Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google redirect and spontaneous IE window opening


  • This topic is locked This topic is locked
32 replies to this topic

#1 oso101

oso101

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 AM

Posted 11 December 2010 - 12:47 PM

Hello,

I'm running Windows 7. The first sign of a problem I noticed was when Internet Explorer windows began opening spontaneously and loading ad websites. I don't use IE - this occured while I was using Chrome. A window like this pops up every several minutes, usually with an ad on a site called "Epic Arcade" or a google search results page like this: http://www.google.com/search?q=111211url.cptgt.com

I began Googling to see what this problem might be, and noticed that when I clicked on links to malware support forums, my browser was redirected, usually to a site called "7search." Here's one URL that I have been redirected to when clicking on a google link: http://7search.com/scripts/validation/v1/validate.aspx?x=P3ZWU9fFYokfnnjaYxwfhg%3d%3d_nhOtydLqdv9m6IipKcv8Csb3oog/rIHWxLXRQpm5OIxY1HZ0OXtkN7jEn0g2y6mHUizHc1ETuRC8VT5T7SWYTH7WQGSsZNkCqYQ7/1ACCJyEvepuK8cXQge6EJTP0dfaKi2o%2b7n7e7cpA3ZOUknmFBZR8a07pMy%2b4LSmVv6WAUEPMXL569LJ1gS6JS9DKiFFap3QsqaeXqcWCIDXVQaLuIGdh6wSh1hiAWlUa%2bTaTK3zNpFdgdARBBCOdxcaQhTsCnxiwsSWwRxPkmX01CCu3t12JQBQdfSGb2bQcWJHuvb3XdnDhbmQrScmWA/VqNhO

I ran a Windows Defender system scan and it turned up something called Win32/Alureon.CT, which I then removed.

However, I was still seeing the same IE popups and experiencing the same Google redirects. I got paranoid and disconnected from the internet, and then ran a full AntiVir system scan, which turned up a number of threats. Here's the scan report:




Avira AntiVir Personal
Report file date: Friday, December 10, 2010 23:19

Scanning for 3138734 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows 7
Windows version : (plain) [6.1.7600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : JESSE-PC

Version information:
BUILD.DAT : 10.0.0.607 31826 Bytes 11/30/2010 19:17:00
AVSCAN.EXE : 10.0.3.5 435368 Bytes 12/8/2010 13:51:08
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/1/2010 17:57:06
LUKE.DLL : 10.0.3.2 104296 Bytes 12/8/2010 13:51:10
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 04:40:50
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 22:50:31
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 22:50:31
VBASE002.VDF : 7.10.3.1 3143680 Bytes 1/20/2010 18:05:03
VBASE003.VDF : 7.10.3.75 996864 Bytes 1/26/2010 23:03:24
VBASE004.VDF : 7.10.4.203 1579008 Bytes 3/5/2010 02:23:48
VBASE005.VDF : 7.10.6.82 2494464 Bytes 4/15/2010 22:00:20
VBASE006.VDF : 7.10.7.218 2294784 Bytes 6/2/2010 01:44:48
VBASE007.VDF : 7.10.9.165 4840960 Bytes 7/23/2010 16:51:44
VBASE008.VDF : 7.10.11.133 3454464 Bytes 9/13/2010 13:52:04
VBASE009.VDF : 7.10.13.80 2265600 Bytes 11/2/2010 13:52:05
VBASE010.VDF : 7.10.13.81 2048 Bytes 11/2/2010 13:52:05
VBASE011.VDF : 7.10.13.82 2048 Bytes 11/2/2010 13:52:05
VBASE012.VDF : 7.10.13.83 2048 Bytes 11/2/2010 13:52:05
VBASE013.VDF : 7.10.13.116 147968 Bytes 11/4/2010 13:52:05
VBASE014.VDF : 7.10.13.147 146944 Bytes 11/7/2010 13:52:05
VBASE015.VDF : 7.10.13.180 123904 Bytes 11/9/2010 13:40:38
VBASE016.VDF : 7.10.13.211 122368 Bytes 11/11/2010 16:26:12
VBASE017.VDF : 7.10.13.243 147456 Bytes 11/15/2010 18:48:00
VBASE018.VDF : 7.10.14.15 142848 Bytes 11/17/2010 18:48:01
VBASE019.VDF : 7.10.14.41 134144 Bytes 11/19/2010 14:27:14
VBASE020.VDF : 7.10.14.63 128000 Bytes 11/22/2010 14:50:10
VBASE021.VDF : 7.10.14.87 143872 Bytes 11/24/2010 13:56:21
VBASE022.VDF : 7.10.14.116 140800 Bytes 11/26/2010 05:46:02
VBASE023.VDF : 7.10.14.147 150528 Bytes 11/30/2010 12:36:07
VBASE024.VDF : 7.10.14.175 126464 Bytes 12/3/2010 12:36:09
VBASE025.VDF : 7.10.14.203 120320 Bytes 12/7/2010 13:50:10
VBASE026.VDF : 7.10.14.230 137216 Bytes 12/9/2010 01:24:15
VBASE027.VDF : 7.10.14.231 2048 Bytes 12/9/2010 01:24:15
VBASE028.VDF : 7.10.14.232 2048 Bytes 12/9/2010 01:24:16
VBASE029.VDF : 7.10.14.233 2048 Bytes 12/9/2010 01:24:16
VBASE030.VDF : 7.10.14.234 2048 Bytes 12/9/2010 01:24:16
VBASE031.VDF : 7.10.14.255 78848 Bytes 12/10/2010 01:24:16
Engineversion : 8.2.4.122
AEVDF.DLL : 8.1.2.1 106868 Bytes 7/31/2010 18:24:56
AESCRIPT.DLL : 8.1.3.48 1286524 Bytes 12/3/2010 12:37:04
AESCN.DLL : 8.1.7.2 127349 Bytes 11/23/2010 14:50:36
AESBX.DLL : 8.1.3.2 254324 Bytes 11/23/2010 14:50:40
AERDL.DLL : 8.1.9.2 635252 Bytes 11/8/2010 13:52:21
AEPACK.DLL : 8.2.4.1 512375 Bytes 12/3/2010 12:36:56
AEOFFICE.DLL : 8.1.1.10 201084 Bytes 11/23/2010 14:50:35
AEHEUR.DLL : 8.1.2.54 3113335 Bytes 12/8/2010 13:50:54
AEHELP.DLL : 8.1.16.0 246136 Bytes 12/3/2010 12:36:21
AEGEN.DLL : 8.1.5.0 397685 Bytes 12/3/2010 12:36:19
AEEMU.DLL : 8.1.3.0 393589 Bytes 11/23/2010 14:50:16
AECORE.DLL : 8.1.19.0 196984 Bytes 12/3/2010 12:36:14
AEBB.DLL : 8.1.1.0 53618 Bytes 4/23/2010 21:49:54
AVWINLL.DLL : 10.0.0.0 19304 Bytes 8/2/2010 20:09:58
AVPREF.DLL : 10.0.0.0 44904 Bytes 8/2/2010 20:09:56
AVREP.DLL : 10.0.0.8 62209 Bytes 6/17/2010 19:27:14
AVREG.DLL : 10.0.3.2 53096 Bytes 8/2/2010 20:09:56
AVSCPLR.DLL : 10.0.3.2 84328 Bytes 12/8/2010 13:51:09
AVARKT.DLL : 10.0.22.6 231784 Bytes 12/8/2010 13:50:57
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 8/2/2010 20:09:56
SQLITE3.DLL : 3.6.19.0 355688 Bytes 6/17/2010 19:27:24
AVSMTP.DLL : 10.0.0.17 63848 Bytes 8/2/2010 20:09:58
NETNT.DLL : 10.0.0.0 11624 Bytes 6/17/2010 19:27:22
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 1/28/2010 18:10:22
RCTEXT.DLL : 10.0.58.0 97128 Bytes 8/2/2010 20:10:10

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Friday, December 10, 2010 23:19

Starting search for hidden objects.
c:\progra~1\java\jre6\bin\ssvagent.exe
c:\progra~1\java\jre6\bin\ssvagent.exe
[NOTE] The process is not visible.
c:\progra~1\java\jre6\bin\ssvagent.exe
c:\progra~1\java\jre6\bin\ssvagent.exe
c:\progra~1\java\jre6\bin\ssvagent.exe
c:\progra~1\java\jre6\bin\ssvagent.exe
c:\program files\java\jre6\bin\ssvagent.exe
c:\program files\java\jre6\bin\ssvagent.exe
[NOTE] The process is not visible.
c:\program files\microsoft silverlight\4.0.50917.0\silverlight.configuration.exe
c:\program files\microsoft silverlight\4.0.50917.0\silverlight.configuration.exe
[NOTE] The process is not visible.
c:\windows\system32\wuapp.exe
c:\windows\system32\wuapp.exe
[NOTE] The process is not visible.

The scan of running processes will be started
Scan process 'SearchProtocolHost.exe' - '43' Module(s) have been scanned
Scan process 'SearchFilterHost.exe' - '27' Module(s) have been scanned
Scan process 'rundll32.exe' - '38' Module(s) have been scanned
Scan process 'googletalkplugin.exe' - '61' Module(s) have been scanned
Scan process 'chrome.exe' - '49' Module(s) have been scanned
Scan process 'chrome.exe' - '73' Module(s) have been scanned
Scan process 'chrome.exe' - '120' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'vssvc.exe' - '47' Module(s) have been scanned
Scan process 'avscan.exe' - '75' Module(s) have been scanned
Scan process 'avscan.exe' - '28' Module(s) have been scanned
Scan process 'avcenter.exe' - '95' Module(s) have been scanned
Scan process 'msiexec.exe' - '68' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'chrome.exe' - '45' Module(s) have been scanned
Scan process 'chrome.exe' - '96' Module(s) have been scanned
Scan process 'iexplore.exe' - '138' Module(s) have been scanned
Scan process 'POWERPNT.EXE' - '113' Module(s) have been scanned
Scan process 'svchost.exe' - '62' Module(s) have been scanned
Scan process 'MSASCui.exe' - '49' Module(s) have been scanned
Scan process 'svchost.exe' - '60' Module(s) have been scanned
Scan process 'FlashUtil10h_ActiveX.exe' - '36' Module(s) have been scanned
Scan process 'iexplore.exe' - '133' Module(s) have been scanned
Scan process 'conhost.exe' - '21' Module(s) have been scanned
Scan process 'iexplore.exe' - '100' Module(s) have been scanned
Scan process 'Apntex.exe' - '24' Module(s) have been scanned
Scan process 'HidFind.exe' - '25' Module(s) have been scanned
Scan process 'BtStackServer.exe' - '71' Module(s) have been scanned
Scan process 'ApMsgFwd.exe' - '18' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '120' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'svchost.exe' - '33' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '66' Module(s) have been scanned
Scan process 'iPodService.exe' - '33' Module(s) have been scanned
Scan process 'RSIGuard.exe' - '53' Module(s) have been scanned
Scan process 'BTTray.exe' - '58' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '27' Module(s) have been scanned
Scan process 'rundll32.exe' - '32' Module(s) have been scanned
Scan process 'rundll32.exe' - '32' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '55' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '76' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '29' Module(s) have been scanned
Scan process 'schedhlp.exe' - '25' Module(s) have been scanned
Scan process 'TimounterMonitor.exe' - '35' Module(s) have been scanned
Scan process 'BlackArmorBackupMonitor.exe' - '43' Module(s) have been scanned
Scan process 'rundll32.exe' - '30' Module(s) have been scanned
Scan process 'GoogleDesktop.exe' - '90' Module(s) have been scanned
Scan process 'sprtcmd.exe' - '119' Module(s) have been scanned
Scan process 'WLTRAY.EXE' - '64' Module(s) have been scanned
Scan process 'avgnt.exe' - '65' Module(s) have been scanned
Scan process 'OEM02Mon.exe' - '32' Module(s) have been scanned
Scan process 'sttray.exe' - '36' Module(s) have been scanned
Scan process 'Apoint.exe' - '40' Module(s) have been scanned
Scan process 'Explorer.EXE' - '209' Module(s) have been scanned
Scan process 'Dwm.exe' - '32' Module(s) have been scanned
Scan process 'taskhost.exe' - '59' Module(s) have been scanned
Scan process 'xaudio.exe' - '17' Module(s) have been scanned
Scan process 'bcmwltry.exe' - '69' Module(s) have been scanned
Scan process 'WLTRYSVC.EXE' - '17' Module(s) have been scanned
Scan process 'ViewpointService.exe' - '28' Module(s) have been scanned
Scan process 'svchost.exe' - '64' Module(s) have been scanned
Scan process 'STacSV.exe' - '36' Module(s) have been scanned
Scan process 'sprtsvc.exe' - '101' Module(s) have been scanned
Scan process 'sprtsvc.exe' - '81' Module(s) have been scanned
Scan process 'conhost.exe' - '14' Module(s) have been scanned
Scan process 'avshadow.exe' - '31' Module(s) have been scanned
Scan process 'schedul2.exe' - '27' Module(s) have been scanned
Scan process 'svchost.exe' - '78' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '40' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '48' Module(s) have been scanned
Scan process 'avguard.exe' - '70' Module(s) have been scanned
Scan process 'aestsrv.exe' - '8' Module(s) have been scanned
Scan process 'svchost.exe' - '61' Module(s) have been scanned
Scan process 'sched.exe' - '50' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '34' Module(s) have been scanned
Scan process 'spoolsv.exe' - '116' Module(s) have been scanned
Scan process 'winlogon.exe' - '31' Module(s) have been scanned
Scan process 'svchost.exe' - '75' Module(s) have been scanned
Scan process 'DockLogin.exe' - '22' Module(s) have been scanned
Scan process 'svchost.exe' - '82' Module(s) have been scanned
Scan process 'svchost.exe' - '166' Module(s) have been scanned
Scan process 'svchost.exe' - '117' Module(s) have been scanned
Scan process 'svchost.exe' - '98' Module(s) have been scanned
Scan process 'svchost.exe' - '42' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '20' Module(s) have been scanned
Scan process 'svchost.exe' - '52' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Scan process 'lsass.exe' - '67' Module(s) have been scanned
Scan process 'services.exe' - '33' Module(s) have been scanned
Scan process 'csrss.exe' - '16' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '16' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '1698' files ).


Starting the file scan:

Begin scan in 'C:\' <OS>
C:\Users\Jesse\AppData\Local\Temp\jar_cache3377026421965529886.tmp
[0] Archive type: ZIP
[DETECTION] Is the TR/Dldr.Java.Agent.AH Trojan
--> AppletPanel.class
[DETECTION] Is the TR/Dldr.Java.Agent.AH Trojan
--> Main.class
[DETECTION] Is the TR/Dldr.Java.Agent.AH.1 Trojan
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\488e63d0-2f211c8b
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3869.A exploit
--> vmain.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3869.A exploit
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4c5157e3-560cdb58
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GM exploit
--> vmain.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GM exploit
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\7ee0a02a-41db1dc8
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/ClassLoader.AV Java virus
--> AppleT.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoader.AV Java virus
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\78ae856e-3bbc314c
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.N Java virus
--> AppleT.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.N Java virus
Begin scan in 'D:\' <RECOVERY>

Beginning disinfection:
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\78ae856e-3bbc314c
[DETECTION] Contains recognition pattern of the JAVA/Agent.N Java virus
[NOTE] The file was moved to the quarantine directory under the name '49d22e28.qua'.
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\7ee0a02a-41db1dc8
[DETECTION] Contains recognition pattern of the JAVA/ClassLoader.AV Java virus
[NOTE] The file was moved to the quarantine directory under the name '514901bc.qua'.
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4c5157e3-560cdb58
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GM exploit
[NOTE] The file was moved to the quarantine directory under the name '03465b4a.qua'.
C:\Users\Jesse\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\488e63d0-2f211c8b
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3869.A exploit
[NOTE] The file was moved to the quarantine directory under the name '657214a5.qua'.
C:\Users\Jesse\AppData\Local\Temp\jar_cache3377026421965529886.tmp
[DETECTION] Is the TR/Dldr.Java.Agent.AH.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '20b839b4.qua'.


End of the scan: Saturday, December 11, 2010 09:27
Used time: 2:10:51 Hour(s)

The scan has been done completely.

35220 Scanned directories
457912 Files were scanned
6 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
5 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
457906 Files not concerned
2959 Archives were scanned
0 Warnings
5 Notes
502356 Objects were scanned with rootkit scan
8 Hidden objects were found


The next morning, still feeling paranoid and still disconnected from the internet, I ran another full AntiVir scan which came up clean.

I then reconnected to the internet, and immediately started getting the same Google redirects and IE popups.

So, what should I do and how screwed am I? Did I mention that I'm a grad student and I'm smack in the middle of final exams? Great timing...

BC AdBot (Login to Remove)

 


#2 oxtar

oxtar

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 11 December 2010 - 04:49 PM

I'm having the same exact problem and as I refresh, I see more and more guests viewing this page (usually around 30 of them) so this seems like a new problem. Hope this post will get moderators in here sooner.

#3 catmeister

catmeister

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 11 December 2010 - 05:08 PM

I am having the same problem. Please help!!!!!

#4 oxtar

oxtar

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 11 December 2010 - 05:10 PM

If you are lurking this page because you have the same problem, you should register and post so we can fix this.

#5 Zash208

Zash208

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 11 December 2010 - 06:34 PM

Yup, it's kinda' pissing me off now. I've noticed that defragmenting my disk has slowed the flow a bit, and soon I'm going to use the Malicious Software Removal Tool and see how that goes... Rage!

#6 Mikelhg

Mikelhg

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:10:38 AM

Posted 11 December 2010 - 08:44 PM

I have the same problem!! It started a couple of days ago... I'm paranoid now because I have run different antivirus programs on the computer, including malware removal from Microsoft and they did not find anything wrong, yet the same ads keep poping up!

Please help, if you find a solution, as I have not been successful in solving the issue. Meanwhile, I'll keep researching. Thanks.

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,231 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:38 PM

Posted 11 December 2010 - 09:27 PM

Hello all except oso101..
They have another topic working,need to run these. Then start a new topic with the resulting logs and an update on how it is running now.
PM me that you have done this and I will look.

Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.



Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 oxtar

oxtar

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 11 December 2010 - 11:37 PM

Hi, thanks for the help. This is my TDSS report:


2010/12/11 23:22:43.0468 TDSS rootkit removing tool 2.4.11.0 Dec 8 2010 14:46:40
2010/12/11 23:22:43.0468 ================================================================================
2010/12/11 23:22:43.0468 SystemInfo:
2010/12/11 23:22:43.0468
2010/12/11 23:22:43.0468 OS Version: 5.1.2600 ServicePack: 3.0
2010/12/11 23:22:43.0468 Product type: Workstation
2010/12/11 23:22:43.0468 ComputerName: OZLAPTOP
2010/12/11 23:22:43.0468 UserName: Oz
2010/12/11 23:22:43.0468 Windows directory: C:\WINDOWS
2010/12/11 23:22:43.0468 System windows directory: C:\WINDOWS
2010/12/11 23:22:43.0468 Processor architecture: Intel x86
2010/12/11 23:22:43.0468 Number of processors: 2
2010/12/11 23:22:43.0468 Page size: 0x1000
2010/12/11 23:22:43.0468 Boot type: Normal boot
2010/12/11 23:22:43.0468 ================================================================================
2010/12/11 23:22:43.0671 Initialize success
2010/12/11 23:22:44.0937 ================================================================================
2010/12/11 23:22:44.0937 Scan started
2010/12/11 23:22:44.0937 Mode: Manual;
2010/12/11 23:22:44.0937 ================================================================================
2010/12/11 23:22:45.0828 abp480n5 (6abb91494fe6c59089b9336452ab2ea3) C:\WINDOWS\system32\DRIVERS\ABP480N5.SYS
2010/12/11 23:22:45.0890 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2010/12/11 23:22:45.0921 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
2010/12/11 23:22:45.0953 adpu160m (9a11864873da202c996558b2106b0bbc) C:\WINDOWS\system32\DRIVERS\adpu160m.sys
2010/12/11 23:22:45.0984 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2010/12/11 23:22:46.0046 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2010/12/11 23:22:46.0062 agp440 (08fd04aa961bdc77fb983f328334e3d7) C:\WINDOWS\system32\DRIVERS\agp440.sys
2010/12/11 23:22:46.0109 agpCPQ (03a7e0922acfe1b07d5db2eeb0773063) C:\WINDOWS\system32\DRIVERS\agpCPQ.sys
2010/12/11 23:22:46.0140 Aha154x (c23ea9b5f46c7f7910db3eab648ff013) C:\WINDOWS\system32\DRIVERS\aha154x.sys
2010/12/11 23:22:46.0156 aic78u2 (19dd0fb48b0c18892f70e2e7d61a1529) C:\WINDOWS\system32\DRIVERS\aic78u2.sys
2010/12/11 23:22:46.0187 aic78xx (b7fe594a7468aa0132deb03fb8e34326) C:\WINDOWS\system32\DRIVERS\aic78xx.sys
2010/12/11 23:22:46.0218 AliIde (1140ab9938809700b46bb88e46d72a96) C:\WINDOWS\system32\DRIVERS\aliide.sys
2010/12/11 23:22:46.0250 alim1541 (cb08aed0de2dd889a8a820cd8082d83c) C:\WINDOWS\system32\DRIVERS\alim1541.sys
2010/12/11 23:22:46.0281 amdagp (95b4fb835e28aa1336ceeb07fd5b9398) C:\WINDOWS\system32\DRIVERS\amdagp.sys
2010/12/11 23:22:46.0296 amsint (79f5add8d24bd6893f2903a3e2f3fad6) C:\WINDOWS\system32\DRIVERS\amsint.sys
2010/12/11 23:22:46.0328 APPDRV (ec94e05b76d033b74394e7b2175103cf) C:\WINDOWS\SYSTEM32\DRIVERS\APPDRV.SYS
2010/12/11 23:22:46.0359 asc (62d318e9a0c8fc9b780008e724283707) C:\WINDOWS\system32\DRIVERS\asc.sys
2010/12/11 23:22:46.0375 asc3350p (69eb0cc7714b32896ccbfd5edcbea447) C:\WINDOWS\system32\DRIVERS\asc3350p.sys
2010/12/11 23:22:46.0390 asc3550 (5d8de112aa0254b907861e9e9c31d597) C:\WINDOWS\system32\DRIVERS\asc3550.sys
2010/12/11 23:22:46.0453 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2010/12/11 23:22:46.0484 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2010/12/11 23:22:46.0593 ati2mtag (e78b73eb84c257d0d940e041742d2699) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
2010/12/11 23:22:46.0625 atiide (1842b56b3d3f195c36f62708d266b95e) C:\WINDOWS\system32\DRIVERS\atiide.sys
2010/12/11 23:22:46.0671 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2010/12/11 23:22:46.0703 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2010/12/11 23:22:46.0734 BCM43XX (b89bcf0a25aeb3b47030ac83287f894a) C:\WINDOWS\system32\DRIVERS\bcmwl5.sys
2010/12/11 23:22:46.0765 bcm4sbxp (cd4646067cc7dcba1907fa0acf7e3966) C:\WINDOWS\system32\DRIVERS\bcm4sbxp.sys
2010/12/11 23:22:46.0796 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2010/12/11 23:22:46.0828 cbidf (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\DRIVERS\cbidf2k.sys
2010/12/11 23:22:46.0843 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2010/12/11 23:22:46.0875 cd20xrnt (f3ec03299634490e97bbce94cd2954c7) C:\WINDOWS\system32\DRIVERS\cd20xrnt.sys
2010/12/11 23:22:46.0890 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2010/12/11 23:22:46.0906 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2010/12/11 23:22:46.0953 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2010/12/11 23:22:46.0984 cfwids (7e6f7da1c4de5680820f964562548949) C:\WINDOWS\system32\drivers\cfwids.sys
2010/12/11 23:22:47.0031 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
2010/12/11 23:22:47.0062 CmdIde (e5dcb56c533014ecbc556a8357c929d5) C:\WINDOWS\system32\DRIVERS\cmdide.sys
2010/12/11 23:22:47.0093 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
2010/12/11 23:22:47.0125 Cpqarray (3ee529119eed34cd212a215e8c40d4b6) C:\WINDOWS\system32\DRIVERS\cpqarray.sys
2010/12/11 23:22:47.0171 dac2w2k (e550e7418984b65a78299d248f0a7f36) C:\WINDOWS\system32\DRIVERS\dac2w2k.sys
2010/12/11 23:22:47.0187 dac960nt (683789caa3864eb46125ae86ff677d34) C:\WINDOWS\system32\DRIVERS\dac960nt.sys
2010/12/11 23:22:47.0218 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2010/12/11 23:22:47.0281 DLABMFSM (0659e6e0a95564f958d9df7313f7701e) C:\WINDOWS\system32\DLA\DLABMFSM.SYS
2010/12/11 23:22:47.0296 DLABOIOM (8691c78908f0bd66170669db268369f2) C:\WINDOWS\system32\DLA\DLABOIOM.SYS
2010/12/11 23:22:47.0312 DLACDBHM (76167b5eb2dffc729edc36386876b40b) C:\WINDOWS\system32\Drivers\DLACDBHM.SYS
2010/12/11 23:22:47.0343 DLADResM (5615744a1056933b90e6ac54feb86f35) C:\WINDOWS\system32\DLA\DLADResM.SYS
2010/12/11 23:22:47.0359 DLAIFS_M (1aeca2afa5005ce4a550cf8eb55a8c88) C:\WINDOWS\system32\DLA\DLAIFS_M.SYS
2010/12/11 23:22:47.0375 DLAOPIOM (840e7f6abb885c72b9ffddb022ef5b6d) C:\WINDOWS\system32\DLA\DLAOPIOM.SYS
2010/12/11 23:22:47.0390 DLAPoolM (0294d18731ac05da80132ce88f8a876b) C:\WINDOWS\system32\DLA\DLAPoolM.SYS
2010/12/11 23:22:47.0421 DLARTL_M (91886fed52a3f9966207bce46cfd794f) C:\WINDOWS\system32\Drivers\DLARTL_M.SYS
2010/12/11 23:22:47.0437 DLAUDFAM (cca4e121d599d7d1706a30f603731e59) C:\WINDOWS\system32\DLA\DLAUDFAM.SYS
2010/12/11 23:22:47.0453 DLAUDF_M (7dab85c33135df24419951da4e7d38e5) C:\WINDOWS\system32\DLA\DLAUDF_M.SYS
2010/12/11 23:22:47.0531 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2010/12/11 23:22:47.0546 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2010/12/11 23:22:47.0593 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2010/12/11 23:22:47.0640 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2010/12/11 23:22:47.0671 dpti2o (40f3b93b4e5b0126f2f5c0a7a5e22660) C:\WINDOWS\system32\DRIVERS\dpti2o.sys
2010/12/11 23:22:47.0687 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2010/12/11 23:22:47.0718 DRVMCDB (c00440385cf9f3d142917c63f989e244) C:\WINDOWS\system32\Drivers\DRVMCDB.SYS
2010/12/11 23:22:47.0734 DRVNDDM (6e6ab29d3c06e64ce81feacda85394b5) C:\WINDOWS\system32\Drivers\DRVNDDM.SYS
2010/12/11 23:22:47.0875 DSproct (413f2d5f9d802688242c23b38f767ecb) C:\Program Files\DellSupport\GTAction\triggers\DSproct.sys
2010/12/11 23:22:47.0921 dsunidrv (dfeabb7cfffadea4a912ab95bdc3177a) C:\WINDOWS\system32\DRIVERS\dsunidrv.sys
2010/12/11 23:22:47.0953 E100B (3fca03cbca11269f973b70fa483c88ef) C:\WINDOWS\system32\DRIVERS\e100b325.sys
2010/12/11 23:22:48.0000 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2010/12/11 23:22:48.0031 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2010/12/11 23:22:48.0078 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2010/12/11 23:22:48.0093 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2010/12/11 23:22:48.0140 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2010/12/11 23:22:48.0156 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2010/12/11 23:22:48.0203 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2010/12/11 23:22:48.0234 GEARAspiWDM (ab8a6a87d9d7255c3884d5b9541a6e80) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
2010/12/11 23:22:48.0265 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2010/12/11 23:22:48.0312 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
2010/12/11 23:22:48.0343 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2010/12/11 23:22:48.0406 hpn (b028377dea0546a5fcfba928a8aefae0) C:\WINDOWS\system32\DRIVERS\hpn.sys
2010/12/11 23:22:48.0453 HSFHWAZL (b1526810210980bed9d22315946c919d) C:\WINDOWS\system32\DRIVERS\HSFHWAZL.sys
2010/12/11 23:22:48.0500 HSF_DPV (ddbd528e60f5961c142a490dc4ea7780) C:\WINDOWS\system32\DRIVERS\HSF_DPV.sys
2010/12/11 23:22:48.0703 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2010/12/11 23:22:48.0781 i2omgmt (9368670bd426ebea5e8b18a62416ec28) C:\WINDOWS\system32\drivers\i2omgmt.sys
2010/12/11 23:22:48.0796 i2omp (f10863bf1ccc290babd1a09188ae49e0) C:\WINDOWS\system32\DRIVERS\i2omp.sys
2010/12/11 23:22:48.0828 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/12/11 23:22:48.0859 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2010/12/11 23:22:48.0890 ini910u (4a40e045faee58631fd8d91afc620719) C:\WINDOWS\system32\DRIVERS\ini910u.sys
2010/12/11 23:22:48.0921 IntelIde (b5466a9250342a7aa0cd1fba13420678) C:\WINDOWS\system32\DRIVERS\intelide.sys
2010/12/11 23:22:48.0953 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2010/12/11 23:22:48.0968 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2010/12/11 23:22:49.0015 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2010/12/11 23:22:49.0031 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2010/12/11 23:22:49.0078 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2010/12/11 23:22:49.0109 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2010/12/11 23:22:49.0156 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2010/12/11 23:22:49.0187 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2010/12/11 23:22:49.0218 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2010/12/11 23:22:49.0250 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2010/12/11 23:22:49.0281 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2010/12/11 23:22:49.0343 L6BOD (0e2e3cabb4723b78441e58e5899d82d9) C:\WINDOWS\system32\Drivers\L6BOD.sys
2010/12/11 23:22:49.0484 McPvDrv (436966e5f96ea810a8a80a5fb41b63ad) C:\WINDOWS\system32\drivers\McPvDrv.sys
2010/12/11 23:22:49.0531 mdmxsdk (0cea2d0d3fa284b85ed5b68365114f76) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
2010/12/11 23:22:49.0593 mfeapfk (84d59a3eddfb9438fb94f7f80d37859d) C:\WINDOWS\system32\drivers\mfeapfk.sys
2010/12/11 23:22:49.0640 mfeavfk (67e961988312b1a28d6f93357b0bf998) C:\WINDOWS\system32\drivers\mfeavfk.sys
2010/12/11 23:22:49.0687 mfebopk (19161b1796cf74a6a326abde309062ba) C:\WINDOWS\system32\drivers\mfebopk.sys
2010/12/11 23:22:49.0718 mfefirek (d5f89b4934960c70882924d992c6abfc) C:\WINDOWS\system32\drivers\mfefirek.sys
2010/12/11 23:22:49.0765 mfehidk (0efab2b91b27543fe589de700de07136) C:\WINDOWS\system32\drivers\mfehidk.sys
2010/12/11 23:22:49.0796 mfendisk (549dd4966bf0b1d1fc205ca0755a745b) C:\WINDOWS\system32\DRIVERS\mfendisk.sys
2010/12/11 23:22:49.0812 mfendiskmp (549dd4966bf0b1d1fc205ca0755a745b) C:\WINDOWS\system32\DRIVERS\mfendisk.sys
2010/12/11 23:22:49.0843 mferkdet (c9eda1eada2ab6e34cd1a10c3a24ab25) C:\WINDOWS\system32\drivers\mferkdet.sys
2010/12/11 23:22:49.0906 mferkdk (41fe2f288e05a6c8ab85dd56770ffbad) C:\WINDOWS\system32\drivers\mferkdk.sys
2010/12/11 23:22:49.0968 mfesmfk (096b52ea918aa909ba5903d79e129005) C:\WINDOWS\system32\drivers\mfesmfk.sys
2010/12/11 23:22:50.0015 mfetdi2k (e6c5f7aade5a31c057d73201acfe8adf) C:\WINDOWS\system32\drivers\mfetdi2k.sys
2010/12/11 23:22:50.0062 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2010/12/11 23:22:50.0109 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2010/12/11 23:22:50.0140 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2010/12/11 23:22:50.0187 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2010/12/11 23:22:50.0234 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2010/12/11 23:22:50.0281 mraid35x (3f4bb95e5a44f3be34824e8e7caf0737) C:\WINDOWS\system32\DRIVERS\mraid35x.sys
2010/12/11 23:22:50.0312 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2010/12/11 23:22:50.0375 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2010/12/11 23:22:50.0406 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2010/12/11 23:22:50.0468 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2010/12/11 23:22:50.0546 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2010/12/11 23:22:50.0562 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2010/12/11 23:22:50.0609 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2010/12/11 23:22:50.0625 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2010/12/11 23:22:50.0687 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2010/12/11 23:22:50.0718 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2010/12/11 23:22:50.0750 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2010/12/11 23:22:50.0765 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2010/12/11 23:22:50.0796 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
2010/12/11 23:22:50.0812 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2010/12/11 23:22:50.0843 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2010/12/11 23:22:50.0890 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2010/12/11 23:22:50.0937 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2010/12/11 23:22:50.0984 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2010/12/11 23:22:51.0093 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2010/12/11 23:22:51.0171 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2010/12/11 23:22:51.0187 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2010/12/11 23:22:51.0234 Packet (8f856dae19383bd69db444004d5d4f50) C:\WINDOWS\system32\DRIVERS\packet.sys
2010/12/11 23:22:51.0281 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2010/12/11 23:22:51.0296 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2010/12/11 23:22:51.0343 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2010/12/11 23:22:51.0359 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2010/12/11 23:22:51.0406 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2010/12/11 23:22:51.0421 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2010/12/11 23:22:51.0546 perc2 (6c14b9c19ba84f73d3a86dba11133101) C:\WINDOWS\system32\DRIVERS\perc2.sys
2010/12/11 23:22:51.0609 perc2hib (f50f7c27f131afe7beba13e14a3b9416) C:\WINDOWS\system32\DRIVERS\perc2hib.sys
2010/12/11 23:22:51.0687 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2010/12/11 23:22:51.0703 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
2010/12/11 23:22:51.0734 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2010/12/11 23:22:51.0750 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2010/12/11 23:22:51.0796 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
2010/12/11 23:22:51.0812 ql1080 (0a63fb54039eb5662433caba3b26dba7) C:\WINDOWS\system32\DRIVERS\ql1080.sys
2010/12/11 23:22:51.0828 Ql10wnt (6503449e1d43a0ff0201ad5cb1b8c706) C:\WINDOWS\system32\DRIVERS\ql10wnt.sys
2010/12/11 23:22:51.0875 ql12160 (156ed0ef20c15114ca097a34a30d8a01) C:\WINDOWS\system32\DRIVERS\ql12160.sys
2010/12/11 23:22:51.0890 ql1240 (70f016bebde6d29e864c1230a07cc5e6) C:\WINDOWS\system32\DRIVERS\ql1240.sys
2010/12/11 23:22:51.0906 ql1280 (907f0aeea6bc451011611e732bd31fcf) C:\WINDOWS\system32\DRIVERS\ql1280.sys
2010/12/11 23:22:51.0953 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2010/12/11 23:22:51.0984 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2010/12/11 23:22:52.0000 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2010/12/11 23:22:52.0031 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2010/12/11 23:22:52.0062 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2010/12/11 23:22:52.0093 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2010/12/11 23:22:52.0109 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2010/12/11 23:22:52.0140 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2010/12/11 23:22:52.0171 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2010/12/11 23:22:52.0203 rimmptsk (d85e3fa9f5b1f29bb4ed185c450d1470) C:\WINDOWS\system32\DRIVERS\rimmptsk.sys
2010/12/11 23:22:52.0281 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\WINDOWS\system32\DRIVERS\sdbus.sys
2010/12/11 23:22:52.0312 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2010/12/11 23:22:52.0343 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2010/12/11 23:22:52.0375 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2010/12/11 23:22:52.0390 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2010/12/11 23:22:52.0453 sisagp (6b33d0ebd30db32e27d1d78fe946a754) C:\WINDOWS\system32\DRIVERS\sisagp.sys
2010/12/11 23:22:52.0500 Sparrow (83c0f71f86d3bdaf915685f3d568b20e) C:\WINDOWS\system32\DRIVERS\sparrow.sys
2010/12/11 23:22:52.0531 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2010/12/11 23:22:52.0562 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2010/12/11 23:22:52.0625 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
2010/12/11 23:22:52.0703 STHDA (31ba85e1cff39a57f702a2a0877bb8e1) C:\WINDOWS\system32\drivers\sthda.sys
2010/12/11 23:22:52.0750 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2010/12/11 23:22:52.0781 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2010/12/11 23:22:52.0828 symc810 (1ff3217614018630d0a6758630fc698c) C:\WINDOWS\system32\DRIVERS\symc810.sys
2010/12/11 23:22:52.0859 symc8xx (070e001d95cf725186ef8b20335f933c) C:\WINDOWS\system32\DRIVERS\symc8xx.sys
2010/12/11 23:22:52.0890 sym_hi (80ac1c4abbe2df3b738bf15517a51f2c) C:\WINDOWS\system32\DRIVERS\sym_hi.sys
2010/12/11 23:22:52.0906 sym_u3 (bf4fab949a382a8e105f46ebb4937058) C:\WINDOWS\system32\DRIVERS\sym_u3.sys
2010/12/11 23:22:52.0953 SynTP (936cd58395d36659bb798b961ef7357f) C:\WINDOWS\system32\DRIVERS\SynTP.sys
2010/12/11 23:22:52.0984 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2010/12/11 23:22:53.0062 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2010/12/11 23:22:53.0093 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2010/12/11 23:22:53.0140 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2010/12/11 23:22:53.0171 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2010/12/11 23:22:53.0218 TosIde (f2790f6af01321b172aa62f8e1e187d9) C:\WINDOWS\system32\DRIVERS\toside.sys
2010/12/11 23:22:53.0265 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2010/12/11 23:22:53.0281 ultra (1b698a51cd528d8da4ffaed66dfc51b9) C:\WINDOWS\system32\DRIVERS\ultra.sys
2010/12/11 23:22:53.0343 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2010/12/11 23:22:53.0390 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2010/12/11 23:22:53.0406 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2010/12/11 23:22:53.0421 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
2010/12/11 23:22:53.0468 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2010/12/11 23:22:53.0500 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2010/12/11 23:22:53.0531 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2010/12/11 23:22:53.0578 viaagp (754292ce5848b3738281b4f3607eaef4) C:\WINDOWS\system32\DRIVERS\viaagp.sys
2010/12/11 23:22:53.0609 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) C:\WINDOWS\system32\DRIVERS\viaide.sys
2010/12/11 23:22:53.0656 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2010/12/11 23:22:53.0703 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2010/12/11 23:22:53.0750 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2010/12/11 23:22:53.0812 winachsf (96aff1738271755a39b52eef7e35f98f) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys
2010/12/11 23:22:53.0875 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
2010/12/11 23:22:53.0968 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2010/12/11 23:22:53.0984 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2010/12/11 23:22:54.0203 ================================================================================
2010/12/11 23:22:54.0203 Scan finished
2010/12/11 23:22:54.0203 ================================================================================
2010/12/11 23:23:12.0687 Deinitialize success



-------------------------------------------------------------------------------------------------------------------------
This is my MBAM report:


Malwarebytes' Anti-Malware 1.50
www.malwarebytes.org

Database version: 5298

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/11/2010 11:35:05 PM
mbam-log-2010-12-11 (23-35-05).txt

Scan type: Quick scan
Objects scanned: 155739
Time elapsed: 8 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\Oz\local settings\Temp\0.16379784835141176.exe (Trojan.Dropper) -> Quarantined and deleted successfully.




Restarting after I post this. Thanks

#9 catmeister

catmeister

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 12 December 2010 - 12:43 AM

I ran both TDSSKiller and Malwarebytes and did not receive an error or an infected file (see Malwarebyte report below) but I am still getting the ads to come up.

Malwarebytes' Anti-Malware 1.50
www.malwarebytes.org

Database version: 5298

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18975

12/11/2010 11:37:54 PM
mbam-log-2010-12-11 (23-37-54).txt

Scan type: Quick scan
Objects scanned: 242083
Time elapsed: 9 minute(s), 16 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#10 catmeister

catmeister

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 12 December 2010 - 12:55 AM

It happens after I search anything in Internet Explorer or Mozilla Firefox and then click on any returned search item.

#11 Blackbridge

Blackbridge

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 12 December 2010 - 01:07 AM

I am having the same problem Catmeister except I get pop-up saying "You have won a $1000 Walmart gift card." I can't search anything, when I click on anything in the search, it re-directs me to various sites such as scour.com and stop-zilla.com. I had AVG for anti-virus so I finally broke down & bought McAfee yesterday & installed it. It ran a though scan & found various things that were supposedly repaired/quarantined. I also downloaded SpyBot & Malware Bytes & ran both of these & again it found various things that were supposedly found & repaired. Then today while I was on the internet, I get the "You've won a $1000 Walmart giftcard" pop-up & redirect again. I read about the TDSS program & clicked on it and ran it but it did not find anything. With all of these programs, why can't one of them find this thing & get rid of it? Can anyone help me get this thing off of my computer for good? Please, I am at my wit's end. Thanks so much in advance, I can use all the help I can get. :)

#12 oxtar

oxtar

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 12 December 2010 - 01:24 AM

I restarted and the problems still here.

Also after surfing for a little while, it randomly tried redirecting me (via hijack) to this sketchy obvious malware site: http://djsearch.info/nte/avorp 1lala.exe (i broke the hyperlink so nobody accidently clicks it)

I too got the $1000 walmart card by the way, but that was much earlier. Norton AV, TDSSkiller, Malwarebytes and Spybot still haven't picked up and/or fully fixed anything yet!

one extra note: It doesn't let you see cached Google pages, it just shows them blank so you can't pass their redirecting crap. I hate this malware lol

Edited by oxtar, 12 December 2010 - 01:34 AM.


#13 rboyd

rboyd

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:12:38 PM

Posted 12 December 2010 - 01:48 AM

I have the same problems but additionally, I have a bunch of audio commercials coming through. I have to mute my computer because of the noise.

#14 catmeister

catmeister

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:38 PM

Posted 12 December 2010 - 10:00 AM

It sounds like we all have the same virus as I have had all of the above. I get the $1000 Walmart gift card, the ramdom audio channel which is giving entertainment news and redirecting to various sites.

#15 sparky494

sparky494

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Milwaukee WI
  • Local time:12:38 PM

Posted 12 December 2010 - 10:58 AM

I am also in the same boat!!! I just got this virus friday night on my netbook. Nothing I have will pick it up

Windows defender
malwarebytes
tdsskiller
rkill

dont know what to do.

I have been glued to this page hoping for a fix

Edited by sparky494, 12 December 2010 - 11:12 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users