Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

tdlwsp.dll Trojan keeps coming back!


  • Please log in to reply
1 reply to this topic

#1 UnbidPaladin

UnbidPaladin

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:50 PM

Posted 05 November 2009 - 04:48 PM

So I've recently gotten this trojan and tried many different ways to remove it. I use spybot S&D, AVG 9.0, MBytes and AD-Aware. I've tried running all of them in safe mode and AVG keeps finding it each time I restart my computer I don't know what to do Please help. This is my AVG Safe Mode log

AVG 9.0 Anti-Virus command line scanner
Copyright © 1992 - 2009 AVG Technologies
Program version 9.0.663, engine 9.0.695
Virus Database: Version 270.14.50/2481 2009-11-04

C:\boot\bcd Locked file. Not tested.
C:\boot\BCD.LOG Locked file. Not tested.
C:\Documents and Settings\ Locked file. Not tested.
C:\pagefile.sys Locked file. Not tested.
C:\ProgramData\Desktop\ Locked file. Not tested.
C:\ProgramData\Documents\ Locked file. Not tested.
C:\ProgramData\Favorites\ Locked file. Not tested.
C:\ProgramData\Lavasoft\Ad-Aware\MiniMessage\3 Locked file. Not tested.
C:\ProgramData\Templates\ Locked file. Not tested.
C:\System Volume Information\ Locked file. Not tested.
C:\Users\Default\AppData\Local\History\ Locked file. Not tested.
C:\Users\Default\Documents\My Music\ Locked file. Not tested.
C:\Users\Default\Documents\My Pictures\ Locked file. Not tested.
C:\Users\Default\Documents\My Videos\ Locked file. Not tested.
C:\Users\Default\NetHood\ Locked file. Not tested.
C:\Users\Default\PrintHood\ Locked file. Not tested.
C:\Users\Default\Recent\ Locked file. Not tested.
C:\Users\Default\Templates\ Locked file. Not tested.
C:\Users\HP USER\AppData\Local\History\ Locked file. Not tested.
C:\Users\HP USER\AppData\Local\Microsoft\CardSpace\CardSpace.db Locked file. Not tested.
C:\Users\HP USER\AppData\Local\Microsoft\CardSpace\CardSpace.db.shadow Locked file. Not tested.
C:\Users\HP USER\AppData\Local\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Users\HP USER\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1 Locked file. Not tested.
C:\Users\HP USER\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG2 Locked file. Not tested.
C:\Users\HP USER\AppData\Local\Temp\etilqs_cjdL7dHO0qCHgrATVDC6 Locked file. Not tested.
C:\Users\HP USER\AppData\Roaming\Mozilla\Firefox\Profiles\dtfhhoox.default\parent.lock Locked file. Not tested.
C:\Users\HP USER\AppData\Roaming\Mozilla\Firefox\Profiles\dtfhhoox.default\places.sqlite-journal Locked file. Not tested.
C:\Users\HP USER\Documents\My Music\ Locked file. Not tested.
C:\Users\HP USER\Documents\My Pictures\ Locked file. Not tested.
C:\Users\HP USER\Documents\My Videos\ Locked file. Not tested.
C:\Users\HP USER\ntuser.dat Locked file. Not tested.
C:\Users\HP USER\ntuser.dat.LOG1 Locked file. Not tested.
C:\Users\HP USER\ntuser.dat.LOG2 Locked file. Not tested.
C:\Users\Public\Documents\My Music\ Locked file. Not tested.
C:\Users\Public\Documents\My Pictures\ Locked file. Not tested.
C:\Users\Public\Documents\My Videos\ Locked file. Not tested.
C:\WINDOWS\CSC\ Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\LocalService\ntuser.dat Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\LocalService\ntuser.dat.LOG1 Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\LocalService\ntuser.dat.LOG2 Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\NetworkService\AppData\Local\Temp\csp67F9.tmp Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\NetworkService\AppData\Local\Temp\cspEB5.tmp Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\NetworkService\ntuser.dat Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\NetworkService\ntuser.dat.LOG1 Locked file. Not tested.
C:\WINDOWS\ServiceProfiles\NetworkService\ntuser.dat.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\catroot2\edb.log Locked file. Not tested.
C:\WINDOWS\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb Locked file. Not tested.
C:\WINDOWS\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb Locked file. Not tested.
C:\WINDOWS\System32\config\components Locked file. Not tested.
C:\WINDOWS\System32\config\COMPONENTS.LOG1 Locked file. Not tested.
C:\WINDOWS\System32\config\COMPONENTS.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\config\default Locked file. Not tested.
C:\WINDOWS\System32\config\DEFAULT.LOG1 Locked file. Not tested.
C:\WINDOWS\System32\config\DEFAULT.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\config\RegBack\COMPONENTS Locked file. Not tested.
C:\WINDOWS\System32\config\RegBack\DEFAULT Locked file. Not tested.
C:\WINDOWS\System32\config\RegBack\SAM Locked file. Not tested.
C:\WINDOWS\System32\config\RegBack\SECURITY Locked file. Not tested.
C:\WINDOWS\System32\config\RegBack\SOFTWARE Locked file. Not tested.
C:\WINDOWS\System32\config\RegBack\SYSTEM Locked file. Not tested.
C:\WINDOWS\System32\config\sam Locked file. Not tested.
C:\WINDOWS\System32\config\SAM.LOG1 Locked file. Not tested.
C:\WINDOWS\System32\config\SAM.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\config\security Locked file. Not tested.
C:\WINDOWS\System32\config\SECURITY.LOG1 Locked file. Not tested.
C:\WINDOWS\System32\config\SECURITY.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\config\software Locked file. Not tested.
C:\WINDOWS\System32\config\SOFTWARE.LOG1 Locked file. Not tested.
C:\WINDOWS\System32\config\SOFTWARE.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\config\system Locked file. Not tested.
C:\WINDOWS\System32\config\SYSTEM.LOG1 Locked file. Not tested.
C:\WINDOWS\System32\config\SYSTEM.LOG2 Locked file. Not tested.
C:\WINDOWS\System32\config\systemprofile\AppData\Local\History\ Locked file. Not tested.
C:\WINDOWS\System32\config\systemprofile\Documents\My Music\ Locked file. Not tested.
C:\WINDOWS\System32\config\systemprofile\Documents\My Pictures\ Locked file. Not tested.
C:\WINDOWS\System32\config\systemprofile\Documents\My Videos\ Locked file. Not tested.
C:\WINDOWS\System32\LogFiles\WMI\RtBackup\ Locked file. Not tested.
C:\WINDOWS\System32\tdlwsp.dll Trojan horse Agent_r.OT Object was moved to Virus Vault.
D:\System Volume Information\ Locked file. Not tested.
E:\System Volume Information\ Locked file. Not tested.
G:\System Volume Information\ Locked file. Not tested.

------------------------------------------------------------
Objects scanned : 461433
Found infections : 1
Found PUPs : 0
Healed infections : 1
Healed PUPs : 0
Warnings : 0
------------------------------------------------------------

BC AdBot (Login to Remove)

 


#2 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:09:50 PM

Posted 07 November 2009 - 09:05 PM

In normal mode:

Update mbam and run a FULL scan
Please post the results


Then run

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

----------------------------------

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High

Also try: right-click on rootrepeal.exe and rename it to tatertot.scr
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users