Hi,
I know you are all busy and I know I've been daft but someone's help would be most appreciated.
I have suffered an attach by Anti Malware Doctor and immediately ran Malwarebytes Antimalware to get rid of it. I thought I had cleaned it up at first then strange things started to happen: multiple system crashes, Orange version of Internet Explorer not working, Windows update prevented, emails attempting to send(but being blocked by my ESET AV software ).
I've been fighting for control of my PC ever since.
The MBAM log:
Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943
03/09/2010 12:09:40
mbam-log-2010-09-03 (12-09-40).txt
Scan type: Quick scan
Objects scanned: 175696
Time elapsed: 15 minute(s), 4 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 12
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 6
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_CLASSES_ROOT\AppID\{84c3c236-f588-4c93-84f4-147b2abbe67b} (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Antimalware Doctor Inc (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Antimalware Doctor (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$NtUninstallMTF1011$ (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c81f3d4f-b2f5-45df-9a59-35fd2ecdffe2} (Adware.AdRotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c81f3d4f-b2f5-45df-9a59-35fd2ecdffe2} (Adware.AdRotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d25254b7-4b6b-4435-bc21-13c1b69a1b89} (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{d25254b7-4b6b-4435-bc21-13c1b69a1b89} (Adware.Adrotator) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mrsnwaecxo.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mediafix70700en02.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
C:\Windows\$NtUninstallMTF1011$ (Adware.Adrotator) -> Quarantined and deleted successfully.
Files Infected:
C:\Users\Colin\AppData\Local\Temp\mrsnwaecxo.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Users\Colin\AppData\Local\Temp\aencwmosxr.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\Users\Colin\AppData\Local\Temp\st_witty820_1930.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\Windows\$NtUninstallMTF1011$\apUninstall.exe (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Windows\$NtUninstallMTF1011$\zrpt.xml (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Users\Colin\AppData\Roaming\85FFBFA0CE4C8B154609F9CD53054136\mediafix70700en02.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Reading the DaniWeb instructions, I have run Microsoft Malicious Software Tool and several other programs. The MMST found something in quick scan and suggested a full can. The computor crashed halfway through and each time was unsuccessful.
GMER ran for the first pass but would not run the second time with boxes unchecked as instructed. I tried several times (including in Safe Mode) and each time either it was stopped or the machine crashed.....here is the log
MER 1.0.15.15281 - http://www.gmer.net
Rootkit quick scan 2010-09-10 10:46:32
Windows 6.0.6002 Service Pack 2
Running: 3jbyz8yc.exe; Driver: C:\Users\Colin\AppData\Local\Temp\kwldyfow.sys
---- Devices - GMER 1.0.15 ----
AttachedDevice \FileSystem\Ntfs \Ntfs eamon.sys (Amon monitor/ESET)
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\fastfat \Fat eamon.sys (Amon monitor/ESET)
AttachedDevice \Driver\tdx \Device\Ip epfwtdi.sys (Eset Personal Firewall TDI filter/ESET)
AttachedDevice \Driver\tdx \Device\Tcp epfwtdi.sys (Eset Personal Firewall TDI filter/ESET)
AttachedDevice \Driver\tdx \Device\Udp epfwtdi.sys (Eset Personal Firewall TDI filter/ESET)
AttachedDevice \Driver\tdx \Device\RawIp epfwtdi.sys (Eset Personal Firewall TDI filter/ESET)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 TSIKBF5.SYS (Remote Control Component/Laplink Software, Inc.)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 TSIKBF5.SYS (Remote Control Component/Laplink Software, Inc.)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
Device -> \Driver\atapi \Device\Harddisk0\DR0 8546EEC5
---- Files - GMER 1.0.15 ----
File C:\Windows\system32\drivers\atapi.sys suspicious modification
---- EOF - GMER 1.0.15 ----
The last instruction was to run DDS: this immediately results in a text file full of code but I can't see how to run it if it is a program.
There you go. Can anyone help?