Jump to content

Antimalware doctor infection!


Recommended Posts

Hi I ended up getting the Antimalware doctor infection and using malwarebytes seems to have done the job of removing the virus but now whenever I search google in either Firefox or IE I get redirected to different sites. I think my browser is hijacked. How can I fix this?

Thanks in advance.

Link to post
Share on other sites

Hello shafr! Welcome to MalwareBytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install any software or hardware, while work on.

Step 1:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Step 2:

Download DDS and save it to your desktop from here or here or here.

Disable any script blocker, and then double click dds.scr to run the tool.

  • When done, DDS will open two (2) logs:
    1. DDS.txt
    2. Attach.txt

    [*]Save both reports to your desktop. Post them back to your topic.

Step 3:

Please download the following scanning tool. GMER

  • Open the zip file and copy the file
    gmer.exe
    to your Desktop.

  • Double click on
    gmer.exe
    and run it.

  • It may take a minute to load and become available.

  • Do not make any changes. Click on the
    SCAN
    button and DO NOT use the computer while it's scanning.

  • Once the scan is done click on the
    SAVE
    button and browse to your Desktop and save the file as
    GMER.LOG

  • Zip up the
    GMER.LOG
    file and save it as
    gmerlog.zip
    and attach it to your reply post.

  • DO NOT
    directly post this log into a reply. You
    MUST
    attach it as a
    .ZIP
    file.

  • Click OK and quit the GMER program.

In your next reply, please include these log(s) in this sequence:

  1. MalwareBytes' Anti-Malware log
  2. DDS log with Attach.txt
  3. GMER log

Link to post
Share on other sites

Hi Borislav , thank you for your help. For some reason, I can't seem to get GMER to run. It keeps freezing on me. I have attached the other files you requested. I hope its sufficient.

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4056

Windows 5.1.2600 Service Pack 3

Internet Explorer 7.0.5730.13

4/30/2010 8:06:39 PM

mbam-log-2010-04-30 (20-06-39).txt

Scan type: Quick scan

Objects scanned: 151865

Time elapsed: 7 minute(s), 33 second(s)

Memory Processes Infected: 1

Memory Modules Infected: 0

Registry Keys Infected: 8

Registry Values Infected: 0

Registry Data Items Infected: 1

Folders Infected: 0

Files Infected: 7

Memory Processes Infected:

C:\WINDOWS\Ftedaa.exe (Trojan.Fraudpack) -> Unloaded process successfully.

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CURRENT_USER\Software\M5T8QL3YW3 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Antimalware Doctor (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\Antimalware Doctor Inc (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\QZAIB7KITK (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 93.188.162.34,93.188.166.117 -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\Ftedaa.exe (Trojan.Fraudpack) -> Quarantined and deleted successfully.

C:\Documents and Settings\sramaiah\Local Settings\Temporary Internet Files\Content.IE5\GVQFK4P2\gotnewupdate[1].exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.

C:\Documents and Settings\sramaiah\Local Settings\Temporary Internet Files\Content.IE5\JC7XPCMZ\rvqxfn[1].htm (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\sramaiah\Local Settings\Temporary Internet Files\Content.IE5\NFB1HRX5\kkemu[1].htm (Rootkit.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\sramaiah\Local Settings\Temporary Internet Files\Content.IE5\X02I1Q0A\hypwhc[1].htm (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\spool\prtprocs\w32x86\b000041ac.dll (Rootkit.Dropper) -> Quarantined and deleted successfully.

C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.

DDS.txt

Attach.txt

Link to post
Share on other sites

Step 1:

Please, uninstall the following applications:

  1. Adobe Reader 9

You can read, how to this in:

Step 2:

Please go into the Control Panel, Add/Remove and for now remove ALL versions of JAVA

Then run this tool to help cleanup any left over Java

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.

Please download JavaRa and unzip it to your desktop.

***Please close any instances of Internet Explorer (or other web browser) before continuing!***

  • Double-click on JavaRa.exe to start the program.
  • From the drop-down menu, choose English and click on Select.
  • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
  • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
  • A logfile will pop up. Please save it to a convenient location and post it back when you reply
    Then look for the following Java folders and if found delete them.
    C:\Program Files\Java
    C:\Program Files\Common Files\Java
    C:\Windows\Sun
    C:\Documents and Settings\All Users\Application Data\Java
    C:\Documents and Settings\All Users\Application Data\Sun\Java
    C:\Documents and Settings\username\Application Data\Java
    C:\Documents and Settings\username\Application Data\Sun\Java

Step 3:

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

In your next reply, please include these log(s) in this sequence:

  1. JavaRa log
  2. ComboFix log

Link to post
Share on other sites

Please go to http://virustotal.com

Next to the "Browse" button, in to the blank field, please paste the following:

c:\windows\system32\flvDX.dll

c:\windows\system32\msfDX.dll

c:\windows\system32\nbDX.dll

Hit SEND FILE. Please be patient, it will take a while to get it scanned. Once all the scanners are done, post back with the results (copy & paste them here)

Link to post
Share on other sites

FlvDX.dll

Antivirus Version Last Update Result

a-squared 4.5.0.50 2010.05.02 -

AhnLab-V3 2010.05.02.00 2010.05.01 -

AntiVir 8.2.1.224 2010.04.30 -

Antiy-AVL 2.0.3.7 2010.04.30 -

Authentium 5.2.0.5 2010.05.01 -

Avast 4.8.1351.0 2010.05.02 -

Avast5 5.0.332.0 2010.05.02 -

AVG 9.0.0.787 2010.05.02 -

BitDefender 7.2 2010.05.02 -

CAT-QuickHeal 10.00 2010.05.01 -

ClamAV 0.96.0.3-git 2010.05.02 -

Comodo 4741 2010.05.02 -

DrWeb 5.0.2.03300 2010.05.02 -

eSafe 7.0.17.0 2010.05.02 -

eTrust-Vet 35.2.7462 2010.04.30 -

F-Prot 4.5.1.85 2010.05.01 -

F-Secure 9.0.15370.0 2010.05.02 -

Fortinet 4.0.14.0 2010.05.02 -

GData 21 2010.05.02 -

Ikarus T3.1.1.80.0 2010.05.02 -

Jiangmin 13.0.900 2010.05.02 -

Kaspersky 7.0.0.125 2010.05.02 -

McAfee 5.400.0.1158 2010.05.02 -

McAfee-GW-Edition 6.8.5 2010.05.02 -

Microsoft 1.5703 2010.05.02 -

NOD32 5080 2010.05.02 -

Norman 6.04.12 2010.05.02 -

nProtect 2010-05-02.01 2010.05.02 -

Panda 10.0.2.7 2010.05.02 -

PCTools 7.0.3.5 2010.05.02 -

Prevx 3.0 2010.05.02 -

Rising 22.45.04.03 2010.04.30 -

Sophos 4.53.0 2010.05.02 -

Sunbelt 6250 2010.05.02 -

Symantec 20091.2.0.41 2010.05.02 -

TheHacker 6.5.2.0.275 2010.05.02 -

TrendMicro 9.120.0.1004 2010.05.02 -

TrendMicro-HouseCall 9.120.0.1004 2010.05.02 -

VBA32 3.12.12.4 2010.04.30 -

ViRobot 2010.5.1.2299 2010.05.02 -

VirusBuster 5.0.27.0 2010.05.02 -

Additional information

File size: 163328 bytes

MD5...: 8453687a045c926f0291301ebaf50370

SHA1..: 8d756345c945b75ef63314fa8992f1b582067ff3

SHA256: 151afe783864d2fcbe6f954d1aef0cb1a157ae41848e2f0478217cddaad61967

ssdeep: 3072:91gwAEW0tqtON2BemdVhxcFtNSrL70RU5P7Rv8OYLI1ejvTeDT:9CwvW0tq

tONy0t4/7B5+y62

PEiD..: -

PEInfo: PE Structure information

( base data )

entrypointaddress.: 0x6bf60

timedatestamp.....: 0x445872ae (Wed May 03 09:06:54 2006)

machinetype.......: 0x14c (I386)

( 3 sections )

name viradd virsiz rawdsiz ntrpy md5

UPX0 0x1000 0x44000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e

UPX1 0x45000 0x28000 0x27200 7.92 8c71ecde07c563755798b56de82cfa8b

.rsrc 0x6d000 0x1000 0x800 3.27 ea079b662ca468ac3b84ac5ae3533871

( 9 imports )

> KERNEL32.DLL: LoadLibraryA, GetProcAddress, VirtualProtect

> ADVAPI32.dll: RegEnumKeyW

> comdlg32.dll: GetFileTitleW

> GDI32.dll: SaveDC

> ole32.dll: CoInitialize

> OLEAUT32.dll: -

> SHLWAPI.dll: PathIsUNCW

> USER32.dll: GetDC

> WINSPOOL.DRV: ClosePrinter

( 4 exports )

DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer

RDS...: NSRL Reference Data Set

-

pdfid.: -

trid..: Win64 Executable Generic (52.5%)

UPX compressed Win32 Executable (18.7%)

Win32 EXE Yoda's Crypter (16.3%)

Win32 Executable Generic (5.2%)

Win32 Dynamic Link Library (generic) (4.6%)

sigcheck:

publisher....: Gabest

copyright....: Copyright © 2005-2006 Gabest

product......: FLV Splitter

description..: FLV Splitter

original name: FLVSplitter.ax

internal name: FLV Splitter

file version.: 1, 0, 0, 1

comments.....: http://gabest.org/

signers......: -

signing date.: -

verified.....: Unsigned

packers (Kaspersky): PE_Patch.UPX, UPX

packers (F-Prot): UPX

======================================

msfDX.dll

Antivirus Version Last Update Result

a-squared 4.5.0.50 2010.05.02 -

AhnLab-V3 2010.05.02.00 2010.05.01 -

AntiVir 8.2.1.224 2010.04.30 -

Antiy-AVL 2.0.3.7 2010.04.30 -

Authentium 5.2.0.5 2010.05.01 -

Avast 4.8.1351.0 2010.05.02 -

Avast5 5.0.332.0 2010.05.02 -

AVG 9.0.0.787 2010.05.02 -

BitDefender 7.2 2010.05.02 -

CAT-QuickHeal 10.00 2010.05.01 -

ClamAV 0.96.0.3-git 2010.05.02 -

Comodo 4741 2010.05.02 -

DrWeb 5.0.2.03300 2010.05.02 -

eSafe 7.0.17.0 2010.05.02 Suspicious File

eTrust-Vet 35.2.7462 2010.04.30 -

F-Prot 4.5.1.85 2010.05.01 -

F-Secure 9.0.15370.0 2010.05.02 -

Fortinet 4.0.14.0 2010.05.02 -

GData 21 2010.05.02 -

Ikarus T3.1.1.80.0 2010.05.02 -

Jiangmin 13.0.900 2010.05.02 -

Kaspersky 7.0.0.125 2010.05.02 -

McAfee 5.400.0.1158 2010.05.02 -

McAfee-GW-Edition 6.8.5 2010.05.02 -

Microsoft 1.5703 2010.05.02 -

NOD32 5080 2010.05.02 -

Norman 6.04.12 2010.05.02 -

nProtect 2010-05-02.01 2010.05.02 -

Panda 10.0.2.7 2010.05.02 -

PCTools 7.0.3.5 2010.05.02 -

Prevx 3.0 2010.05.02 -

Rising 22.45.04.03 2010.04.30 -

Sophos 4.53.0 2010.05.02 -

Sunbelt 6250 2010.05.02 -

Symantec 20091.2.0.41 2010.05.02 -

TheHacker 6.5.2.0.275 2010.05.02 -

TrendMicro 9.120.0.1004 2010.05.02 -

TrendMicro-HouseCall 9.120.0.1004 2010.05.02 -

VBA32 3.12.12.4 2010.04.30 -

ViRobot 2010.5.1.2299 2010.05.02 -

VirusBuster 5.0.27.0 2010.05.02 -

Additional information

File size: 31232 bytes

MD5...: 21d8f42d54598b73c2e1a9571399113b

SHA1..: ed711faa61fdd6d53eacc7a99d60d95dd9137a7d

SHA256: 992e23bddfa1eaaf66cc7ccbef23596be5d2b47aa6a8272028092b4829bde784

ssdeep: 768:Cn1nHSwfnflO/a7ubx6dIN5OKVfNqW190LwiuO:C5yAf6a7EuKtN990L

PEiD..: -

PEInfo: PE Structure information

( base data )

entrypointaddress.: 0x47c0

timedatestamp.....: 0x3f8e4348 (Thu Oct 16 07:05:44 2003)

machinetype.......: 0x14c (I386)

( 3 sections )

name viradd virsiz rawdsiz ntrpy md5

.text 0x1000 0x14000 0x5e00 7.96 2c3b58f66566a8e664c8ea4a5a891296

.rsrc 0x15000 0x2000 0x1600 6.84 345310e90c13175c817748d5d69715bf

.reloc 0x17000 0x1000 0x200 0.22 3bea04e909f4f9d16cc848d4a6c601f5

( 6 imports )

> kernel32.dll: LoadLibraryA, GetProcAddress, VirtualAlloc, VirtualFree

> MSVCRT.dll: _CxxThrowException

> ADVAPI32.dll: RegCreateKeyExA

> USER32.dll: SetRectEmpty

> GDI32.dll: CreateDCA

> ole32.dll: CoInitialize

( 4 exports )

DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer

RDS...: NSRL Reference Data Set

-

pdfid.: -

trid..: Win32 EXE PECompact compressed (v2.x) (48.9%)

Win32 EXE PECompact compressed (generic) (34.4%)

Win32 Executable Generic (7.0%)

Win32 Dynamic Link Library (generic) (6.2%)

Generic Win/DOS Executable (1.6%)

packers (Kaspersky): PE_Patch.PECompact, PecBundle, PECompact

sigcheck:

publisher....: Hans Mayerl

copyright....: n/a

product......: msfDX.dll

description..: msfDX.dll

original name: msfDX.dll

internal name: msfDX.dll

file version.: 2.02.2113

comments.....: MOV Source Filter

signers......: -

signing date.: -

verified.....: Unsigned

packers (F-Prot): PecBundle, PECompact

===============================================

nbDX.dll

Antivirus Version Last Update Result

a-squared 4.5.0.50 2010.05.02 -

AhnLab-V3 2010.05.02.00 2010.05.01 -

AntiVir 8.2.1.224 2010.04.30 -

Antiy-AVL 2.0.3.7 2010.04.30 -

Authentium 5.2.0.5 2010.05.01 -

Avast 4.8.1351.0 2010.05.02 -

Avast5 5.0.332.0 2010.05.02 -

AVG 9.0.0.787 2010.05.02 -

BitDefender 7.2 2010.05.02 -

CAT-QuickHeal 10.00 2010.05.01 -

ClamAV 0.96.0.3-git 2010.05.02 -

Comodo 4741 2010.05.02 -

DrWeb 5.0.2.03300 2010.05.02 -

eSafe 7.0.17.0 2010.05.02 Suspicious File

eTrust-Vet 35.2.7462 2010.04.30 -

F-Prot 4.5.1.85 2010.05.01 -

F-Secure 9.0.15370.0 2010.05.02 -

Fortinet 4.0.14.0 2010.05.02 -

GData 21 2010.05.02 -

Ikarus T3.1.1.80.0 2010.05.02 -

Jiangmin 13.0.900 2010.05.02 -

Kaspersky 7.0.0.125 2010.05.02 -

McAfee 5.400.0.1158 2010.05.02 -

McAfee-GW-Edition 6.8.5 2010.05.02 -

Microsoft 1.5703 2010.05.02 -

NOD32 5080 2010.05.02 -

Norman 6.04.12 2010.05.02 -

nProtect 2010-05-02.01 2010.05.02 -

Panda 10.0.2.7 2010.05.02 -

PCTools 7.0.3.5 2010.05.02 -

Prevx 3.0 2010.05.02 -

Rising 22.45.04.03 2010.04.30 -

Sophos 4.53.0 2010.05.02 -

Sunbelt 6250 2010.05.02 -

Symantec 20091.2.0.41 2010.05.02 -

TheHacker 6.5.2.0.275 2010.05.02 -

TrendMicro 9.120.0.1004 2010.05.02 -

TrendMicro-HouseCall 9.120.0.1004 2010.05.02 -

VBA32 3.12.12.4 2010.04.30 -

ViRobot 2010.5.1.2299 2010.05.02 -

VirusBuster 5.0.27.0 2010.05.02 -

Additional information

File size: 216064 bytes

MD5...: e4b6b932b6e5ce386627ceea2a0a0f4c

SHA1..: b9bcaae7bb27161148e1301fc8d8cd3f568c6e22

SHA256: a0f6231d8f48d8579be4275b95425f80cc5f703730f5f5e9f5b8748a813282f6

ssdeep: 6144:auoML/fwfGnrNibNILomhkHi0hywYDWfclB:auoY4fGrNJLoC0VYDwcl

PEiD..: -

PEInfo: PE Structure information

( base data )

entrypointaddress.: 0xe540

timedatestamp.....: 0x47dd210d (Sun Mar 16 13:30:53 2008)

machinetype.......: 0x14c (I386)

( 3 sections )

name viradd virsiz rawdsiz ntrpy md5

.text 0x1000 0xab000 0x32e00 8.00 ca6fa635de272e225cfc131d9fe20052

.rsrc 0xac000 0x2000 0x1800 6.86 446ef74531ed3e33f7b3852a7184e670

.reloc 0xae000 0x1000 0x200 0.22 8c0a50c2ebb734c97d87d426da67930d

( 8 imports )

> kernel32.dll: LoadLibraryA, GetProcAddress, VirtualAlloc, VirtualFree

> USER32.dll: GrayStringW

> GDI32.dll: ScaleWindowExtEx

> WINSPOOL.DRV: ClosePrinter

> ADVAPI32.dll: RegCreateKeyW

> SHLWAPI.dll: PathFindFileNameW

> ole32.dll: CoTaskMemFree

> OLEAUT32.dll: -

( 4 exports )

DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer

RDS...: NSRL Reference Data Set

-

pdfid.: -

trid..: Win32 EXE PECompact compressed (v2.x) (48.9%)

Win32 EXE PECompact compressed (generic) (34.4%)

Win32 Executable Generic (7.0%)

Win32 Dynamic Link Library (generic) (6.2%)

Generic Win/DOS Executable (1.6%)

sigcheck:

publisher....: MONOGRAM Multimedia, s.r.o.

copyright....: Copyright © 2008

product......: MONOGRAM AMR Filter Pack

description..: AMR Filter Pack

original name: mmamr.ax

internal name: mmamr

file version.: 1, 0, 1, 0

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

packers (Kaspersky): PE_Patch.PECompact, PecBundle, PECompact

packers (F-Prot): PecBundle, PECompact

Link to post
Share on other sites

Thanks!

Step 1:

Open Notepad and copy all the text below:

Windows Registry Editor Version 5.00

[-HKLM\~\startupfolder\C:^Documents and Settings^sramaiah^Start Menu^Programs^Startup^Antimalware Doctor.lnk]

Save this as fix.reg to your Desktop (remember to select Save as file type: All files in Notepad.)

Double Click fix.reg and click YES for confirm.

Reboot your computer.

Step 2:

Please read the following through carefully so that you understand what to do.

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK. (If Vista, click on the Vista Orb and copy and paste the following into the Search field. (make sure you include the quotation marks) Then press Ctrl+Shift+Enter.)
    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v
  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
  • It may ask you to reboot the computer to complete the process. Allow it to do so.
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

Link to post
Share on other sites

Here you go!

16:09:19:668 1944 TDSS rootkit removing tool 2.2.8.1 Mar 22 2010 10:43:04

16:09:19:668 1944 ================================================================================

16:09:19:668 1944 SystemInfo:

16:09:19:668 1944 OS Version: 5.1.2600 ServicePack: 3.0

16:09:19:668 1944 Product type: Workstation

16:09:19:668 1944 ComputerName: HOME

16:09:19:668 1944 UserName: SRamaiah

16:09:19:668 1944 Windows directory: C:\WINDOWS

16:09:19:668 1944 Processor architecture: Intel x86

16:09:19:668 1944 Number of processors: 2

16:09:19:668 1944 Page size: 0x1000

16:09:19:668 1944 Boot type: Normal boot

16:09:19:668 1944 ================================================================================

16:09:19:697 1944 UnloadDriverW: NtUnloadDriver error 2

16:09:19:697 1944 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2

16:09:19:727 1944 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system

16:09:19:727 1944 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

16:09:19:727 1944 wfopen_ex: Trying to KLMD file open

16:09:19:727 1944 wfopen_ex: File opened ok (Flags 2)

16:09:19:727 1944 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software

16:09:19:727 1944 wfopen_ex: MyNtCreateFileW error 32 (C0000043)

16:09:19:727 1944 wfopen_ex: Trying to KLMD file open

16:09:19:727 1944 wfopen_ex: File opened ok (Flags 2)

16:09:19:727 1944 Initialize success

16:09:19:727 1944

16:09:19:727 1944 Scanning Services ...

16:09:19:801 1944 Raw services enum returned 360 services

16:09:19:801 1944

16:09:19:801 1944 Scanning Kernel memory ...

16:09:19:801 1944 Devices to scan: 3

16:09:19:801 1944

16:09:19:801 1944 Driver Name: Disk

16:09:19:801 1944 IRP_MJ_CREATE : BA0EEBB0

16:09:19:801 1944 IRP_MJ_CREATE_NAMED_PIPE : 804F4562

16:09:19:801 1944 IRP_MJ_CLOSE : BA0EEBB0

16:09:19:801 1944 IRP_MJ_READ : BA0E8D1F

16:09:19:801 1944 IRP_MJ_WRITE : BA0E8D1F

16:09:19:801 1944 IRP_MJ_QUERY_INFORMATION : 804F4562

16:09:19:801 1944 IRP_MJ_SET_INFORMATION : 804F4562

16:09:19:801 1944 IRP_MJ_QUERY_EA : 804F4562

16:09:19:801 1944 IRP_MJ_SET_EA : 804F4562

16:09:19:801 1944 IRP_MJ_FLUSH_BUFFERS : BA0E92E2

16:09:19:801 1944 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562

16:09:19:801 1944 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562

16:09:19:801 1944 IRP_MJ_DIRECTORY_CONTROL : 804F4562

16:09:19:801 1944 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562

16:09:19:801 1944 IRP_MJ_DEVICE_CONTROL : BA0E93BB

16:09:19:801 1944 IRP_MJ_INTERNAL_DEVICE_CONTROL : BA0ECF28

16:09:19:801 1944 IRP_MJ_SHUTDOWN : BA0E92E2

16:09:19:801 1944 IRP_MJ_LOCK_CONTROL : 804F4562

16:09:19:801 1944 IRP_MJ_CLEANUP : 804F4562

16:09:19:801 1944 IRP_MJ_CREATE_MAILSLOT : 804F4562

16:09:19:801 1944 IRP_MJ_QUERY_SECURITY : 804F4562

16:09:19:801 1944 IRP_MJ_SET_SECURITY : 804F4562

16:09:19:801 1944 IRP_MJ_POWER : BA0EAC82

16:09:19:801 1944 IRP_MJ_SYSTEM_CONTROL : BA0EF99E

16:09:19:801 1944 IRP_MJ_DEVICE_CHANGE : 804F4562

16:09:19:801 1944 IRP_MJ_QUERY_QUOTA : 804F4562

16:09:19:801 1944 IRP_MJ_SET_QUOTA : 804F4562

16:09:19:816 1944 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1

16:09:19:816 1944

16:09:19:816 1944 Driver Name: Disk

16:09:19:816 1944 IRP_MJ_CREATE : BA0EEBB0

16:09:19:816 1944 IRP_MJ_CREATE_NAMED_PIPE : 804F4562

16:09:19:816 1944 IRP_MJ_CLOSE : BA0EEBB0

16:09:19:816 1944 IRP_MJ_READ : BA0E8D1F

16:09:19:816 1944 IRP_MJ_WRITE : BA0E8D1F

16:09:19:816 1944 IRP_MJ_QUERY_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_SET_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_EA : 804F4562

16:09:19:816 1944 IRP_MJ_SET_EA : 804F4562

16:09:19:816 1944 IRP_MJ_FLUSH_BUFFERS : BA0E92E2

16:09:19:816 1944 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_DIRECTORY_CONTROL : 804F4562

16:09:19:816 1944 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562

16:09:19:816 1944 IRP_MJ_DEVICE_CONTROL : BA0E93BB

16:09:19:816 1944 IRP_MJ_INTERNAL_DEVICE_CONTROL : BA0ECF28

16:09:19:816 1944 IRP_MJ_SHUTDOWN : BA0E92E2

16:09:19:816 1944 IRP_MJ_LOCK_CONTROL : 804F4562

16:09:19:816 1944 IRP_MJ_CLEANUP : 804F4562

16:09:19:816 1944 IRP_MJ_CREATE_MAILSLOT : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_SECURITY : 804F4562

16:09:19:816 1944 IRP_MJ_SET_SECURITY : 804F4562

16:09:19:816 1944 IRP_MJ_POWER : BA0EAC82

16:09:19:816 1944 IRP_MJ_SYSTEM_CONTROL : BA0EF99E

16:09:19:816 1944 IRP_MJ_DEVICE_CHANGE : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_QUOTA : 804F4562

16:09:19:816 1944 IRP_MJ_SET_QUOTA : 804F4562

16:09:19:816 1944 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1

16:09:19:816 1944

16:09:19:816 1944 Driver Name: iaStor

16:09:19:816 1944 IRP_MJ_CREATE : B9E9AFBA

16:09:19:816 1944 IRP_MJ_CREATE_NAMED_PIPE : 804F4562

16:09:19:816 1944 IRP_MJ_CLOSE : B9E9AFBA

16:09:19:816 1944 IRP_MJ_READ : 804F4562

16:09:19:816 1944 IRP_MJ_WRITE : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_SET_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_EA : 804F4562

16:09:19:816 1944 IRP_MJ_SET_EA : 804F4562

16:09:19:816 1944 IRP_MJ_FLUSH_BUFFERS : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562

16:09:19:816 1944 IRP_MJ_DIRECTORY_CONTROL : 804F4562

16:09:19:816 1944 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562

16:09:19:816 1944 IRP_MJ_DEVICE_CONTROL : B9E988E8

16:09:19:816 1944 IRP_MJ_INTERNAL_DEVICE_CONTROL : 8A0F7BB0

16:09:19:816 1944 IRP_MJ_SHUTDOWN : 804F4562

16:09:19:816 1944 IRP_MJ_LOCK_CONTROL : 804F4562

16:09:19:816 1944 IRP_MJ_CLEANUP : 804F4562

16:09:19:816 1944 IRP_MJ_CREATE_MAILSLOT : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_SECURITY : 804F4562

16:09:19:816 1944 IRP_MJ_SET_SECURITY : 804F4562

16:09:19:816 1944 IRP_MJ_POWER : B9E91FBC

16:09:19:816 1944 IRP_MJ_SYSTEM_CONTROL : B9E9150A

16:09:19:816 1944 IRP_MJ_DEVICE_CHANGE : 804F4562

16:09:19:816 1944 IRP_MJ_QUERY_QUOTA : 804F4562

16:09:19:816 1944 IRP_MJ_SET_QUOTA : 804F4562

16:09:19:831 1944 C:\WINDOWS\system32\drivers\iaStor.sys - Verdict: 1

16:09:19:831 1944

16:09:19:831 1944 Completed

16:09:19:831 1944

16:09:19:831 1944 Results:

16:09:19:831 1944 Memory objects infected / cured / cured on reboot: 0 / 0 / 0

16:09:19:831 1944 Registry objects infected / cured / cured on reboot: 0 / 0 / 0

16:09:19:831 1944 File objects infected / cured / cured on reboot: 0 / 0 / 0

16:09:19:831 1944

16:09:19:831 1944 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system

16:09:19:831 1944 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software

16:09:19:831 1944 KLMD(ARK) unloaded successfully

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.