ntoskrnl.exe Error, need this fix by tomorrow morning

Hello, let me just say that I have been a big fan of the Avast Anti-Virus software and I have recommended it to all my friends and clients. I am a rookie IT repair man, and lately I’ve been fixing up laptops, most notably optimizing Windows. Most of my clients have slow performances due to infections however, my only solution has only been a full system restore. Currently is there a way to fix ntoskrnl.exe? I used aswMBR.exe and it detected this in my clients Windows 7 laptop. Let me provide the official log

aswMBR version 0.9.9.1707 Copyright(c) 2011 AVAST Software
Run date: 2013-01-16 20:24:51

20:24:51.805 OS Version: Windows x64 6.1.7600
20:24:51.805 Number of processors: 2 586 0x170A
20:24:51.805 ComputerName: TOM-PC UserName: Tom
20:24:52.258 Initialize success
20:24:52.320 AVAST engine defs: 12103100
20:24:55.580 Disk 0 (boot) \Device\Harddisk0\DR0 → \Device\Ide\IdeDeviceP0T0L0-0
20:24:55.596 Disk 0 Vendor: WDC_WD2500BEVT-75A23T0 01.01A01 Size: 238475MB BusType: 11
20:24:55.596 Device \Driver\atapi → MajorFunction fffffa8004a565e8
20:24:55.596 Disk 0 MBR read successfully
20:24:55.596 Disk 0 MBR scan
20:24:55.612 Disk 0 Windows 7 default MBR code
20:24:55.612 Disk 0 MBR hidden
20:24:55.612 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
20:24:55.627 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 238373 MB offset 206848
20:24:55.627 Disk 0 scanning C:\Windows\system32\drivers
20:25:04.207 Service scanning
20:25:30.727 Modules scanning
20:25:30.727 Disk 0 trace - called modules:
20:25:30.743 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xfffffa8004a565e8]<<
20:25:30.743 1 nt!IofCallDriver → \Device\Harddisk0\DR0[0xfffffa8004434670]
20:25:30.759 3 CLASSPNP.SYS[fffff8800192b43f] → nt!IofCallDriver → \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa80036e4680]
20:25:30.759 \Driver\atapi[0xfffffa80045a2b20] → IRP_MJ_CREATE → 0xfffffa8004a565e8
20:25:31.242 AVAST engine scan C:\Windows
20:25:33.629 AVAST engine scan C:\Windows\system32
20:28:29.394 AVAST engine scan C:\Windows\system32\drivers
20:28:39.332 AVAST engine scan C:\Users\Tom
20:30:23.774 Disk 0 MBR has been saved successfully to “F:\MBR.dat”
20:30:23.789 The log file has been saved successfully to “F:\aswMBR.txt”

aswMBR version 0.9.9.1707 Copyright(c) 2011 AVAST Software
Run date: 2013-01-17 12:11:36

12:11:36.552 OS Version: Windows x64 6.1.7600
12:11:36.552 Number of processors: 2 586 0x170A
12:11:36.552 ComputerName: TOM-PC UserName: Tom
12:11:37.207 Initialize success
12:11:37.535 AVAST engine defs: 12103100
12:11:39.672 Disk 0 (boot) \Device\Harddisk0\DR0 → \Device\Ide\IdeDeviceP0T0L0-0
12:11:39.688 Disk 0 Vendor: WDC_WD2500BEVT-75A23T0 01.01A01 Size: 238475MB BusType: 11
12:11:39.688 Device \Driver\atapi → MajorFunction fffffa80049c95e8
12:11:39.688 Disk 0 MBR read successfully
12:11:39.688 Disk 0 MBR scan
12:11:39.703 Disk 0 Windows 7 default MBR code
12:11:39.719 Disk 0 MBR hidden
12:11:39.750 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
12:11:39.766 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 238373 MB offset 206848
12:11:39.828 Disk 0 scanning C:\Windows\system32\drivers
12:11:55.381 Service scanning
12:12:22.759 Modules scanning
12:12:22.759 Disk 0 trace - called modules:
12:12:22.775 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xfffffa80049c95e8]<<
12:12:22.775 1 nt!IofCallDriver → \Device\Harddisk0\DR0[0xfffffa8004549370]
12:12:22.791 3 CLASSPNP.SYS[fffff8800197b43f] → nt!IofCallDriver → \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa80040d2060]
12:12:22.791 \Driver\atapi[0xfffffa80049a12d0] → IRP_MJ_CREATE → 0xfffffa80049c95e8
12:12:23.259 AVAST engine scan C:\Windows
12:12:25.942 AVAST engine scan C:\Windows\system32
12:15:52.627 AVAST engine scan C:\Windows\system32\drivers
12:16:03.952 AVAST engine scan C:\Users\Tom
13:14:55.767 AVAST engine scan C:\ProgramData
13:20:26.691 Scan finished successfully
13:30:19.616 Disk 0 MBR has been saved successfully to “F:\MBR.dat”
13:30:19.632 The log file has been saved successfully to “F:\aswMBR.txt”

Yep run this programme first and attach the log which will be located at C:\TDSSKiller date time

Download the latest version of TDSSKiller from here and save it to your Desktop.

[*]Doubleclick on TDSSKiller.exe to run the application

https://dl.dropbox.com/u/73555776/tdss%20start.JPG

[*]Then click on Change parameters.

https://dl.dropbox.com/u/73555776/tdss%20Change%20param.JPG

[*]Check the boxes beside Verify Driver Digital Signature and Detect TDLFS file system, then click OK.

[*]Click the Start Scan button.

[*]If a suspicious object is detected, the default action will be Skip, click on Continue.

https://dl.dropbox.com/u/73555776/tdss%20threat.JPG

[*]If malicious objects are found, they will show in the Scan results and offer three (3) options.
[*]Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

[*]Get the report by selecting Reports

https://dl.dropbox.com/u/73555776/tdss%20report.JPG

[*]Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

Please copy and paste its contents on your next reply.

THEN

Download OTL to your Desktop
Secondary link

[*]Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.

https://dl.dropbox.com/u/73555776/OTL_Main_Tutorial.gif

[*]Select All Users
[*]Under the Custom Scan box paste this in

netsvcs
BASESERVICES
%SYSTEMDRIVE%*.exe
/md5start
services.*
explorer.exe
winlogon.exe
Userinit.exe
svchost.exe
winsock.*
/md5stop
CREATERESTOREPOINT

[*]Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
[*]When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
[*]Post both logs

15:21:33.0530 3264 TDSS rootkit removing tool 2.8.15.0 Oct 31 2012 21:47:35
15:21:33.0671 3264 ============================================================
15:21:33.0671 3264 Current date / time: 2013/01/17 15:21:33.0671
15:21:33.0671 3264 SystemInfo:
15:21:33.0671 3264
15:21:33.0671 3264 OS Version: 6.1.7600 ServicePack: 0.0
15:21:33.0671 3264 Product type: Workstation
15:21:33.0671 3264 ComputerName: TOM-PC
15:21:33.0671 3264 UserName: Tom
15:21:33.0671 3264 Windows directory: C:\Windows
15:21:33.0671 3264 System windows directory: C:\Windows
15:21:33.0671 3264 Running under WOW64
15:21:33.0671 3264 Processor architecture: Intel x64
15:21:33.0671 3264 Number of processors: 2
15:21:33.0671 3264 Page size: 0x1000
15:21:33.0671 3264 Boot type: Normal boot
15:21:33.0671 3264 ============================================================
15:21:37.0539 3264 BG loaded
15:21:38.0850 3264 Drive \Device\Harddisk0\DR0 - Size: 0x3A38B2E000 (232.89 Gb), SectorSize: 0x200, Cylinders: 0x76C1, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type ‘K0’, Flags 0x00000040
15:21:38.0943 3264 Drive \Device\Harddisk2\DR2 - Size: 0x1DE200000 (7.47 Gb), SectorSize: 0x200, Cylinders: 0x3CF, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type ‘W’
15:21:38.0943 3264 ============================================================
15:21:38.0943 3264 \Device\Harddisk0\DR0:
15:21:38.0943 3264 MBR partitions:
15:21:38.0943 3264 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x32000
15:21:38.0943 3264 \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x32800, BlocksNum 0x1D192800
15:21:38.0943 3264 \Device\Harddisk2\DR2:
15:21:38.0959 3264 MBR partitions:
15:21:38.0959 3264 \Device\Harddisk2\DR2\Partition1: MBR, Type 0xB, StartLBA 0x880, BlocksNum 0xEF0780
15:21:38.0959 3264 ============================================================
15:21:39.0193 3264 C: ↔ \Device\Harddisk0\DR0\Partition2
15:21:39.0193 3264 ============================================================
15:21:39.0193 3264 Initialize success
15:21:39.0193 3264 ============================================================

15:26:15.0728 1636 ============================================================
15:26:15.0728 1636 Scan finished
15:26:15.0728 1636 ============================================================
15:26:15.0759 3464 Detected object count: 5
15:26:15.0759 3464 Actual detected object count: 5
15:27:04.0696 3464 BrYNSvc ( UnsignedFile.Multi.Generic ) - skipped by user
15:27:04.0696 3464 BrYNSvc ( UnsignedFile.Multi.Generic ) - User select action: Skip
15:27:04.0696 3464 NWVZHelper ( UnsignedFile.Multi.Generic ) - skipped by user
15:27:04.0696 3464 NWVZHelper ( UnsignedFile.Multi.Generic ) - User select action: Skip
15:27:04.0696 3464 QBCFMonitorService ( UnsignedFile.Multi.Generic ) - skipped by user
15:27:04.0696 3464 QBCFMonitorService ( UnsignedFile.Multi.Generic ) - User select action: Skip
15:27:04.0696 3464 QBFCService ( UnsignedFile.Multi.Generic ) - skipped by user
15:27:04.0696 3464 QBFCService ( UnsignedFile.Multi.Generic ) - User select action: Skip
15:27:04.0712 3464 \Device\Harddisk0\DR0 ( TDSS File System ) - skipped by user
15:27:04.0712 3464 \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Skip

Now I’ll post the OTL logs soon

Once you have attached the OTL log then re-run TDSSKiller with the same parameters
When this element appears select delete :

\Device\Harddisk0\DR0 ( TDSS File System )

Edit: NVM, well here are the logs

There will be some delay due to differing time zones (almost 1:30am in the UK) and essexboy will be sleeping. But he should be back later today to continue.

I would recommend a run with AdwCleaner as there is a lot of rubbish there

How is the computer at the moment

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

https://dl.dropbox.com/u/73555776/OTL_Fix.GIF


:OTL
IE:64bit: - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://searchfunmoods.com/?f=1&a=ironpub12&ir=ironpub12&cd=2XzuyEtN2Y1L1Qzu0CyEtCyB0F0EzzyEyDzztA0DtDzzzzyEtN0D0Tzu0CtAyBtBtN1L2XzutBtFtBtFtCtFyEtDyB&cr=2056306552
IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
IE:64bit: - HKLM\..\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}: "URL" = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=ironpub12&ir=ironpub12&cd=2XzuyEtN2Y1L1Qzu0CyEtCyB0F0EzzyEyDzztA0DtDzzzzyEtN0D0Tzu0CtAyBtBtN1L2XzutBtFtBtFtCtFyEtDyB&cr=2056306552
IE - HKLM\..\SearchScopes,DefaultScope = {B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}
IE - HKLM\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}: "URL" = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT1712531
IE - HKLM\..\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}: "URL" = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=ironpub12&ir=ironpub12&cd=2XzuyEtN2Y1L1Qzu0CyEtCyB0F0EzzyEyDzztA0DtDzzzzyEtN0D0Tzu0CtAyBtBtN1L2XzutBtFtBtFtCtFyEtDyB&cr=2056306552
IE - HKU\.DEFAULT\..\SearchScopes,DefaultScope = {afdbddaa-5d3f-42ee-b79c-185a7020515b}
IE - HKU\S-1-5-18\..\SearchScopes,DefaultScope = {afdbddaa-5d3f-42ee-b79c-185a7020515b}
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Search Bar = http://toolbar.inbox.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=%tb_id&%language
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\URLSearchHook: {D3D233D5-9F6D-436C-B6C7-E63F77503B30} - No CLSID value found
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\URLSearchHook: {de6c5f41-7812-41c4-8a87-30f0bfbe0a3e} - No CLSID value found
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}: "URL" = http://search.babylon.com/?q={searchTerms}&affID=111758&babsrc=SP_ss&mntrId=d4600884000000000000c417fe84583d
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\SearchScopes\{A531D99C-5A22-449b-83DA-872725C6D0ED}: "URL" = http://search.alot.com/web?q={searchTerms}
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}: "URL" = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT1712531
IE - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\SearchScopes\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}: "URL" = http://searchfunmoods.com/results.php?f=4&q={searchTerms}&a=ironpub12&ir=ironpub12&cd=2XzuyEtN2Y1L1Qzu0CyEtCyB0F0EzzyEyDzztA0DtDzzzzyEtN0D0Tzu0CtAyBtBtN1L2XzutBtFtBtFtCtFyEtDyB&cr=2056306552
FF - prefs.js..browser.search.defaultenginename: "My Web Search"
FF - prefs.js..browser.search.order.1: "Search the web (Babylon)"
FF - prefs.js..browser.search.selectedEngine: "Funmoods"
FF - prefs.js..browser.startup.homepage: "http://searchfunmoods.com/?f=1&a=ironpub12&ir=ironpub12&cd=2XzuyEtN2Y1L1Qzu0CyEtCyB0F0EzzyEyDzztA0DtDzzzzyEtN0D0Tzu0CtAyBtBtN1L2XzutBtFtBtFtCtFyEtDyB&cr=2056306552"
FF - prefs.js..extensions.enabledAddons: ffxtlbr%40funmoods.com:1.5.1
FF - prefs.js..keyword.URL: "http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?id=XQxdm014YYus&ptnrS=XQxdm014YYus&ptb=47226062-3615-4911-B37A-6A6DADCDC722&psa=&ind=2011100212&st=kwd&n=77def434&searchfor="
[2013/01/06 20:13:56 | 000,000,000 | ---D | M] (Funmoods.com) -- C:\Users\Tom\AppData\Roaming\Mozilla\Firefox\Profiles\eedfj3j1.default\extensions\ffxtlbr@funmoods.com
[2013/01/06 20:14:15 | 000,002,353 | ---- | M] () -- C:\Users\Tom\AppData\Roaming\Mozilla\Firefox\Profiles\eedfj3j1.default\searchplugins\Funmoods.xml
[2011/05/02 06:17:31 | 000,002,292 | ---- | M] () -- C:\Users\Tom\AppData\Roaming\Mozilla\Firefox\Profiles\eedfj3j1.default\searchplugins\inbox-search.xml
[2012/01/21 12:43:35 | 000,009,650 | ---- | M] () -- C:\Users\Tom\AppData\Roaming\Mozilla\Firefox\Profiles\eedfj3j1.default\searchplugins\my-web-search.xml
[2013/01/17 09:56:10 | 000,000,376 | ---- | M] () -- C:\Users\Tom\AppData\Roaming\Mozilla\Firefox\Profiles\eedfj3j1.default\searchplugins\search-here.xml
[2012/05/05 23:18:43 | 000,002,313 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\babylon.xml
O2 - BHO: (no name) - {58307a99-7813-45f1-ac6c-06ff1617a20d} - No CLSID value found.
O3 - HKLM\..\Toolbar: (Daily Fitness Center) - {a6547405-a964-4600-8326-e91c95218964} - C:\Program Files (x86)\DailyFitnessCenter_53\bar\1.bin\53bar.dll File not found
O3 - HKU\S-1-5-21-3737608247-847623716-767314435-1000\..\Toolbar\WebBrowser: (Daily Fitness Center) - {A6547405-A964-4600-8326-E91C95218964} - C:\Program Files (x86)\DailyFitnessCenter_53\bar\1.bin\53bar.dll File not found
[2013/01/17 09:44:38 | 000,020,480 | ---- | C] (Microsoft Corporation) -- C:\Windows\svchost.exe
[2013/01/06 20:03:03 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Bloson
[2013/01/06 20:02:59 | 000,000,000 | ---D | C] -- C:\Users\Tom\AppData\Roaming\Bloson
[2013/01/06 20:02:20 | 000,000,000 | ---D | C] -- C:\Users\Tom\AppData\Roaming\Funmoods
[2012/12/26 20:55:18 | 000,000,000 | ---D | C] -- C:\Users\Tom\AppData\Local\Shopping Sidekick Plugin
[2012/12/26 20:55:03 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Shopping Sidekick Plugin
[2011/05/13 17:38:30 | 000,000,000 | ---D | M] -- C:\$Recycle.bin\S-1-5-21-3737608247-847623716-767314435-1000\$RFZ4MR0\gqtf31md.xeo\gp3gi3of.hb5\1\l

:Commands
[resethosts]
[emptytemp]
[CREATERESTOREPOINT]
[Reboot]

[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

THEN

CLEAR THE BAD TOOLBARS

Download AdwCleaner from here to your desktop
Run AdwCleaner and select Delete

https://dl.dropbox.com/u/73555776/AdwCleaner.GIF

Once done it will ask to reboot, allow this
On reboot a log will be produced please attach that

So far, so good. The computer speed has increased and a lot of the junk webpages are all gone so browsing performance has increased.

Subject to no further problems :slight_smile:

I will remove my tools now and give some recommendations, but, I would like you to run for 24 hours or so and come back if you have any problems

Now the best part of the day ----- Your log now appears clean :thumbsup:

A good workman always cleans up after himself so…The following will implement some cleanup procedures as well as reset System Restore points:

Run OTL and hit the cleanup button. It will remove all the programmes we have used plus itself.

We will now confirm that your hidden files are set to that, as some of the tools I use will change that
[*]Click Start.
[*]Open My Computer.
[*]Select the Tools menu and click Folder Options.
[*]Select the View Tab.
[*]Under the Hidden files and folders heading select Do not show hidden files and folders.
[]Click Yes to confirm.
[
]Click OK.

: Keep Java Updated :

WARNING: Java is the #1 exploited program at this time. The Department of Homeland Security recommends that computer users disable Java
See this article and this article.
I would recommend that you completely uninstall Java unless you need it to run an important software.
In that instance I would recommend that you disable Java in your browsers until you need it for that software and then enable it. (See How to diasble Java in your web browser and How to unplug Java from the browser)

Now that you are clean, to help protect your computer in the future I recommend that you get the following free programmes:

http://img233.imageshack.us/img233/7729/mbamicontw5.gif
Malwarebytes.

Update and run weekly to keep your system clean

Download and install FileHippo update checker and run it monthly it will show you which programmes on your system need updating and give a download link

If you use on-line banking then as an added layer of protection install Trusteer Rapport

It is critical to have both a firewall and anti virus to protect your system and to keep them updated. To keep your operating system up to date visit
[*]Microsoft Windows Update

To learn more about how to protect yourself while on the internet read our little guide How did I get infected in the first place ?Keep safe :wave: