Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TDSSserv.sys in my device manager


  • Please log in to reply
35 replies to this topic

#1 fucock2002

fucock2002

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 31 July 2009 - 05:29 AM

Hello I am new to this forum, I recently found TDSSserv.sys in my device manager under Non-plug and Play Drivers.
So far I have ran malwarebytes anti-malware, norton security full scan in safe mode and spybot.
TDSSserv.sys will not go away!!! it does have a yellow (!).
Also Beep under Non-Plug and Play Drivers has a yellow(!).
Can I just disable them??? Please help!! Thank you in advance!!!

Edited by fucock2002, 31 July 2009 - 05:31 AM.


BC AdBot (Login to Remove)

 


#2 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 31 July 2009 - 07:57 AM

Let's look for rootkits

http://rootrepeal.googlepages.com/

http://rootrepeal.googlepages.com/RootRepeal.zip

Just use the file tab at the bottom, scan and paste the report into a reply here please

Posted Image
Chewy

No. Try not. Do... or do not. There is no try.

#3 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 31 July 2009 - 07:52 PM

I could not get RootRepeal to fully run in safemode without having my laptop freeze during the scan.
I tried running it in the regular mode and it would go to the blue screen, do a memory dump and then turn off.
I ran malwarebytes anti-malware in safe mode, here are the logs.

Malwarebytes' Anti-Malware 1.39
Database version: 2528
Windows 5.1.2600 Service Pack 3

7/31/2009 5:36:27 PM
mbam-log-2009-07-31 (17-36-27).txt

Scan type: Full Scan (C:\|D:\|E:\|)
Objects scanned: 175526
Time elapsed: 29 minute(s), 4 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TDSSserv.sys (Rootkit.TDSS) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


This is a log from a few days ago hope it helps!!!

Malwarebytes' Anti-Malware 1.39
Database version: 2528
Windows 5.1.2600 Service Pack 2

7/29/2009 4:52:59 PM
mbam-log-2009-07-29 (16-52-59).txt

Scan type: Quick Scan
Objects scanned: 89209
Time elapsed: 6 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\temp\TDSS715d.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSS73de.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSS7565.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSS7ae3.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSSc3dc.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSSc60f.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSSc8be.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSSd64b.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.


And here is one more from i believe the same day....

Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 2

7/29/2009 4:34:18 PM
mbam-log-2009-07-29 (16-34-18).txt

Scan type: Full Scan (C:\|D:\|E:\|)
Objects scanned: 176059
Time elapsed: 33 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 18
Registry Values Infected: 4
Registry Data Items Infected: 6
Folders Infected: 0
Files Infected: 31

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{99c158b9-fa74-4e49-971e-708f37b235d7} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{99c158b9-fa74-4e49-971e-708f37b235d7} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{f0d4b230-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{f0d4b23a-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{f0d4b23c-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b15fd82e-85bc-430d-90cb-65db1b030510} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f0d4b239-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f0d4b239-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f0d4b23b-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{f0d4b23b-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TDSSdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\TDSS (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Trymedia Systems (Adware.Trymedia) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7f38607f (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\brastk (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{99c158b9-fa74-4e49-971e-708f37b235d7} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{f0d4b239-da4b-4daf-81e4-dfee4931a4aa} (Adware.AskSBAR) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\program files\AskSBar\bar\1.bin\A2HIGHIN.EXE (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\AskSBar\bar\1.bin\A2PLUGIN.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\AskSBar\bar\1.bin\ASKSBAR.DLL (Adware.AskSBAR) -> Quarantined and deleted successfully.
c:\program files\AskSBar\bar\1.bin\NPASKSBR.DLL (Trojan.Agent) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0018940.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0019940.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0019941.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0020940.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0020941.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0022940.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0023940.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{6d05fab2-7a62-4a96-a638-2f0b6a273527}\RP121\A0023941.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\av.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\TDSShrxx.dll (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\system32\TDSSoiqt.dll (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\system32\TDSSvkql.dll (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\system32\TDSSxfum.dll (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\system32\drivers\TDSSpqlt.sys (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\temp\TDSS76dc.tmp (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSS78b0.tmp (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSScb7d.tmp (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\WINDOWS\temp\TDSSd011.tmp (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\delself.bat (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\TDSSkhyp.log (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\system32\TDSSkkai.log (Trojan.TDSS) -> Delete on reboot.
c:\WINDOWS\system32\TDSSlxcp.dll (Rootkit.Agent) -> Delete on reboot.
c:\WINDOWS\system32\TDSSsahc.dll (Rootkit.Agent) -> Delete on reboot.

#4 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 31 July 2009 - 09:04 PM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Chewy

No. Try not. Do... or do not. There is no try.

#5 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 01 August 2009 - 07:32 PM

Thanks for your reply. I followed the directions and here is the log. -Chad

inetchk.exe;C:\Program Files\music_now;Trojan.Click.2093;Deleted.;
AOLCINST.EXE\core.cab\GTDOWNAO_106.ocx;C:\Program Files\Online Services\Aol\United States\AOL90\COMPS\COACH\AOLCINST.EXE;Adware.Gdown;;
AOLCINST.EXE;C:\Program Files\Online Services\Aol\United States\AOL90\COMPS\COACH;Archive contains infected objects;Moved.;
SP31524.exe/musicnow1.exe\data008;C:\SwSetup\AOLMN\SP31524.exe/musicnow1.exe;Trojan.Click.2093;;
\musicnow1.exe;C:\SwSetup\AOLMN;Archive contains infected objects;;
SP31524.exe;C:\SwSetup\AOLMN;Archive contains infected objects;Moved.;
A0037234.exe;C:\System Volume Information\_restore{6D05FAB2-7A62-4A96-A638-2F0B6A273527}\RP147;Trojan.Click.2093;Deleted.;
A0037235.EXE\core.cab\GTDOWNAO_106.ocx;C:\System Volume Information\_restore{6D05FAB2-7A62-4A96-A638-2F0B6A273527}\RP147\A0037235.EXE;Adware.Gdown;;
A0037235.EXE;C:\System Volume Information\_restore{6D05FAB2-7A62-4A96-A638-2F0B6A273527}\RP147;Archive contains infected objects;Moved.;
A0037236.exe/musicnow1.exe\data008;C:\System Volume Information\_restore{6D05FAB2-7A62-4A96-A638-2F0B6A273527}\RP147\A0037236.exe/musicnow1.exe;Trojan.Click.2093;;
\musicnow1.exe;C:\System Volume Information\_restore{6D05FAB2-7A62-4A96-A638-2F0B6A273527}\RP147;Archive contains infected objects;;
A0037236.exe;C:\System Volume Information\_restore{6D05FAB2-7A62-4A96-A638-2F0B6A273527}\RP147;Archive contains infected objects;Moved.;

Edited by fucock2002, 01 August 2009 - 07:35 PM.


#6 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 01 August 2009 - 07:40 PM

Take a little time and carefully read or print these directions

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
  • Make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

Chewy

No. Try not. Do... or do not. There is no try.

#7 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 02 August 2009 - 12:33 AM

Ok the scans were completed. Here are the logs. The hidden files were tagged removable: yes, but not recommended.
Thanks again - Chad


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/1/2009 at 21:02:33 PM
User "Chad Parscal" on computer "CHAD"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Documents and Settings\All Users\Application Data\Norton\00000082\000000fb\000002bd\cltLMS1.dat
Hidden: file C:\Documents and Settings\All Users\Application Data\Norton\00000082\000000fb\000002bd\cltLMS2.dat
Info: Starting disk scan of D: (FAT).
Stopped logging on 8/1/2009 at 21:29:02 PM


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/1/2009 at 21:42:17 PM
User "Chad Parscal" on computer "CHAD"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Documents and Settings\All Users\Application Data\Norton\00000082\000000fb\000002bd\cltLMS1.dat
Hidden: file C:\Documents and Settings\All Users\Application Data\Norton\00000082\000000fb\000002bd\cltLMS2.dat
Info: Starting disk scan of D: (FAT).
Stopped logging on 8/1/2009 at 22:08:17 PM

#8 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 02 August 2009 - 12:47 AM

Please download and run Processexplorer


http://technet.microsoft.com/en-us/sysinte...s/bb896653.aspx

Under file and save as, create a log and post here

copy and paste into a reply

Next

Please download TFC by Old Timer and save it to your desktop.

http://oldtimer.geekstogo.com/TFC.exe
http://www.geekstogo.com/forum/TFC-Temp-Fi...er-file187.html

Save any unsaved work. TFC will close ALL open programs including your browser!
Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.

Update MBAM

Disable Norton's after disconnecting from the internet

Run a quick scan with MBAM
Chewy

No. Try not. Do... or do not. There is no try.

#9 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 02 August 2009 - 01:09 AM

Thanks for the quick response! I am going to run the processexplorer but a compressed(zipped) file warning is coming up. It is saying that to run properly it may need to extract other compressed files in the folder. Should I extract all files?? or just run?? -Chad

#10 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 02 August 2009 - 01:22 AM

http://download.sysinternals.com/Files/ProcessExplorer.zip

There's a seperate help file and a eula.txt

Always download, extraxt and then run
Chewy

No. Try not. Do... or do not. There is no try.

#11 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 02 August 2009 - 05:11 PM

Thanks Chew, her is the process explorer log.

Process PID CPU Description Company Name
System Idle Process 0 93.18
Interrupts n/a 1.52 Hardware Interrupts
DPCs n/a Deferred Procedure Calls
System 4
smss.exe 1204 Windows NT Session Manager Microsoft Corporation
csrss.exe 1260 Client Server Runtime Process Microsoft Corporation
winlogon.exe 1304 Windows NT Logon Application Microsoft Corporation
services.exe 1348 2.27 Services and Controller app Microsoft Corporation
svchost.exe 1532 Generic Host Process for Win32 Services Microsoft Corporation
wmiprvse.exe 3884 WMI Microsoft Corporation
HPQTOA~1.EXE 244 HpqToaster Module
agent.exe 3724 InstallShield Update Service Agent Macrovision Corporation
svchost.exe 1604 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1656 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1812 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1868 Generic Host Process for Win32 Services Microsoft Corporation
spoolsv.exe 316 Spooler SubSystem App Microsoft Corporation
svchost.exe 380 Generic Host Process for Win32 Services Microsoft Corporation
AOLacsd.exe 412 AOL Connectivity Service America Online
AppleMobileDeviceService.exe 428 Apple Mobile Device Service Apple Inc.
mDNSResponder.exe 460 Bonjour Service Apple Inc.
LSSrvc.exe 676 Hewlett-Packard Company
ccSvcHst.exe 696 Symantec Service Framework Symantec Corporation
ccSvcHst.exe 2008 Symantec Service Framework Symantec Corporation
nvsvc32.exe 728 NVIDIA Driver Helper Service, Version 84.61 NVIDIA Corporation
svchost.exe 788 Generic Host Process for Win32 Services Microsoft Corporation
ViewpointService.exe 824 ViewMgr Viewpoint Corporation
alg.exe 2556 Application Layer Gateway Service Microsoft Corporation
lsass.exe 1364 LSA Shell (Export Version) Microsoft Corporation
explorer.exe 1264 Windows Explorer Microsoft Corporation
jusched.exe 3780 Java™ Platform SE binary Sun Microsystems, Inc.
HP Wireless Assistant.exe 3796 HP Wireless Assistant Module Hewlett-Packard Development Company, L.P.
SynTPEnh.exe 3836 1.52 Synaptics TouchPad Enhancements Synaptics, Inc.
QPService.exe 3848 HP QuickPlay Resident Program CyberLink Corp.
hpwuSchd2.exe 3860 Hewlett-Packard Product Assistant Hewlett-Packard Co.
issch.exe 3924 InstallShield Update Service Scheduler Macrovision Corporation
ISUSPM.exe 2124 InstallShield Update Service Update Manager InstallShield Software Corporation
QTTask.exe 4060 QuickTime Task Apple Inc.
ctfmon.exe 200 CTF Loader Microsoft Corporation
iexplore.exe 552 Internet Explorer Microsoft Corporation
iexplore.exe 1676 Internet Explorer Microsoft Corporation
procexp.exe 2980 Sysinternals Process Explorer Sysinternals - www.sysinternals.com
procexp.exe 2060 1.52 Sysinternals Process Explorer Sysinternals - www.sysinternals.com
rundll32.exe 4024 Run a DLL as an App Microsoft Corporation

#12 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 02 August 2009 - 05:51 PM

Well the rootkit seems to be gone, update MBAM and run a quick scan

and a Hidden Services scan with RootRepeal
Chewy

No. Try not. Do... or do not. There is no try.

#13 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 02 August 2009 - 06:57 PM

TheTFC by oldtimer, how long does that take to run?? Its been goin for about 2 hours now. Thanks, Chad.

#14 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:14 AM

Posted 02 August 2009 - 07:59 PM

If it locks your computer up, you might try from safe mode, you have a lot running in normal mode.
Chewy

No. Try not. Do... or do not. There is no try.

#15 fucock2002

fucock2002
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:12:14 AM

Posted 02 August 2009 - 08:20 PM

No luck w/ safe mode either..as soon as I click start everything on the desktop dissapears. The mouse will still move but that's it.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users