Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How do I fix Google redirect virus?


  • Please log in to reply
21 replies to this topic

#1 ashi

ashi

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 05 July 2011 - 06:46 AM

I recently had one of the anti-spyware viruses on my computer, and I completely took away the virus and repaired the computer. Or so I thought, this may be all connected somehow. For a while, my desktop items weren't showing up even though I un-hid them, but I finally got them to display. Unfortunately, when I click on start menu, I can see the programs but when I mouse over to the individual programs, it says "empty." So that's the first issue, which might be related to the old virus still.

The main issue, though, is a google redirect virus. I have MalwareBytes installed and running, but it didn't find anything after fixing the desktop issue. McAfee is supposedly running but all these viruses have gotten through, so I doubt it's working. Every time I click on a searched item in google, it brings me to a different site - sometimes shopica.com or some form of it. No anti-malware scan has found anything yet. Please help!

Edited by hamluis, 05 July 2011 - 08:23 AM.
Moved from XP to Am I Infected.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,695 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:03 PM

Posted 05 July 2011 - 04:49 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 06 July 2011 - 08:39 PM

Here's the checkup.txt:
Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

McAfee Security Scan Plus
Antivirus up to date! (On Access scanning disabled!)
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 17
Out of date Java installed!
Adobe Flash Player 10.1.85.3
Adobe Reader 9.4.5
Out of date Adobe Reader installed!
Mozilla Firefox (x86 en-US..) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

``````````End of Log````````````
---------------------------------------------------------------------------------

Here's the MiniToolBox results:

MiniToolBox by Farbar
Ran by Gregg Shields (administrator) on 06-07-2011 at 20:22:27
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************


========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= End of IE Proxy Settings ========================
Hosts file not detected in the default diroctory
================= IP Configuration: =======================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : DEBBY

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : home



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . : home

Description . . . . . . . . . . . : Realtek RTL8102E/RTL8103E Family PCI-E Fast Ethernet NIC

Physical Address. . . . . . . . . : 00-25-64-05-02-43

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.2

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 192.168.1.1

68.238.96.12

Lease Obtained. . . . . . . . . . : Wednesday, July 06, 2011 8:15:55 PM

Lease Expires . . . . . . . . . . : Thursday, July 07, 2011 8:15:55 PM

Server: Wireless_Broadband_Router.home
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.227.83, 74.125.227.84, 74.125.227.82, 74.125.227.81
74.125.227.80



Pinging google.com [74.125.227.84] with 32 bytes of data:



Reply from 74.125.227.84: bytes=32 time=10ms TTL=56

Reply from 74.125.227.84: bytes=32 time=11ms TTL=56



Ping statistics for 74.125.227.84:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 10ms, Maximum = 11ms, Average = 10ms

Server: Wireless_Broadband_Router.home
Address: 192.168.1.1

Name: yahoo.com
Addresses: 72.30.2.43, 98.137.149.56, 209.191.122.70, 67.195.160.76
69.147.125.65



Pinging yahoo.com [69.147.125.65] with 32 bytes of data:



Reply from 69.147.125.65: bytes=32 time=57ms TTL=54

Reply from 69.147.125.65: bytes=32 time=49ms TTL=54



Ping statistics for 69.147.125.65:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 49ms, Maximum = 57ms, Average = 53ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 25 64 05 02 43 ...... Realtek RTL8102E/RTL8103E Family PCI-E Fast Ethernet NIC - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.2 192.168.1.2 20
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 20
192.168.1.2 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 20
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 20
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None

================= End of IP Configuration =================================

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/06/2011 09:29:17 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.19088, fault address 0x00026225.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/05/2011 09:58:55 PM) (Source: Application Hang) (User: )
Description: Hanging application msnmsgr.exe, version 14.0.8117.416, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (06/30/2011 10:59:37 PM) (Source: Application Error) (User: )
Description: Fault bucket -2079641241.
The Wep key exchange did not result in a secure connection setup after 802.1x authentication. The current setting has been marked as failed and the Wireless connection will be disconnected.

Error: (06/30/2011 10:59:33 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module dbghelp.dll, version 5.1.2600.5512, fault address 0x000153c4.
Processing media-specific event for [iexplore.exe!ws!]

Error: (06/30/2011 08:16:24 PM) (Source: Application Error) (User: )
Description: Fault bucket -1786507564.
The Wep key exchange did not result in a secure connection setup after 802.1x authentication. The current setting has been marked as failed and the Wireless connection will be disconnected.

Error: (06/30/2011 07:34:21 PM) (Source: Application Error) (User: )
Description: Faulting application explorer.exe, version 6.0.2900.5512, faulting module unknown, version 0.0.0.0, fault address 0x00cf2616.
Processing media-specific event for [explorer.exe!ws!]

Error: (06/30/2011 05:57:42 PM) (Source: ESENT) (User: )
Description: wlcomm (1508) C:\Documents and Settings\Gregg Shields\Local Settings\Application Data\Microsoft\Windows Live Contacts\{5a91d9ef-eed0-442f-a516-dc3caf1a5124}\: The backup has been stopped because it was halted by the client or the connection with the client failed.

Error: (06/30/2011 05:57:42 PM) (Source: ESENT) (User: )
Description: wlcomm (1508) Error (-1032) during backup of a database (file C:\Documents and Settings\Gregg Shields\Local Settings\Application Data\Microsoft\Windows Live Contacts\{5a91d9ef-eed0-442f-a516-dc3caf1a5124}\DBStore\contacts.edb). The database will be unable to restore.

Error: (06/30/2011 05:57:42 PM) (Source: ESENT) (User: )
Description: wlcomm (1508) An attempt to create the file "C:\Documents and Settings\Gregg Shields\Local Settings\Application Data\Microsoft\Windows Live Contacts\{5a91d9ef-eed0-442f-a516-dc3caf1a5124}\DBStore\contacts.pat" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).

Error: (06/30/2011 05:57:02 PM) (Source: ESENT) (User: )
Description: wlcomm (1508) C:\Documents and Settings\Gregg Shields\Local Settings\Application Data\Microsoft\Windows Live Contacts\{ca920f85-5eee-4115-993e-a61c6cd6cf8d}\: The backup has been stopped because it was halted by the client or the connection with the client failed.


System errors:
=============
Error: (07/06/2011 08:16:01 PM) (Source: Service Control Manager) (User: )
Description: The lxduCATSCustConnectService service failed to start due to the following error:
%%1053

Error: (07/06/2011 08:16:01 PM) (Source: Service Control Manager) (User: )
Description: Timeout (30000 milliseconds) waiting for the lxduCATSCustConnectService service to connect.

Error: (07/06/2011 07:31:26 AM) (Source: DCOM) (User: Gregg Shields)
Description: The server {0002DF01-0000-0000-C000-000000000046} did not register with DCOM within the required timeout.

Error: (07/06/2011 07:29:50 AM) (Source: Service Control Manager) (User: )
Description: The lxduCATSCustConnectService service failed to start due to the following error:
%%1053

Error: (07/06/2011 07:29:50 AM) (Source: Service Control Manager) (User: )
Description: Timeout (30000 milliseconds) waiting for the lxduCATSCustConnectService service to connect.

Error: (07/05/2011 10:13:47 PM) (Source: Service Control Manager) (User: )
Description: The Windows Search service failed to start due to the following error:
%%1053

Error: (07/05/2011 10:13:47 PM) (Source: Service Control Manager) (User: )
Description: Timeout (30000 milliseconds) waiting for the Windows Search service to connect.

Error: (07/05/2011 10:13:47 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1053" attempting to start the service WSearch with arguments ""
in order to run the server:
{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}

Error: (07/05/2011 10:11:16 PM) (Source: DCOM) (User: SYSTEM)
Description: The server {7D096C5F-AC08-4F1F-BEB7-5C22C517CE39} did not register with DCOM within the required timeout.

Error: (07/05/2011 10:10:47 PM) (Source: Service Control Manager) (User: )
Description: The Windows Search service failed to start due to the following error:
%%1053


Microsoft Office Sessions:
=========================

========================= End of Event log errors =========================

========================= Memory info: ====================================

Percentage of memory in use: 37%
Total physical RAM: 2012.98 MB
Available physical RAM: 1249.3 MB
Total Pagefile: 3905.78 MB
Available Pagefile: 3057.46 MB
Total Virtual: 2047.88 MB
Available Virtual: 1997.81 MB

======================= Partitions: =======================================

1 Drive c: (OS) (Fixed) (Total:288.29 GB) (Free:222.74 GB) NTFS

================= Users: ==================================================

User accounts for \\DEBBY

-------------------------------------------------------------------------------
Administrator Gregg Shields Guest
HelpAssistant SUPPORT_388945a0
The command completed successfully.

================= End of Users ============================================

I already downloaded and ran Malwarebytes' Anti Malware, but I ran it again. It did find one highjacked registry file, which may have been the start panel issue. Here are the results:
Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 7024

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/6/2011 8:37:53 PM
mbam-log-2011-07-06 (20-37-53).txt

Scan type: Quick scan
Objects scanned: 180774
Time elapsed: 6 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CLASSES_ROOT\.exe\shell\open\command\(default) (Hijack.ExeFile) -> Value: (default) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,695 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:03 PM

Posted 06 July 2011 - 08:43 PM

I still need GMER log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 06 July 2011 - 10:10 PM

I've been running it ever since I last posted. I think it accidentally did afull scan, i'll stop and retty.

*retry

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,695 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:03 PM

Posted 06 July 2011 - 10:16 PM

OK....

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 06 July 2011 - 11:22 PM

It's still taking a long time. How long should this normally take?

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,695 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:03 PM

Posted 06 July 2011 - 11:28 PM

GMER scan may take a while.
Be patient.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 07 July 2011 - 12:32 AM

Here's the gmer results:

GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-07-07 00:31:13
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4 WDC_WD3200AAKS-75L9A0 rev.02.03E02
Running: xytmd2dp.exe; Driver: C:\DOCUME~1\GREGGS~1\LOCALS~1\Temp\kxtdapog.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xA4AC3620]

Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenProcess [0xB9EAAD34]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenThread [0xB9EAAD48]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenProcess
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenThread

---- Kernel code sections - GMER 1.0.15 ----

PAGE ntkrnlpa.exe!NtOpenProcess 805CB440 5 Bytes JMP B9EAAD38 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenThread 805CB6CC 5 Bytes JMP B9EAAD4C mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
.text KDCOM.DLL!KdSendPacket BA5A8345 6 Bytes [FA, 8D, 46, 01, 25, FF]
.text KDCOM.DLL!KdSendPacket BA5A834D 5 Bytes [80, 79, 07, 48, 0D]
.text KDCOM.DLL!KdSendPacket BA5A8353 29 Bytes [FF, FF, FF, 40, 0F, B6, F0, ...]
.text KDCOM.DLL!KdSendPacket BA5A8371 28 Bytes [FF, FF, FF, 42, 0F, B6, FA, ...]
.text KDCOM.DLL!KdD0Transition + 8 BA5A838E 17 Bytes [08, 03, 55, F8, 03, D8, 81, ...]
.text KDCOM.DLL!KdD0Transition + 1A BA5A83A0 42 Bytes [FF, FF, FF, 43, 0F, B6, C3, ...]
.text KDCOM.DLL!KdDebuggerInitialize0 + 25 BA5A83CB 6 Bytes [00, C9, C2, 08, 00, 55] {ADD CL, CL; RET 0x8; PUSH EBP}
.text KDCOM.DLL!KdDebuggerInitialize0 + 2C BA5A83D2 23 Bytes [EC, 83, C8, FF, 83, 7D, 08, ...]
.text KDCOM.DLL!KdDebuggerInitialize0 + 44 BA5A83EA 162 Bytes [42, 5E, F6, C1, 01, 74, 0A, ...]
.text KDCOM.DLL!KdRestore + 2D BA5A848D 1 Byte [43]
.text KDCOM.DLL!KdRestore + 2D BA5A848D 77 Bytes [43, 08, 89, 45, FC, 8B, 55, ...]
.text KDCOM.DLL!KdRestore + 7C BA5A84DC 25 Bytes [C9, C2, 08, 00, 55, 8B, EC, ...]
.text KDCOM.DLL!KdRestore + 97 BA5A84F7 21 Bytes [89, 06, 89, 46, 08, 89, 46, ...]
.text KDCOM.DLL!KdRestore + AD BA5A850D 241 Bytes CALL BA5A846D \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
.text ...
PAGEKD KDCOM.DLL!KdReceivePacket + 2 BA5A8F4E 205 Bytes [F0, 8D, 45, FC, 50, 53, 56, ...]
PAGEKD KDCOM.DLL!KdReceivePacket + D0 BA5A901C 2 Bytes [75, 0E] {JNZ 0x10}
PAGEKD KDCOM.DLL!KdReceivePacket + D3 BA5A901F 1 Byte [C0]
PAGEKD KDCOM.DLL!KdReceivePacket + D3 BA5A901F 103 Bytes [C0, 02, 83, C2, 02, 84, DB, ...]
PAGEKD KDCOM.DLL!KdReceivePacket + 13B BA5A9087 131 Bytes [7D, 0C, B8, 4D, 5A, 00, 00, ...]
PAGEKD ...
PAGEKD KDCOM.DLL!KdSendPacket + 6F BA5A9221 181 Bytes [83, C4, 18, 33, C0, 85, FF, ...]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[1652] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9A91 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD0CD C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25466E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDB60 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E5691 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!getaddrinfo 71AB2A6F 5 Bytes JMP 46CAE71D C:\Program Files\Microsoft\Search Enhancement Pack\SeaNote\SeaNote.dll (Microsoft Search Note/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 46CAEEE9 C:\Program Files\Microsoft\Search Enhancement Pack\SeaNote\SeaNote.dll (Microsoft Search Note/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!socket 71AB4211 5 Bytes JMP 46CAE59E C:\Program Files\Microsoft\Search Enhancement Pack\SeaNote\SeaNote.dll (Microsoft Search Note/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 46CAE62A C:\Program Files\Microsoft\Search Enhancement Pack\SeaNote\SeaNote.dll (Microsoft Search Note/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!send 71AB4C27 5 Bytes JMP 46CAE9ED C:\Program Files\Microsoft\Search Enhancement Pack\SeaNote\SeaNote.dll (Microsoft Search Note/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!gethostbyname 71AB5355 5 Bytes JMP 00E3000A
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WS2_32.dll!recv 71AB676F 5 Bytes JMP 46CAF1C3 C:\Program Files\Microsoft\Search Enhancement Pack\SeaNote\SeaNote.dll (Microsoft Search Note/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 075F2D20 c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (SiteAdvisor/McAfee, Inc.)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 075F2C00 c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (SiteAdvisor/McAfee, Inc.)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WININET.dll!HttpAddRequestHeadersA 3D94CF4E 5 Bytes JMP 00E868C7
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 075F2EC0 c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (SiteAdvisor/McAfee, Inc.)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WININET.dll!InternetConnectA 3D94DEAE 5 Bytes JMP 075F2FC0 c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (SiteAdvisor/McAfee, Inc.)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] WININET.dll!HttpAddRequestHeadersW 3D94FE49 5 Bytes JMP 00E86AD2
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] WININET.dll!HttpAddRequestHeadersA 3D94CF4E 5 Bytes JMP 01D668C7
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3836] WININET.dll!HttpAddRequestHeadersW 3D94FE49 5 Bytes JMP 01D66AD2

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdSendPacket] [BA5A8631] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdD0Transition] [BA5A85DF] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdD3Transition] [BA5A85E9] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdReceivePacket] [BA5A860D] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdDebuggerInitialize0] [BA5A85F3] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdSave] [BA5A8625] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdDebuggerInitialize1] [BA5A85FF] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdRestore] [BA5A8619] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\hal.dll[KDCOM.dll!KdRestore] [BA5A8619] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!READ_PORT_UCHAR] 736F746E
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!WRITE_PORT_UCHAR] 6C6E726B
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!HalQueryRealTimeClock] 6578652E
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!HalInitSystem] 00000000
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!KdComPortInUse] 2E6C6168

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\WINDOWS\system32\mfevtps.exe[840] @ C:\WINDOWS\system32\CRYPT32.dll [ADVAPI32.dll!RegQueryValueExW] [0040A4B0] C:\WINDOWS\system32\mfevtps.exe (McAfee Process Validation Service/McAfee, Inc.)
IAT C:\WINDOWS\system32\mfevtps.exe[840] @ C:\WINDOWS\system32\CRYPT32.dll [KERNEL32.dll!LoadLibraryA] [0040A510] C:\WINDOWS\system32\mfevtps.exe (McAfee Process Validation Service/McAfee, Inc.)
IAT C:\Program Files\Internet Explorer\IEXPLORE.EXE[2548] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryExW] [451F1ACB] C:\Program Files\Internet Explorer\xpshims.dll (Internet Explorer Compatibility Shims for XP/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Threads - GMER 1.0.15 ----

Thread System [4:112] 8A8760B3
Thread System [4:124] 8A8777FB

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\Gregg Shields\Cookies\gregg__shields@voicefive[2].txt 6714 bytes
File C:\Documents and Settings\Gregg Shields\Cookies\gregg__shields@spotxchange[1].txt 0 bytes
File C:\Documents and Settings\Gregg Shields\Cookies\gregg__shields@login.live[2].txt 946 bytes
File C:\Documents and Settings\Gregg Shields\Cookies\gregg__shields@bluekai[2].txt 5882 bytes
File C:\Documents and Settings\Gregg Shields\Cookies\gregg__shields@invitemedia[2].txt 3819 bytes
File C:\Documents and Settings\Gregg Shields\Cookies\gregg__shields@dc.tremormedia[1].txt 114 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temp\fla4E.tmp 14736394 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temp\fla4F.tmp 2425133 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\en_us_symc-auth_logo[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\500371723@Bottom3[1].htm 355 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\55[1].jpg 943 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1299786638_nat-ben-119[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1300384211_vanessa-nick-119[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1305308146_leah-119[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1308926833_heather-mcdonald-chelsea-handler-119[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1309181666_mob-wives-karen-drita-sm[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1309467530_farrah-abraham-119[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1309467530_farrah-abraham-84[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1309962996_emily-maynard-143[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\1309964390_kate-hudson-matt-bellamy-143[1].jpg 5384 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\loader-bg[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\logCA067Q1D.txt 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\logCAAOEEX1.txt 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\casey-anthony-not-guilty-da[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\beacon[1].js 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\beacon[2].js 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\bg_footer_border_middle[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\bg_latest[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\bg_leftNavDropdown_left[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\bg_universal_glow[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\bluebox_head_left[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\claims_160x600[1].swf 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\combo[1].css 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\stumbleit[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\st[1].php 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\swfproxy-2.0.31[1].swf 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\TheFind[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\ads[2].js 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\advertisement_top_right[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\IronKey[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\i_red_star[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\j0438743_2[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\image.featuredcontent[2].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\image.featuredcontent[4].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\image.featuredcontent[5].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\image.featuredcontent[7].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\image.featuredcontent[8].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\image.videoimage[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\scott_11q2_yellow_ro_2[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\script44[1].js 27105 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\smiling_couple_elderly[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\som[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\princew[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\print_icon[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\7590[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\8212[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\nav_right[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\nearlythenews[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\nina-ian-talk-character[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\eyes[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\dev041500[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\dev041794[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\foxnews_logo_k[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\btnback-cran-89x22[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\btnback-cran-89x44[1].gif 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\us_logo_like[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\MCF_MultEYE_Rich_300x250_Bnr_062211_Pr01[1].swf 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\mcilroy[1].jpg 8128 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\logCAP42I7M.txt 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\logCAR5OK0P.txt 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\profile_48c[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\puerto%20rico[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\RA_Image[1].jpg 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\tmz_logo_k[1].png 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\toppicks[1] 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\toppicks[2] 0 bytes
File C:\Documents and Settings\Gregg Shields\Local Settings\Temporary Internet Files\Content.IE5\0G3MZEDV\TreeOfLifeMovie[1].jpg 0 bytes

---- EOF - GMER 1.0.15 ----

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,695 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:03 PM

Posted 07 July 2011 - 07:07 PM

You're not running any AV program.
You can safely uninstall McAfee Security Scan Plus, typical foistware.
Then, install one of these:
- Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html
- Avira free antivirus: http://www.free-av.com/en/download/1/avira_antivir_personal__free_antivirus.html
Update, run full scan, report on any findings.

When done...

Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 10 July 2011 - 08:58 PM

I uninstalled McAfee Security Center, and installed Avast!
I ran the full scan, and it recommended that I run the boot-up scan as well, which I did. It found viruses in both, which I either deleted or moved to the chest. Avast is showing pop-up messages now pretty frequently. Is it supposed to do that? It's looking similar to Defender and other fake anti-virus software.
I'll download and run TDSSKiller next and tell the results soon. Thanks!

#12 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 10 July 2011 - 09:02 PM

I downloaded tdsskiller.exe to my desktop, but everytime I try to open it, nothing happens.

#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,695 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:03 PM

Posted 10 July 2011 - 09:17 PM

No worries :)

Download the FixTDSS.exe

Save the file to your Windows desktop.
Close all running programs.
If you are running Windows XP, turn off System Restore. How to turn off or turn on Windows XP System Restore
Double-click the FixTDSS.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.
Restart the computer when prompted by the tool.
After the computer has started, the tool will inform you of the state of infection (make sure to let me know what it said)
If you are running Windows XP, re-enable System Restore.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#14 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 10 July 2011 - 09:39 PM

Upon restart it said "***Infected MBR detected"

Should I click repair?

#15 ashi

ashi
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:03 PM

Posted 10 July 2011 - 09:41 PM

I repaired it, and it said repair succeeded.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users