Jump to content

Google results redirect me to a random page


Ricky
 Share

Recommended Posts

Hi, I am Ricky and I'm new here. A friend suggested me to use this site so now here I am ;)

As the title implies, I am having a problem with Google results on my computer. It seems that whenever I click on the result for something on Google, I sometimes get sent to a random site that may have little to no relevance to whatever that I have searched for.

For example, I search up the term "Ford" on Google and I click on the entry about Henry Ford on Wikipedia. I would then get redirected to another site that may or may not show the word "please wait until redirected" or somewhere along those lines and get sent to a website called pronto.com that sells stuff but with the search term "ford". I go back to the Google results page, click on the same result (the Wikipedia one) and get sent to a web site that claims my computer is infected...blah..blah..blah...I pressed the x for everything and went back to Google to click on the result again this time sending me to the article about Henry Ford on Wikipedia. I could "fix" this problem by just opening the link in a new tab, but I know the problem is still there and there might be more to it.

So based on the scenario (which really happened just as I was typing this) what is the problem with my computer and how do I fix this? I have ran Malwarebytes prior and it removed some .exe file in the System volume Information folder. It claimed it was a trojan but it did nothing to fix my problem. I have also ran my anti virus (Avira) and it removed some old files that I have used along time ago with no problem but didn't use them now.

I'm not sure what log I should post up so I'm going to wait for a reply.

Link to post
Share on other sites

Hello Ricky

Welcome to Malwarebytes.

=====================

  • Download OTL to your desktop.
  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Under Custom scan's and fixes section paste in the below in bold


    %SYSTEMDRIVE%\*.exe

    /md5start

    eventlog.dll

    scecli.dll

    netlogon.dll

    cngaudit.dll

    sceclt.dll

    ntelogon.dll

    logevent.dll

    iaStor.sys

    nvstor.sys

    atapi.sys

    IdeChnDr.sys

    viasraid.sys

    AGP440.sys

    vaxscsi.sys

    nvatabus.sys

    viamraid.sys

    nvata.sys

    nvgts.sys

    iastorv.sys

    ViPrt.sys

    eNetHook.dll

    ahcix86.sys

    KR10N.sys

    nvstor32.sys

    ahcix86s.sys

    nvrd32.sys

    /md5stop

    %systemroot%\*. /mp /s

    CREATERESTOREPOINT

    %systemroot%\system32\*.dll /lockedfiles

    %systemroot%\Tasks\*.job /lockedfiles


  • Check the boxes beside LOP Check and Purity Check.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post it with your next reply.

====================

Download the following GMER Rootkit Scanner from Here

  • Download the randomly named EXE file to your Desktop. Remember what its name is since it is randomly named.
  • Double click on the new random named exe file you downloaded and run it. If prompted about the Security Warning and Unknown Publisher go ahead and click on Run
  • It may take a minute to load and become available.
  • If it gives you a warning about rootkit activity and asks if you want to run a full scan...click on NO, then use the following settings for a more complete scan..
  • In the right panel, you will see several boxes that have been checked. Ensure the following are UNCHECKED


  • Sections

  • IAT/EAT

  • Drives/Partition other than Systemdrive (typically only C:\ should be checked)

  • Show All (don't miss this one)


  • Then click the Scan button & wait for it to finish.
  • Once done click on the [save..] button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post.
  • Save it where you can easily find it, such as your desktop
  • **Caution** Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries
  • Click OK and quit the GMER program.
  • Note: On Firefox you need to go to Tools/Options/Main then under the Downloads section, click on Always ask me where to save files so that you can choose the name and where to save to, in this case your Desktop.
  • Post that log in your next reply.

Link to post
Share on other sites

Hello kahdah, I did what you wanted me to do but there is one slight problem. I can't run GMER without getting the blue screen of doom. Here is a picture of it: http://img230.imageshack.us/img230/8984/dsc00651tv.jpg .

So here are the contents of the files made from OLT.exe:

Extras.txt

OTL Extras logfile created on: 31/01/2010 9:24:13 PM - Run 1

OTL by OldTimer - Version 3.1.27.1 Folder = C:\Documents and Settings\ThE CoMpUtEr\Desktop

Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation

Internet Explorer (Version = 8.0.6001.18702)

Locale: 00001009 | Country: Canada | Language: ENC | Date Format: dd/MM/yyyy

959.00 Mb Total Physical Memory | 110.00 Mb Available Physical Memory | 11.00% Memory free

2.00 Gb Paging File | 1.00 Gb Available in Paging File | 39.00% Paging File free

Paging file location(s): c:\pagefile.sys 1440 2880 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files

Drive C: | 74.52 Gb Total Space | 4.16 Gb Free Space | 5.58% Space Free | Partition Type: NTFS

D: Drive not present or media not loaded

E: Drive not present or media not loaded

F: Drive not present or media not loaded

G: Drive not present or media not loaded

H: Drive not present or media not loaded

I: Drive not present or media not loaded

Computer Name: THECOMPUTER

Current User Name: ThE CoMpUtEr

Logged in as Administrator.

Current Boot Mode: Normal

Scan Mode: Current user

Company Name Whitelist: Off

Skip Microsoft Files: Off

File Age = 30 Days

Output = Minimal

========== Extra Registry (SafeList) ==========

========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]

.cmd [@ = IAS.Accounting] -- Reg Error: Key error. File not found

.html [@ = htmlfile] -- C:\Program Files\Internet Explorer\IEXPLORE.EXE (Microsoft Corporation)

.inf [@ = Reg Error: Value error.] -- Reg Error: Key error. File not found

.txt [@ = Reg Error: Value error.] -- Reg Error: Key error. File not found

[HKEY_CURRENT_USER\SOFTWARE\Classes\<extension>]

.html [@ = htmlfile] -- Reg Error: Key error. File not found

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]

batfile [open] -- "%1" %*

cmdfile [open] -- "%1" %*

comfile [open] -- "%1" %*

exefile [open] -- "%1" %*

htmlfile [edit] -- "C:\Program Files\Microsoft Office\Office12\msohtmed.exe" %1 (Microsoft Corporation)

htmlfile [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)

htmlfile [opennew] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)

htmlfile [print] -- "C:\Program Files\Microsoft Office\Office12\msohtmed.exe" /p %1 (Microsoft Corporation)

http [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)

https [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)

piffile [open] -- "%1" %*

regfile [merge] -- Reg Error: Key error.

scrfile [config] -- %1

scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)

scrfile [open] -- "%1" /S

txtfile [edit] -- Reg Error: Key error.

Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1

Directory [AddToPlaylistVLC] -- "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --playlist-enqueue "%1" ()

Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

Directory [OneNote.Open] -- C:\PROGRA~1\MICROS~2\Office12\ONENOTE.EXE "%L" (Microsoft Corporation)

Directory [PlayWithVLC] -- "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --no-playlist-enqueue "%1" ()

Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)

Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)

Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

Applications\iexplore.exe [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)

CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} [OpenHomePage] -- "C:\Program Files\Internet Explorer\iexplore.exe" (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]

"FirstRunDisabled" = 1

"AntiVirusDisableNotify" = 0

"FirewallDisableNotify" = 0

"UpdatesDisableNotify" = 0

"AntiVirusOverride" = 0

"FirewallOverride" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

"EnableFirewall" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]

"EnableFirewall" = 1

"DoNotAllowExceptions" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007

"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

"%windir%\system32\sessmgr.exe" = %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019 -- (Microsoft Corporation)

"C:\Program Files\Windows Live\Messenger\msnmsgr.exe" = C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger -- (Microsoft Corporation)

"%windir%\Network Diagnostic\xpnetdiag.exe" = %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000 -- (Microsoft Corporation)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]

"%windir%\system32\sessmgr.exe" = %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019 -- (Microsoft Corporation)

"C:\Program Files\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\bin\Apache.exe" = C:\Program Files\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\bin\Apache.exe:*:Enabled:Apache HTTP Server -- (Apache Software Foundation)

"C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE" = C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE:*:Enabled:Microsoft Office Outlook -- (Microsoft Corporation)

"C:\Program Files\Microsoft Office\Office12\GROOVE.EXE" = C:\Program Files\Microsoft Office\Office12\GROOVE.EXE:*:Enabled:Microsoft Office Groove -- (Microsoft Corporation)

"C:\Program Files\Microsoft Office\Office12\ONENOTE.EXE" = C:\Program Files\Microsoft Office\Office12\ONENOTE.EXE:*:Enabled:Microsoft Office OneNote -- (Microsoft Corporation)

"C:\Program Files\uTorrent\uTorrent.exe" = C:\Program Files\uTorrent\uTorrent.exe:*:Enabled:

Link to post
Share on other sites

So sorry about not getting back to you I did not receive a reply.

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Link to post
Share on other sites

Sorry I didn't see your message on your signature so I didn't send you a PM. Anyways, I can't find ComboFix.txt in my C:\ drive or any other place. All I found in the C:\ drive that had to do anything with Combofix is a folder. The name was Combofix but had a picture of the icon for My computer. When I double click it, I get to a place call C:\Combofix and it shoes what I would see if I just open up" My Computer" Is this because I somehow did it wrong or something?

Link to post
Share on other sites

Ok so I re downloaded it and ran like normal. Everything was going fine until it was about to delete the files (after it is done stage 50 or something) Whenever it went to that "stage" my computer would get the BSOD. I would press the restart button and the computer would boot up like normal. '

I have tried running it many times already but they all end up in the same result.

Link to post
Share on other sites

Ok here are the contents of the log:

23:46:14:796 3064 TDSS rootkit removing tool 2.2.3 Feb 4 2010 14:34:00

23:46:14:796 3064 ================================================================================

23:46:14:796 3064 SystemInfo:

23:46:14:796 3064 OS Version: 5.1.2600 ServicePack: 3.0

23:46:14:796 3064 Product type: Workstation

23:46:14:796 3064 ComputerName: THECOMPUTER

23:46:14:796 3064 UserName: ThE CoMpUtEr

23:46:14:796 3064 Windows directory: C:\WINDOWS

23:46:14:796 3064 Processor architecture: Intel x86

23:46:14:796 3064 Number of processors: 1

23:46:14:796 3064 Page size: 0x1000

23:46:14:796 3064 Boot type: Normal boot

23:46:14:796 3064 ================================================================================

23:46:14:906 3064 UnloadDriverW: NtUnloadDriver error 2

23:46:14:906 3064 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2

23:46:14:921 3064 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\drivers\klmd.sys) returned status 00000000

23:46:15:437 3064 UtilityInit: KLMD drop and load success

23:46:15:437 3064 KLMD_OpenDevice: Trying to open KLMD Device(KLMD201010)

23:46:15:437 3064 UtilityInit: KLMD open success

23:46:15:437 3064 UtilityInit: Initialize success

23:46:15:437 3064

23:46:15:437 3064 Scanning Services ...

23:46:15:437 3064 CreateRegParser: Registry parser init started

23:46:15:437 3064 DisableWow64Redirection: GetProcAddress(Wow64DisableWow64FsRedirection) error 127

23:46:15:437 3064 CreateRegParser: DisableWow64Redirection error

23:46:15:437 3064 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system

23:46:15:437 3064 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\config\system) returned status C0000043

23:46:15:437 3064 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

23:46:15:437 3064 wfopen_ex: Trying to KLMD file open

23:46:15:437 3064 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\config\system

23:46:15:437 3064 wfopen_ex: File opened ok (Flags 2)

23:46:15:437 3064 CreateRegParser: HIVE_ADAPTER(C:\WINDOWS\system32\config\system) init success: 3848D8

23:46:15:437 3064 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software

23:46:15:437 3064 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\config\software) returned status C0000043

23:46:15:437 3064 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

23:46:15:437 3064 wfopen_ex: Trying to KLMD file open

23:46:15:437 3064 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\config\software

23:46:15:437 3064 wfopen_ex: File opened ok (Flags 2)

23:46:15:437 3064 CreateRegParser: HIVE_ADAPTER(C:\WINDOWS\system32\config\software) init success: 384980

23:46:15:437 3064 EnableWow64Redirection: GetProcAddress(Wow64RevertWow64FsRedirection) error 127

23:46:15:437 3064 CreateRegParser: EnableWow64Redirection error

23:46:15:437 3064 CreateRegParser: RegParser init completed

23:46:16:531 3064 GetAdvancedServicesInfo: Raw services enum returned 379 services

23:46:16:531 3064 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system

23:46:16:531 3064 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software

23:46:16:531 3064

23:46:16:531 3064 Scanning Kernel memory ...

23:46:16:546 3064 KLMD_GetSystemObjectAddressByNameW: Trying to get system object address by name \Driver\Disk

23:46:16:546 3064 DetectCureTDL3: \Driver\Disk PDRIVER_OBJECT: 861BA908

23:46:16:546 3064 DetectCureTDL3: KLMD_GetDeviceObjectList returned 2 DevObjects

23:46:16:546 3064

23:46:16:546 3064 DetectCureTDL3: DEVICE_OBJECT: 8615CC68

23:46:16:546 3064 KLMD_GetLowerDeviceObject: Trying to get lower device object for 8615CC68

23:46:16:546 3064 KLMD_ReadMem: Trying to ReadMemory 0x8615CC68[0x38]

23:46:16:546 3064 DetectCureTDL3: DRIVER_OBJECT: 861BA908

23:46:16:546 3064 KLMD_ReadMem: Trying to ReadMemory 0x861BA908[0xA8]

23:46:16:546 3064 KLMD_ReadMem: Trying to ReadMemory 0xE1008DD8[0x18]

23:46:16:546 3064 DetectCureTDL3: DRIVER_OBJECT name: \Driver\Disk, Driver Name: Disk

23:46:16:546 3064 DetectCureTDL3: IrpHandler (0) addr: F74EDBB0

23:46:16:546 3064 DetectCureTDL3: IrpHandler (1) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (2) addr: F74EDBB0

23:46:16:546 3064 DetectCureTDL3: IrpHandler (3) addr: F74E7D1F

23:46:16:546 3064 DetectCureTDL3: IrpHandler (4) addr: F74E7D1F

23:46:16:546 3064 DetectCureTDL3: IrpHandler (5) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (6) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (7) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (8) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (9) addr: F74E82E2

23:46:16:546 3064 DetectCureTDL3: IrpHandler (10) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (11) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (12) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (13) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (14) addr: F74E83BB

23:46:16:546 3064 DetectCureTDL3: IrpHandler (15) addr: F74EBF28

23:46:16:546 3064 DetectCureTDL3: IrpHandler (16) addr: F74E82E2

23:46:16:546 3064 DetectCureTDL3: IrpHandler (17) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (18) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (19) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (20) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (21) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (22) addr: F74E9C82

23:46:16:546 3064 DetectCureTDL3: IrpHandler (23) addr: F74EE99E

23:46:16:546 3064 DetectCureTDL3: IrpHandler (24) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (25) addr: 804F355A

23:46:16:546 3064 DetectCureTDL3: IrpHandler (26) addr: 804F355A

23:46:16:546 3064 TDL3_FileDetect: Processing driver: Disk

23:46:16:546 3064 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\DRIVERS\disk.sys

23:46:16:546 3064 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\DRIVERS\disk.sys

23:46:16:593 3064 TDL3_FileDetect: C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean

23:46:16:593 3064

23:46:16:593 3064 DetectCureTDL3: DEVICE_OBJECT: 8615DAB8

23:46:16:593 3064 KLMD_GetLowerDeviceObject: Trying to get lower device object for 8615DAB8

23:46:16:593 3064 DetectCureTDL3: DEVICE_OBJECT: 861EFF18

23:46:16:593 3064 KLMD_GetLowerDeviceObject: Trying to get lower device object for 861EFF18

23:46:16:593 3064 DetectCureTDL3: DEVICE_OBJECT: 861BD940

23:46:16:593 3064 KLMD_GetLowerDeviceObject: Trying to get lower device object for 861BD940

23:46:16:593 3064 KLMD_ReadMem: Trying to ReadMemory 0x861BD940[0x38]

23:46:16:593 3064 DetectCureTDL3: DRIVER_OBJECT: 86163568

23:46:16:593 3064 KLMD_ReadMem: Trying to ReadMemory 0x86163568[0xA8]

23:46:16:593 3064 KLMD_ReadMem: Trying to ReadMemory 0xE18BCBA8[0x1A]

23:46:16:593 3064 DetectCureTDL3: DRIVER_OBJECT name: \Driver\atapi, Driver Name: atapi

23:46:16:593 3064 DetectCureTDL3: IrpHandler (0) addr: F720EB40

23:46:16:593 3064 DetectCureTDL3: IrpHandler (1) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (2) addr: F720EB40

23:46:16:593 3064 DetectCureTDL3: IrpHandler (3) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (4) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (5) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (6) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (7) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (8) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (9) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (10) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (11) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (12) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (13) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (14) addr: F720EB40

23:46:16:593 3064 DetectCureTDL3: IrpHandler (15) addr: F720EB40

23:46:16:593 3064 DetectCureTDL3: IrpHandler (16) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (17) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (18) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (19) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (20) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (21) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (22) addr: F720EB40

23:46:16:593 3064 DetectCureTDL3: IrpHandler (23) addr: F720EB40

23:46:16:593 3064 DetectCureTDL3: IrpHandler (24) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (25) addr: 804F355A

23:46:16:593 3064 DetectCureTDL3: IrpHandler (26) addr: 804F355A

23:46:16:593 3064 KLMD_ReadMem: Trying to ReadMemory 0xF720C864[0x400]

23:46:16:593 3064 TDL3_StartIoHookDetect: CheckParameters: 0, 00000000, 0

23:46:16:593 3064 TDL3_FileDetect: Processing driver: atapi

23:46:16:593 3064 TDL3_FileDetect: Processing driver file: C:\WINDOWS\system32\DRIVERS\atapi.sys

23:46:16:593 3064 KLMD_CreateFileW: Trying to open file C:\WINDOWS\system32\DRIVERS\atapi.sys

23:46:16:625 3064 TDL3_FileDetect: C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: Clean

23:46:16:625 3064

23:46:16:625 3064 Completed

23:46:16:625 3064

23:46:16:625 3064 Results:

23:46:16:625 3064 Memory objects infected / cured / cured on reboot: 0 / 0 / 0

23:46:16:625 3064 Registry objects infected / cured / cured on reboot: 0 / 0 / 0

23:46:16:625 3064 File objects infected / cured / cured on reboot: 0 / 0 / 0

23:46:16:625 3064

23:46:16:640 3064 MyNtCreateFileW: NtCreateFile(\??\C:\WINDOWS\system32\drivers\klmd.sys) returned status 00000000

23:46:16:640 3064 UtilityDeinit: KLMD(ARK) unloaded successfully

Link to post
Share on other sites

HiJack This! Forum Policy

We will not be party to obvious use of key gens, cracks, warez or other illegal means of downloading software, music, videos ect. This means no P2P evidence will be supported. Logs that show these in them, will given the option to remove the P2P items. Keygens, cracks, warez and similar will have the thread closed period. It's theft and against the law.

Need to remove those torrent programs and cracks before proceeding.

===========================

Run OTL

  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    :OTL
    [2010/01/16 21:35:18 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\ThE CoMpUtEr\Application Data\.#



    :Commands
    [emptytemp]


  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot when it is done
  • It will produce a log for you on reboot, please post that log in your next reply.

==============

Update Run Malwarebytes

Please update\run Malwarebytes' Anti-Malware.

Double Click the Malwarebytes Anti-Malware icon to run the application.

  • Click on the update tab then click on Check for updates.
  • If an update is found, it will download and install the latest version.
  • Once the update has loaded, go to the Scanner tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatley.

=====

* Go here to run an online scannner from ESET.

  • Note: You will need to use Internet explorer for this scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Check next options: Remove found threats and Scan unwanted applications.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\ESET\ESET Online Scanner\log.txt
  • Copy and paste that log as a reply to this topic

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.