Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirect Virus/Malware


  • This topic is locked This topic is locked
13 replies to this topic

#1 dormdweller

dormdweller

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 01 February 2010 - 09:44 PM

Hello,

I continue to get re-directed when I do google searches and click on links. It typically takes me to various sites and then installs a fake virus scanner program to the computer. I then use rkill.exe to stop known malware processes and run Malwarebytes which effectively removes the fake virus scanner program; however, after a while I am redirected again and the problem repeats itself. I can't seem to get rid of it. Please help! I've run DDS and attached is the DDS.txt file. I've also attached the root repeal text file.

Attached Files



BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 08 February 2010 - 12:56 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE



Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 dormdweller

dormdweller
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 09 February 2010 - 12:03 AM

Thanks for your help! Attached in the next few posts are the DDS.txt, Attach.txt, and GMER.log.

DDS.txt


DDS (Ver_09-12-01.01) - NTFSx86
Run by 10163267 at 21:24:09.91 on Mon 02/08/2010
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.400 [GMT -7:00]

FW: Integrity Agent Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\WINDOWS\System32\ibmpmsvc.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\System32\S24EvMon.exe
C:\Program Files\CheckPoint\SecuRemote\bin\SR_Service.exe
C:\Program Files\CheckPoint\SecuRemote\bin\SR_WatchDog.exe
C:\WINDOWS\System32\svchost.exe -k NetworkService
C:\WINDOWS\System32\svchost.exe -k eapsvcs
C:\WINDOWS\System32\svchost.exe -k LocalService
C:\WINDOWS\System32\svchost.exe -k dot3svc
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\svchost.exe -k LocalService
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\mcshield.exe
C:\Program Files\Network Associates\VirusScan\vstskmgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\P-Synch\Clients\service\psginasvc.exe
C:\WINDOWS\System32\QCONSVC.EXE
C:\WINDOWS\System32\RegSrvc.exe
C:\Program Files\McAfee\Common Framework\naPrdMgr.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\system32\TpKmpSVC.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\system32\CCM\CLICOMP\RemCtrl\Wuser32.exe
C:\WINDOWS\system32\CCM\CcmExec.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\CheckPoint\SecuRemote\bin\SR_GUI.Exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
C:\Program Files\ThinkPad\ConnectUtilities\QCWLICON.EXE
C:\Program Files\ThinkPad\PkgMgr\HOTKEY\TPONSCR.exe
C:\Program Files\ThinkPad\PkgMgr\HOTKEY_1\TpScrex.exe
C:\PROGRA~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\CheckPoint\Integrity Client\iclient.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\ThinkPad\UltraNav Wizard\UNavTray.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\10163267\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Program Files\Java\jre6\bin\jucheck.exe
C:\Documents and Settings\10163267\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\10163267\My Documents\Downloads\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uWindow Title = Microsoft Internet Explorer provided by Hospira, Inc.
uStart Page =
mDefault_Page_URL = hxxp://www.ourhospira.corp
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\tfswshx.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Google Update] "c:\documents and settings\10163267\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [S3TRAY2] S3Tray2.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [ATIModeChange] Ati2mdxx.exe
mRun: [BluetoothAuthenticationAgent] rundll32.exe irprops.cpl,,BluetoothAuthenticationAgent
mRun: [TPHOTKEY] c:\progra~1\thinkpad\pkgmgr\hotkey\TPHKMGR.exe
mRun: [QCWLICON] c:\program files\thinkpad\connectutilities\QCWLICON.EXE
mRun: [TPKMAPHELPER] c:\program files\thinkpad\utilities\TpKmapAp.exe -helper
mRun: [TP4EX] tp4ex.exe
mRun: [EZEJMNAP] c:\progra~1\thinkpad\utilit~1\EzEjMnAp.Exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [UC_SMB]
mRun: [tgcmd]
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [ShStatEXE] "c:\program files\network associates\virusscan\SHSTAT.EXE" /STANDALONE
mRun: [<NO NAME>]
mRun: [Zone Labs Client] "c:\program files\checkpoint\integrity client\iclient.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\UdaterUI.exe" /StartedFromRunKey
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
uPolicies-explorer: NoThemesTab = 1 (0x1)
uPolicies-explorer: NoSimpleStartMenu = 1 (0x1)
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
uPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
uPolicies-explorer: NoWindowsUpdate = 1 (0x1)
uPolicies-system: NoColorChoice = 1 (0x1)
uPolicies-system: NoSizeChoice = 1 (0x1)
uPolicies-system: NoVisualStyleChoice = 1 (0x1)
mPolicies-explorer: NoPublishingWizard = 1 (0x1)
mPolicies-explorer: NoWebServices = 1 (0x1)
mPolicies-system: EnableLUA = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: buy-internet-security10.com
Trusted Zone: buy-internetsecurity10.com
Trusted Zone: is-soft-download.com
Trusted Zone: is-software-download.com
Trusted Zone: is-software-download25.com
Trusted Zone: phoenixstatus.com\epicc
Trusted Zone: salesforce.com
Trusted Zone: successfactors.com\performancemanager
Trusted Zone: buy-internet-security10.com
Trusted Zone: buy-internetsecurity10.com
Trusted Zone: phoenixstatus.com\epicc
Trusted Zone: salesforce.com
Trusted Zone: successfactors.com\performancemanager
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://www.apple.com/qtactivex/qtplugin.cab
DPF: {1C11B948-582A-433F-A98D-A8C4D5CC64F2} - hxxps://lowes.2020.net/Core/Player/2020PlayerAX_Win32.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1233954094307
DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} - hxxp://v4.windowsupdate.microsoft.com/CAB/x86/unicode/iuctl.CAB?38056.4540162037
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} -
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Notify: AtiExtEvent - Ati2evxx.dll
Notify: ckpNotify - ckpNotify.dll

============= SERVICES / DRIVERS ===============

R1 FW1;SecuRemote Miniport;c:\windows\system32\drivers\fw.sys [2007-5-31 2234672]
R1 NaiAvTdi1;NaiAvTdi1;c:\windows\system32\drivers\mvstdi5x.sys [2007-5-24 59904]
R1 TPPWR;TPPWR;c:\windows\system32\drivers\TPPWR.SYS [2004-2-25 12288]
R1 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2006-10-12 382512]
R2 CP_OMDRV;Check Point Office Mode Module;c:\windows\system32\drivers\omdrv.sys [2007-5-31 36400]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2007-5-21 103744]
R2 McShield;Network Associates McShield;c:\program files\network associates\virusscan\mcshield.exe [2007-1-18 221191]
R2 McTaskManager;Network Associates Task Manager;c:\program files\network associates\virusscan\vstskmgr.exe [2007-1-18 29184]
R2 psginasvc;P-Synch Logon Management Service;c:\program files\p-synch\clients\service\psginasvc.exe [2008-6-27 591112]
R2 VNASC;Check Point Virtual Network Adapter - SecureClient;c:\windows\system32\drivers\vnasc.sys [2007-5-31 109072]
R2 VPN-1;VPN-1 Module;c:\windows\system32\drivers\vpn.sys [2007-5-31 671472]
R2 vsmon;TrueVector Internet Monitor;c:\windows\system32\zonelabs\vsmon.exe -service --> c:\windows\system32\zonelabs\vsmon.exe -service [?]
R3 NaiAvFilter1;NaiAvFilter1;c:\windows\system32\drivers\naiavf5x.sys [2007-5-24 117024]
S3 ADM8511;ADMtek ADM8511/AN986 USB To Fast Ethernet Converter;c:\windows\system32\drivers\ADM8511.SYS [2004-9-7 20160]
S3 OnePointDomainAdminService;Active Directory Migration Agent;c:\windows\onepointdomainagent\dctagentservice.exe --> c:\windows\onepointdomainagent\DCTAgentService.exe [?]
S3 vsinstdv;vsinstdv;\??\c:\docume~1\raged0\locals~1\temp\{cd17c3e7-f04b-4148-88f8-a32c3974d999}\vsinstdv.sys --> c:\docume~1\raged0\locals~1\temp\{cd17c3e7-f04b-4148-88f8-a32c3974d999}\vsinstdv.sys [?]

=============== Created Last 30 ================

2010-01-29 00:08:27 0 d-----w- c:\program files\IamFX MT4
2010-01-28 14:50:13 0 d-----w- C:\quarantine
2010-01-28 05:19:05 120 ----a-w- c:\windows\CIS_Setup_3.13.126709.581_XP_Vista_x32[1].INI
2010-01-28 04:55:08 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-28 04:55:03 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-28 04:35:40 0 d-----w- c:\program files\CCleaner
2010-01-28 03:30:20 0 d-----w- c:\windows\system32\wbem\Repository
2010-01-26 23:17:55 0 d-----w- c:\docume~1\10163267\applic~1\Malwarebytes
2010-01-26 23:17:48 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-26 23:17:48 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-01-26 03:40:41 0 d-----w- c:\documents and settings\10163267\PrivacIE
2010-01-26 03:38:16 0 d-----w- c:\documents and settings\10163267\IETldCache
2010-01-26 02:52:49 0 dc----w- c:\windows\ie8
2010-01-20 01:52:35 0 d-----w- c:\program files\MetaTrader 4

==================== Find3M ====================

2010-01-28 03:59:54 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2010-01-28 03:59:54 96512 ----a-w- c:\windows\system32\dllcache\atapi.sys

============= FINISH: 21:26:07.53 ===============


Attach.txt


UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT

DDS (Ver_09-12-01.01)

Microsoft Windows XP Professional
Boot Device: \Device\HarddiskVolume1
Install Date: 6/25/2004 11:41:52 PM
System Uptime: 2/8/2010 8:25:59 PM (1 hours ago)

Motherboard: IBM | | 2897GAU
Processor: Intel® Pentium® M processor 1500MHz | None | 1495/400mhz

==== Disk Partitions =========================

C: is FIXED (NTFS) - 53 GiB total, 34.885 GiB free.
D: is CDROM ()

==== Disabled Device Manager Items =============

==== System Restore Points ===================

RP868: 12/8/2009 2:43:27 PM - System Checkpoint
RP869: 12/10/2009 9:00:20 PM - System Checkpoint
RP870: 12/15/2009 6:38:07 PM - System Checkpoint
RP871: 12/17/2009 8:28:43 PM - System Checkpoint
RP872: 1/7/2010 6:42:44 PM - System Checkpoint
RP873: 1/17/2010 3:19:36 PM - System Checkpoint
RP874: 1/19/2010 6:47:05 PM - System Checkpoint
RP875: 1/20/2010 9:30:57 PM - System Checkpoint
RP876: 1/21/2010 9:55:41 PM - System Checkpoint
RP877: 1/22/2010 10:17:15 PM - System Checkpoint
RP878: 1/25/2010 7:54:42 PM - Installed Windows Internet Explorer 8.
RP879: 1/26/2010 8:10:57 PM - System Checkpoint
RP880: 1/27/2010 8:02:24 PM - Restore Operation
RP881: 1/28/2010 8:44:55 PM - System Checkpoint
RP882: 2/3/2010 9:19:57 PM - Installed QuickTime

==== Installed Programs ======================


Access IBM
Access IBM Message Center
Access IBM Tools
Adobe Flash Player 10 ActiveX
Adobe Reader 8.1.0
Adobe Reader Japanese Fonts
Agere Systems AC'97 Modem
alm
Apple Software Update
ATI Control Panel
ATI Display Driver
ATI HydraVision
CCleaner
Compatibility Pack for the 2007 Office system
DST_Patch_Shutdown-Policy
ENLASO Tools
Google Chrome
HighMAT Extension to Microsoft Windows XP CD Writing Wizard
Hitachi ID P-Synch Client Components
Hospira PST Backup
Hotfix for Windows XP (KB970653-v3)
IamFX MT4 4.00
IBM Access Connections
IBM Access Support
IBM Access Support - Local Content Pack
IBM DLA
IBM Rapid Restore PC Setup
IBM RecordNow
IBM RecordNow Update Manager
IBM Themes
IBM ThinkPad Battery MaxiMiser and Power Management Features
IBM ThinkPad Configuration
IBM ThinkPad EasyEject Utility
IBM ThinkPad Keyboard Customizer Utility
IBM ThinkPad Power Management Driver
IBM ThinkPad Presentation Director
IBM ThinkPad UltraNav Driver
IBM ThinkPad UltraNav Wizard
IBM TrackPoint Accessibility Features
IBM Update Connector
Integrity Agent
Intel® PRO Network Adapters and Drivers
Intel® Sebring API
InterVideo WinDVD
Java™ 6 Update 13
Java™ 6 Update 7
LiveUpdate 1.80 (Symantec Corporation)
Malwarebytes' Anti-Malware
McAfee VirusScan Enterprise
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft Data Access Components KB870669
Microsoft Office Professional Edition 2003
Microsoft Office Visio Professional 2003
Microsoft Office Visio Viewer 2003 (English)
Microsoft Windows Journal Viewer
MSXML 4.0 SP2 (KB927978)
MSXML 4.0 SP2 (KB954430)
MSXML 6.0 Parser (KB927977)
Network Recording Player
PC-Doctor for Windows
QuickTime
Security Update for Microsoft .NET Framework 2.0 (KB917283)
Security Update for Microsoft .NET Framework 2.0 (KB922770)
Security Update for Step By Step Interactive Training (KB898458)
Security Update for Step By Step Interactive Training (KB923723)
Security Update for Windows Media Player (KB911564)
Security Update for Windows Media Player 6.4 (KB925398)
Security Update for Windows Media Player 9 (KB911565)
Security Update for Windows Media Player 9 (KB917734)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB923689)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951698)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB954459)
Security Update for Windows XP (KB954600)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956841)
Security Update for Windows XP (KB957097)
Security Update for Windows XP (KB958215)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958687)
Security Update for Windows XP (KB958690)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960714)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB961371)
Security Update for Windows XP (KB961373)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB963027)
Security Update for Windows XP (KB968537)
Security Update for Windows XP (KB969897)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB971633)
Security Update for Windows XP (KB973346)
SMS Advanced Client
Snapshot Viewer
Support.com Software
ThinkPad FullScreen Magnifier
ThinkPad Software Installer
Time Zone Data Update Tool for Microsoft Office Outlook
TPNala Wallpaper
Update for Windows XP (KB955839)
Update for Windows XP (KB967715)
VPN Client
WebEx Meeting Manager for Internet Explorer
WebEx Recorder and Player
WebFldrs XP
Windows Communication Foundation
Windows Genuine Advantage Notifications (KB905474)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Imaging Component
Windows Presentation Foundation
Windows Workflow Foundation
Windows XP Service Pack 3
WinZip
XML Paper Specification Shared Components Pack 1.0

==== Event Viewer Messages From Past Week ========

2/6/2010 10:44:59 PM, error: DCOM [10016] - The application-specific permission settings do not grant Local Launch permission for the COM Server application with CLSID {7E89FF0B-F649-4F9A-A9C3-F05DFAAA3DA1} to the user NT AUTHORITY\SYSTEM SID (S-1-5-18). This security permission can be modified using the Component Services administrative tool.
2/6/2010 10:41:31 PM, error: Service Control Manager [7034] - The WebClient service terminated unexpectedly. It has done this 1 time(s).
2/6/2010 10:41:19 PM, error: Service Control Manager [7034] - The Terminal Services service terminated unexpectedly. It has done this 1 time(s).
2/6/2010 10:41:19 PM, error: Service Control Manager [7031] - The DCOM Server Process Launcher service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Reboot the machine.
2/6/2010 10:41:07 PM, error: Service Control Manager [7031] - The Wired AutoConfig service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.
2/6/2010 10:40:37 PM, error: Service Control Manager [7031] - The Extensible Authentication Protocol Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.
2/6/2010 10:40:26 PM, error: Service Control Manager [7034] - The Windows Image Acquisition (WIA) service terminated unexpectedly. It has done this 1 time(s).
2/1/2010 7:07:00 PM, error: sr [1] - The System Restore filter encountered the unexpected error '0xC0000001' while processing the file '' on the volume 'HarddiskVolume1'. It has stopped monitoring the volume.
2/1/2010 7:06:37 PM, error: NETLOGON [5719] - No Domain Controller is available for domain HOSPIRA due to the following: There are currently no logon servers available to service the logon request. . Make sure that the computer is connected to the network and try again. If the problem persists, please contact your domain administrator.
2/1/2010 7:06:36 PM, error: Dhcp [1002] - The IP address lease 192.168.1.103 for the Network Card with network address 000CF11998B6 has been denied by the DHCP server 192.168.1.1 (The DHCP Server sent a DHCPNACK message).
2/1/2010 7:04:29 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}
2/1/2010 6:28:39 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: Fips IBMTPCHK intelppm Smapint TDSMAPI TPHKDRV TPPWR TSMAPIP
2/1/2010 6:28:39 PM, error: Service Control Manager [7023] - The Windows Firewall/Internet Connection Sharing (ICS) service terminated with the following error: The class is configured to run as a security id different from the caller
2/1/2010 6:27:11 PM, error: Ftdisk [49] - Configuring the Page file for crash dump failed. Make sure there is a page file on the boot partition and that is large enough to contain all physical memory.
2/1/2010 6:27:11 PM, error: Ftdisk [45] - The system could not sucessfully load the crash dump driver.
2/1/2010 6:27:06 PM, error: Dhcp [1001] - Your computer was not assigned an address from the network (by the DHCP Server) for the Network Card with network address 000CF11998B6. The following error occurred: The operation was canceled by the user. . Your computer will continue to try and obtain an address on its own from the network address (DHCP) server.
2/1/2010 10:46:17 PM, error: Service Control Manager [7034] - The SMS Remote Control Agent service terminated unexpectedly. It has done this 1 time(s).

==== End Of File ===========================

GMER.log

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-02-08 21:45:34
Windows 5.1.2600 Service Pack 3
Running: 5bgdqv5h.exe; Driver: C:\DOCUME~1\10163267\LOCALS~1\Temp\fxroypob.sys


---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs naiavf5x.sys (Anti-Virus File System Filter Driver/McAfee Inc.)

Device \Driver\Tcpip \Device\Ip vsdatant.sys (TrueVector Device Driver/Zone Labs, LLC)

AttachedDevice \Driver\Tcpip \Device\Ip mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/McAfee Inc.)

Device \Driver\Tcpip \Device\Tcp vsdatant.sys (TrueVector Device Driver/Zone Labs, LLC)

AttachedDevice \Driver\Tcpip \Device\Tcp mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/McAfee Inc.)

Device \Driver\Tcpip \Device\Udp vsdatant.sys (TrueVector Device Driver/Zone Labs, LLC)

AttachedDevice \Driver\Tcpip \Device\Udp mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/McAfee Inc.)

Device \Driver\Tcpip \Device\RawIp vsdatant.sys (TrueVector Device Driver/Zone Labs, LLC)

AttachedDevice \Driver\Tcpip \Device\RawIp mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/McAfee Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 mouclass.sys (Mouse Class Driver/Microsoft Corporation)

Device -> \Driver\atapi \Device\Harddisk0\DR0 87297856

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

#4 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 09 February 2010 - 03:09 PM

Hello, dormdweller
Welcome to the Bleeping Computer Forums. My name is Thomas (Tom is fine), and I will be helping you fixing your problems.

If you do not make a reply in 5 days, we will have to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.
  • Please set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.




Please go here and have a look how you can disable your security software.

Download Combofix from any of the links below but rename it to before saving it to your desktop.

Link 1
Link 2



--------------------------------------------------------------------

Double click on the renamed Combofix.exe & follow the prompts.
    When finished, it will produce a report for you.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#5 dormdweller

dormdweller
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 11 February 2010 - 01:13 AM

I attempted to run Combofix but I got a "blue screen of death" about 5 minutes into the scan that said Windows is shutting down to prevent damage to the system and then it rebooted and did some stuff on it's own. I don't have a combofix.txt file under C:\Windows. There is a little computer looking Icon with the same name that I named the combofix.exe file.

#6 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 13 February 2010 - 06:57 AM

Hi,
  1. Please download OTL from one of the following mirrors:
  2. Save it to your desktop.
  3. Double click on the icon on your desktop.
  4. Under the Custom Scan box paste this in
    netsvcs
    %SYSTEMDRIVE%\*.exe
    safebootminimal
    safebootnetwork
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
  5. Push the Quick Scan button.
  6. Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#7 dormdweller

dormdweller
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 16 February 2010 - 11:19 PM

Wouldn't let me paste it into the window for some reason so the two requested files are attached.

Attached Files



#8 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 18 February 2010 - 01:37 PM

Hi,

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#9 dormdweller

dormdweller
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 22 February 2010 - 07:04 PM

17:01:51:764 2540 TDSS rootkit removing tool 2.2.4 Feb 15 2010 19:38:31
17:01:51:764 2540 ================================================================================
17:01:51:764 2540 SystemInfo:

17:01:51:764 2540 OS Version: 5.1.2600 ServicePack: 3.0
17:01:51:764 2540 Product type: Workstation
17:01:51:764 2540 ComputerName: FUSCO96W
17:01:51:774 2540 UserName: 10163267
17:01:51:774 2540 Windows directory: C:\WINDOWS
17:01:51:774 2540 Processor architecture: Intel x86
17:01:51:774 2540 Number of processors: 1
17:01:51:774 2540 Page size: 0x1000
17:01:51:774 2540 Boot type: Normal boot
17:01:51:774 2540 ================================================================================
17:01:51:804 2540 UnloadDriverW: NtUnloadDriver error 2
17:01:51:804 2540 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
17:01:51:824 2540 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\drivers\klmd.sys) returned status 00000000
17:01:52:064 2540 UtilityInit: KLMD drop and load success
17:01:52:064 2540 KLMD_OpenDevice: Trying to open KLMD Device(KLMD201010)
17:01:52:074 2540 UtilityInit: KLMD open success
17:01:52:074 2540 UtilityInit: Initialize success
17:01:52:074 2540
17:01:52:074 2540 Scanning Services ...
17:01:52:094 2540 CreateRegParser: Registry parser init started
17:01:52:094 2540 DisableWow64Redirection: GetProcAddress(Wow64DisableWow64FsRedirection) error 127
17:01:52:094 2540 CreateRegParser: DisableWow64Redirection error
17:01:52:094 2540 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system
17:01:52:094 2540 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\config\system) returned status C0000043
17:01:52:094 2540 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
17:01:52:094 2540 wfopen_ex: Trying to KLMD file open
17:01:52:094 2540 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\config\system
17:01:52:094 2540 wfopen_ex: File opened ok (Flags 2)
17:01:52:094 2540 CreateRegParser: HIVE_ADAPTER(C:\WINDOWS\system32\config\system) init success: 274B90
17:01:52:094 2540 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software
17:01:52:094 2540 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\config\software) returned status C0000043
17:01:52:094 2540 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
17:01:52:094 2540 wfopen_ex: Trying to KLMD file open
17:01:52:094 2540 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\config\software
17:01:52:094 2540 wfopen_ex: File opened ok (Flags 2)
17:01:52:094 2540 CreateRegParser: HIVE_ADAPTER(C:\WINDOWS\system32\config\software) init success: 274A80
17:01:52:094 2540 EnableWow64Redirection: GetProcAddress(Wow64RevertWow64FsRedirection) error 127
17:01:52:094 2540 CreateRegParser: EnableWow64Redirection error
17:01:52:094 2540 CreateRegParser: RegParser init completed
17:01:52:966 2540 GetAdvancedServicesInfo: Raw services enum returned 393 services
17:01:52:986 2540 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system
17:01:52:986 2540 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software
17:01:52:986 2540
17:01:52:986 2540 Scanning Kernel memory ...
17:01:52:986 2540 KLMD_GetSystemObjectAddressByNameW: Trying to get system object address by name \Driver\Disk
17:01:52:986 2540 DetectCureTDL3: \Driver\Disk PDRIVER_OBJECT: 873390D8
17:01:52:986 2540 DetectCureTDL3: KLMD_GetDeviceObjectList returned 2 DevObjects
17:01:52:986 2540
17:01:52:986 2540 DetectCureTDL3: DEVICE_OBJECT: 87335C68
17:01:52:986 2540 KLMD_GetLowerDeviceObject: Trying to get lower device object for 87335C68
17:01:52:986 2540 KLMD_ReadMem: Trying to ReadMemory 0x87335C68[0x38]
17:01:52:986 2540 DetectCureTDL3: DRIVER_OBJECT: 873390D8
17:01:52:986 2540 KLMD_ReadMem: Trying to ReadMemory 0x873390D8[0xA8]
17:01:52:986 2540 KLMD_ReadMem: Trying to ReadMemory 0xE18CDBE8[0x18]
17:01:52:986 2540 DetectCureTDL3: DRIVER_OBJECT name: \Driver\Disk, Driver Name: Disk
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_CREATE : F7826BB0
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_CREATE_NAMED_PIPE : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_CLOSE : F7826BB0
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_READ : F7820D1F
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_WRITE : F7820D1F
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_QUERY_INFORMATION : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SET_INFORMATION : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_QUERY_EA : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SET_EA : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_FLUSH_BUFFERS : F78212E2
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_QUERY_VOLUME_INFORMATION : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SET_VOLUME_INFORMATION : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_DIRECTORY_CONTROL : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_FILE_SYSTEM_CONTROL : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_DEVICE_CONTROL : F78213BB
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_INTERNAL_DEVICE_CONTROL : F7824F28
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SHUTDOWN : F78212E2
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_LOCK_CONTROL : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_CLEANUP : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_CREATE_MAILSLOT : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_QUERY_SECURITY : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SET_SECURITY : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_POWER : F7822C82
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SYSTEM_CONTROL : F782799E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_DEVICE_CHANGE : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_QUERY_QUOTA : 804FA87E
17:01:52:986 2540 DetectCureTDL3: IRP_MJ_SET_QUOTA : 804FA87E
17:01:52:986 2540 TDL3_FileDetect: Processing driver: Disk
17:01:52:986 2540 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\DRIVERS\disk.sys
17:01:52:986 2540 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\DRIVERS\disk.sys
17:01:53:026 2540 TDL3_FileDetect: Processing driver: Disk
17:01:53:026 2540 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\DRIVERS\disk.sys
17:01:53:026 2540 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\DRIVERS\disk.sys
17:01:53:036 2540 TDL3_FileDetect: C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
17:01:53:036 2540
17:01:53:036 2540 DetectCureTDL3: DEVICE_OBJECT: 87330AB8
17:01:53:036 2540 KLMD_GetLowerDeviceObject: Trying to get lower device object for 87330AB8
17:01:53:036 2540 DetectCureTDL3: DEVICE_OBJECT: 873359E8
17:01:53:036 2540 KLMD_GetLowerDeviceObject: Trying to get lower device object for 873359E8
17:01:53:036 2540 DetectCureTDL3: DEVICE_OBJECT: 87336940
17:01:53:036 2540 KLMD_GetLowerDeviceObject: Trying to get lower device object for 87336940
17:01:53:036 2540 KLMD_ReadMem: Trying to ReadMemory 0x87336940[0x38]
17:01:53:036 2540 DetectCureTDL3: DRIVER_OBJECT: 87357EC0
17:01:53:036 2540 KLMD_ReadMem: Trying to ReadMemory 0x87357EC0[0xA8]
17:01:53:036 2540 KLMD_ReadMem: Trying to ReadMemory 0x87338030[0x38]
17:01:53:036 2540 KLMD_ReadMem: Trying to ReadMemory 0x872FB8F0[0xA8]
17:01:53:036 2540 KLMD_ReadMem: Trying to ReadMemory 0xE101A390[0x1A]
17:01:53:036 2540 DetectCureTDL3: DRIVER_OBJECT name: \Driver\atapi, Driver Name: atapi
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_CREATE : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_CREATE_NAMED_PIPE : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_CLOSE : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_READ : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_WRITE : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_QUERY_INFORMATION : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SET_INFORMATION : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_QUERY_EA : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SET_EA : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_FLUSH_BUFFERS : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_QUERY_VOLUME_INFORMATION : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SET_VOLUME_INFORMATION : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_DIRECTORY_CONTROL : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_FILE_SYSTEM_CONTROL : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_DEVICE_CONTROL : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_INTERNAL_DEVICE_CONTROL : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SHUTDOWN : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_LOCK_CONTROL : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_CLEANUP : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_CREATE_MAILSLOT : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_QUERY_SECURITY : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SET_SECURITY : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_POWER : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SYSTEM_CONTROL : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_DEVICE_CHANGE : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_QUERY_QUOTA : 87296856
17:01:53:036 2540 DetectCureTDL3: IRP_MJ_SET_QUOTA : 87296856
17:01:53:036 2540 TDL3_FileDetect: Processing driver: atapi
17:01:53:036 2540 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\DRIVERS\atapi.sys
17:01:53:036 2540 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\DRIVERS\atapi.sys
17:01:53:046 2540 DetectCureTDL3: All IRP handlers pointed to one addr: 87296856
17:01:53:046 2540 KLMD_ReadMem: Trying to ReadMemory 0x87296856[0x400]
17:01:53:046 2540 TDL3_IrpHookDetect: CheckParameters: 4, FFDF0308, 333, 121, 3, 109
17:01:53:046 2540 Driver "atapi" Irp handler infected by TDSS rootkit ... 17:01:53:046 2540 KLMD_WriteMem: Trying to WriteMemory 0x872968CF[0xD]
17:01:53:046 2540 cured
17:01:53:046 2540 KLMD_ReadMem: Trying to ReadMemory 0x87296701[0x400]
17:01:53:046 2540 TDL3_StartIoHookDetect: CheckParameters: 9, FFDF0308, 1
17:01:53:046 2540 Driver "atapi" StartIo handler infected by TDSS rootkit ... 17:01:53:046 2540 TDL3_StartIoHookCure: Number of patches 1
17:01:53:046 2540 KLMD_WriteMem: Trying to WriteMemory 0x8729680A[0x6]
17:01:53:046 2540 cured
17:01:53:046 2540 TDL3_FileDetect: Processing driver: atapi
17:01:53:046 2540 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\DRIVERS\atapi.sys
17:01:53:046 2540 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\DRIVERS\atapi.sys
17:01:53:066 2540 TDL3_FileDetect: C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: Infected
17:01:53:066 2540 File C:\WINDOWS\system32\DRIVERS\atapi.sys infected by TDSS rootkit ... 17:01:53:066 2540 TDL3_FileCure: Processing driver file: C:\WINDOWS\system32\DRIVERS\atapi.sys
17:01:53:066 2540 ProcessDirEnumEx: FindFirstFile(C:\WINDOWS\system32\DriverStore\FileRepository\*) error 3
17:01:53:096 2540 CABFileCallback: Processing cab-file: C:\WINDOWS\Driver Cache\i386\driver.cab
17:01:53:186 2540 CABFileCallback: Processing cab-file: C:\WINDOWS\Driver Cache\i386\Q323183.cab
17:01:53:196 2540 CABFileCallback: Processing cab-file: C:\WINDOWS\Driver Cache\i386\sp1.cab
17:01:53:436 2540 CABFileCallback: Processing cab-file: C:\WINDOWS\Driver Cache\i386\sp2.cab
17:01:53:496 2540 CABFileCallback: Processing cab-file: C:\WINDOWS\Driver Cache\i386\sp3.cab
17:01:53:526 2540 CabinetCallback: Backup candidate found: atapi.sys:96512, extracting..
17:01:54:087 2540 CabinetCallback: File extracted successfully: C:\DOCUME~1\10163267\LOCALS~1\Temp\bck10.tmp
17:01:54:087 2540 ValidateDriverFile: Stage 1 passed
17:01:54:087 2540 ValidateDriverFile: Stage 2 passed
17:01:54:297 2540 DigitalSignVerifyByHandle: Embedded DS result: 800B0100
17:01:54:988 2540 DigitalSignVerifyByHandle: Cat DS result: 00000000
17:01:54:988 2540 ValidateDriverFile: Stage 3 passed
17:01:54:988 2540 CabinetCallback: File validated successfully, restore information prepared
17:01:54:988 2540 FindDriverFileBackup: Backup copy found in cab-file
17:01:54:988 2540 TDL3_FileCure: Backup copy found, using it..
17:01:54:988 2540 TDL3_FileCure: Dumping cured buffer to file C:\WINDOWS\system32\drivers\tsk11.tmp
17:01:55:319 2540 TDL3_FileCure: New / Old Image paths: (system32\drivers\tsk11.tmp, system32\drivers\atapi.sys)
17:01:55:319 2540 TDL3_FileCure: KLMD jobs schedule success
17:01:55:319 2540 will be cured on next reboot
17:01:55:329 2540 UtilityBootReinit: Reboot required for cure complete..
17:01:55:329 2540 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\drivers\klmdb.sys) returned status 00000000
17:01:55:569 2540 UtilityBootReinit: KLMD drop success
17:01:55:569 2540 KLMD_ApplyPendList: Pending buffer(4E24_22AA, 608) dropped successfully
17:01:55:569 2540 UtilityBootReinit: Cure on reboot scheduled successfully
17:01:55:569 2540
17:01:55:569 2540 Completed
17:01:55:579 2540
17:01:55:579 2540 Results:
17:01:55:579 2540 Memory objects infected / cured / cured on reboot: 2 / 2 / 0
17:01:55:579 2540 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
17:01:55:579 2540 File objects infected / cured / cured on reboot: 1 / 0 / 1
17:01:55:579 2540
17:01:55:579 2540 UnloadDriverW: NtUnloadDriver error 1
17:01:55:579 2540 KLMD_Unload: UnloadDriverW(klmd21) error 1
17:01:55:619 2540 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\drivers\klmd.sys) returned status 00000000
17:01:55:619 2540 UtilityDeinit: KLMD(ARK) unloaded successfully


#10 dormdweller

dormdweller
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 22 February 2010 - 07:06 PM

Hi and thank you for helping me with my computer problems. I also wanted to add that my computer continues to re-direct me when in the internet browser and especially when I click on google links. I don't know if this problem will be solved at the same time you are fixing the current problem, but I wanted to bring this up as well while you are graciously helping me out.

Thank you much!
Dean

#11 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 23 February 2010 - 03:10 PM

Hi,

This system here is still redirecting?

Please post back with a fresh OTL logfile.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#12 dormdweller

dormdweller
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 25 February 2010 - 12:04 AM

Actually, you may have solved the re-directing problem with whatever you had me do last as it hasn't done it tonight when I've been on and usually it would do it for every search and every clicked on link.

#13 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 25 February 2010 - 01:53 PM

That sounds better smile.gif

Please post a fresh OTL logfile.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#14 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:46 AM

Posted 02 March 2010 - 02:50 PM

Due to the lack of feedback, this topic is now closed.
If you need this topic reopened, please PM a staff member and we will reopen it for you (include the address of this thread in your request). This applies to the original topic starter only. Everyone else with similar problems, please start a new topic.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users