My brothers laptop has a problem booting, it automatically shows a BSOD: dumping memory to physical disk
Initially I thought it could be a RAM-related problem, but after a MBAM-scan I found following items:
c:/users/xxx/appdata/roaming/avdrn.dat
c:/users/xxx/appdata/roaming/fvgqad.dat
c:/windows/system32/evdrm.sys
If this does not clear it I may need to use a stronger tool
Start OTS. Copy/Paste the information in the quotebox below into the pane where it says “Paste fix here” and then click the Run Fix button.
[Unregister Dlls]
[Files/Folders - Modified Within 30 Days]
NY -> egvzm.sys -> C:\Windows\System32\drivers\egvzm.sys
[Files - No Company Name]
NY -> egvzm.sys -> C:\Windows\System32\drivers\egvzm.sys
[Custom Scans]
YY -> desktop.ini -> c:\$recycle.bin\S-1-5-21-2152478756-3922319563-605102323-500\desktop.ini
YY -> desktop.ini -> c:\$recycle.bin\S-1-5-21-2815755638-1480285660-2120787009-500\desktop.ini
YY -> desktop.ini -> c:\$recycle.bin\S-1-5-21-3514180388-4221529941-4065199933-1000\desktop.ini
YY -> desktop.ini -> c:\$recycle.bin\S-1-5-21-3514180388-4221529941-4065199933-500\desktop.ini
[Empty Temp Folders]
The fix should only take a very short time. When the fix is completed a message box will popup telling you that it is finished. Click the Ok button and Notepad will open with a log of actions taken during the fix. Post that information back here along with a new OTS log.
I will review the information when it comes back in.
Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.
Double-click gmer.exe. The program will begin to run.
Caution
These types of scans can produce false positives. Do NOT take any action on any “<— ROOKIT” entries unless advised!
If possible rootkit activity is found, you will be asked if you would like to perform a full scan.
[*]Click NO
[*]In the right panel, you will see a bunch of boxes that have been checked … leave everything checked and ensure the Show all box is un-checked.
[*]Now click the Scan button. Once the scan is complete, you may receive another notice about rootkit activity.
[]Click OK.
[]GMER will produce a log. Click on the [Save…] button, and in the File name area, type in “GMER.txt”
[*]Save it where you can easily find it, such as your desktop.
Post the contents of GMER.txt in your next reply.
Also let me know of any problems you encountered performing the steps above or any continuing problems you are still having with the computer.
Thanks for the fast answer, I’ll have a look at my brothers laptop this weekend.
Yesterday I used mbam on his laptop to remove the three files I mentioned above. (Was this a safe action?)
This was a good start: his laptop can boot normally again.
But I’ll have to perform your prescribed actions asap.
I advised him to change all his paswords on a clean pc.
Mbam is een goede tool, in het bijzonder sinds Uw landgenote, MiekieMoes uit Brugge Assistant Director of Research @ Malwarebytes werd en deze dame is ook een exellente malware eliminator. zie: http://miekiemoes.blogspot.com/
Maar volg ook alle instructies van essexboy nauwgezet op, hij heeft een gelijkaardige achtergrond en heeft dezelde online outbuilding als MiekieMoes,
P.S.: I connected my own external harddrive to my brothers laptop (vista) to make a backup, before we made an intervention.
Now, I worry if it’s safe enough to connect my external HD to my own laptop (win7) again? Is it possible that the rootkit transferred itself to my external HD?
Just switch back to English, because that is the main forum language. Well before you should venture out on such an exercise secure the usb stick in question it cannot get infected. Read the info here:
1: scan with MBAM (without actions, see ‘mbam-log-2010-02-07 (11-13-08).txt’ )
2: scan with OTS (with your parameters, without actions, see ‘2010-02-07 11-34 OTS.Txt’)
3: performed actions with OTS as prescribed in your reply (see ‘OTS-log 02072010_113601.txt’)
4: scan with OTS (with your parameters, without actions, see ‘2010-02-07 11-52 OTS.Txt’)
5: scan with MBAM (without actions, see 'mbam-log-2010-02-07 (11-58-04).txt ')
6: scan with GMER (see gmer 2010-02-07.log )
As you can see, OTS couldn’t remove evdrm.sys. It’s still present as visible in the logs (OTS, MBAM, GMER).
I hope you can figure this out and help me further.
Thanks in advance!!
OK OTS was not strong enough to kill the rootkit - so it is hammer time
Please downloadThe Avenger2 by Swandog46 to your Desktop.
[*]Right click on the Avenger.zip folder and select “Extract All…”
[*] Follow the prompts and extract the avenger folder to your desktop
Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):
Begin copying here:
Files to delete:
C:\Windows\System32\drivers\egvzm.sys
Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.
Now, open the avenger folder and start The Avenger program by clicking on its icon.
[*] Right click on the window under Input script here:, and select Paste.
[*] You can also Paste the text copied to the clipboard into this window by pressing (Ctrl+V), or click on the third button under the menu to paste it from the clipboard.
[*] Click on Execute
[*] Answer “Yes” twice when prompted.
The Avenger will automatically do the following:
[*]It will Restart your computer. ( In cases where the code to execute contains “Drivers to Delete” or “Drivers to Disable”, The Avenger will actually restart your system twice.)
[*]After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
[*] The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
Please copy/paste the content of c:\avenger.txt into your reply
I’m the brother jan.vanderborght is referring to. I’ve installed the Avenger tool, and tried several times to remove the malware. But avanger seems not to do anything. I’ve copied ALL the text in your codebox and Avanger ask to reboot. My system reboots, but then nothing happens. No window of Avenger, no log file found, no map created by Avenger, malware still there. Could it be that something is blocking the Avenger to run at startup? (by example; windows defender, Panda virus scanner…)
[*]Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
[*]Double click on ComboFix.exe & follow the prompts.
[*]As part of it’s process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it’s strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
[*]Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it’s malware removal procedures.
OK I can see the driver now, if this fails I have one other tool ;D
Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):
Begin copying here:
Drivers to delete:
egvzm
Files to delete:
C:\Windows\System32\drivers\egvzm.sys
Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.
Now, open the avenger folder and start The Avenger program by clicking on its icon.
[*] Right click on the window under Input script here:, and select Paste.
[*] You can also Paste the text copied to the clipboard into this window by pressing (Ctrl+V), or click on the third button under the menu to paste it from the clipboard.
[*] Click on Execute
[*] Answer “Yes” twice when prompted.
The Avenger will automatically do the following:
[*]It will Restart your computer. ( In cases where the code to execute contains “Drivers to Delete” or “Drivers to Disable”, The Avenger will actually restart your system twice.)
[*]After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
[*] The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
Please copy/paste the content of c:\avenger.txt into your reply [b]