TechSpot

Tidserv virus - redirecting webpages

Solved
By lizmcreations
Apr 8, 2010
  1. Hi,

    I have a Tidserv virus, at least that is what the error from my Norton is telling me. However, when I do a full scan with Norton it does not remove it.

    My websites, mostly from searches, are being redirected - so when I do a search I can't actually go to the pages that are shown unless I put the URL in the addressbar myself - can't click on the links without my browser redirecting me to some other page. Despite my Norton telling me that it prevented the tidserv request from accessing the computer.

    I have obviously turned off my Norton, per the 8 steps. Attached are the logs from the steps.

    Thank you!

    Liz Martinez
     

    Attached Files:

  2. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    Your Malwarebytes log says "No action taken" after each line.
    You need to re-run it, apply all fixes and post fresh log.

    Additionally, AFTER you're done with MBAM...

    Download TDSSKiller and save it to your Desktop.
    Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
    Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

    If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
    When it is done, a log file should be created on your C: drive called TDSSKiller.txt please copy and paste the contents of that file here.
     
  3. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Sorry, I did fix the problems the first time I ran the malwarebytes, but didn't save the log for after everything was fixed.

    Both files attached because the file I looked at for the original scan says "quarantined and deleted successfully" .. so maybe I attached the wrong file the first time ... Yes, I did attach the wrong file the first time ... the right file is attached, I removed the extra log that was attached that has no information in it ... Thank you!

    Also, I have run the TDSKiller.exe program a few times today ... always with the same result ... atapi.sys file is infected, but will be fixed after re-boot, but I've rebooted multiple times and no fix. Here is the output log for this most recent run of TDSKiller.exe.

    Let me know what else I should do .... thanks!

    17:13:37:585 5696 TDSS rootkit removing tool 2.2.8.1 Mar 22 2010 10:43:04
    17:13:37:585 5696 ================================================================================
    17:13:37:585 5696 SystemInfo:

    17:13:37:585 5696 OS Version: 6.0.6002 ServicePack: 2.0
    17:13:37:585 5696 Product type: Workstation
    17:13:37:585 5696 ComputerName: LIZ-LAPTOP
    17:13:37:585 5696 UserName: Liz
    17:13:37:585 5696 Windows directory: C:\Windows
    17:13:37:585 5696 Processor architecture: Intel x86
    17:13:37:585 5696 Number of processors: 2
    17:13:37:585 5696 Page size: 0x1000
    17:13:37:585 5696 Boot type: Normal boot
    17:13:37:585 5696 ================================================================================
    17:13:37:585 5696 UnloadDriverW: NtUnloadDriver error 2
    17:13:37:585 5696 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
    17:13:37:788 5696 wfopen_ex: Trying to open file C:\Windows\system32\config\system
    17:13:37:788 5696 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
    17:13:37:788 5696 wfopen_ex: Trying to KLMD file open
    17:13:37:788 5696 wfopen_ex: File opened ok (Flags 2)
    17:13:37:819 5696 wfopen_ex: Trying to open file C:\Windows\system32\config\software
    17:13:37:819 5696 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
    17:13:37:819 5696 wfopen_ex: Trying to KLMD file open
    17:13:37:819 5696 wfopen_ex: File opened ok (Flags 2)
    17:13:37:819 5696 Initialize success
    17:13:37:819 5696
    17:13:37:819 5696 Scanning Services ...
    17:13:38:974 5696 Raw services enum returned 449 services
    17:13:38:989 5696
    17:13:38:989 5696 Scanning Kernel memory ...
    17:13:38:989 5696 Devices to scan: 2
    17:13:38:989 5696
    17:13:38:989 5696 Driver Name: USBSTOR
    17:13:38:989 5696 IRP_MJ_CREATE : 915BBFC8
    17:13:38:989 5696 IRP_MJ_CREATE_NAMED_PIPE : 82428A22
    17:13:38:989 5696 IRP_MJ_CLOSE : 915BC040
    17:13:38:989 5696 IRP_MJ_READ : 915BC0B8
    17:13:38:989 5696 IRP_MJ_WRITE : 915BC0B8
    17:13:38:989 5696 IRP_MJ_QUERY_INFORMATION : 82428A22
    17:13:38:989 5696 IRP_MJ_SET_INFORMATION : 82428A22
    17:13:38:989 5696 IRP_MJ_QUERY_EA : 82428A22
    17:13:38:989 5696 IRP_MJ_SET_EA : 82428A22
    17:13:38:989 5696 IRP_MJ_FLUSH_BUFFERS : 82428A22
    17:13:38:989 5696 IRP_MJ_QUERY_VOLUME_INFORMATION : 82428A22
    17:13:38:989 5696 IRP_MJ_SET_VOLUME_INFORMATION : 82428A22
    17:13:38:989 5696 IRP_MJ_DIRECTORY_CONTROL : 82428A22
    17:13:38:989 5696 IRP_MJ_FILE_SYSTEM_CONTROL : 82428A22
    17:13:38:989 5696 IRP_MJ_DEVICE_CONTROL : 915BBBC4
    17:13:38:989 5696 IRP_MJ_INTERNAL_DEVICE_CONTROL : 915AF7E4
    17:13:38:989 5696 IRP_MJ_SHUTDOWN : 82428A22
    17:13:38:989 5696 IRP_MJ_LOCK_CONTROL : 82428A22
    17:13:38:989 5696 IRP_MJ_CLEANUP : 82428A22
    17:13:38:989 5696 IRP_MJ_CREATE_MAILSLOT : 82428A22
    17:13:38:989 5696 IRP_MJ_QUERY_SECURITY : 82428A22
    17:13:38:989 5696 IRP_MJ_SET_SECURITY : 82428A22
    17:13:38:989 5696 IRP_MJ_POWER : 915BA59C
    17:13:38:989 5696 IRP_MJ_SYSTEM_CONTROL : 915B77A2
    17:13:38:989 5696 IRP_MJ_DEVICE_CHANGE : 82428A22
    17:13:38:989 5696 IRP_MJ_QUERY_QUOTA : 82428A22
    17:13:38:989 5696 IRP_MJ_SET_QUOTA : 82428A22
    17:13:39:005 5696 C:\Windows\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
    17:13:39:005 5696
    17:13:39:005 5696 Driver Name: atapi
    17:13:39:005 5696 IRP_MJ_CREATE : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_CREATE_NAMED_PIPE : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_CLOSE : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_READ : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_WRITE : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_QUERY_INFORMATION : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SET_INFORMATION : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_QUERY_EA : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SET_EA : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_FLUSH_BUFFERS : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_QUERY_VOLUME_INFORMATION : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SET_VOLUME_INFORMATION : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_DIRECTORY_CONTROL : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_FILE_SYSTEM_CONTROL : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_DEVICE_CONTROL : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_INTERNAL_DEVICE_CONTROL : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SHUTDOWN : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_LOCK_CONTROL : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_CLEANUP : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_CREATE_MAILSLOT : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_QUERY_SECURITY : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SET_SECURITY : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_POWER : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SYSTEM_CONTROL : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_DEVICE_CHANGE : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_QUERY_QUOTA : 85F0EAC8
    17:13:39:005 5696 IRP_MJ_SET_QUOTA : 85F0EAC8
    17:13:39:005 5696 Driver "atapi" infected by TDSS rootkit!
    17:13:39:005 5696 C:\Windows\system32\drivers\atapi.sys - Verdict: 1
    17:13:39:005 5696 File "C:\Windows\system32\drivers\atapi.sys" infected by TDSS rootkit ... 17:13:39:005 5696 Processing driver file: C:\Windows\system32\drivers\atapi.sys
    17:13:41:953 5696 vfvi6
    17:13:42:078 5696 dsvbh1
    17:13:45:307 5696 fdfb1
    17:13:45:307 5696 Backup copy found, using it..
    17:13:45:573 5696 will be cured on next reboot
    17:13:45:573 5696 Reboot required for cure complete..
    17:13:45:713 5696 Cure on reboot scheduled successfully
    17:13:45:713 5696
    17:13:45:713 5696 Completed
    17:13:45:713 5696
    17:13:45:713 5696 Results:
    17:13:45:713 5696 Memory objects infected / cured / cured on reboot: 1 / 0 / 0
    17:13:45:713 5696 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
    17:13:45:713 5696 File objects infected / cured / cured on reboot: 1 / 0 / 1
    17:13:45:713 5696
    17:13:45:713 5696 fclose_ex: Trying to close file C:\Windows\system32\config\system
    17:13:45:713 5696 fclose_ex: Trying to close file C:\Windows\system32\config\software
    17:13:45:713 5696 UnloadDriverW: NtUnloadDriver error 1
    17:13:45:869 5696 KLMD(ARK) unloaded successfully
     

    Attached Files:

  4. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  5. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Ok, done ... attached is the log file, plus another hijackthis file.

    I'm still having the redirect issue.

    What's my next step?

    Thank you!
     

    Attached Files:

  6. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    KillAll::
    
    File::
    c:\users\Liz\AppData\Local\3848741744.dll
    c:\windows\system32\drivers\tsk333F.tmp
    
    
    Folder::
    c:\program files\vmndtx
    
    Driver::
    
    Registry::
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{078fed71-52f2-4a49-a0ab-6453e2ca72ba}]
    [-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D63F58E9-B8BB-4DBA-B2A0-44F72C2A61BD}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{078fed71-52f2-4a49-a0ab-6453e2ca72ba}"=-
    [-HKEY_CLASSES_ROOT\clsid\{078fed71-52f2-4a49-a0ab-6453e2ca72ba}]
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Services\atapi]
    "ImagePath"=-
    
    
    RegLockDel::
    
    MBR::
    
    

    3. Save the above as CFScript.txt

    4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
    • A new HijackThis log.
     
  7. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    OK, done .... and still having the same problem :(

    Logs attached ...

    Next step?


    Thank you!

    Liz Martinez
     

    Attached Files:

  8. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    I expected that. Your computer is not clean yet.

    Please download Profiles by noahdfear.

    * Save it to your desktop.
    * Double-click profiles.exe and post its log when you reply.

    ========================================================================

    Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.
     
  9. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    OK, both are done ... attached are the logs. What's the next step ... still having the redirect problem ...

    Thank you very much for your help, by the way ... I really appreciate it.

    Liz
     

    Attached Files:

  10. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    anymore suggestions?

    Thanks!
     
  11. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    Delete you Combofix file, download fresh one, run it and post fresh log.
     
     
  12. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Ok ... done. AND, even better, I tested a search and I was able to do a search and actually go to the page/link I clicked ... no more random redirect.... spoke too soon ... back to redirect.

    The log is attached though, just want to make sure that my system is fully cleaned.

    Thank you -- let me know if I need to do anything else to fully clear my system.

    Liz
     

    Attached Files:

  13. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    I'm glad to hear it :)

    Uninstall Combofix:
    Go Start > Run [Vista users, go Start>"Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall"
    Click OK (Vista users - press Enter).
    Restart computer.

    ======================================================================

    1. Download Temp File Cleaner (TFC)
    Double click on TFC.exe to run the program.
    Click on Start button to begin cleaning process.
    TFC will close all running programs, and it may ask you to restart computer.


    2. Go to Kaspersky website and perform an online antivirus scan.

    1. Disable your active antivirus program.
    2. Read through the requirements and privacy statement and click on Accept button.
    3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    4. When the downloads have finished, click on Settings.
    5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

    • Spyware, Adware, Dialers, and other potentially dangerous programs
      [*] Archives
      [*] Mail databases
    6. Click on My Computer under Scan.
    7. Once the scan is complete, it will display the results. Click on View Scan Report.
    8. You will see a list of infected items there. Click on Save Report As....
    9. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.

    Post fresh HijackThis log as well.
     
  14. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Alright ... kaspersky scan run ... and log attached as well as the hijackthis log.

    However, I spoke too soon before ... I'm still having the random redirect problem. Although, I was able to search a couple times without having the sites redirected ... but they seem to have been isolated incidents. I searched after the 3rd Combofix scan once, and then posted here ... then I went back and searched again and had the problem.

    Then, I had to close everything and opened firefox again and was once again able to do one search without the redirect problem ... but every search after that had the problem still.

    Also, at the end of the kaspersky log it says "scan stopped by user" ... I stopped it because I forgot that I had a cd in my DVD-rom drive and it was scanning the cd which I didn't think was necessary and it had already been running for over 9 hours ....

    Let me know what the next step is ... thank you!

    Liz
     

    Attached Files:

  15. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    I think, I know, what is causing this.
    Let's get rid of infected files first.

    Please download OTM

    • Save it to your desktop.
    • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
    • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    Code:
    :Processes
    
    :Services
    
    :Reg
    
    :Files
    C:\Users\Liz\Documents\Best Marketing Secrets\ExternalSEOTraffic-Rights.zip	
    C:\Users\Liz\Documents\Capture Pages\13gb templates\CELLPHONE 1\1111Javagamesappnokia\1111JAVAgamesappsnokia.zip	
    C:\Users\Liz\Documents\Capture Pages\13gb templates\CELLPHONE 1\cellphone.zip	
    C:\Users\Liz\Documents\Capture Pages\13gb templates\mixedebooks\123 mixed ebooks\Cash Flow Secrets.zip	
    C:\Users\Liz\Documents\Capture Pages\13gb templates\mixedebooks\mixedebooks.zip	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\index.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\InUse.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\Template1.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\Template2.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\Template3.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\InUse.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\Template1.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\Template2.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\Template3.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\Template1.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\Template2.html	
    C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\Template3.html	
    C:\Users\Liz\Documents\Diginet\SalesPage Rapid Fire\salespage\index.html	
    C:\Users\Liz\Documents\Master Resale Rights Club\AdseseInbox-Rights.zip	
    C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\Download\ezmembershipsystem.zip	
    C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\Download\ezms\install instructions.htm	
    C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\downloadpage.htm	
    C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\index.htm	
    C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\phoenix_ezmem.zip	
    C:\Users\Liz\Documents\Master Resale Rights Club\headlinecreator.zip
    C:\Users\Liz\Documents\Master Resale Rights Club\ifican.zip	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\branding\website-files\download\download.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\branding\website-files\download\index.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\branding\website-files\index.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\download.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\index.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\index.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\sales-letter\index.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\website-files\download\download.html	
    C:\Users\Liz\Documents\My Web Sites\30kchallenge\website-files\download\index.html	
    C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\my-ebook\index.html	
    C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\re-brand\index.html	
    C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\viral-book\download.html	
    C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\viral-book\index.html
          
    :Commands
    [purity]
    [resethosts]
    [emptytemp]
    [Reboot]
    
    • Return to OTM, right click in the Paste Instructions for Items to be Movedwindow (under the yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
    • Close OTM and reboot your PC.

    Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

    ======================================================================

    Please download SystemLook from one of the links below and save it to your Desktop.
    Download Mirror #1
    Download Mirror #2

    • Double-click SystemLook.exe to run it.
    • Vista users:: Right click on SystemLook.exe, click Run As Administrator
    • Copy the content of the following box into the main textfield:
      Code:
      :filefibd
      atapi.sys
      
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  16. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Ok, both tasks performed .... I had to stop the first run of OTM because it stopped responding before it finished ... but the second time around it finished and rebooted.

    Here is the log of the systemlook:

    SystemLook v1.0 by jpshortstuff (11.01.10)
    Log created at 12:43 on 10/04/2010 by Liz (Administrator - Elevation successful)

    Invalid Context: filefibd

    No Context: atapi.sys

    -=End Of File=-

    Next step?

    Thanks so much for your time and assistance.

    Liz
     
  17. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    I apologize. I misspelled the code.

    Run SystemLook again with this code:

    Code:
    :filefind
    atapi.sys
     
  18. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Oops! I didn't even notice or think that it was spelled wrong!

    Here is the output using the right code:

    SystemLook v1.0 by jpshortstuff (11.01.10)
    Log created at 16:38 on 10/04/2010 by Liz (Administrator - Elevation successful)

    ========== filefind ==========

    Searching for "atapi.sys"
    C:\Windows\ERDNT\cache\atapi.sys --a--- 19944 bytes [23:29 08/04/2010] [22:52 08/04/2010] 1F05B78AB91C9075565A9D8A4B880BC4
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys --a--- 19944 bytes [12:09 15/12/2009] [06:32 11/04/2009] 1F05B78AB91C9075565A9D8A4B880BC4
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_c6c2e699\atapi.sys --a--- 19048 bytes [10:25 02/11/2006] [09:49 02/11/2006] 4F4FCB8B6EA06784FB6D475B7EC7300F
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_cc18792d\atapi.sys --a--- 21560 bytes [02:23 21/01/2008] [02:23 21/01/2008] 2D9C903DC76A66813D350A562DE40ED9
    C:\Windows\System32\drivers\atapi.sys --a--- 19944 bytes [12:09 15/12/2009] [17:27 10/04/2010] 1F05B78AB91C9075565A9D8A4B880BC4
    C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6001.18000_none_dd38281a2189ce9c\atapi.sys --a--- 21560 bytes [02:23 21/01/2008] [02:23 21/01/2008] 2D9C903DC76A66813D350A562DE40ED9
    C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1261eab99e8\atapi.sys --a--- 19944 bytes [12:09 15/12/2009] [06:32 11/04/2009] 1F05B78AB91C9075565A9D8A4B880BC4

    -=End Of File=-
     
  19. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    1. Please download The Avenger to your Desktop.
    • Right click on the Avenger.zip folder and select "Extract All..."
    • Follow the prompts and extract the Avenger folder to your desktop
    2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


    Code:
    Begin copying here:
    Files to move:
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys | C:\Windows\System32\drivers\atapi.sys
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys | C:\Windows\ERDNT\cache\atapi.sys
    

    3. Now, open the avenger folder and start The Avenger program by clicking on its icon.

    • Right click on the window under Input script here:, and select Paste.
    • You can also click on this window and press (Ctrl+V) to paste the contents of the clipboard.
    • Click on Execute
    • Answer "Yes" twice when prompted.
    4. The Avenger will automatically do the following:

    • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete", The Avenger will actually restart your system twice.)
    • On reboot, it will briefly open a black command windowon your desktop, this is normal.
    • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
    • The Avenger will also back up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
    5. Please copy/paste the content of c:\avenger.txt into your reply
     
  20. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Ok, only restarted once ... here is the log file:

    http://swandog46.geekstogo.com

    Platform: Windows Vista

    *******************

    Script file opened successfully.
    Script file read successfully.

    Backups directory opened successfully at C:\Avenger

    *******************

    Beginning to process script file:

    Rootkit scan active.
    No rootkits found!

    File move operation "C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys|C:\Windows\System32\drivers\atapi.sys" completed successfully.

    Error: file "C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys" not found!
    File move operation "C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys|C:\Windows\ERDNT\cache\atapi.sys" failed!
    Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
    --> the object does not exist


    Completed script processing.

    *******************

    Finished! Terminate.



    I tested several searches and so far no random redirects ... But, I notice it said that two of the files didn't exist or couldn't be found .. I'm assuming the file location was taken from the "systemlook" log which found those files ... so maybe it isn't 100% fixed?

    Let me know if I need to do anything else ...

    Thank you!

    Liz
     
  21. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    nope ... back to redirecting :( ... but, I guess getting a few searches before it starts is better than not getting any searches at all ... it is going in the right direction though :)

    Liz
     
  22. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    It's my fault the second command didn't complete.
    The first command was the most important, but let's straight it up.

    Using OTM, you already have on your desktop....


    • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
    • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    Code:
    :Processes
    
    :Services
          
    :Reg
    
    :Files
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys|C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys /replace
    C:\Windows\ERDNT\cache\atapi.sys|C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys /replace
    
    :Commands
    [purity]
    [emptytemp]
    [Reboot]
    
    • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
    • Close OTM and reboot your PC.
    Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
     
  23. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    ok, OTM run again ... Here is the log file:

    All processes killed
    ========== PROCESSES ==========
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    File C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys not found.
    File C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys not found.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Liz
    ->Temp folder emptied: 11813636 bytes
    ->Temporary Internet Files folder emptied: 1036699 bytes
    ->Java cache emptied: 0 bytes
    ->FireFox cache emptied: 34516469 bytes
    ->Apple Safari cache emptied: 0 bytes
    ->Flash cache emptied: 1142 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 131696 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 36230186 bytes
    %systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 589 bytes
    RecycleBin emptied: 139256 bytes

    Total Files Cleaned = 80.00 mb


    OTM by OldTimer - Version 3.1.10.1 log created on 04102010_183134

    Files moved on Reboot...
    File move failed. C:\Windows\temp\WebEx\Log\410\atashost.log scheduled to be moved on reboot.
    File C:\Windows\temp\hsperfdata_LIZ-LAPTOP$\1120 not found!
    C:\Windows\temp\00002TY10004.CDX moved successfully.
    C:\Windows\temp\00002TY10005.CDX moved successfully.
    C:\Windows\temp\00002TY10006.CDX moved successfully.
    File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VI3IVH63\activityi;src=1984865;type=ttcom362;cat=ttcom510;ord=1;num=2689726250009[1].htm not found!
    File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8RP9XYP7\blank[3].htm not found!
    File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8RP9XYP7\iepngfix[1].htc not found!
    File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7JQAO0KG\turbotax_intuit_com[1].txt not found!

    Registry entries deleted on Reboot...


    Liz
     
  24. Broni

    Broni Malware Annihilator Posts: 47,675   +267

    Try different code:

    Code:
    :Processes
    
    :Services
          
    :Reg
    
    :Files
    C:\Windows\ERDNT\cache\atapi.sys|C:\Windows\System32\drivers\atapi.sys /replace
    
    :Commands
    [purity]
    [emptytemp]
    [Reboot]
     
  25. lizmcreations

    lizmcreations TS Rookie Topic Starter Posts: 60

    Ok, here's the report:

    All processes killed
    ========== PROCESSES ==========
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    File C:\Windows\ERDNT\cache\atapi.sys successfully replaced with C:\Windows\System32\drivers\atapi.sys
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Liz
    ->Temp folder emptied: 161033 bytes
    ->Temporary Internet Files folder emptied: 274816 bytes
    ->Java cache emptied: 0 bytes
    ->FireFox cache emptied: 18395827 bytes
    ->Apple Safari cache emptied: 0 bytes
    ->Flash cache emptied: 434 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 626 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 301199 bytes
    %systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 18.00 mb


    OTM by OldTimer - Version 3.1.10.1 log created on 04102010_190720

    Files moved on Reboot...
    File move failed. C:\Windows\temp\WebEx\Log\410\atashost.log scheduled to be moved on reboot.
    C:\Windows\temp\00000OPL0004.CDX moved successfully.
    C:\Windows\temp\00000OPL0005.CDX moved successfully.
    C:\Windows\temp\00000OPL0006.CDX moved successfully.

    Registry entries deleted on Reboot...


    Liz
     
Topic Status:
Not open for further replies.


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.