Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser Hijack?


  • Please log in to reply
11 replies to this topic

#1 guidophi

guidophi

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 21 July 2011 - 12:33 PM

Hello,

I have multiple "symptoms" that started a few days ago, so I'm not even sure if they're related or a virus/malware or what. Not too savvy, so please help, and forgive my ignorance.

Running XP Pro

1st Issue : Google search results display, but when I click on them, they try and re-route me through some 3rd party search site (becoolsearch or bestsearchs.net). At random times GoogleUpdate.exe - Application Error pops up, stating "The instruction at "0x..." referenced memory at "0x...". The memory could not be written. Click OK to terminate program


2nd Issue: MS Office applications (Word/Excel) then began displaying "ProgramName has
encountered a problem and needs to close". This occurs after I have
exited the program, and is followed by ProgramName.exe - Application
Error. Started about a day after the first issue, only happens after I exit the program.

3rd Issue: Upon doing a test Google search, the results displayed, but after
clicking a link, I was taken to a google page asking me to verify I was
not a robot by entering the random letter code because it detected unusual
activity coming from my network. (Haven't gotten the Google banner saying I'm infected like I just read about)

I've ran Trend Micro OfficeScan several times after updating and it doesn't find anything.

Tried installing Malwarebytes, but after install, I tried to open the program and I get a vbAccelerator SGrid II Control (Run-time error '0') message. After I click "OK" I get a Run-time error '372' Failed to load control 'vbalGrid' from vbalsgrid6.ocx. Your version may be outdated. Make sure you are using the version of the control that was provided with your application.

Other than that, I've just made sure my windows updated were all installed (they already were) and ran Advanced SystemCare - which cleaned up some things, but didn't detect any malware.

Not sure if this is a virus or just a Windows problem and don't know what to do. Any help will be greatly appreciated.

Thanks!

-J

BC AdBot (Login to Remove)

 


#2 guidophi

guidophi
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 21 July 2011 - 12:49 PM

Oh, and I forgot to say the Windows version is 5.1, Service Pack 3 (if that helps)

Thanks.

#3 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:44 AM

Posted 21 July 2011 - 10:05 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#4 guidophi

guidophi
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 22 July 2011 - 09:56 AM

Hey Broni, thanks for the reply.

As requested, below are the logs for Security Check and Mini Tool Box. I did hit a wall though with the Malwarebytes step. I tried uninstalling/re-installing, but had the same issue as before. I get a vvAccelerator SGrid II Control Runtime Error '0', followed by Run time error '372' Failed to load control 'vbalGrid from vbalsgrid6.ocx Your version may be outdated. Make sure you are using the version of the control that was provided with your application. Followed by mbam.exe-Application Error, The instruction at "0x7c901e78" referenced memory at "0x71ab4a07". The memory could not be "written" Click OK to terminate the program.

I'll proceed with the GMER step though and get that file to you shortly. Thanks again for the help!

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Enabled!
Trend Micro OfficeScan Client
Antivirus up to date!
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 26
Out of date Java installed!
Adobe Flash Player 10.0.12.36
Adobe Reader 8.1.1
Adobe Reader 9
Out of date Adobe Reader installed!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Trend Micro OfficeScan Client pccntmon.exe
Trend Micro OfficeScan Client ntrtscan.exe
Trend Micro OfficeScan Client tmlisten.exe
Trend Micro OfficeScan Client TmPfw.exe
Trend Micro BM TMBMSRV.exe
Trend Micro OfficeScan Client CNTAoSMgr.exe
``````````End of Log````````````

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

MiniToolBox by Farbar
Ran by Administrator (administrator) on 22-07-2011 at 09:43:30
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================
========================= Event log errors: ===============================

Application errors:
==================
Error: (07/22/2011 09:35:58 AM) (Source: AutoEnrollment) (User: )
Description: Automatic certificate enrollment for local system failed to contact the active directory (0x8007054b). The specified domain either does not exist or could not be contacted.
Enrollment will not be performed.

Error: (07/22/2011 09:35:54 AM) (Source: UserInit) (User: )
Description: Could not execute the following script WinVNC, Printer Drivers, & PDM Folder.vbs. The system cannot find the file specified.
.

Error: (07/22/2011 09:35:51 AM) (Source: Userenv) (User: SYSTEM)SYSTEM
Description: Windows cannot obtain the domain controller name for your computer network. (The specified domain either does not exist or could not be contacted. ). Group Policy processing aborted.

Error: (07/21/2011 05:23:51 PM) (Source: Microsoft Office 12) (User: )
Description: Faulting application excel.exe, version 12.0.6557.5000, stamp 4da3be27, faulting module ntdll.dll, version 5.1.2600.6055, stamp 4d00f27d, debug? 0, fault address 0x00001e78.

Error: (07/21/2011 05:18:07 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: The data is invalid.

Error: (07/21/2011 05:18:06 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: The data is invalid.

Error: (07/21/2011 05:18:06 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: The data is invalid.

Error: (07/21/2011 05:18:06 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: The data is invalid.

Error: (07/21/2011 05:18:06 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: The data is invalid.

Error: (07/21/2011 05:18:06 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: The data is invalid.


System errors:
=============
Error: (07/22/2011 09:37:14 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/22/2011 09:37:14 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/22/2011 09:37:13 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/22/2011 09:35:55 AM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (07/22/2011 09:35:53 AM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (07/21/2011 05:23:03 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 29 minutes.
NtpClient has no source of accurate time.

Error: (07/21/2011 05:08:11 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (07/21/2011 05:07:53 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 15 minutes.
NtpClient has no source of accurate time.

Error: (07/21/2011 04:16:54 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 29 minutes.
NtpClient has no source of accurate time.

Error: (07/21/2011 04:02:02 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.


Microsoft Office Sessions:
=========================
Error: (06/16/2010 00:54:00 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6535.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 393 seconds with 360 seconds of active time. This session ended with a crash.


========================= Memory info: ===================================

Percentage of memory in use: 24%
Total physical RAM: 3038.96 MB
Available physical RAM: 2287.25 MB
Total Pagefile: 4924.34 MB
Available Pagefile: 4240.31 MB
Total Virtual: 2047.88 MB
Available Virtual: 1992.51 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:290.08 GB) (Free:254.73 GB) NTFS

========================= Users: ========================================

== End of log ==

#5 guidophi

guidophi
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 22 July 2011 - 02:45 PM

Here's the GMER log:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-22 14:41:45
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 FUJITSU_ rev.0041
Running: rt2vw9wu[1].exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kwtdrpoc.sys


---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9A91 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD0CD C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25466E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDB60 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[320] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E5691 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1620] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9A91 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD0CD C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25466E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDB60 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1728] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E5691 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Program Files\Internet Explorer\iexplore.exe[320] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryExW] [451F1ACB] C:\Program Files\Internet Explorer\xpshims.dll (Internet Explorer Compatibility Shims for XP/Microsoft Corporation)
IAT C:\Program Files\Internet Explorer\iexplore.exe[1728] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryExW] [451F1ACB] C:\Program Files\Internet Explorer\xpshims.dll (Internet Explorer Compatibility Shims for XP/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:44 AM

Posted 22 July 2011 - 08:22 PM

When you posted your MiniToolbox log did you by any chance remove "IP Configuration:" section?
It's empty.

As for MBAM...

1. Uninstall Malwarebytes' Anti-Malware using Add/Remove programs in the control panel.
2. Restart your computer (very important).
3. Download and run this utility.
4. It will ask to restart your computer (please allow it to).
5. After the computer restarts, install the latest version from here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 guidophi

guidophi
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 25 July 2011 - 10:29 AM

I very well may have not checked that box in error, sorry. I ran mini toolbox again and attached that log below.

I did follow the steps for removing all traces of mbam and re-installing, but the same thing happens when the program tries to run (same three error messages in succession). No luck getting it to open.

MiniToolBox by Farbar
Ran by Administrator (administrator) on 25-07-2011 at 10:26:09
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip

Error obtaining configuration for interface Wireless Network Connection.

Error obtaining configuration for interface Local Area Connection.

Error obtaining configuration for interface Local Area Connection 2.



popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : RDGarcia

Primary Dns Suffix . . . . . . . : DavidClark.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : DavidClark.com



Ethernet adapter Wireless Network Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Intel® WiFi Link 5100 AGN

Physical Address. . . . . . . . . : 00-24-D6-2A-55-E4



Ethernet adapter Local Area Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Marvell Yukon 88E8057 PCI-E Gigabit Ethernet Controller

Physical Address. . . . . . . . . : 00-24-BE-7C-30-74



Ethernet adapter Local Area Connection 2:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Bluetooth LAN Access Server Driver

Physical Address. . . . . . . . . : 00-26-43-A8-60-D0



PPP adapter Verizon Wireless - VZAccess:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : WAN (PPP/SLIP) Interface

Physical Address. . . . . . . . . : 00-53-45-00-00-00

Dhcp Enabled. . . . . . . . . . . : No

IP Address. . . . . . . . . . . . : 75.252.76.121

Subnet Mask . . . . . . . . . . . : 255.255.255.255

Default Gateway . . . . . . . . . : 75.252.76.121

DNS Servers . . . . . . . . . . . : 66.174.71.33

69.78.96.14

NetBIOS over Tcpip. . . . . . . . : Disabled

Server: 33.sub-66-174-71.myvzw.com
Address: 66.174.71.33

Name: google.com
Addresses: 74.125.91.105, 74.125.91.103, 74.125.91.99, 74.125.91.147
74.125.91.104, 74.125.91.106



Pinging google.com [74.125.93.103] with 32 bytes of data:



Reply from 74.125.93.103: bytes=32 time=120ms TTL=47

Reply from 74.125.93.103: bytes=32 time=115ms TTL=47



Ping statistics for 74.125.93.103:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 115ms, Maximum = 120ms, Average = 117ms

Server: 33.sub-66-174-71.myvzw.com
Address: 66.174.71.33

Name: yahoo.com
Addresses: 98.137.149.56, 209.191.122.70, 67.195.160.76, 69.147.125.65
72.30.2.43



Pinging yahoo.com [67.195.160.76] with 32 bytes of data:



Reply from 67.195.160.76: bytes=32 time=94ms TTL=44

Reply from 67.195.160.76: bytes=32 time=91ms TTL=44



Ping statistics for 67.195.160.76:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 91ms, Maximum = 94ms, Average = 92ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=64

Reply from 127.0.0.1: bytes=32 time<1ms TTL=64



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 24 d6 2a 55 e4 ...... Intel® WiFi Link 5100 AGN - Packet Scheduler Miniport
0x3 ...00 24 be 7c 30 74 ...... Marvell Yukon 88E8057 PCI-E Gigabit Ethernet Controller - Packet Scheduler Miniport
0x10005 ...00 26 43 a8 60 d0 ...... Bluetooth LAN Access Server Driver - Packet Scheduler Miniport
0x20006 ...00 53 45 00 00 00 ...... WAN (PPP/SLIP) Interface
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 75.252.76.121 75.252.76.121 1
66.174.168.192 255.255.255.255 75.252.76.121 75.252.76.121 1
75.252.76.121 255.255.255.255 127.0.0.1 127.0.0.1 50
75.255.255.255 255.255.255.255 75.252.76.121 75.252.76.121 50
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 75.252.76.121 75.252.76.121 1
255.255.255.255 255.255.255.255 75.252.76.121 3 1
255.255.255.255 255.255.255.255 75.252.76.121 10005 1
255.255.255.255 255.255.255.255 75.252.76.121 75.252.76.121 1
255.255.255.255 255.255.255.255 75.252.76.121 2 1
Default Gateway: 75.252.76.121
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/25/2011 10:11:53 AM) (Source: AutoEnrollment) (User: )
Description: Automatic certificate enrollment for local system failed to contact the active directory (0x800704cf). The network location cannot be reached. For information about network troubleshooting, see Windows Help.
Enrollment will not be performed.

Error: (07/25/2011 10:11:53 AM) (Source: UserInit) (User: )
Description: Could not execute the following script WinVNC, Printer Drivers, & PDM Folder.vbs. The system cannot find the file specified.
.

Error: (07/25/2011 10:11:52 AM) (Source: Userenv) (User: SYSTEM)SYSTEM
Description: Windows cannot obtain the domain controller name for your computer network. (The network location cannot be reached. For information about network troubleshooting, see Windows Help. ). Group Policy processing aborted.

Error: (07/25/2011 10:05:48 AM) (Source: AutoEnrollment) (User: )
Description: Automatic certificate enrollment for local system failed to contact the active directory (0x800704cf). The network location cannot be reached. For information about network troubleshooting, see Windows Help.
Enrollment will not be performed.

Error: (07/25/2011 10:05:48 AM) (Source: UserInit) (User: )
Description: Could not execute the following script WinVNC, Printer Drivers, & PDM Folder.vbs. The system cannot find the file specified.
.

Error: (07/25/2011 10:05:47 AM) (Source: Userenv) (User: SYSTEM)SYSTEM
Description: Windows cannot obtain the domain controller name for your computer network. (The network location cannot be reached. For information about network troubleshooting, see Windows Help. ). Group Policy processing aborted.

Error: (07/25/2011 09:56:09 AM) (Source: AutoEnrollment) (User: )
Description: Automatic certificate enrollment for local system failed to contact the active directory (0x800704cf). The network location cannot be reached. For information about network troubleshooting, see Windows Help.
Enrollment will not be performed.

Error: (07/25/2011 09:56:09 AM) (Source: UserInit) (User: )
Description: Could not execute the following script WinVNC, Printer Drivers, & PDM Folder.vbs. The system cannot find the file specified.
.

Error: (07/25/2011 09:56:08 AM) (Source: Userenv) (User: SYSTEM)SYSTEM
Description: Windows cannot obtain the domain controller name for your computer network. (The network location cannot be reached. For information about network troubleshooting, see Windows Help. ). Group Policy processing aborted.

Error: (07/22/2011 01:31:41 PM) (Source: UserInit) (User: )
Description: Could not execute the following script WinVNC, Printer Drivers, & PDM Folder.vbs. The system cannot find the file specified.
.


System errors:
=============
Error: (07/25/2011 10:14:00 AM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (07/25/2011 10:12:48 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/25/2011 10:12:48 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/25/2011 10:12:47 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/25/2011 10:08:20 AM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (07/25/2011 10:06:56 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/25/2011 10:06:56 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/25/2011 10:06:55 AM) (Source: DCOM) (User: NETWORK SERVICE)
Description: The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID
{A4199E55-EBB9-49E5-AF1A-7A5408B2E206}
to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20). This security permission can be modified using the Component Services administrative tool.

Error: (07/25/2011 10:01:52 AM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (07/25/2011 09:58:51 AM) (Source: Windows Update Agent) (User: )
Description: Unable to Connect: Windows is unable to connect to the automatic updates service and therefore cannot download and install updates according to the set schedule. Windows will continue to try to establish a connection.


Microsoft Office Sessions:
=========================
Error: (06/16/2010 00:54:00 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6535.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 393 seconds with 360 seconds of active time. This session ended with a crash.


========================= Memory info: ===================================

Percentage of memory in use: 24%
Total physical RAM: 3038.96 MB
Available physical RAM: 2305.79 MB
Total Pagefile: 4924.34 MB
Available Pagefile: 4268.11 MB
Total Virtual: 2047.88 MB
Available Virtual: 1993.72 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:290.08 GB) (Free:254.68 GB) NTFS
3 Drive e: () (Removable) (Total:1.87 GB) (Free:1.85 GB) FAT32
6 Drive h: (VZAccess Manager) (CDROM) (Total:0.03 GB) (Free:0 GB) CDFS

========================= Users: ========================================

User accounts for \\RDGARCIA

Administrator Anna Ouellette ASPNET
Guest HelpAssistant SUPPORT_388945a0


== End of log ==

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:44 AM

Posted 25 July 2011 - 07:17 PM

Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/


  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
  • Close SUPERAntiSpyware.
Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; pick Safe Mode; you'll see "Safe Mode" in all four corners of your screen

  • Open SUPERAntiSpyware.
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Post SUPERAntiSpyware log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 guidophi

guidophi
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 26 July 2011 - 07:43 AM

I accidentally hit the Quick Scan before configuring the settings, but then ran a Complete Scan per your directions. Below are both logs:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/25/2011 at 08:39 PM

Application Version : 4.55.1000

Core Rules Database Version : 7459
Trace Rules Database Version: 5271

Scan type : Quick Scan
Total Scan Time : 00:08:47

Memory items scanned : 270
Memory threats detected : 0
Registry items scanned : 1853
Registry threats detected : 1
File items scanned : 6312
File threats detected : 90

Trojan.Agent/Gen-Clemag
[cleanddm] C:\DOCUMENTS AND SETTINGS\JGARCIA\APPLICATION DATA\CLEANDDM.EXE
C:\DOCUMENTS AND SETTINGS\JGARCIA\APPLICATION DATA\CLEANDDM.EXE
C:\WINDOWS\Prefetch\CLEANDDM.EXE-2352AB0A.pf

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@apmebf[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adserver.adtechus[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@invitemedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@imrworldwide[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.bleepingcomputer[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@interclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ehg-techtarget.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@collective-media[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@insightexpressai[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt
a.ads2.msads.net [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
ads2.msads.net [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
adsatt.espn.go.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
b.ads2.msads.net [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
banners.securedataimages.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
cdn.insights.gravity.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
cdn2.invitemedia.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
cdn4.specificclick.net [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
content.yieldmanager.edgesuite.net [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
core.insightexpressai.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
files.youporn.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
i.adultswim.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
ia.media-imdb.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
macromedia.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
media.mtvnservices.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
media.scanscout.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
media1.break.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
media10.washingtonpost.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
msnbcmedia.msn.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
s.ncp.imrworldwide.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
s0.2mdn.net [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
secure-uk.imrworldwide.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
secure-us.imrworldwide.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
serving-sys.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
stmedia.startribune.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
www.dostuffmedia.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
www.pornhub.com [ C:\Documents and Settings\JGarcia\Application Data\Macromedia\Flash Player\#SharedObjects\AHHQNH5J ]
C:\Documents and Settings\JGarcia\Cookies\jgarcia@advertise[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@ar.atwola[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@at.atwola[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@www.find-fast-answers[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@revsci[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@r1-ads.ace.advertising[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@statcounter[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@segment-pixel.invitemedia[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@adbrite[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@bridge2.admarketplace[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@tracker.roitesting[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@fastclick[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@collective-media[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@atdmt[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@a.intentmedia[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@tribalfusion[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@apmebf[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@invitemedia[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@media6degrees[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@mediaplex[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@advertising[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@clickbank[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@pro-market[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@admarketplace[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@content.yieldmanager[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@zedo[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@tacoda.at.atwola[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@anrtx.tacoda[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@casalemedia[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@ad.yieldmanager[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@adserver.adtechus[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@doubleclick[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@imrworldwide[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@interchangecorporation.122.2o7[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@legolas-media[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@mm.chitika[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@ru4[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@theclickcheck[1].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@tracking.servedbyy[2].txt
C:\Documents and Settings\JGarcia\Cookies\jgarcia@www.find-quick-results[1].txt
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/25/2011 at 09:17 PM

Application Version : 4.55.1000

Core Rules Database Version : 7459
Trace Rules Database Version: 5271

Scan type : Complete Scan
Total Scan Time : 00:26:12

Memory items scanned : 270
Memory threats detected : 0
Registry items scanned : 7957
Registry threats detected : 0
File items scanned : 19263
File threats detected : 1

Trojan.Agent/Gen-Clemag
C:\SYSTEM VOLUME INFORMATION\_RESTORE{5DF916F7-AC0D-46EF-B2FC-869D1552769F}\RP175\A0031385.EXE

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:44 AM

Posted 26 July 2011 - 06:54 PM

Still getting redirected?

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
Click the "Scan" button to start scan:
Posted Image

On completion of the scan click "Save log", save it to your desktop and post in your next reply:
Posted Image

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 guidophi

guidophi
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Houston, TX
  • Local time:05:44 AM

Posted 27 July 2011 - 11:25 AM

Thanks for all of your help, Broni! I hate to celebrate prematurely, but it looks like I am re-direct free for a day now, and the application errors have stopped when I close a program. I still do have an application error when I go to log out, and it's strange that Malwarebytes still won't open. Do you think it's still a malware issue, or should those problems be pursued in another forum?

I did run aswMBR amyway, here's the log file:

aswMBR version 0.9.8.977 Copyright© 2011 AVAST Software
Run date: 2011-07-27 11:20:42
-----------------------------
11:20:42.921 OS Version: Windows 5.1.2600 Service Pack 3
11:20:42.921 Number of processors: 2 586 0x170A
11:20:42.921 ComputerName: RDGARCIA UserName:
11:20:44.890 Initialize success
11:20:57.312 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
11:20:57.312 Disk 0 Vendor: FUJITSU_ 0041 Size: 305245MB BusType: 3
11:20:57.312 Disk 1 \Device\Harddisk1\DR3 -> \Device\000000c3
11:20:57.328 Disk 1 Vendor: RICOH 02 Size: 305245MB BusType: 0
11:20:57.328 Disk 2 \Device\Harddisk2\DR5 -> \Device\000000c4
11:20:57.328 Disk 2 Vendor: RICOH 02 Size: 305245MB BusType: 0
11:20:57.343 Disk 0 MBR read successfully
11:20:57.343 Disk 0 MBR scan
11:20:57.343 Disk 0 Windows XP default MBR code
11:20:57.359 Disk 0 scanning sectors +625137345
11:20:57.421 Disk 0 scanning C:\WINDOWS\system32\drivers
11:21:11.453 Service scanning
11:21:12.390 Service TmFilter C:\Program Files\Trend Micro\OfficeScan Client\TmXPFlt.sys **LOCKED** 32
11:21:12.421 Service TmPreFilter C:\Program Files\Trend Micro\OfficeScan Client\TmPreFlt.sys **LOCKED** 32
11:21:12.468 Service VSApiNt C:\Program Files\Trend Micro\OfficeScan Client\VSApiNt.sys **LOCKED** 32
11:21:13.000 Modules scanning
11:21:23.765 Disk 0 trace - called modules:
11:21:23.781 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll iaStor.sys
11:21:23.796 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8af56320]
11:21:23.796 3 CLASSPNP.SYS[b8108fd7] -> nt!IofCallDriver -> \Device\000000a5[0x8af56cc8]
11:21:23.796 5 ACPI.sys[b7f7f620] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x8a9af030]
11:21:23.796 Scan finished successfully
11:22:11.953 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Administrator\Desktop\MBR.dat"
11:22:11.953 The log file has been saved successfully to "C:\Documents and Settings\Administrator\Desktop\aswMBR.txt"

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:44 AM

Posted 27 July 2011 - 08:08 PM

Good news :)

I still do have an application error when I go to log out

Give me more details please.

As for MBAM, let's try one more time...

1. Uninstall Malwarebytes' Anti-Malware using Add/Remove programs in the control panel.
2. Restart your computer (very important).
3. Download and run this utility.
4. It will ask to restart your computer (please allow it to).
5. After the computer restarts, install the latest version from here.

Then....

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users