Jump to content

Multiple Problems

Recommended Posts

I've been getting infected fairly often by Antivirus System Pro and other variants for a few months. Often times after ridding the computer of the crapware with Mbam, I'll have left over settings adjusted by the malware that I'll have to figure out and change such as proxies that were set up on my IE and FireFox. After being infected briefly two nights ago, I'm left with something that redirects my browser if I click the results of a search engine. I'm often redirected to searchclick7 with Google, and Yahoo fails to search all together. I tried to run the GMER scanner as directed in the instructions for posted here, but after 12+ hours of scanning it showed no signs of stopping. I did successfully run DDS and ComboFix has run fine. No problems with Mbam either (though my Mbam is renamed because of previous infections).

DDS (Ver_10-03-17.01) - NTFSx86

Run by Christopher at 14:29:39.90 on Sun 04/04/2010

Internet Explorer: 7.0.5730.13

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2046.1276 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============


C:\WINDOWS\system32\svchost -k DcomLaunch


C:\WINDOWS\System32\svchost.exe -k netsvcs

C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup



C:\Program Files\AVG\AVG9\avgchsvx.exe

C:\Program Files\AVG\AVG9\avgrsx.exe


C:\Program Files\AVG\AVG9\avgcsrvx.exe


C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\AVG\AVG9\avgwdsvc.exe

C:\Program Files\Intel\IDU\awServ.exe

C:\Program Files\AVG\AVG9\avgnsx.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\Common Files\LightScribe\LSSrvc.exe

C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe

C:\Program Files\NVIDIA Corporation\nTune\nTuneService.exe


C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\Program Files\Viewpoint\Common\ViewpointService.exe

C:\Program Files\AVG\AVG9\avgemc.exe

C:\Program Files\AVG\AVG9\avgcsrvx.exe


C:\Program Files\Intel\IDU\iptray.exe

C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe

C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe

C:\Program Files\Freecorder\FLVSrvc.exe

C:\Program Files\iTunes\iTunesHelper.exe


C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe

C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Veoh Networks\Veoh\VeohClient.exe

C:\Program Files\Logitech\Logitech Vid\vid.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe

C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe




C:\Program Files\Mozilla Firefox\firefox.exe

C:\Documents and Settings\Christopher\My Documents\ViralTools\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.yahoo.com/

uInternet Connection Wizard,ShellNext = hxxp://www.www.daemon-search.com/default

uInternet Settings,ProxyServer = http=

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

uURLSearchHooks: Freecorder Toolbar: {1392b8d2-5c05-419f-a8f6-b9f15a596612} - c:\program files\freecorder\tbFre1.dll

BHO: Freecorder Toolbar: {1392b8d2-5c05-419f-a8f6-b9f15a596612} - c:\program files\freecorder\tbFre1.dll

BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll

BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll

TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll

TB: Veoh Browser Plug-in: {d0943516-5076-4020-a3b5-aefaf26ab263} - c:\program files\veoh networks\veoh\plugins\reg\VeohToolbar.dll

TB: AIM Toolbar: {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files\aim toolbar\aimtb.dll

TB: Freecorder Toolbar: {1392b8d2-5c05-419f-a8f6-b9f15a596612} - c:\program files\freecorder\tbFre1.dll

uRun: [LightScribe Control Panel] c:\program files\common files\lightscribe\LightScribeControlPanel.exe -hidden

uRun: [bgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\ahead\lib\NMBgMonitor.exe"

uRun: [NVIDIA nTune] "c:\program files\nvidia corporation\ntune\nTuneCmd.exe" clear

uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"

uRun: [Veoh] "c:\program files\veoh networks\veoh\VeohClient.exe" /VeohHide

uRun: [Logitech Vid] "c:\program files\logitech\logitech vid\vid.exe" -bootmode

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [intelAudioStudio] "c:\program files\intel audio studio\IntelAudioStudio.exe" BOOT

mRun: [NeroFilterCheck] c:\program files\common files\ahead\lib\NeroCheck.exe

mRun: [ipTray.exe] "c:\program files\intel\idu\iptray.exe"

mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"

mRun: [LogitechQuickCamRibbon] "c:\program files\logitech\logitech webcam software\LWS.exe" /hide

mRun: [Freecorder FLV Service] "c:\program files\freecorder\FLVSrvc.exe" /run

mRun: [QuickTime Task] "c:\program files\quicktime alternative\qttask.exe" -atboottime

mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"

mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup

mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adobeg~1.lnk - c:\program files\common files\adobe\calibration\Adobe Gamma Loader.exe

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\desktop messenger\8876480\program\LogitechDesktopMessenger.exe

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FA9B9510-9FCB-4ca0-818C-5D0987B47C4D} - c:\program files\pokerstars.net\PokerStarsUpdate.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {0b83c99c-1efa-4259-858f-bcb33e007a5b} - {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files\aim toolbar\aimtb.dll

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL

DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/director/sw.cab

DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - hxxp://download.divx.com/player/DivXBrowserPlugin.cab

DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab

TCP: {CD7873F9-9D61-41DC-9E62-D85D2A6790EE} =,,

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\logitech\desktop messenger\8876480\program\GAPlugProtocol-8876480.dll

Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll

Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll

Notify: avgrsstarter - avgrsstx.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\christ~1\applic~1\mozilla\firefox\profiles\mizazpvz.default\

FF - prefs.js: browser.startup.homepage - www.yahoo.com

FF - component: c:\documents and settings\christopher\application data\mozilla\firefox\profiles\mizazpvz.default\extensions\{1392b8d2-5c05-419f-a8f6-b9f15a596612}\components\FFAlert.dll

FF - component: c:\program files\avg\avg9\firefox\components\avgssff.dll

FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll

FF - plugin: c:\program files\veoh networks\veoh\plugins\noreg\NPVeohVersion.dll

FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll

FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\


c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-3-22 216200]

R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-2-16 29512]

R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-3-22 242696]

R2 avg9emc;AVG Free E-mail Scanner;c:\program files\avg\avg9\avgemc.exe [2010-3-12 916760]

R2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-3-12 308064]

R2 AWService;Admin Works Agent X8;c:\program files\intel\idu\awServ.exe [2006-12-27 74520]

R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2008-3-11 24652]

S2 wixyatl;wixyatl;\??\c:\windows\system32\drivers\cpgwsup.sys --> c:\windows\system32\drivers\cpgwsup.sys [?]

=============== Created Last 30 ================

2010-04-04 19:29:17 156 ----a-w- c:\documents and settings\christopher\defogger_reenable

2010-04-04 18:58:17 0 d-----w- C:\ComboFix

2010-04-04 18:52:08 0 d-sha-r- C:\cmdcons

2010-04-04 18:51:20 98816 ----a-w- c:\windows\sed.exe

2010-04-04 18:51:20 77312 ----a-w- c:\windows\MBR.exe

2010-04-04 18:51:20 261632 ----a-w- c:\windows\PEV.exe

2010-04-04 18:51:20 161792 ----a-w- c:\windows\SWREG.exe

2010-03-12 18:10:11 12464 ----a-w- c:\windows\system32\avgrsstx.dll

==================== Find3M ====================

2010-03-12 18:10:16 242696 ----a-w- c:\windows\system32\drivers\avgtdix.sys

2010-03-12 18:09:12 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys

2010-03-11 12:38:54 832512 ------w- c:\windows\system32\wininet.dll

2010-03-11 12:38:52 78336 ----a-w- c:\windows\system32\ieencode.dll

2010-03-11 12:38:51 17408 ----a-w- c:\windows\system32\corpol.dll

2010-02-09 07:08:41 23348 ----a-w- c:\windows\system32\emptyregdb.dat

2010-01-22 19:35:59 58820 ---ha-w- c:\windows\system32\mlfcache.dat

2008-07-02 07:06:55 41788 ----a-w- c:\program files\Uninstall.exe

2008-07-02 07:06:55 2004 ----a-w- c:\program files\Uninstall.ini

2009-10-22 07:05:02 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009102220091023\index.dat

============= FINISH: 14:29:48.96 ===============


Link to post
Share on other sites


Infected with another fake anti-virus program. If I try to open any program, the malware pops up and the program never opens. This includes IE, Firefox, and Mbam.

I CAN get to safe mode with networking and so far firefox has managed to work here. I can terminate the ave.exe process and temporarily halt the crap, but haven't tried my luck with combofix yet.

Please, someone help. This is turning from a minor annoyance to something that's made my machine nearly unusable.

Link to post
Share on other sites

Hello FullFreyDog! Welcome to MalwareBytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install any software or hardware, while work on.

Step 1:

Please uninstall the following applications:

Adobe Acrobat and Reader 8.1.2 Security Update 1 (KB403742)

Adobe Reader 8.1.2

Adobe Reader 8.1.2 Security Update 1 (KB403742)

After finish our work, please download and install the latest version of Adobe Reader from:


Step 2:

I also see you have Viewpoint installed...

Viewpoint Manager is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This will change from what we know in 2006 read this article: http://www.clickz.com/news/article.php/3561546

I suggest you remove the program now. Go to Start > Settings > Control Panel > Add/Remove Programs and remove the following programs if present.

  • Viewpoint
  • Viewpoint Manager
  • Viewpoint Media Player

Step 3:

Go into C:\Program Files\Malwarebytes' Anti-Malware and you will see a file called mbam.exe Right click on it and drop down to Rename change the name to firefox.com From mbam.exe to firefox.com . Please, restart your computer.

Step 4:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

In your next reply, please include these log(s):

* MalwareBytes' Anti-Malware log

* a new fresh DDS log only

Link to post
Share on other sites

Thank you for taking the time to respond to me, Borislav. I appreciate all your help.

I followed instructions on another site involving registry changes to prevent AVE.exe from running (possibly uninstalling, but I doubt it) If necessary, I'll post the exact information I used. After that I was able to run MBam again, producing the following log:


Malwarebytes' Anti-Malware 1.45


Database version: 3979

Windows 5.1.2600 Service Pack 2

Internet Explorer 7.0.5730.13

4/12/2010 5:08:51 AM

mbam-log-2010-04-12 (05-08-51).txt

Scan type: Full scan (C:\|)

Objects scanned: 308356

Time elapsed: 1 hour(s), 39 minute(s), 33 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 6

Folders Infected: 0

Files Infected: 2

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\NetworkService\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe") Good: (firefox.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\NetworkService\Local Settings\Application Data\ave.exe" /START "iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\NetworkService\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

C:\Documents and Settings\Christopher\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> Quarantined and deleted successfully.

C:\Documents and Settings\NetworkService\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> Quarantined and deleted successfully.


I'm attaching the subsequent quick scan and DDS scan. Please note that the ave.exe fill has been found and removed from my system on a few occasions before this and is has returned as recently as last night.

Again, thank you!



Link to post
Share on other sites

I wanted to specify that the actions I mentioned taking were taken before you replied here. I don't want you to think I'm ignoring your instructions and doing whatever I want. Since your reply I did only exactly as you stated (other than renaming MBam, since it would once again run) and just wanted to provide the most recent information I could.

Link to post
Share on other sites

Perfect! :)

Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.

  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.

-- If you encounter any problems, try running GMER in Safe Mode.

Let me know how are things running now.

Link to post
Share on other sites

Ugh. Gmer won't finish a scan on the PC. Disconnected internet, turned off everything that AVG would let me turn off (which admittedly, isn't the entire program), tried in normal mode and safe mode. Tried five or six times, even disabled power saving settings and screen saver since GMER would run fine for half an hour before the PC would blue screen with an IRQL not less or equal error.

I can't think of anything more to do other than completely uninstalling AVG ( which is fine with me, I've been considering just buying the full version of MBam for my main protection anyway) but I have no idea if that'll help Gmer finish it's scan.

I'll just wait for your instructions.

Link to post
Share on other sites

Download RootRepeal.zip and unzip it to your Desktop.

  • Double click RootRepeal.exe to start the program
  • Click on the Report tab at the bottom of the program window
  • Click the Scan button
  • In the Select Scan dialog, check:

    • Drivers
    • Files
    • Processes
    • SSDT
    • Stealth Objects
    • Hidden Services

    [*]Click the OK button

    [*]In the next dialog, select all drives showing

    [*]Click OK to start the scan

    Note: The scan can take some time.
    DO NOT
    run any other programs while the scan is running

    [*]When the scan is complete, the Save Report button will become available

    [*]Click this and save the report to your Desktop as RootRepeal.txt

    [*]Go to File, then Exit to close the program

If the report is not too long, post the contents of RootRepeal.txt in your next reply. If the report is very long, it will not be complete if you post it, so please attach it to your reply instead.

Link to post
Share on other sites

Successfully made a report with RootRepeal, is as follows:

ROOTREPEAL © AD, 2007-2009


Scan Start Time: 2010/04/13 00:52

Program Version: Version

Windows Version: Windows XP SP2




Name: dump_atapi.sys

Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys

Address: 0xB3A2B000 Size: 98304 File Visible: No Signed: -

Status: -

Name: dump_WMILIB.SYS

Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS

Address: 0xB8654000 Size: 8192 File Visible: No Signed: -

Status: -

Name: rootrepeal.sys

Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys

Address: 0x93753000 Size: 49152 File Visible: No Signed: -

Status: -

Hidden/Locked Files


Path: c:\windows\tempfile

Status: Allocation size mismatch (API: 33570816, Raw: 0)


Good news, bad news?

Link to post
Share on other sites

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:



[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.


  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.


[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

Link to post
Share on other sites

Please read the following through carefully so that you understand what to do.

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK. (If Vista, click on the Vista Orb and copy and paste the following into the Search field. (make sure you include the quotation marks) Then press Ctrl+Shift+Enter.)
    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v
  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
  • It may ask you to reboot the computer to complete the process. Allow it to do so.
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

Link to post
Share on other sites

17:09:40:812 1096 TDSS rootkit removing tool Mar 22 2010 10:43:04

17:09:40:812 1096 ================================================================================

17:09:40:812 1096 SystemInfo:

17:09:40:812 1096 OS Version: 5.1.2600 ServicePack: 2.0

17:09:40:812 1096 Product type: Workstation

17:09:40:812 1096 ComputerName: MEGATRON

17:09:40:812 1096 UserName: Christopher

17:09:40:812 1096 Windows directory: C:\WINDOWS

17:09:40:812 1096 Processor architecture: Intel x86

17:09:40:812 1096 Number of processors: 2

17:09:40:812 1096 Page size: 0x1000

17:09:40:812 1096 Boot type: Normal boot

17:09:40:812 1096 ================================================================================

17:09:40:812 1096 UnloadDriverW: NtUnloadDriver error 1

17:09:40:812 1096 ForceUnloadDriverW: UnloadDriverW(klmd21) error 1

17:09:40:828 1096 LoadDriverW: Driver already loaded

17:09:40:828 1096 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system

17:09:40:828 1096 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

17:09:40:828 1096 wfopen_ex: Trying to KLMD file open

17:09:40:828 1096 wfopen_ex: File opened ok (Flags 2)

17:09:40:828 1096 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software

17:09:40:828 1096 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

17:09:40:828 1096 wfopen_ex: Trying to KLMD file open

17:09:40:828 1096 wfopen_ex: File opened ok (Flags 2)

17:09:40:828 1096 Initialize success

17:09:40:828 1096

17:09:40:828 1096 Scanning Services ...

17:09:41:281 1096 Raw services enum returned 357 services

17:09:41:296 1096

17:09:41:296 1096 Scanning Kernel memory ...

17:09:41:296 1096 Devices to scan: 2

17:09:41:296 1096

17:09:41:296 1096 Driver Name: Disk

17:09:41:296 1096 IRP_MJ_CREATE : B810EC30

17:09:41:296 1096 IRP_MJ_CREATE_NAMED_PIPE : 804F4476

17:09:41:296 1096 IRP_MJ_CLOSE : B810EC30

17:09:41:296 1096 IRP_MJ_READ : B8108D9B

17:09:41:296 1096 IRP_MJ_WRITE : B8108D9B

17:09:41:296 1096 IRP_MJ_QUERY_INFORMATION : 804F4476

17:09:41:296 1096 IRP_MJ_SET_INFORMATION : 804F4476

17:09:41:296 1096 IRP_MJ_QUERY_EA : 804F4476

17:09:41:296 1096 IRP_MJ_SET_EA : 804F4476

17:09:41:296 1096 IRP_MJ_FLUSH_BUFFERS : B8109366

17:09:41:296 1096 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476

17:09:41:296 1096 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476

17:09:41:296 1096 IRP_MJ_DIRECTORY_CONTROL : 804F4476

17:09:41:296 1096 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476

17:09:41:296 1096 IRP_MJ_DEVICE_CONTROL : B810944D


17:09:41:296 1096 IRP_MJ_SHUTDOWN : B8109366

17:09:41:296 1096 IRP_MJ_LOCK_CONTROL : 804F4476

17:09:41:296 1096 IRP_MJ_CLEANUP : 804F4476

17:09:41:296 1096 IRP_MJ_CREATE_MAILSLOT : 804F4476

17:09:41:296 1096 IRP_MJ_QUERY_SECURITY : 804F4476

17:09:41:296 1096 IRP_MJ_SET_SECURITY : 804F4476

17:09:41:296 1096 IRP_MJ_POWER : B810AEF3

17:09:41:296 1096 IRP_MJ_SYSTEM_CONTROL : B810FA24

17:09:41:296 1096 IRP_MJ_DEVICE_CHANGE : 804F4476

17:09:41:296 1096 IRP_MJ_QUERY_QUOTA : 804F4476

17:09:41:296 1096 IRP_MJ_SET_QUOTA : 804F4476

17:09:41:312 1096 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1

17:09:41:312 1096

17:09:41:312 1096 Driver Name: atapi

17:09:41:312 1096 IRP_MJ_CREATE : 8940DAC8

17:09:41:312 1096 IRP_MJ_CREATE_NAMED_PIPE : 8940DAC8

17:09:41:312 1096 IRP_MJ_CLOSE : 8940DAC8

17:09:41:312 1096 IRP_MJ_READ : 8940DAC8

17:09:41:312 1096 IRP_MJ_WRITE : 8940DAC8

17:09:41:312 1096 IRP_MJ_QUERY_INFORMATION : 8940DAC8

17:09:41:312 1096 IRP_MJ_SET_INFORMATION : 8940DAC8

17:09:41:312 1096 IRP_MJ_QUERY_EA : 8940DAC8

17:09:41:312 1096 IRP_MJ_SET_EA : 8940DAC8

17:09:41:312 1096 IRP_MJ_FLUSH_BUFFERS : 8940DAC8

17:09:41:312 1096 IRP_MJ_QUERY_VOLUME_INFORMATION : 8940DAC8

17:09:41:312 1096 IRP_MJ_SET_VOLUME_INFORMATION : 8940DAC8

17:09:41:312 1096 IRP_MJ_DIRECTORY_CONTROL : 8940DAC8

17:09:41:312 1096 IRP_MJ_FILE_SYSTEM_CONTROL : 8940DAC8

17:09:41:312 1096 IRP_MJ_DEVICE_CONTROL : 8940DAC8

17:09:41:312 1096 IRP_MJ_INTERNAL_DEVICE_CONTROL : 8940DAC8

17:09:41:312 1096 IRP_MJ_SHUTDOWN : 8940DAC8

17:09:41:312 1096 IRP_MJ_LOCK_CONTROL : 8940DAC8

17:09:41:312 1096 IRP_MJ_CLEANUP : 8940DAC8

17:09:41:312 1096 IRP_MJ_CREATE_MAILSLOT : 8940DAC8

17:09:41:312 1096 IRP_MJ_QUERY_SECURITY : 8940DAC8

17:09:41:312 1096 IRP_MJ_SET_SECURITY : 8940DAC8

17:09:41:312 1096 IRP_MJ_POWER : 8940DAC8

17:09:41:312 1096 IRP_MJ_SYSTEM_CONTROL : 8940DAC8

17:09:41:312 1096 IRP_MJ_DEVICE_CHANGE : 8940DAC8

17:09:41:312 1096 IRP_MJ_QUERY_QUOTA : 8940DAC8

17:09:41:312 1096 IRP_MJ_SET_QUOTA : 8940DAC8

17:09:41:312 1096 Driver "atapi" infected by TDSS rootkit!

17:09:41:312 1096 C:\WINDOWS\system32\drivers\tsk1A.tmp - Verdict: 3

17:09:41:312 1096

17:09:41:312 1096 Completed

17:09:41:312 1096

17:09:41:312 1096 Results:

17:09:41:312 1096 Memory objects infected / cured / cured on reboot: 1 / 0 / 0

17:09:41:312 1096 Registry objects infected / cured / cured on reboot: 0 / 0 / 0

17:09:41:312 1096 File objects infected / cured / cured on reboot: 0 / 0 / 0

17:09:41:312 1096

17:09:41:312 1096 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system

17:09:41:312 1096 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software

17:09:41:312 1096 UnloadDriverW: NtUnloadDriver error 1

17:09:41:312 1096 KLMD(ARK) unloaded successfully

Now that was a fast scan! There was another TDSS log created along with the TDSSKiller.txt one. Since you didn't specifically ask for the other, I figured you don't need it. In case I grabbed the wrong log, I thought I'd at least mention it exists.

Link to post
Share on other sites

Please download to your Desktop: Dr.Web CureIt

  • After the file has downloaded, disable your current Anti-Virus and disconnect from the Internet
  • Doubleclick the drweb-cureit.exe file, then click the Start button, then the OK button to perform an Express Scan.
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it.
  • Once the short scan has finished, Click on the Complete scan radio button.
  • Then click on the Settings menu on top, the select Change Settings or press the F9 key. You can also change the Language
  • Choose the Scanning tab and I recomend leaving the Heuristic analysis enabled (this can lead to False Positives though)
  • On the File types tab ensure you select All files
  • Click on the Actions tab and set the following:
    • Objects Infected objects = Cure, Incurable objects = Move, Suspicious objects = Report
    • Infected packages Archive = Move, E-mails = Report, Containers = Move
    • Malware Adware = Move, Dialers = Move, Jokes = Move, Riskware = Move, Hacktools = Move
    • Do not change the Rename extension - default is: #??
    • Leave the default save path for Moved files here: %USERPROFILE%\DoctorWeb\Quarantine\
    • Leave prompt on Action checked

    [*]On the Log file tab leave the Log to file checked.

    [*]Leave the log file path alone: %USERPROFILE%\DoctorWeb\CureIt.log

    [*]Log mode = Append

    [*]Encoding = ANSI

    [*]Details Leave Names of file packers and Statistics checked.

    [*]Limit log file size = 2048 KB and leave the check mark on the Maximum log file size.

    [*]On the General tab leave the Scan Priority on High

    [*]Click the Apply button at the bottom, and then the OK button.

    [*]On the right side under the Dr Web Anti-Virus Logo you will see 3 little buttons. Click the left VCR style Start button.

    [*]In this mode it will scan Boot sectors of all disks, All removable media, and all local drives

    [*]The more files and folders you have the longer the scan will take. On large drives it can take hours to complete.

    [*]When the Cure option is selected, an additional context menu will open. Select the necessary action of the program, if the curing fails.

    [*]Click 'Yes to all' if it asks if you want to cure/move the files.

    [*]This will move it to the %USERPROFILE%\DoctorWeb\Quarantine\ folder if it can't be cured. (in this case we need samples)

    [*]After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list

    [*]Save the report to your Desktop. The report will be called DrWeb.csv

    [*]Close Dr.Web Cureit.

    [*]Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.

    [*]After reboot, post the contents of the log from Dr.Web you saved previously to your Desktop in your next reply with a new hijackthis log.


Link to post
Share on other sites

All right. Didn't follow your exact instructions, but here's what I did and why I did it.

Downloaded and ran drweb-cureit. First express scan hung on a file (the log is included, as the file is "cured" over and over some 420 times)

Restarted, ran express scan again. This time I didn't click "yes to all" so after it tried to cure the file the first time and asked again, I moved it instead. Finished express scan. Log included.

It was getting late, so I stopped messing with the computer and went to bed. Woke up today and opened drweb again, since it starts to an express scan I allowed it to finish before doing a complete scan.

The way the logs worked with this program, it appends all additional scans to the first log... so all four logs, including the first partial scan, are included in one bulky file which I zipped and attached to this message.

If you have to read through all of that crap, I'm really really sorry for doing this to you. Dr. Web Cure It identified a few problems as a backdoor tdss, which I'm desperately hoping is a false positive. Awaiting your confirmation on the diagnosis.


Link to post
Share on other sites


Dr. Web found 1 malware only, Please see a statistic:


Scan statistics


Scanned: 457224

Infected: 1

Modifications: 0

Suspicious: 0

Adware: 0

Dialers: 0

Jokes: 0

Riskware: 0

Hacktools: 0

Cured: 1

Deleted: 0

Renamed: 0

Moved: 0

Ignored: 0

Scan speed: 90 Kb/s

Scan time: 04:52:24


If everything is OK, here are some final steps:

Step 1:

* Go to start > run and copy and paste next command in the field:

ComboFix /uninstall

Make sure there's a space between Combofix and /

Then hit enter.

This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.

Step 2:

Please manually delete: DDS ; GMER ; RootRepeal ; TDSSKiller ; Dr. Web ;

Step 3:

Some malware preventions:


Safe surfing! :D

Link to post
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.