Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

redirect and system repair...


  • Please log in to reply
11 replies to this topic

#1 race3champ

race3champ

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 26 July 2011 - 07:40 PM

I've been battling what appears to me to be several types of malware over the past couple weeks. Last week I followed instructions I found in one of these forums and believe I have gotten rid of the system repair problem. However, I still have the google redirect problems using Firefox. Vista home -service pack 2. 32 bit. I think part of the problem may be that I tried so many programs over the last couple weeks that they are fighting each other. Here are the logs from Security check, MiniToolBox, Malwarebytes, and GMER. Any suggestions would be be much appreciated.

Results of screen317's Security Check version 0.99.7
Windows Vista Service Pack 2 (UAC is enabled)
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
AVG 2011
iolo technologies' System Mechanic Professional
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 26
Java™ 6 Update 5
Out of date Java installed!
Adobe Flash Player 10.3.181.34
Adobe Reader 8.3.0
Out of date Adobe Reader installed!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Spybot Teatimer.exe is disabled!
AVG avgwdsvc.exe
AVG avgrsx.exe
AVG avgnsx.exe
AVG avgemc.exe
Common Files Authentium AntiVirus5 vsedsps.exe
Common Files Authentium AntiVirus5 vseamps.exe
iolo Common Lib ioloServiceManager.exe
iolo System Mechanic Professional System Shield ioloSSTray.exe
iolo System Mechanic Professional SysMech.exe
``````````End of Log````````````




MiniToolBox by Farbar
Ran by Marissa (administrator) on 25-07-2011 at 22:43:15
Windows Vista ™ Home Premium Service Pack 2 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================

127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global defaultcurhoplimit=64
set interface interface="Local Area Connection" forwarding=disabled advertise=disabled mtu=1500 metric=0 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled
set interface interface="Wireless Network Connection" forwarding=disabled advertise=disabled mtu=1500 metric=0 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection 2" forwarding=disabled advertise=disabled mtu=1500 metric=0 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection 3" forwarding=disabled advertise=disabled mtu=1500 metric=0 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection 4" forwarding=disabled advertise=disabled mtu=1500 metric=0 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection 5" forwarding=disabled advertise=disabled mtu=1500 metric=0 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : McKee-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : ftrdhcpuser.net

Ethernet adapter Local Area Connection* 13:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Juniper Network Connect Virtual Adapter
Physical Address. . . . . . . . . : 00-FF-08-F0-B8-87
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . : ftrdhcpuser.net
Description . . . . . . . . . . . : Dell Wireless 1397 WLAN Mini-Card
Physical Address. . . . . . . . . : 00-22-5F-0D-D3-B1
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::e88e:3445:c6e1:cd25%12(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.64(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Monday, July 25, 2011 5:45:13 AM
Lease Expires . . . . . . . . . . : Tuesday, July 26, 2011 5:52:30 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 201335391
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-10-4A-85-26-00-21-70-81-98-E3
DNS Servers . . . . . . . . . . . : 192.168.1.1
184.16.4.22
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : globalsuite.net
Description . . . . . . . . . . . : Broadcom NetLink ™ Gigabit Ethernet
Physical Address. . . . . . . . . : 00-21-70-81-98-E3
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.globalsuite.net
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:3427:17c4:3f57:febf(Preferred)
Link-local IPv6 Address . . . . . : fe80::3427:17c4:3f57:febf%10(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.ftrdhcpuser.net
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 13:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{C7F46B2A-1151-45C3-8436-57E6204F9F05}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: dslmodem.domain
Address: 192.168.1.1

DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
Name: google.com
Address: 74.125.93.104


Pinging google.com [74.125.93.103] with 32 bytes of data:
Reply from 74.125.93.103: bytes=32 time=103ms TTL=52
Reply from 74.125.93.103: bytes=32 time=104ms TTL=52

Ping statistics for 74.125.93.103:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 103ms, Maximum = 104ms, Average = 103ms
Server: dslmodem.domain
Address: 192.168.1.1

DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
Name: yahoo.com
Address: 67.195.160.76


Pinging yahoo.com [209.191.122.70] with 32 bytes of data:
Reply from 209.191.122.70: bytes=32 time=65ms TTL=53
Reply from 209.191.122.70: bytes=32 time=62ms TTL=53

Ping statistics for 209.191.122.70:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 62ms, Maximum = 65ms, Average = 63ms

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=64
Reply from 127.0.0.1: bytes=32 time<1ms TTL=64

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
20 ...00 ff 08 f0 b8 87 ...... Juniper Network Connect Virtual Adapter
12 ...00 22 5f 0d d3 b1 ...... Dell Wireless 1397 WLAN Mini-Card
11 ...00 21 70 81 98 e3 ...... Broadcom NetLink ™ Gigabit Ethernet
1 ........................... Software Loopback Interface 1
17 ...00 00 00 00 00 00 00 e0 isatap.globalsuite.net
10 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
22 ...00 00 00 00 00 00 00 e0 isatap.ftrdhcpuser.net
21 ...00 00 00 00 00 00 00 e0 isatap.{C7F46B2A-1151-45C3-8436-57E6204F9F05}
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.64 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.64 281
192.168.1.64 255.255.255.255 On-link 192.168.1.64 281
192.168.1.255 255.255.255.255 On-link 192.168.1.64 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.64 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.64 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
10 18 ::/0 On-link
1 306 ::1/128 On-link
10 18 2001::/32 On-link
10 266 2001:0:4137:9e76:3427:17c4:3f57:febf/128
On-link
12 281 fe80::/64 On-link
10 266 fe80::/64 On-link
10 266 fe80::3427:17c4:3f57:febf/128
On-link
12 281 fe80::e88e:3445:c6e1:cd25/128
On-link
1 306 ff00::/8 On-link
10 266 ff00::/8 On-link
12 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/25/2011 10:34:36 PM) (Source: Application Hang) (User: )
Description: The program SysMech.exe version 10.5.3.16 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Problem Reports and Solutions control panel.
Process ID: 1f64
Start Time: 01cc4b42e8255ff0
Termination Time: 22

Error: (07/25/2011 05:46:31 AM) (Source: Windows Search Service) (User: )
Description: The search service has detected corrupted data files in the index. The service will attempt to automatically correct this problem by rebuilding the index.

Context: Windows Application, SystemIndex Catalog

Details:
The content index metadata cannot be read. 0xc0041801 (0xc0041801)

Error: (07/25/2011 05:46:26 AM) (Source: Windows Search Service) (User: )
Description: The application cannot be initialized.

Context: Windows Application

Details:
The registry value cannot be read because the configuration is invalid. Recreate the content index configuration by removing the content index. (0x80040d03)

Error: (07/25/2011 05:46:26 AM) (Source: Windows Search Service) (User: )
Description: The gatherer object cannot be initialized.

Context: Windows Application, SystemIndex Catalog

Details:
The registry value cannot be read because the configuration is invalid. Recreate the content index configuration by removing the content index. (0x80040d03)

Error: (07/25/2011 05:46:09 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (07/25/2011 05:46:06 AM) (Source: Windows Search Service) (User: )
Description: The gatherer is unable to read the registry DocIdMapFile.

Context: Application, SystemIndex Catalog

Details:
The system cannot find the file specified. (0x80070002)

Error: (07/24/2011 10:38:48 PM) (Source: MsiInstaller) (User: Marissa)Marissa
Description: Product: Microsoft Office Professional Edition 2003 -- Error 1706. Setup cannot find the required files. Check your connection to the network, or CD-ROM drive. For other potential solutions to this problem, see C:\Program Files\Microsoft Office\OFFICE11\1033\SETUP.CHM.

Error: (07/24/2011 08:32:46 PM) (Source: Windows Backup) (User: )
Description: File backup failed. The error is: The latest backup set can not be found. Make sure it is accessible and it has not been deleted. Otherwise, create a new full backup. (0x8100000A).

Error: (07/24/2011 07:20:36 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 9.0.8112.16421, time stamp 0x4d76255d, faulting module MSHTML.dll, version 9.0.8112.16430, time stamp 0x4db210c4, exception code 0xc0000005, fault offset 0x001637fd,
process id 0x10c8, application start time 0xiexplore.exe0.

Error: (07/22/2011 11:34:36 PM) (Source: Windows Search Service) (User: )
Description: The application cannot be initialized.

Context: Windows Application

Details:
The registry value cannot be read because the configuration is invalid. Recreate the content index configuration by removing the content index. (0x80040d03)


System errors:
=============

Microsoft Office Sessions:
=========================
Error: (01/26/2011 07:16:14 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6545.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 19 seconds with 0 seconds of active time. This session ended with a crash.

Error: (10/17/2010 11:02:13 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6545.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 19749 seconds with 0 seconds of active time. This session ended with a crash.

Error: (12/28/2009 11:17:25 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6514.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 11965 seconds with 2100 seconds of active time. This session ended with a crash.

Error: (01/03/2009 01:48:45 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6331.5000, Microsoft Office Version: 12.0.6215.1000. This session lasted 292 seconds with 0 seconds of active time. This session ended with a crash.


========================= Memory info: ===================================

Percentage of memory in use: 65%
Total physical RAM: 2941.26 MB
Available physical RAM: 1008.66 MB
Total Pagefile: 6105.06 MB
Available Pagefile: 3741.28 MB
Total Virtual: 2047.88 MB
Available Virtual: 1966.54 MB

========================= Partitions: =====================================

1 Drive c: (OS) (Fixed) (Total:223.08 GB) (Free:151.13 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:9.77 GB) (Free:5.29 GB) NTFS
3 Drive e: (Jul 02 2011) (CDROM) (Total:3.55 GB) (Free:0 GB) UDF

========================= Users: ========================================

User accounts for \\MCKEE-PC

Administrator Guest Marissa
Mcx1 Ryan


== End of log ==

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7278

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

7/25/2011 11:05:36 PM
mbam-log-2011-07-25 (23-05-36).txt

Scan type: Quick scan
Objects scanned: 212356
Time elapsed: 18 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CLASSES_ROOT\scrfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (NOTEPAD.EXE %1) Good: ("%1" /S) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (NOTEPAD.EXE %1) Good: (regedit.exe "%1") -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-26 19:03:18
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\0000006b WDC_WD25 rev.1.01
Running: bddejo50.exe; Driver: C:\Users\Marissa\AppData\Local\Temp\ugloypow.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwOpenProcess [0x9E1F07A0]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwTerminateProcess [0x9E1F0848]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwTerminateThread [0x9E1F08E4]
SSDT \SystemRoot\system32\DRIVERS\AVGIDSShim.Sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwWriteVirtualMemory [0x9E1F0980]

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!KeSetEvent + 3F1 822FCB74 4 Bytes [A0, 07, 1F, 9E]
.text ntkrnlpa.exe!KeSetEvent + 621 822FCDA4 8 Bytes [48, 08, 1F, 9E, E4, 08, 1F, ...] {DEC EAX; OR [EDI], BL; SAHF ; IN AL, 0x8; POP DS; SAHF }
.text ntkrnlpa.exe!KeSetEvent + 681 822FCE04 4 Bytes [80, 09, 1F, 9E] {OR BYTE [ECX], 0x1f; SAHF }
.text kdcom.dll!KdSendPacket 80404041 367 Bytes [0B, B8, FF, FF, 00, 00, 66, ...]
.text kdcom.dll!KdRestore + 55 804041B1 9 Bytes [FF, 8B, F0, 8B, C6, E9, DB, ...]
.text kdcom.dll!KdRestore + 5F 804041BB 8 Bytes [8B, C7, 8D, 50, 02, 66, 8B, ...] {MOV EAX, EDI; LEA EDX, [EAX+0x2]; MOV CX, [EAX]}
.text kdcom.dll!KdRestore + 68 804041C4 1 Byte [C0]
.text kdcom.dll!KdRestore + 68 804041C4 102 Bytes [C0, 02, 66, 85, C9, 75, F5, ...]
.text kdcom.dll!KdRestore + CF 8040422B 59 Bytes [0F, BE, 8C, 05, 94, FE, FF, ...]
.text ...
.text kdcom.dll!KdReceivePacket + 51 8040433F 119 Bytes [0F, B7, 07, EB, 14, 03, C1, ...]
.text kdcom.dll!KdReceivePacket + CA 804043B8 105 Bytes [00, 03, 87, 58, 0E, 00, 00, ...]
.text kdcom.dll!KdReceivePacket + 134 80404422 29 Bytes [75, 08, FF, 15, A8, 32, 40, ...]
.text kdcom.dll!KdReceivePacket + 152 80404440 16 Bytes [F0, FF, FF, 53, 6A, 00, FF, ...]
.text kdcom.dll!KdReceivePacket + 164 80404452 8 Bytes [00, 8B, 5D, F8, 89, BB, 5C, ...] {ADD [EBX-0x447607a3], CL; POP ESP; PUSH CS}
.text ...
.text kdcom.dll!KdSendPacket + 82 804045E8 133 Bytes [22, 02, 49, 6F, 47, 65, 74, ...]
.text kdcom.dll!KdSendPacket + 108 8040466E 8 Bytes [72, 79, 54, 6F, 44, 61, 74, ...] {JB 0x7b; PUSH ESP; OUTSD ; INC ESP; POPA ; JZ 0x69}
.text kdcom.dll!KdSendPacket + 111 80404677 186 Bytes CALL ECB49881
.text kdcom.dll!KdSendPacket + 1CE 80404734 35 Bytes [08, 00, 00, 00, 08, 00, 00, ...]
.text kdcom.dll!KdSendPacket + 1F2 80404758 3 Bytes [0D, 06, 00]
.text ...
.text C:\Windows\system32\DRIVERS\atikmdag.sys section is writeable [0x8DA01000, 0x20B6D6, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!EnableWindow 756ACD8B 5 Bytes JMP 690F98BC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!DialogBoxParamW 756D10B0 5 Bytes JMP 690515E3 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!DialogBoxIndirectParamW 756D2EF5 5 Bytes JMP 69245E86 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!DialogBoxParamA 756E8152 5 Bytes JMP 69245E21 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!DialogBoxIndirectParamA 756E847D 5 Bytes JMP 69245EEB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!MessageBoxIndirectA 756FD4D9 5 Bytes JMP 69245DA8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!MessageBoxIndirectW 756FD5D3 5 Bytes JMP 69245D2F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!MessageBoxExA 756FD639 5 Bytes JMP 69245CCB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] USER32.dll!MessageBoxExW 756FD65D 5 Bytes JMP 69245C67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WININET.dll!HttpAddRequestHeadersA 76AF1B9C 5 Bytes JMP 007B6822
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WININET.dll!HttpAddRequestHeadersW 76B3F7A8 5 Bytes JMP 007B6A2D
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WS2_32.dll!closesocket 76D9330C 5 Bytes JMP 008E000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WS2_32.dll!recv 76D9343A 5 Bytes JMP 008B000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WS2_32.dll!connect 76D940D9 5 Bytes JMP 008D000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WS2_32.dll!getaddrinfo 76D9418A 5 Bytes JMP 0091000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WS2_32.dll!send 76D9659B 5 Bytes JMP 008F000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2204] WS2_32.dll!gethostbyname 76DA62D4 5 Bytes JMP 0090000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] kernel32.dll!CreateThread 7531CB2E 5 Bytes JMP 690B71CB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!SetWindowsHookExW 756A87AD 5 Bytes JMP 690F204C C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!CallNextHookEx 756A8E3B 1 Byte [E9]
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!CallNextHookEx 756A8E3B 5 Bytes JMP 69117A3F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!UnhookWindowsHookEx 756A98DB 5 Bytes JMP 6913E9F8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!EnableWindow 756ACD8B 5 Bytes JMP 690F98BC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!DefWindowProcA 756ADB88 7 Bytes JMP 690B93F5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!CreateWindowExA 756ADC2A 2 Bytes JMP 690C3223 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!CreateWindowExA + 3 756ADC2D 2 Bytes [A1, F3]
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!CreateWindowExW 756B1305 5 Bytes JMP 6911FE1F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!DefWindowProcW 756C03B4 7 Bytes JMP 69117AA2 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!DialogBoxParamW 756D10B0 5 Bytes JMP 690515E3 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!DialogBoxIndirectParamW 756D2EF5 5 Bytes JMP 69245E86 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!DialogBoxParamA 756E8152 5 Bytes JMP 69245E21 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!DialogBoxIndirectParamA 756E847D 5 Bytes JMP 69245EEB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!MessageBoxIndirectA 756FD4D9 5 Bytes JMP 69245DA8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!MessageBoxIndirectW 756FD5D3 5 Bytes JMP 69245D2F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!MessageBoxExA 756FD639 5 Bytes JMP 69245CCB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] USER32.dll!MessageBoxExW 756FD65D 5 Bytes JMP 69245C67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] ole32.dll!OleLoadFromStream 766F1E80 5 Bytes JMP 6924666E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WININET.dll!HttpAddRequestHeadersA 76AF1B9C 5 Bytes JMP 00AF6822
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WININET.dll!HttpAddRequestHeadersW 76B3F7A8 5 Bytes JMP 00AF6A2D
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WS2_32.dll!closesocket 76D9330C 5 Bytes JMP 00BE000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WS2_32.dll!recv 76D9343A 5 Bytes JMP 00BC000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WS2_32.dll!connect 76D940D9 5 Bytes JMP 00BD000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WS2_32.dll!getaddrinfo 76D9418A 5 Bytes JMP 00C1000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WS2_32.dll!send 76D9659B 5 Bytes JMP 00BF000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4348] WS2_32.dll!gethostbyname 76DA62D4 5 Bytes JMP 00C0000A

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdD3Transition] [804035E9] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdD0Transition] [804035DF] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdReceivePacket] [8040360D] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdSendPacket] [80403631] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdRestore] [80403619] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdSave] [80403625] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdDebuggerInitialize0] [804035F3] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\ntkrnlpa.exe[KDCOM.dll!KdDebuggerInitialize1] [804035FF] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\hal.dll[KDCOM.dll!KdRestore] [80403619] \SystemRoot\system32\kdcom.dll (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \SystemRoot\system32\kdcom.dll[HAL.dll!READ_PORT_UCHAR] FC458B08
IAT \SystemRoot\system32\kdcom.dll[HAL.dll!WRITE_PORT_UCHAR] 8B87048B
IAT \SystemRoot\system32\kdcom.dll[HAL.dll!HalQueryRealTimeClock] C3030C55
IAT \SystemRoot\system32\kdcom.dll[HAL.dll!KdComPortInUse] 1A3A188A

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown] [73C07817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage] [73C5A86D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI] [73C0BB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [73BFF695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup] [73C075E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC] [73BFE7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM] [73C38395] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream] [73C0DA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight] [73BFFFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth] [73BFFF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage] [73BF71CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM] [73C8CAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile] [73C2C8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics] [73BFD968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree] [73BF6853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc] [73BF687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[5984] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode] [73C02AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs AVGIDSFilter.Sys (IDS Application Activity Monitor Filter Driver./AVG Technologies CZ, s.r.o. )
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\fastfat \Fat AVGIDSFilter.Sys (IDS Application Activity Monitor Filter Driver./AVG Technologies CZ, s.r.o. )

---- Threads - GMER 1.0.15 ----

Thread System [4:220] 86F100B3
Thread System [4:228] 86F10923
Thread System [4:232] 86F117FB

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\BthPort\Parameters\Keys\001644ff4857
Reg HKLM\SYSTEM\ControlSet002\Services\BthPort\Parameters\Keys\001644ff4857 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\BthPort\Parameters\Keys\001644ff4857 (not active ControlSet)

---- EOF - GMER 1.0.15 ----

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,078 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:10 AM

Posted 26 July 2011 - 08:01 PM

Hello, looks like some outdated things are being exploited by malware.

YOu have an Old Java and Adobe reader on here that needs to be removed. I will post the complete removal method.
Java™ 6 Update 26 <<-- This is OK
Java™ 6 Update 5
Out of date Java installed!
Adobe Flash Player 10.3.181.34 <<-- This is OK
Adobe Reader 8.3.0
Out of date Adobe Reader installed!


Note when updating uncheck the box before Yes, install Google Toolbar

Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u26-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.


Please do similarly and update to Adobe Reader X (10.1.0)


Next run this
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.5.9.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, [color="#8B0000"]Post new scan log
and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 race3champ

race3champ
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 26 July 2011 - 10:47 PM

When trying to uninstall old versions of java I get the message "The system administrator has set policies to prevent this installation." I am the system administrator...Then the message says I do not have sufficient access to uninstall. Thoughts?

#4 race3champ

race3champ
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 27 July 2011 - 09:13 PM

k - I figured out how to uninstall/update java and adobe. Here are the updated logs:

no infection found with tdsskiller


Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7305

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

7/27/2011 9:09:12 PM
mbam-log-2011-07-27 (21-09-12).txt

Scan type: Quick scan
Objects scanned: 214721
Time elapsed: 19 minute(s), 55 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,078 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:10 AM

Posted 27 July 2011 - 09:21 PM

Actually you are Not the ADMIN. See How to access the true Administrator account in Windows Vista


To activate the 'real' administrator account do the following

1. Run the command prompt as administrator
2. Type net user administrator /activate:yes

To set the administrator password type

> net user administrator <your choice of password>
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 race3champ

race3champ
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 28 July 2011 - 09:25 PM

Malwarebytes and TDSS killer show no infection yet the redirect just occurred again. Since the scans are showing as clean should I do the new restore point now even though the scans are clean but I'm still being redirected??

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,078 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:10 AM

Posted 28 July 2011 - 09:38 PM

No instead try going to a restore point before this happened and see if it stops. Windows Vista System Restore Guide
Are you using firefox?
Are you on a router? with other machines? Do they redirect?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 race3champ

race3champ
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 28 July 2011 - 09:40 PM

Mostly use firefox but happens in IE as well. Wireless router. No other machines.

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,078 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:10 AM

Posted 28 July 2011 - 09:51 PM

Ok try the resore point.
If still no joy.... Your HOSTS file may be infected.
Reset the HOSTS file
As this infection also changes your Windows HOSTS file, we want to replace this file with the default version for your operating system.
Some types of malware will alter the HOSTS file as part of its infection. Please follow the instructions provided in How do I reset the hosts file back to the default?

To reset the hosts file automatically,go HERE click the Posted Image button. Then just follow the prompts in the Fix it wizard.


OR
Click Run in the File Download dialog box or save MicrosoftFixit50267.msi to your Desktop and double-click on it to run. Then just follow the promots in the Fix it wizard.




OR Your router is probably hijacked by trojan DNS-hijacker.

  • Please read this: Malware Silently Alters Wireless Router Settings

  • Then reset your router to it's factory default settings:

    "If your machine has been infected by one of these Zlob/DNSchanger Trojans, and your router settings have been altered, I would strongly recommend that you reset the router to its default configuration. Usually, this can be done by inserting something tiny like a paper clip end or pencil tip into a small hole labeled "reset" located on the back of the router. Press and hold down the small button inside until the lights on the front of the router blink off and then on again (usually about 10 seconds)"


  • This is the difficult part.
    First get to the routers server. To do that open Internet Explorer and type http:\\192.168.1.1 in the address bar and click Enter. You get the log in window.
    Fill in the password you have already found and you will get the configuration page.
    Configure the router to allow you to connect to your ISP server. In some routers it is done by a setup wizard. But you have to fill in the log in password your ISP has initially given to you.
    You can also call your ISP if you don't have your initial password.
    Don't forget to change the routers default password and set a strong password. Note down the password and keep it somewhere for future reference.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 race3champ

race3champ
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 29 July 2011 - 05:55 AM

couldn't do the restore point. i've been battling this for at least 2 weeks and i think closer to 3. when i went in to do the system restore the furthest away restore point was last week (lots of software installations and uninstalls in the past couple weeks trying to fix all this)....thus I didn't try the system restore.

tried the microsoft fixit - still redirecting.

will try the router reset but have the track down the original password.

#11 race3champ

race3champ
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 29 July 2011 - 10:13 PM

reset the router to factory defaults and changed the password. ran tdsskiller and it found something that I had it cure. ran malwarebytes and it came back with nothing. so far there has been no redirect so we shall see!! (KNOCK ON WOOD!)

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,078 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:10 AM

Posted 30 July 2011 - 09:28 AM

Excellent!! If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Tips to protect yourself against malware and reduce the potential for re-infection:Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. To learn more about this risk, please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users