GeekPolice
Would you like to react to this message? Create an account in a few clicks or log in to continue.

GeekPoliceLog in

 


descriptionDCOM server process error, security scam, search engine redirect, etc EmptyDCOM server process error, security scam, search engine redirect, etc

more_horiz
Hi all--

The errors and problems I have seen are sudden system shutdown with the DCOM server process error, the fake security trojan (looks the AVG symbol), and the browser redirects from the search engines. It is also just generally slow, but that may be a computer hardware prob. Smile...

This machine is running Windows XP Pro SP3. It recently (about 6 months ago) had a new hard drive installed as the old one crashed.

I have gone through the Before You Post and done as many as the computer would allow. I cannot get it to finish updating Windows, install JavaRa, or the Adobe files. I get a 'GetPlus+(R) error for the Adobe "Operating system error", for JavaRa the error is "System administrator has set poices to prevent this application" And Windows just takes me in circles.


I went ahead and did the HijackThis:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:01:49 PM, on 1/27/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Safe mode with network support

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://update.microsoft.com/microsoftupdate
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll (file missing)
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User '?')
O4 - HKUS\S-1-5-20\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User '?')
O4 - HKUS\S-1-5-21-507921405-706699826-1957994488-1003\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User '?')
O4 - HKUS\S-1-5-18\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User '?')
O4 - HKUS\.DEFAULT\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'Default user')
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1251492208807
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1251492097347
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe

--
End of file - 3357 bytes

Any help is greatly appreciated!
Thanks!

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Please visit this webpage for instructions for downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Post the log from ComboFix when you've accomplished that.

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Thank you. Here is the combofix log:

ComboFix 10-01-29.05 - wmh 01/29/2010 20:09:18.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.720 [GMT -7:00]
Running from: c:\documents and settings\wmh\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\Common Files\Uninstall

Infected copy of c:\windows\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - Kitty ate it :p
.
((((((((((((((((((((((((( Files Created from 2009-12-28 to 2010-01-30 )))))))))))))))))))))))))))))))
.

2010-01-30 02:59 . 2010-01-30 02:59 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2010-01-28 07:03 . 2010-01-28 07:13 -------- d-----w- c:\documents and settings\wmh\.SunDownloadManager
2010-01-28 07:02 . 2010-01-28 07:02 -------- d-----w- c:\program files\Common Files\Java
2010-01-28 07:01 . 2010-01-28 07:01 348160 ----a-w- c:\documents and settings\wmh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5dd87400-n\msvcr71.dll
2010-01-28 07:01 . 2010-01-28 07:01 503808 ----a-w- c:\documents and settings\wmh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5dd87400-n\msvcp71.dll
2010-01-28 07:01 . 2010-01-28 07:01 499712 ----a-w- c:\documents and settings\wmh\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5dd87400-n\jmc.dll
2010-01-28 07:01 . 2010-01-28 07:01 61440 ----a-w- c:\documents and settings\wmh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-29673716-n\decora-sse.dll
2010-01-28 07:01 . 2010-01-28 07:01 12800 ----a-w- c:\documents and settings\wmh\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-29673716-n\decora-d3d.dll
2010-01-28 07:00 . 2010-01-28 07:00 -------- d-----w- c:\program files\Java
2010-01-28 06:32 . 2010-01-28 06:32 -------- d-----w- c:\program files\NOS
2010-01-28 06:32 . 2009-12-17 23:37 31936 ----a-w- c:\documents and settings\wmh\Application Data\Mozilla\Firefox\Profiles\psl20b32.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\plugins\np_gp.dll
2010-01-28 06:32 . 2009-12-17 23:37 29344 ----a-w- c:\documents and settings\wmh\Application Data\Mozilla\Firefox\Profiles\psl20b32.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\chrome\content\getPlusPlus_Adobe_reg.exe
2010-01-28 06:23 . 2010-01-28 06:23 -------- d--h--w- c:\windows\system32\GroupPolicy
2010-01-28 06:00 . 2010-01-28 06:00 -------- d-----w- c:\program files\Trend Micro
2010-01-28 05:05 . 2010-01-07 23:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-28 05:05 . 2010-01-07 23:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-28 00:05 . 2010-01-28 00:05 0 ----a-w- c:\windows\system32\drivers\.sys
2010-01-17 22:52 . 2009-11-21 15:51 471552 ------w- c:\windows\system32\dllcache\aclayers.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-30 00:18 . 2009-08-29 19:19 1528 ----a-w- c:\windows\system32\d3d9caps.dat
2010-01-28 07:00 . 2009-12-20 04:15 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-01-28 06:33 . 2009-09-03 21:53 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2010-01-28 06:15 . 2009-11-07 17:04 15816 ----a-w- c:\documents and settings\wmh\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-28 05:05 . 2009-12-23 20:09 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-28 00:21 . 2004-08-03 22:59 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2010-01-23 04:06 . 2009-09-11 14:48 -------- d-----w- c:\documents and settings\wmh\Application Data\Move Networks
2010-01-17 00:13 . 2009-08-28 19:46 108552 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-01-02 01:56 . 2009-08-29 17:00 1416 ----a-w- c:\windows\system32\d3d8caps.dat
2009-12-23 20:09 . 2009-12-23 20:09 -------- d-----w- c:\documents and settings\wmh\Application Data\Malwarebytes
2009-12-23 20:09 . 2009-12-23 20:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-12-21 19:14 . 2007-09-13 12:15 916480 ----a-w- c:\windows\system32\wininet.dll
2009-11-21 15:51 . 2007-09-13 12:10 471552 ----a-w- c:\windows\AppPatch\aclayers.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-12-11 2043160]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-11 246504]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"nltide_3"="advpack.dll" [2009-03-08 128512]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"DisableCAD"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-08-29 17:37 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [8/28/2009 12:46 PM 335240]
R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [8/28/2009 12:46 PM 908056]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [8/28/2009 12:46 PM 297752]
R3 s3m;s3m;c:\windows\system32\drivers\s3m.sys [8/28/2009 1:40 AM 166720]
S1 982E1;982E1;\??\c:\windows\system32\drivers\982E1.sys --> c:\windows\system32\drivers\982E1.sys [?]
S1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [8/28/2009 12:46 PM 108552]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
getPlusHelper REG_MULTI_SZ getPlusHelper
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
FF - ProfilePath - c:\documents and settings\wmh\Application Data\Mozilla\Firefox\Profiles\psl20b32.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://m.www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?ei=UTF-8&fr=ytff-ytbm&p=
FF - plugin: c:\documents and settings\wmh\Application Data\Mozilla\Firefox\Profiles\psl20b32.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\plugins\np_gp.dll
.
- - - - ORPHANS REMOVED - - - -

SafeBoot-982E1



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-29 20:21
Windows 5.1.2600 Service Pack 3 NTFS

scanning hȋdden processes ...

scanning hȋdden autostart entries ...

scanning hȋdden files ...

scan completed successfully
hȋdden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1088)
c:\windows\system32\WININET.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\IEFRAME.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\progra~1\AVG\AVG8\avgrsx.exe
c:\program files\AVG\AVG8\avgcsrvx.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2010-01-29 20:27:05 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-30 03:27

Pre-Run: 31,869,456,384 bytes free
Post-Run: 32,766,377,984 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 608F8538E12A26ED6FA1B69A5F8EE6BF

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Hi again. Please do these steps in order.

1. Please download TFC by OldTimer to your desktop
  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start
    button to begin the process. Depending on how often you clean temp
    files, execution time should be anywhere from a few seconds to a minute
    or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.


2. DCOM server process error, security scam, search engine redirect, etc Mbamicontw5 Please download Malwarebytes Anti-Malware from Malwarebytes.org.
Alternate link: BleepingComputer.com.
(Note: if you already have the program installed, just follow the directions. No need to re-download or re-install!)

Double Click mbam-setup.exe to install the application.

(Note: if you already have the program installed, open Malwarebytes from the Start Menu or Desktop shortcut, click the Update tab, and click Check for Updates, before doing the scan as instructed below!)

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

3. Please visit this webpage for instructions for downloading and running SUPERAntiSpyware (SAS) to scan and remove malware from your computer:

http://www.bleepingcomputer.com/virus-removal/how-to-use-superantispyware-tutorial

Post the log from SUPERAntiSpyware when you've accomplished that.

4. Please run a free online scan with the ESET Online Scanner
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start
  • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
  • Click Scan (This scan can take several hours, so please be patient)
  • Once the scan is completed, you may close the window
  • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic


5. Post the following in your next reply:
  • MBAM log
  • SAS log
  • ESET log

And, please tell me how your computer is doing.

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Computer is doing much better. No DCOM shutdown yet (usually occurs in the first 5 minutes of internet access), no false security pop ups yet and no search engine redirect either! WOW!

Here are the 3 logs:

Malwarebytes' Anti-Malware 1.44
Database version: 3662
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

1/30/2010 9:44:45 AM
mbam-log-2010-01-30 (09-44-45).txt

Scan type: Full Scan (C:\|)
Objects scanned: 121898
Time elapsed: 52 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{096007E3-F157-45C1-A12F-A26148EBFBE5}\RP10\A0001978.sys (Malware.Trace) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{096007E3-F157-45C1-A12F-A26148EBFBE5}\RP10\A0002004.com (Trojan.Agent) -> Quarantined and deleted successfully.


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/30/2010 at 10:44 AM

Application Version : 4.33.1000

Core Rules Database Version : 4540
Trace Rules Database Version: 2352

Scan type : Complete Scan
Total Scan Time : 00:37:52

Memory items scanned : 373
Memory threats detected : 0
Registry items scanned : 3519
Registry threats detected : 0
File items scanned : 11549
File threats detected : 40

Adware.Tracking Cookie
C:\Documents and Settings\wmh\Cookies\wmh@microsoftinternetexplorer.112.2o7[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@casalemedia[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@ads.bridgetrack[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@content.yieldmanager[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@imrworldwide[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@atdmt[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@fastclick[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@media6degrees[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@tracking.admarketplace[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@rotator.adjuggler[3].txt
C:\Documents and Settings\wmh\Cookies\wmh@zedo[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@advertising[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@pro-market[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@ad.yieldmanager[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@serving-sys[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@adserver.adtechus[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@ads.undertone[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@doubleclick[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@mediaplex[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@specificmedia[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@statcounter[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@counter.surfcounters[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@specificclick[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@rotator.adjuggler[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@apmebf[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@adx.bixee[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@collective-media[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@atwola[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@cdn4.specificclick[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@tribalfusion[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@2o7[2].txt
C:\Documents and Settings\wmh\Cookies\wmh@microsoftwindows.112.2o7[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@tacoda[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@interclick[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@ads.us.e-planning[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@msnportal.112.2o7[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@at.atwola[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@bs.serving-sys[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@invitemedia[1].txt
C:\Documents and Settings\wmh\Cookies\wmh@www.googleadservices[1].txt


ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6211
# api_version=3.0.2
# EOSSerial=9c7aa48da350f94d812aa03e580a3ed9
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2010-01-30 06:57:35
# local_time=2010-01-30 11:57:35 (-0700, Mountain Standard Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 3
# compatibility_mode=512 16777215 100 0 0 0 0 0
# compatibility_mode=1028 16777189 100 95 0 13299217 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=21619
# found=3
# cleaned=3
# scan_time=3459
C:\Free Software\Utilities\duplicate file killer\dfk185.exe Win32/TrojanDownloader.IstBar.NAU trojan (deleted - quarantined) 00000000000000000000000000000000 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\atapi.sys.vir Win32/Olmarik.RF virus (deleted - quarantined) 00000000000000000000000000000000 C
C:\WINDOWS\system32\config\systemprofile\Application Data\Sun\Java\Deployment\cache\6.0\45\667bb02d-5702249d multiple threats (deleted - quarantined) 00000000000000000000000000000000 C

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Please re-open Malwarebytes, click the Update tab, and click Check for Updates. Then, click the Scanner tab, select Perform Full Scan, and press Scan. Remove selected, and post the log in your next reply.

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Nothing to remove...does that mean I'm in the clear?

Malwarebytes' Anti-Malware 1.44
Database version: 3664
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

1/30/2010 3:40:52 PM
mbam-log-2010-01-30 (15-40-52).txt

Scan type: Full Scan (C:\|)
Objects scanned: 122521
Time elapsed: 35 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Now to get you off to a good start we will clean your restore points so that all the bad stuff is gone for good. Then if you need to restore at some stage you will be clean. There are several ways to reset your restore points, but this is my method:
  • Select Start > All Programs > Accessories > System tools > System Restore.
  • On the dialogue box that appears select Create a Restore Point
  • Click NEXT
  • Enter a name e.g. Clean
  • Click CREATE

You now have a clean restore point, to get rid of the bad ones:
  • Select Start > All Programs > Accessories > System tools > Disk Cleanup.
  • In the Drop down box that appears select your main drive e.g. C
  • Click OK
  • The System will do some calculation and the display a dialogue box with TABS
  • Select the More Options Tab.
  • At the bottom will be a system restore box with a CLEANUP button click this
  • Accept the Warning and select OK again, the program will close and you are done


To remove all of the tools we used and the files and folders they created, please do the following:
Please download OTC.exe by OldTimer:

  • Save it to your Desktop.
  • Double click OTC.exe.
  • Click the CleanUp! button.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.

Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

==

Please download TFC by OldTimer to your desktop
  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start
    button to begin the process. Depending on how often you clean temp
    files, execution time should be anywhere from a few seconds to a minute
    or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.


==

Download Security Check by screen317 from SpywareInfoforum.org or Changelog.fr.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Ok--all done. Here is the last log:

Results of screen317's Security Check version 0.99.1
Windows XP Service Pack 3
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
AVG 8.5
Antivirus up to date!
``````````````````````````````
Anti-malware/Other Utilities Check:

SUPERAntiSpyware Free Edition
Java(TM) 6 Update 18
Java Auto Updater
Out of date Java installed!
Adobe Flash Player 10
Adobe Reader 9.3
``````````````````````````````
Process Check:
objlist.exe by Laurent

AVG avgwdsvc.exe
AVG avgtray.exe
AVG avgrsx.exe
AVG avgemc.exe
AVG avgemc.exe
``````````````````````````````
DNS Vulnerability Check:

GREAT! (Not vulnerable to DNS cache poisoning)

`````````End of Log```````````

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Please read the following information that I have provided, which will help you prevent malicious software in the future. Please keep in mind, malware is a continuous danger on the Internet. It is highly important to stay safe while browsing, to prevent re-infection.

Software recommendations

Firewall

  • Tallemu Online Armor: the free version is just as good as the premium. I have linked you to the free version.
  • Comodo Firewall: the free version is just as good as the premium. I have linked you to the free version. The optional security suite enhances the firewall by 40% increase. If you would like to install the suite that includes antivirus, then remove your old antivirus first.
  • PC Tools Firewall Plus: free and excellent firewall.


AntiSpyware

  • SpywareBlaster
    SpywareBlaster is a program that prevents spyware from installing on your computer. A tutorial on using SpywareBlaster may be found here.
  • Spybot - Search & Destroy.
    Spybot - Search & Destroy is a spyware and adware removal program. It also has realtime protection, TeaTimer to help safeguard your computer against spyware. (The link for Spybot - Search & Destroy contains a tutorial that will help you download, install, and begin using Spybot).


NOTE: Please keep ALL of these programs up-to-date and run them whenever you suspect a problem to prevent malware problems.

Resident Protection help
A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall, and scanning anti-spyware program at a time. Passive protectors such as SpywareBlaster can be run with any of them.

Rogue programs help
There are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:
http://www.spywarewarrior.com/rogue_anti-spyware.htm

Securing your computer

  • Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
  • hpHosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. This prevents your computer from connecting to those sites by redirecting them to 127.0.0.1, which is your local computer's loopback address, meaning it will be difficult to infect your computer in the future.


Please consider using an alternate browser
Mozilla's Firefox browser is a very good alternative. In addition to being generally more secure than Internet Explorer, it has a very good built-in popup blocker and add-ons, like NoScript, can make it even more secure. Opera is another good option.

If you are interested:


See this page for more info about malware and prevention.

Thank you for choosing GeekPolice. Please see this page if you would like to leave feedback or contribute to our site. Do you have any more questions?

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
Thank you very much! Your help is very much appreciated! Will recommend to others.

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
You're welcome. Smile...

descriptionDCOM server process error, security scam, search engine redirect, etc EmptyRe: DCOM server process error, security scam, search engine redirect, etc

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum