Adapter
9 ...00 19 d1 5f 4b 7d ...... Intel® 82566DC Gigabit Network Connection
1 ........................... Software Loopback Interface 1
8 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
10 ...00 00 00 00 00 00 00 e0 isatap.us.dell.com
14 ...00 00 00 00 00 00 00 e0 isatap.{0C379853-26E2-4AD2-AD85-48623E051341}
15 ...00 00 00 00 00 00 00 e0 isatap.gateway.2wire.net
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.254 192.168.1.66 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.66 281
192.168.1.66 255.255.255.255 On-link 192.168.1.66 281
192.168.1.255 255.255.255.255 On-link 192.168.1.66 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.66 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.66 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
8 18 ::/0 On-link
1 306 ::1/128 On-link
8 18 2001::/32 On-link
8 266 2001:0:4137:9e76:30d7:1b37:9c94:196/128
On-link
11 281 fe80::/64 On-link
8 266 fe80::/64 On-link
8 266 fe80::30d7:1b37:9c94:196/128
On-link
11 281 fe80::9501:a2d4:17ca:8848/128
On-link
1 306 ff00::/8 On-link
11 281 ff00::/8 On-link
8 266 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

================= End of IP Configuration =================================

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/04/2011 05:46:18 PM) (Source: Application Error) (User: )
Description: Faulting application dlcxPSWX.EXE, version 4.48.0.0, time stamp 0x45386386, faulting module ntdll.dll, version 6.0.6002.18327, time stamp 0x4cb73436, exception code 0xc0000005, fault offset 0x00039431,
process id 0xc58, application start time 0xdlcxPSWX.EXE0.

Error: (06/27/2011 10:58:55 PM) (Source: Application Error) (User: )
Description: Faulting application TFC.exe, version 3.1.7.0, time stamp 0x2a425e19, faulting module RPCRT4.dll, version 6.0.6002.18024, time stamp 0x49f05bcc, exception code 0xc0000005, fault offset 0x000b0af5,
process id 0x2664, application start time 0xTFC.exe0.

Error: (06/27/2011 10:41:21 PM) (Source: Application Error) (User: )
Description: Faulting application TFC.exe, version 3.1.7.0, time stamp 0x2a425e19, faulting module ole32.dll, version 6.0.6002.18277, time stamp 0x4c28d53e, exception code 0xc0000005, fault offset 0x00004669,
process id 0x1160, application start time 0xTFC.exe0.

Error: (06/26/2011 09:42:09 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE SECURITYCENTER.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (06/26/2011 09:42:09 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE SECURITYCENTER.LNK> in the hash map cannot be updated.

Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)

Error: (06/26/2011 07:39:42 PM) (Source: EventSystem) (User: )
Description: d:\longhorn\com\complus\src\events\tier1\eventsystemobj.cpp458007043c

Error: (06/26/2011 07:10:46 PM) (Source: Perflib) (User: )
Description: EmdCacheC:\Windows\system32\emdmgmt.dll4

Error: (06/18/2011 05:15:50 PM) (Source: PerfNet) (User: )
Description:

Error: (06/18/2011 05:15:50 PM) (Source: PerfNet) (User: )
Description:

Error: (06/18/2011 05:15:49 PM) (Source: Perflib) (User: )
Description: EmdCacheC:\Windows\system32\emdmgmt.dll4


System errors:
=============
Error: (07/07/2011 10:57:22 PM) (Source: Service Control Manager) (User: )
Description: Ati External Event Utility1

Error: (07/07/2011 10:46:59 PM) (Source: Service Control Manager) (User: )
Description: Ati External Event Utility1

Error: (07/07/2011 10:35:02 PM) (Source: Service Control Manager) (User: )
Description: dlcx_device1

Error: (07/07/2011 10:22:35 PM) (Source: Service Control Manager) (User: )
Description: Ati External Event Utility1

Error: (07/05/2011 09:58:03 PM) (Source: Service Control Manager) (User: )
Description: Apple Mobile Device2600001Restart the service

Error: (07/05/2011 09:56:10 PM) (Source: Service Control Manager) (User: )
Description: Apple Mobile Device1600001Restart the service

Error: (06/30/2011 08:17:29 PM) (Source: DCOM) (User: )
Description: {3A185DDE-E020-4985-A8F2-E27CDC4A0F3A}

Error: (06/30/2011 04:04:51 AM) (Source: Ntfs) (User: )
Description: The file system structure on the disk is corrupt and unusable.
Please run the chkdsk utility on the volume OS.

Error: (06/30/2011 04:00:03 AM) (Source: Ntfs) (User: )
Description: The file system structure on the disk is corrupt and unusable.
Please run the chkdsk utility on the volume OS.

Error: (06/29/2011 11:07:09 PM) (Source: volsnap) (User: )
Description: The shadow copies of volume C: were aborted because of a failed free space computation.


Microsoft Office Sessions:
=========================
Error: (07/04/2011 05:46:18 PM) (Source: Application Error)(User: )
Description: dlcxPSWX.EXE4.48.0.045386386ntdll.dll6.0.6002.183274cb73436c000000500039431c5801cc3a9c2f11c867

Error: (06/27/2011 10:58:55 PM) (Source: Application Error)(User: )
Description: TFC.exe3.1.7.02a425e19RPCRT4.dll6.0.6002.1802449f05bccc0000005000b0af5266401cc3546d56f9b2f

Error: (06/27/2011 10:41:21 PM) (Source: Application Error)(User: )
Description: TFC.exe3.1.7.02a425e19ole32.dll6.0.6002.182774c28d53ec000000500004669116001cc35449053b0af

Error: (06/26/2011 09:42:09 PM) (Source: Windows Search Service)(User: )
Description: Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE SECURITYCENTER.LNK

Error: (06/26/2011 09:42:09 PM) (Source: Windows Search Service)(User: )
Description: Context: Application, SystemIndex Catalog

Details:
A device attached to the system is not functioning. (0x8007001f)
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\MCAFEE\MCAFEE SECURITYCENTER.LNK

Error: (06/26/2011 07:39:42 PM) (Source: EventSystem)(User: )
Description: d:\longhorn\com\complus\src\events\tier1\eventsystemobj.cpp458007043c

Error: (06/26/2011 07:10:46 PM) (Source: Perflib)(User: )
Description: EmdCacheC:\Windows\system32\emdmgmt.dll4

Error: (06/18/2011 05:15:50 PM) (Source: PerfNet)(User: )
Description:

Error: (06/18/2011 05:15:50 PM) (Source: PerfNet)(User: )
Description:

Error: (06/18/2011 05:15:49 PM) (Source: Perflib)(User: )
Description: EmdCacheC:\Windows\system32\emdmgmt.dll4


========================= End of Event log errors =========================

========================= Memory info: ====================================

Percentage of memory in use: 44%
Total physical RAM: 2045.21 MB
Available physical RAM: 1130.7 MB
Total Pagefile: 4327.67 MB
Available Pagefile: 2972.63 MB
Total Virtual: 2047.88 MB
Available Virtual: 1959.11 MB

======================= Partitions: =======================================

2 Drive c: (OS) (Fixed) (Total:288.04 GB) (Free:225.08 GB) NTFS
3 Drive d: (RECOVERY) (Fixed) (Total:10 GB) (Free:5.54 GB) NTFS

================= Users: ==================================================

User accounts for \\JASON-PC

-------------------------------------------------------------------------------
Administrator ASPNET Guest
IUSR_NMPR Jason
The command completed successfully.

================= End of Users ============================================

=========================== Minidump Files ====================

C:\Windows\Minidump\Mini061311-01.dmp
C:\Windows\Minidump\Mini061311-02.dmp

=========================== End oF Minidump Files =============

#15 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:32 AM

Posted 11 July 2011 - 08:10 AM

We need to know more about your BSODs...

Download BlueScreenView (in Zip file)

No installation required.

Unzip downloaded file and double click on BlueScreenView.exe file to run the program and When scanning is done, go to Edit > Select All.

Then go to File > Save Selected Items, and save the report as BSOD.txt.

Open BSOD.txt in Notepad, copy all content, and paste it into your next reply.

Compliments of Broni




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users