Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How to delete a couple .sys files that have corrupted my laptop


  • This topic is locked This topic is locked
7 replies to this topic

#1 kingarthur2

kingarthur2

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:42 PM

Posted 07 June 2010 - 12:57 PM

My computer has recently gone corrupt, to say the least. I have run AVG, Avast and Symantec which found a couple of trojans on there. Also, I have run CrapCleaner to delete the temp internet files etc. Also, I've run Malawarebytes which got rid of some infections. The last thing that I ran was GMER and it found 2 suspicious items in the system32\drivers\iastor.sys and atapi.sys. I then downloaded Combofix. When I go to run it, a bluebar starts across the screen showing that it's loading but it never starts. I've tried this in safemode too and disable my virus protection. No good
I'm more advanced than most of my friends and I'm usually the one fixing their computers because of malaware or a virus but this one has stumped me. Here are a few of the things that I"ve noticed since my computer became infected.
1. Windows has a differnet appearance than before (icons, color, etc)
2. When attempting to access windowsupdate.com it says "can not display".
3. When doing a search, it will redirect me to a random site.
4. Its really slow now.

Can anyone give me some advice? Last case senerio, I can send this back to my company and they will reimage it but I'd like to not spend $200. Thanks in advance!

Edited by Budapest, 07 June 2010 - 08:39 PM.
Moved from AntiVirus, Firewall and Privacy Products and Protection Methods ~BP


BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:42 AM

Posted 07 June 2010 - 08:40 PM

Please post the GMER log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 kingarthur2

kingarthur2
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:42 PM

Posted 07 June 2010 - 10:58 PM

I'm new to this site and not really sure how to attach log file. I tried copying and paste and it was too large. Any particular part that you need? I've simply attached the bottom part of the log file that identified a suspicious modification. Thanks in advance.

C:\WINDOWS\SHELLNEW\CredDB.CEF 888 bytes
File C:\WINDOWS\SigPlus\Docs\CredDB.CEF 296 bytes
File C:\WINDOWS\Temp\CredDB.CEF 296 bytes
File C:\WINDOWS\Installer\$PatchCache$\Managed\0180F2A9F96368E4092779F3EB61975C\19.0.4001\CredDB.CEF 2368 bytes
File C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\CredDB.CEF 296 bytes
File C:\WINDOWS\Microsoft.NET\Framework\v3.5\Microsoft .NET Framework 3.5 SP1\CredDB.CEF 7104 bytes
File C:\WINDOWS\system32\drivers\iaStor.sys suspicious modification
File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

Edited by kingarthur2, 07 June 2010 - 10:59 PM.


#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:42 AM

Posted 07 June 2010 - 10:59 PM

Try this:

http://www.bleepingcomputer.com/virus-remo...sing-tdsskiller
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 kingarthur2

kingarthur2
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:42 PM

Posted 08 June 2010 - 04:02 PM

Thank you. This did remove one of the suspicious sys files which allowed me to now connect to windows update again. However, the tool bar and everything about my windows XP looks different still and the computer is still slow. One step at a time I guess. I did manage to update windows, update symantec and run full scan and update and run a full malawarebytes full scan. When running GMER again, I tried it in safe mode and it would stop 1/2 through the run. I am going to post what it did find. I'm running in regular mode now (couldn't disable RTscan...wouldn't let me) and it seems to be rolling along. I will post those results when it gets done. May have to copy and past 1/2 of it on another post because it seems to be too long. There are some options on the side panel of GMER that can be checked or unchecked if you'd think that would eliminate a scan that doesn't need to be done (system, sections, IAT/EAT, devices....). Here is what I ran earlier today.

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-06-08 14:47:12
Windows 5.1.2600 Service Pack 3
Running: jwzb2r0x.exe; Driver: C:\DOCUME~1\1000\LOCALS~1\Temp\pxryypow.sys


---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 01: copy of MBR
Disk \Device\Harddisk0\DR0 sector 02: copy of MBR
Disk \Device\Harddisk0\DR0 sector 03: copy of MBR
Disk \Device\Harddisk0\DR0 sector 04: copy of MBR
Disk \Device\Harddisk0\DR0 sector 05: copy of MBR
Disk \Device\Harddisk0\DR0 sector 06: copy of MBR
Disk \Device\Harddisk0\DR0 sector 07: copy of MBR
Disk \Device\Harddisk0\DR0 sector 08: copy of MBR
Disk \Device\Harddisk0\DR0 sector 09: copy of MBR
Disk \Device\Harddisk0\DR0 sector 10: copy of MBR
Disk \Device\Harddisk0\DR0 sector 11: copy of MBR
Disk \Device\Harddisk0\DR0 sector 12: copy of MBR
Disk \Device\Harddisk0\DR0 sector 13: copy of MBR
Disk \Device\Harddisk0\DR0 sector 14: copy of MBR
Disk \Device\Harddisk0\DR0 sector 15: copy of MBR
Disk \Device\Harddisk0\DR0 sector 16: copy of MBR
Disk \Device\Harddisk0\DR0 sector 17: copy of MBR
Disk \Device\Harddisk0\DR0 sector 18: copy of MBR
Disk \Device\Harddisk0\DR0 sector 19: copy of MBR
Disk \Device\Harddisk0\DR0 sector 20: copy of MBR
Disk \Device\Harddisk0\DR0 sector 21: copy of MBR
Disk \Device\Harddisk0\DR0 sector 22: copy of MBR
Disk \Device\Harddisk0\DR0 sector 23: copy of MBR
Disk \Device\Harddisk0\DR0 sector 24: copy of MBR
Disk \Device\Harddisk0\DR0 sector 25: copy of MBR
Disk \Device\Harddisk0\DR0 sector 26: copy of MBR
Disk \Device\Harddisk0\DR0 sector 27: copy of MBR
Disk \Device\Harddisk0\DR0 sector 28: copy of MBR
Disk \Device\Harddisk0\DR0 sector 29: copy of MBR
Disk \Device\Harddisk0\DR0 sector 30: copy of MBR
Disk \Device\Harddisk0\DR0 sector 31: copy of MBR
Disk \Device\Harddisk0\DR0 sector 32: copy of MBR
Disk \Device\Harddisk0\DR0 sector 33: copy of MBR
Disk \Device\Harddisk0\DR0 sector 34: copy of MBR
Disk \Device\Harddisk0\DR0 sector 35: copy of MBR
Disk \Device\Harddisk0\DR0 sector 36: copy of MBR
Disk \Device\Harddisk0\DR0 sector 37: copy of MBR
Disk \Device\Harddisk0\DR0 sector 38: copy of MBR
Disk \Device\Harddisk0\DR0 sector 39: copy of MBR
Disk \Device\Harddisk0\DR0 sector 40: copy of MBR
Disk \Device\Harddisk0\DR0 sector 41: copy of MBR
Disk \Device\Harddisk0\DR0 sector 42: copy of MBR
Disk \Device\Harddisk0\DR0 sector 43: copy of MBR
Disk \Device\Harddisk0\DR0 sector 44: copy of MBR
Disk \Device\Harddisk0\DR0 sector 45: copy of MBR
Disk \Device\Harddisk0\DR0 sector 46: copy of MBR
Disk \Device\Harddisk0\DR0 sector 47: copy of MBR
Disk \Device\Harddisk0\DR0 sector 48: copy of MBR
Disk \Device\Harddisk0\DR0 sector 49: copy of MBR
Disk \Device\Harddisk0\DR0 sector 50: copy of MBR
Disk \Device\Harddisk0\DR0 sector 51: copy of MBR
Disk \Device\Harddisk0\DR0 sector 52: copy of MBR
Disk \Device\Harddisk0\DR0 sector 53: copy of MBR
Disk \Device\Harddisk0\DR0 sector 54: copy of MBR
Disk \Device\Harddisk0\DR0 sector 55: copy of MBR
Disk \Device\Harddisk0\DR0 sector 56: copy of MBR
Disk \Device\Harddisk0\DR0 sector 57: copy of MBR
Disk \Device\Harddisk0\DR0 sector 58: copy of MBR
Disk \Device\Harddisk0\DR0 sector 59: copy of MBR
Disk \Device\Harddisk0\DR0 sector 60: copy of MBR
Disk \Device\Harddisk0\DR0 sector 61: copy of MBR
Disk \Device\Harddisk0\DR0 sector 62: rootkit-like behavior; copy of MBR
Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior; copy of MBR

---- System - GMER 1.0.15 ----

SSDT CmgShREG.sys (CMG Shield for Windows Driver/Credant Technologies, Inc.) ZwEnumerateKey [0xBAEB2AA4]
SSDT CmgShREG.sys (CMG Shield for Windows Driver/Credant Technologies, Inc.) ZwEnumerateValueKey [0xBAEB2B60]

---- EOF - GMER 1.0.15 ----

#6 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:42 AM

Posted 08 June 2010 - 04:14 PM

This is going to require a more in depth look. Please follow these instructions:

http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#7 kingarthur2

kingarthur2
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:42 PM

Posted 09 June 2010 - 10:54 AM

When I finished doing http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/ instructions, it said to start a new post? I did. Did I read correctly. Thanks,

#8 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:42 AM

Posted 09 June 2010 - 04:17 PM

Yes you read correctly.

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MR Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users