Solved Tidserv virus - redirecting webpages

Status
Not open for further replies.

lizmcreations

Posts: 60   +0
Hi,

I have a Tidserv virus, at least that is what the error from my Norton is telling me. However, when I do a full scan with Norton it does not remove it.

My websites, mostly from searches, are being redirected - so when I do a search I can't actually go to the pages that are shown unless I put the URL in the addressbar myself - can't click on the links without my browser redirecting me to some other page. Despite my Norton telling me that it prevented the tidserv request from accessing the computer.

I have obviously turned off my Norton, per the 8 steps. Attached are the logs from the steps.

Thank you!

Liz Martinez
 

Attachments

  • mbam-log-2010-04-08 (10-42-40).txt
    2.6 KB · Views: 3
  • hijackthis.log
    12.5 KB · Views: 3
  • SUPERAntiSpyware Scan Log - 04-08-2010 - 13-40-11.log
    7.5 KB · Views: 2
Your Malwarebytes log says "No action taken" after each line.
You need to re-run it, apply all fixes and post fresh log.

Additionally, AFTER you're done with MBAM...

Download TDSSKiller and save it to your Desktop.
Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

"%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.
When it is done, a log file should be created on your C: drive called TDSSKiller.txt please copy and paste the contents of that file here.
 
Sorry, I did fix the problems the first time I ran the malwarebytes, but didn't save the log for after everything was fixed.

Both files attached because the file I looked at for the original scan says "quarantined and deleted successfully" .. so maybe I attached the wrong file the first time ... Yes, I did attach the wrong file the first time ... the right file is attached, I removed the extra log that was attached that has no information in it ... Thank you!

Also, I have run the TDSKiller.exe program a few times today ... always with the same result ... atapi.sys file is infected, but will be fixed after re-boot, but I've rebooted multiple times and no fix. Here is the output log for this most recent run of TDSKiller.exe.

Let me know what else I should do .... thanks!

17:13:37:585 5696 TDSS rootkit removing tool 2.2.8.1 Mar 22 2010 10:43:04
17:13:37:585 5696 ================================================================================
17:13:37:585 5696 SystemInfo:

17:13:37:585 5696 OS Version: 6.0.6002 ServicePack: 2.0
17:13:37:585 5696 Product type: Workstation
17:13:37:585 5696 ComputerName: LIZ-LAPTOP
17:13:37:585 5696 UserName: Liz
17:13:37:585 5696 Windows directory: C:\Windows
17:13:37:585 5696 Processor architecture: Intel x86
17:13:37:585 5696 Number of processors: 2
17:13:37:585 5696 Page size: 0x1000
17:13:37:585 5696 Boot type: Normal boot
17:13:37:585 5696 ================================================================================
17:13:37:585 5696 UnloadDriverW: NtUnloadDriver error 2
17:13:37:585 5696 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
17:13:37:788 5696 wfopen_ex: Trying to open file C:\Windows\system32\config\system
17:13:37:788 5696 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
17:13:37:788 5696 wfopen_ex: Trying to KLMD file open
17:13:37:788 5696 wfopen_ex: File opened ok (Flags 2)
17:13:37:819 5696 wfopen_ex: Trying to open file C:\Windows\system32\config\software
17:13:37:819 5696 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
17:13:37:819 5696 wfopen_ex: Trying to KLMD file open
17:13:37:819 5696 wfopen_ex: File opened ok (Flags 2)
17:13:37:819 5696 Initialize success
17:13:37:819 5696
17:13:37:819 5696 Scanning Services ...
17:13:38:974 5696 Raw services enum returned 449 services
17:13:38:989 5696
17:13:38:989 5696 Scanning Kernel memory ...
17:13:38:989 5696 Devices to scan: 2
17:13:38:989 5696
17:13:38:989 5696 Driver Name: USBSTOR
17:13:38:989 5696 IRP_MJ_CREATE : 915BBFC8
17:13:38:989 5696 IRP_MJ_CREATE_NAMED_PIPE : 82428A22
17:13:38:989 5696 IRP_MJ_CLOSE : 915BC040
17:13:38:989 5696 IRP_MJ_READ : 915BC0B8
17:13:38:989 5696 IRP_MJ_WRITE : 915BC0B8
17:13:38:989 5696 IRP_MJ_QUERY_INFORMATION : 82428A22
17:13:38:989 5696 IRP_MJ_SET_INFORMATION : 82428A22
17:13:38:989 5696 IRP_MJ_QUERY_EA : 82428A22
17:13:38:989 5696 IRP_MJ_SET_EA : 82428A22
17:13:38:989 5696 IRP_MJ_FLUSH_BUFFERS : 82428A22
17:13:38:989 5696 IRP_MJ_QUERY_VOLUME_INFORMATION : 82428A22
17:13:38:989 5696 IRP_MJ_SET_VOLUME_INFORMATION : 82428A22
17:13:38:989 5696 IRP_MJ_DIRECTORY_CONTROL : 82428A22
17:13:38:989 5696 IRP_MJ_FILE_SYSTEM_CONTROL : 82428A22
17:13:38:989 5696 IRP_MJ_DEVICE_CONTROL : 915BBBC4
17:13:38:989 5696 IRP_MJ_INTERNAL_DEVICE_CONTROL : 915AF7E4
17:13:38:989 5696 IRP_MJ_SHUTDOWN : 82428A22
17:13:38:989 5696 IRP_MJ_LOCK_CONTROL : 82428A22
17:13:38:989 5696 IRP_MJ_CLEANUP : 82428A22
17:13:38:989 5696 IRP_MJ_CREATE_MAILSLOT : 82428A22
17:13:38:989 5696 IRP_MJ_QUERY_SECURITY : 82428A22
17:13:38:989 5696 IRP_MJ_SET_SECURITY : 82428A22
17:13:38:989 5696 IRP_MJ_POWER : 915BA59C
17:13:38:989 5696 IRP_MJ_SYSTEM_CONTROL : 915B77A2
17:13:38:989 5696 IRP_MJ_DEVICE_CHANGE : 82428A22
17:13:38:989 5696 IRP_MJ_QUERY_QUOTA : 82428A22
17:13:38:989 5696 IRP_MJ_SET_QUOTA : 82428A22
17:13:39:005 5696 C:\Windows\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
17:13:39:005 5696
17:13:39:005 5696 Driver Name: atapi
17:13:39:005 5696 IRP_MJ_CREATE : 85F0EAC8
17:13:39:005 5696 IRP_MJ_CREATE_NAMED_PIPE : 85F0EAC8
17:13:39:005 5696 IRP_MJ_CLOSE : 85F0EAC8
17:13:39:005 5696 IRP_MJ_READ : 85F0EAC8
17:13:39:005 5696 IRP_MJ_WRITE : 85F0EAC8
17:13:39:005 5696 IRP_MJ_QUERY_INFORMATION : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SET_INFORMATION : 85F0EAC8
17:13:39:005 5696 IRP_MJ_QUERY_EA : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SET_EA : 85F0EAC8
17:13:39:005 5696 IRP_MJ_FLUSH_BUFFERS : 85F0EAC8
17:13:39:005 5696 IRP_MJ_QUERY_VOLUME_INFORMATION : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SET_VOLUME_INFORMATION : 85F0EAC8
17:13:39:005 5696 IRP_MJ_DIRECTORY_CONTROL : 85F0EAC8
17:13:39:005 5696 IRP_MJ_FILE_SYSTEM_CONTROL : 85F0EAC8
17:13:39:005 5696 IRP_MJ_DEVICE_CONTROL : 85F0EAC8
17:13:39:005 5696 IRP_MJ_INTERNAL_DEVICE_CONTROL : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SHUTDOWN : 85F0EAC8
17:13:39:005 5696 IRP_MJ_LOCK_CONTROL : 85F0EAC8
17:13:39:005 5696 IRP_MJ_CLEANUP : 85F0EAC8
17:13:39:005 5696 IRP_MJ_CREATE_MAILSLOT : 85F0EAC8
17:13:39:005 5696 IRP_MJ_QUERY_SECURITY : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SET_SECURITY : 85F0EAC8
17:13:39:005 5696 IRP_MJ_POWER : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SYSTEM_CONTROL : 85F0EAC8
17:13:39:005 5696 IRP_MJ_DEVICE_CHANGE : 85F0EAC8
17:13:39:005 5696 IRP_MJ_QUERY_QUOTA : 85F0EAC8
17:13:39:005 5696 IRP_MJ_SET_QUOTA : 85F0EAC8
17:13:39:005 5696 Driver "atapi" infected by TDSS rootkit!
17:13:39:005 5696 C:\Windows\system32\drivers\atapi.sys - Verdict: 1
17:13:39:005 5696 File "C:\Windows\system32\drivers\atapi.sys" infected by TDSS rootkit ... 17:13:39:005 5696 Processing driver file: C:\Windows\system32\drivers\atapi.sys
17:13:41:953 5696 vfvi6
17:13:42:078 5696 dsvbh1
17:13:45:307 5696 fdfb1
17:13:45:307 5696 Backup copy found, using it..
17:13:45:573 5696 will be cured on next reboot
17:13:45:573 5696 Reboot required for cure complete..
17:13:45:713 5696 Cure on reboot scheduled successfully
17:13:45:713 5696
17:13:45:713 5696 Completed
17:13:45:713 5696
17:13:45:713 5696 Results:
17:13:45:713 5696 Memory objects infected / cured / cured on reboot: 1 / 0 / 0
17:13:45:713 5696 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
17:13:45:713 5696 File objects infected / cured / cured on reboot: 1 / 0 / 1
17:13:45:713 5696
17:13:45:713 5696 fclose_ex: Trying to close file C:\Windows\system32\config\system
17:13:45:713 5696 fclose_ex: Trying to close file C:\Windows\system32\config\software
17:13:45:713 5696 UnloadDriverW: NtUnloadDriver error 1
17:13:45:869 5696 KLMD(ARK) unloaded successfully
 

Attachments

  • mbam-log-2010-04-08 (10-43-47).txt
    2.9 KB · Views: 2
Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  1. Please, never rename Combofix unless instructed.
  2. Close any open browsers.
  3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    NOTE1. If Combofix asks you to install Recovery Console, please allow it.
    NOTE 2. If Combofix asks you to update the program, always do so.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
  4. Double click on combofix.exe & follow the prompts.
  5. When finished, it will produce a report for you.
  6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Make sure, you re-enable your security programs, when you're done with Combofix.

DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
 
Ok, done ... attached is the log file, plus another hijackthis file.

I'm still having the redirect issue.

What's my next step?

Thank you!
 

Attachments

  • combofix-log.txt
    28.2 KB · Views: 2
  • hijackthis2.log
    11.8 KB · Views: 1
1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

Code:
KillAll::

File::
c:\users\Liz\AppData\Local\3848741744.dll
c:\windows\system32\drivers\tsk333F.tmp


Folder::
c:\program files\vmndtx

Driver::

Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{078fed71-52f2-4a49-a0ab-6453e2ca72ba}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D63F58E9-B8BB-4DBA-B2A0-44F72C2A61BD}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{078fed71-52f2-4a49-a0ab-6453e2ca72ba}"=-
[-HKEY_CLASSES_ROOT\clsid\{078fed71-52f2-4a49-a0ab-6453e2ca72ba}]
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\atapi]
"ImagePath"=-


RegLockDel::

MBR::


3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

CFScript.gif



5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
  • A new HijackThis log.
 
OK, done .... and still having the same problem :(

Logs attached ...

Next step?


Thank you!

Liz Martinez
 

Attachments

  • combofix-log2.txt
    62.4 KB · Views: 2
  • hijackthis3.log
    11.5 KB · Views: 0
I expected that. Your computer is not clean yet.

Please download Profiles by noahdfear.

* Save it to your desktop.
* Double-click profiles.exe and post its log when you reply.

========================================================================

Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
Alternative downloads:
- http://majorgeeks.com/GMER_d5198.html
- http://www.softpedia.com/get/Interne...ers/GMER.shtml
Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
When scan is completed, click Save button, and save the results as gmer.log
Warning ! Please, do not select the "Show all" checkbox during the scan.
Post the log to your next reply.
 
OK, both are done ... attached are the logs. What's the next step ... still having the redirect problem ...

Thank you very much for your help, by the way ... I really appreciate it.

Liz
 

Attachments

  • gmer.log
    1 KB · Views: 4
  • prof.txt
    991 bytes · Views: 3
Ok ... done. AND, even better, I tested a search and I was able to do a search and actually go to the page/link I clicked ... no more random redirect.... spoke too soon ... back to redirect.

The log is attached though, just want to make sure that my system is fully cleaned.

Thank you -- let me know if I need to do anything else to fully clear my system.

Liz
 

Attachments

  • combofix-log3.txt
    27.5 KB · Views: 1
I'm glad to hear it :)

Uninstall Combofix:
Go Start > Run [Vista users, go Start>"Start search"]
Type in:
Combofix /Uninstall
Note the space between the "Combofix" and the "/Uninstall"
Click OK (Vista users - press Enter).
Restart computer.

======================================================================

1. Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.


2. Go to Kaspersky website and perform an online antivirus scan.

1. Disable your active antivirus program.
2. Read through the requirements and privacy statement and click on Accept button.
3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
4. When the downloads have finished, click on Settings.
5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

  • Spyware, Adware, Dialers, and other potentially dangerous programs
    [*] Archives
    [*] Mail databases
6. Click on My Computer under Scan.
7. Once the scan is complete, it will display the results. Click on View Scan Report.
8. You will see a list of infected items there. Click on Save Report As....
9. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.

Post fresh HijackThis log as well.
 
Alright ... kaspersky scan run ... and log attached as well as the hijackthis log.

However, I spoke too soon before ... I'm still having the random redirect problem. Although, I was able to search a couple times without having the sites redirected ... but they seem to have been isolated incidents. I searched after the 3rd Combofix scan once, and then posted here ... then I went back and searched again and had the problem.

Then, I had to close everything and opened firefox again and was once again able to do one search without the redirect problem ... but every search after that had the problem still.

Also, at the end of the kaspersky log it says "scan stopped by user" ... I stopped it because I forgot that I had a cd in my DVD-rom drive and it was scanning the cd which I didn't think was necessary and it had already been running for over 9 hours ....

Let me know what the next step is ... thank you!

Liz
 

Attachments

  • kaspersky-report.txt
    5.8 KB · Views: 1
  • hijackthislog.txt
    12.4 KB · Views: 0
I think, I know, what is causing this.
Let's get rid of infected files first.

Please download OTM

  • Save it to your desktop.
  • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

Code:
:Processes

:Services

:Reg

:Files
C:\Users\Liz\Documents\Best Marketing Secrets\ExternalSEOTraffic-Rights.zip	
C:\Users\Liz\Documents\Capture Pages\13gb templates\CELLPHONE 1\1111Javagamesappnokia\1111JAVAgamesappsnokia.zip	
C:\Users\Liz\Documents\Capture Pages\13gb templates\CELLPHONE 1\cellphone.zip	
C:\Users\Liz\Documents\Capture Pages\13gb templates\mixedebooks\123 mixed ebooks\Cash Flow Secrets.zip	
C:\Users\Liz\Documents\Capture Pages\13gb templates\mixedebooks\mixedebooks.zip	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\index.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\InUse.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\Template1.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\Template2.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\Sales-Letter-Creator-Rebrander\Template3.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\InUse.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\Template1.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\Template2.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\bin\Template3.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\Template1.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\Template2.html	
C:\Users\Liz\Documents\Diginet\Sales Letter Creator\Source-Code\SLC-Source-Code\Template3.html	
C:\Users\Liz\Documents\Diginet\SalesPage Rapid Fire\salespage\index.html	
C:\Users\Liz\Documents\Master Resale Rights Club\AdseseInbox-Rights.zip	
C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\Download\ezmembershipsystem.zip	
C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\Download\ezms\install instructions.htm	
C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\downloadpage.htm	
C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\index.htm	
C:\Users\Liz\Documents\Master Resale Rights Club\ez membership site\phoenix_ezmem.zip	
C:\Users\Liz\Documents\Master Resale Rights Club\headlinecreator.zip
C:\Users\Liz\Documents\Master Resale Rights Club\ifican.zip	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\branding\website-files\download\download.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\branding\website-files\download\index.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\branding\website-files\index.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\download.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\download\index.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\index.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\sales-letter\index.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\website-files\download\download.html	
C:\Users\Liz\Documents\My Web Sites\30kchallenge\website-files\download\index.html	
C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\my-ebook\index.html	
C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\re-brand\index.html	
C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\viral-book\download.html	
C:\Users\Liz\Documents\My Web Sites\YourHomeBizGuide\viral-book\index.html
      
:Commands
[purity]
[resethosts]
[emptytemp]
[Reboot]

  • Return to OTM, right click in the Paste Instructions for Items to be Movedwindow (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM and reboot your PC.

Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

======================================================================

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Vista users:: Right click on SystemLook.exe, click Run As Administrator
  • Copy the content of the following box into the main textfield:
    Code:
    :filefibd
    atapi.sys
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
 
Ok, both tasks performed .... I had to stop the first run of OTM because it stopped responding before it finished ... but the second time around it finished and rebooted.

Here is the log of the systemlook:

SystemLook v1.0 by jpshortstuff (11.01.10)
Log created at 12:43 on 10/04/2010 by Liz (Administrator - Elevation successful)

Invalid Context: filefibd

No Context: atapi.sys

-=End Of File=-

Next step?

Thanks so much for your time and assistance.

Liz
 
I apologize. I misspelled the code.

Run SystemLook again with this code:

Code:
:filefind
atapi.sys
 
Oops! I didn't even notice or think that it was spelled wrong!

Here is the output using the right code:

SystemLook v1.0 by jpshortstuff (11.01.10)
Log created at 16:38 on 10/04/2010 by Liz (Administrator - Elevation successful)

========== filefind ==========

Searching for "atapi.sys"
C:\Windows\ERDNT\cache\atapi.sys --a--- 19944 bytes [23:29 08/04/2010] [22:52 08/04/2010] 1F05B78AB91C9075565A9D8A4B880BC4
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys --a--- 19944 bytes [12:09 15/12/2009] [06:32 11/04/2009] 1F05B78AB91C9075565A9D8A4B880BC4
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_c6c2e699\atapi.sys --a--- 19048 bytes [10:25 02/11/2006] [09:49 02/11/2006] 4F4FCB8B6EA06784FB6D475B7EC7300F
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_cc18792d\atapi.sys --a--- 21560 bytes [02:23 21/01/2008] [02:23 21/01/2008] 2D9C903DC76A66813D350A562DE40ED9
C:\Windows\System32\drivers\atapi.sys --a--- 19944 bytes [12:09 15/12/2009] [17:27 10/04/2010] 1F05B78AB91C9075565A9D8A4B880BC4
C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6001.18000_none_dd38281a2189ce9c\atapi.sys --a--- 21560 bytes [02:23 21/01/2008] [02:23 21/01/2008] 2D9C903DC76A66813D350A562DE40ED9
C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1261eab99e8\atapi.sys --a--- 19944 bytes [12:09 15/12/2009] [06:32 11/04/2009] 1F05B78AB91C9075565A9D8A4B880BC4

-=End Of File=-
 
1. Please download The Avenger to your Desktop.
  • Right click on the Avenger.zip folder and select "Extract All..."
  • Follow the prompts and extract the Avenger folder to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


Code:
Begin copying here:
Files to move:
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys | C:\Windows\System32\drivers\atapi.sys
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys | C:\Windows\ERDNT\cache\atapi.sys


3. Now, open the avenger folder and start The Avenger program by clicking on its icon.

  • Right click on the window under Input script here:, and select Paste.
  • You can also click on this window and press (Ctrl+V) to paste the contents of the clipboard.
  • Click on Execute
  • Answer "Yes" twice when prompted.
4. The Avenger will automatically do the following:

  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command windowon your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also back up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
5. Please copy/paste the content of c:\avenger.txt into your reply
 
Ok, only restarted once ... here is the log file:

http://swandog46.geekstogo.com

Platform: Windows Vista

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File move operation "C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys|C:\Windows\System32\drivers\atapi.sys" completed successfully.

Error: file "C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys" not found!
File move operation "C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys|C:\Windows\ERDNT\cache\atapi.sys" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist


Completed script processing.

*******************

Finished! Terminate.



I tested several searches and so far no random redirects ... But, I notice it said that two of the files didn't exist or couldn't be found .. I'm assuming the file location was taken from the "systemlook" log which found those files ... so maybe it isn't 100% fixed?

Let me know if I need to do anything else ...

Thank you!

Liz
 
nope ... back to redirecting :( ... but, I guess getting a few searches before it starts is better than not getting any searches at all ... it is going in the right direction though :)

Liz
 
It's my fault the second command didn't complete.
The first command was the most important, but let's straight it up.

Using OTM, you already have on your desktop....


  • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

Code:
:Processes

:Services
      
:Reg

:Files
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys|C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys /replace
C:\Windows\ERDNT\cache\atapi.sys|C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys /replace

:Commands
[purity]
[emptytemp]
[Reboot]

  • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM and reboot your PC.
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
 
ok, OTM run again ... Here is the log file:

All processes killed
========== PROCESSES ==========
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
File C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys not found.
File C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6002.18005_none_df23a1 261eab99e8\atapi.sys not found.
========== COMMANDS ==========

[EMPTYTEMP]

User: All Users

User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Liz
->Temp folder emptied: 11813636 bytes
->Temporary Internet Files folder emptied: 1036699 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 34516469 bytes
->Apple Safari cache emptied: 0 bytes
->Flash cache emptied: 1142 bytes

User: Public
->Temp folder emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 131696 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 36230186 bytes
%systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 589 bytes
RecycleBin emptied: 139256 bytes

Total Files Cleaned = 80.00 mb


OTM by OldTimer - Version 3.1.10.1 log created on 04102010_183134

Files moved on Reboot...
File move failed. C:\Windows\temp\WebEx\Log\410\atashost.log scheduled to be moved on reboot.
File C:\Windows\temp\hsperfdata_LIZ-LAPTOP$\1120 not found!
C:\Windows\temp\00002TY10004.CDX moved successfully.
C:\Windows\temp\00002TY10005.CDX moved successfully.
C:\Windows\temp\00002TY10006.CDX moved successfully.
File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VI3IVH63\activityi;src=1984865;type=ttcom362;cat=ttcom510;ord=1;num=2689726250009[1].htm not found!
File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8RP9XYP7\blank[3].htm not found!
File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8RP9XYP7\iepngfix[1].htc not found!
File C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7JQAO0KG\turbotax_intuit_com[1].txt not found!

Registry entries deleted on Reboot...


Liz
 
Try different code:

Code:
:Processes

:Services
      
:Reg

:Files
C:\Windows\ERDNT\cache\atapi.sys|C:\Windows\System32\drivers\atapi.sys /replace

:Commands
[purity]
[emptytemp]
[Reboot]
 
Ok, here's the report:

All processes killed
========== PROCESSES ==========
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
File C:\Windows\ERDNT\cache\atapi.sys successfully replaced with C:\Windows\System32\drivers\atapi.sys
========== COMMANDS ==========

[EMPTYTEMP]

User: All Users

User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Liz
->Temp folder emptied: 161033 bytes
->Temporary Internet Files folder emptied: 274816 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 18395827 bytes
->Apple Safari cache emptied: 0 bytes
->Flash cache emptied: 434 bytes

User: Public
->Temp folder emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 626 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 301199 bytes
%systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 0 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 18.00 mb


OTM by OldTimer - Version 3.1.10.1 log created on 04102010_190720

Files moved on Reboot...
File move failed. C:\Windows\temp\WebEx\Log\410\atashost.log scheduled to be moved on reboot.
C:\Windows\temp\00000OPL0004.CDX moved successfully.
C:\Windows\temp\00000OPL0005.CDX moved successfully.
C:\Windows\temp\00000OPL0006.CDX moved successfully.

Registry entries deleted on Reboot...


Liz
 
Status
Not open for further replies.
Back