Sign in to follow this  
jamesriby

Help! Problem I can't get rid of and which Norton 360 doesn't seem able to fix.

Recommended Posts

Hi all

A few weeks ago I seem to have picked up a problem with my internet browser (Internet Explorer 8 running on Windows Vista SP 2, 32 bit). When I search anything (and whichever engine I use, whether Google, Bing etc) some of the links get automatically re-directed to ad sites. The ad sites are usually linked vaguely with the topic of my search and the results it threw up. The re-direction always passes through one particular site - www.noranioheggt.com/search.php?q=[name of the link which I clicked on] - before being re-directed yet futher to the site it dumps me on to.

Anyone know how I might fix this? Spydig, Ad Aware and Norton 360 can't seem to kill it, nor Microsoft's Malicious Software Removal Tool.

I've run GMER and the log is as follows:

GMER 1.0.15.15530 - [url="http://www.gmer.net"]http://www.gmer.net[/url]
Rootkit quick scan 2010-11-15 21:30:55
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0 Hitachi_ rev.BBFO
Running: c7e06tmb.exe; Driver: C:\Users\MYCOMP~1\AppData\Local\Temp\axroiuoc.sys


---- Devices - GMER 1.0.15 ----
AttachedDevice \Driver\tdx \Device\Ip SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\Tcp SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\Udp SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\RawIp SYMTDIV.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----



Thanks

James

Share this post


Link to post
Share on other sites
[color="#FF0000"][b]Please read carefully and follow these steps.[/b][/color] [list]
[*]Download [b][url="http://support.kaspersky.com/downloads/utils/tdsskiller.zip"]TDSSKiller[/url][/b] and save it to your Desktop.
[*]Extract its contents to your desktop.
[*]Once extracted, open the TDSSKiller folder and doubleclick on [b]TDSSKiller.exe[/b] to run the application, then on [b]Start Scan.[/b]


[img]http://i466.photobucket.com/albums/rr21/JSntgRvr/TDSSKillermain.png[/img]


[*]If an infected file is detected, the default action will be [b]Cure[/b], click on [b]Continue.[/b]


[img]http://i466.photobucket.com/albums/rr21/JSntgRvr/TDSSKillerMal-1.png[/img]


[*]If a suspicious file is detected, the default action will be [b]Skip[/b], click on [b]Continue.[/b]


[img]http://i466.photobucket.com/albums/rr21/JSntgRvr/TDSSKillerSuspicious-1.png[/img]


[*]It may ask you to reboot the computer to complete the process. Click on [b]Reboot Now[/b].


[img]http://i466.photobucket.com/albums/rr21/JSntgRvr/TDSSKillerCompleted.png[/img]


[*]If no reboot is require, click on [b]Report[/b]. A log file should appear. Please copy and paste the contents of that file here.
[*]If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "[b]TDSSKiller.[Version]_[Date]_[Time]_log.txt[/b]". Please copy and paste the contents of that file here.
[/list]

Share this post


Link to post
Share on other sites
Sign in to follow this