Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Backing up and infected computer and other harddrives.


  • Please log in to reply
15 replies to this topic

#1 misquito

misquito

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 28 May 2010 - 12:36 PM

About 4 days ago i got hit with Anti Spyware Soft and everything has went down from there. I've been running AVG free and Stopzilla, and they've been finding hijackers and Omega search, and Anti Spyware soft again and now i have a webpage redirect issue. I've read on a forum (can't remember where) that i might have something that won't go away and Reformatting is the best option. I have another hardrive that I've been meaning to switch to anyway so I'm more worried about how safe the files i back up now are As well as the harddrive that I install my games too as well as my external hardive which has a file on it called "SZKGFS" which is a DAT file that refuses to be deleted. Also the websites I've gone to that have needed passwords were all saved so that i didn't have to type it in, should i go change them?

Any help and info would be greatly appreciated.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 28 May 2010 - 02:02 PM

Hello and welcome... Let's try this first. if needed I'll tell you the other things.
Please follow our Removal Guide here Remove Antispyware Soft (Uninstall Guide)
You will move to the Automated Removal Instructions

After you completed that, post your scan log here,let me know how things are.
The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 28 May 2010 - 09:09 PM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4052

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

5/28/2010 8:29:18 PM
mbam-log-2010-05-28 (20-29-18).txt

Scan type: Full scan (C:\|D:\|I:\|)
Objects scanned: 208855
Time elapsed: 1 hour(s), 56 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 28 May 2010 - 09:29 PM

Good ... Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.



Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 30 May 2010 - 03:23 AM

SAS:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/29/2010 at 02:56 AM

Application Version : 4.38.1004

Core Rules Database Version : 5004
Trace Rules Database Version: 2816

Scan type : Complete Scan
Total Scan Time : 03:40:11

Memory items scanned : 227
Memory threats detected : 0
Registry items scanned : 5191
Registry threats detected : 0
File items scanned : 93894
File threats detected : 38

Adware.Flash Tracking Cookie
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\BANNERFARM.ACE.ADVERTISING.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\DS.SERVING-SYS.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\SERVING-SYS.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEMECOUNTER.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\BC.YOUPORN.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\STATIC.YOUPORN.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\ACVS.MEDIAONENETWORK.NET
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\CACHE.SPECIFICMEDIA.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\CONVOAD.TECHNORATIMEDIA.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\IA.MEDIA-IMDB.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.EBAUMSWORLD.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.ENTERTONEMENT.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.FLESHLIGHT.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.IGN.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.MTVNSERVICES.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.PODADDIES.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.RESULTHOST.ORG
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.SCANSCOUT.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA.TATTOMEDIA.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MEDIA1.BREAK.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\MSNBCMEDIA.MSN.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\OBJECTS.TREMORMEDIA.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\RICHMEDIA247.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\VIDEOMEDIA.IGN.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\I.ADULTSWIM.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\WWW.ADULTSWIM.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\INTERCLICK.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\UDN.SPECIFICCLICK.NET
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\CRACKLE.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\ADS1.MSN.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\NAIADSYSTEMS.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\2MDN.NET
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\M1.2MDN.NET
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\S0.2MDN.NET
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\STATIC.2MDN.NET
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\HS.INTERPOLLS.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\SECURE-US.IMRWORLDWIDE.COM
C:\Documents and Settings\Law\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\NZREMBW2\ODDCAST.COM





MBAM:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4155

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 7.0.5730.13

5/30/2010 2:25:53 AM
mbam-log-2010-05-30 (02-25-53).txt

Scan type: Full scan (C:\|D:\|I:\|)
Objects scanned: 208251
Time elapsed: 51 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{A2F22DD9-C228-4676-B012-5EB872435656}\RP620\A0088407.exe (Rogue.AntispywareSoft) -> Quarantined and deleted successfully.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 01 June 2010 - 01:40 PM

Hello, I had to go away for a few days.. This looks good now any thing acting up?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 01 June 2010 - 08:58 PM

Anti spyware soft is gone, but I'm still getting redirects, my usual programs that start at start up aren't there such as AIM but all the anti virus and ad wares do, and my themes aren't starting automatically either and I have to start them manually in Computer Management. And more frequently my computer started getting stuck on "acquiring network address" and now won't connect to the internet at all other than in safe mode with networking.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 01 June 2010 - 09:10 PM

Let's check with an onlinr scan and a rootkit scan.

ESET
Please perform a scan with Eset Online Antiivirus Scanner.
(Requires Internet Explorer to work. If given the option, choose "Quarantine" instead of delete.)
Vista users need to run Internet Explorer as Administrator. Right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run as Administrator from the context menu.
  • Click the green ESET Online Scanner button.
  • Read the End User License Agreement and check the box: YES, I accept the Terms of Use.
  • Click on the Start button next to it.
  • You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.
  • A new window will appear asking "Do you want to install this software?"".
  • Answer Yes to download and install the ActiveX controls that allows the scan to run.
  • Click Start.
  • Check Remove found threats and Scan potentially unwanted applications.
  • Click Scan to start. (please be patient as the scan could take some time to complete)
  • If offered the option to get information or buy software. Just close the window.
  • When the scan has finished, a log.txt file will be created and automatically saved in the C:\Program Files\ESET\ESET Online Scanner\log.txt
    folder.
  • Click Posted Image > Run..., then copy and paste this command into the open box: C:\Program Files\EsetOnlineScanner\log.txt
  • The scan results will open in Notepad. Copy and paste the contents of log.txt in your next reply.
Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.


Gmer
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 01 June 2010 - 10:17 PM

can't do the online scan because its stuck on acquiring network address.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 01 June 2010 - 10:20 PM

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Try ESET again, if still no luck let me know and move to GMER.

Edited by boopme, 01 June 2010 - 10:21 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 04 June 2010 - 02:30 AM

GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2010-06-04 02:27:20
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\Law\LOCALS~1\Temp\uwtdipob.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xB6FAE620]

---- Kernel code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB983F360, 0x37388D, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\svchost.exe[1076] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0099000A
.text C:\WINDOWS\system32\svchost.exe[1076] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 009A000A
.text C:\WINDOWS\system32\svchost.exe[1076] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 0098000C
.text C:\WINDOWS\system32\svchost.exe[1076] USER32.dll!GetCursorPos 7E42974E 5 Bytes JMP 0087000A
.text C:\WINDOWS\system32\svchost.exe[1076] ole32.dll!CoCreateInstance 7750057E 5 Bytes JMP 00B2000A
.text C:\WINDOWS\system32\wuauclt.exe[1184] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00C1000A
.text C:\WINDOWS\system32\wuauclt.exe[1184] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00C2000A
.text C:\WINDOWS\system32\wuauclt.exe[1184] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00C0000C
.text C:\WINDOWS\Explorer.EXE[1368] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00B7000A
.text C:\WINDOWS\Explorer.EXE[1368] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00C5000A
.text C:\WINDOWS\Explorer.EXE[1368] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00B6000C
.text C:\WINDOWS\system32\wuauclt.exe[3760] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0099000A
.text C:\WINDOWS\system32\wuauclt.exe[3760] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 009A000A
.text C:\WINDOWS\system32\wuauclt.exe[3760] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 0098000C

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs szkgfs.sys (STOPzilla Kernel Guard File System, x86-32 /iS3, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \FileSystem\Fastfat \Fat szkgfs.sys (STOPzilla Kernel Guard File System, x86-32 /iS3, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device -> \Driver\atapi \Device\Harddisk0\DR0 8ABD9D01

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 04 June 2010 - 09:30 AM

Hello, there are some unknown and modified/suspicious .sys filres here. We need a deeper look. Please follow these instructions to post needed logs.

Preparation Guide . proceed to steps 6 through 9.
If you cannot perform a step move on to the next. Post all required logs and the complete log.
You can use the GMER log above when requested.
Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 05 June 2010 - 10:11 PM

dds scanned but didn't display results.

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:13 AM

Posted 05 June 2010 - 10:15 PM

If you cannot get DDS to work, please try this instead.

Please download RSIT by random/random and save it to your Desktop.
Note: You will need to run this tool while connected to the Internet so it can download HijackThis if it is not located on your system. If you get a warning from your firewall or other security programs regarding RSIT attempting to contact the Internet, please allow the connection.
  • Close all applications and windows so that you have nothing open and are at your Desktop.
  • Double-click on RSIT.exe to start the program.
  • If using Windows Vista, be sure to Run As Administrator.
  • Click Continue after reading the disclaimer screen.
  • Leave the drop down box set to default: "List/folders created or modified in the last 1 month (30 days).
  • When the scan is complete, a text file named log.txt will automatically open in Notepad.
  • Save the log file to your desktop and copy/paste the contents into a new topic in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here.
Important: Be sure to mention that you tried to follow the Prep Guide but were unable to get DDS to run.
If RSIT did not work, then reply back here.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 misquito

misquito
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 06 June 2010 - 12:01 AM

with he help of a reboot and Stopzilla pointing me in the right temp file i found DDS.txt but not the .attach.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Law at 23:20:18.89 on Sat 06/05/2010
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_17
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3070.2182 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\Program Files\Common Files\iS3\Anti-Spyware\SZServer.exe
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmctxth.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\PROGRA~1\AVG\AVG9\avgtray.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\TomTom HOME 2\TomTomHOMERunner.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
svchost.exe
C:\Program Files\ABBYY Screenshot Reader\NetworkLicenseServer.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\TomTom HOME 2\TomTomHOMEService.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmsrvc.exe
C:\Program Files\AVG\AVG9\avgemc.exe
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Law\Desktop\dds.scr




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users