Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Rootkit Survives Formats.. TSDD possibly ZeroAccess?????

  • This topic is locked This topic is locked
2 replies to this topic

#1 logikz


  • Members
  • 65 posts
  • Local time:10:53 AM

Posted 16 October 2016 - 09:48 AM

So I ran this scan.  I have been dealing with this for some time now.  It went away and then i plugged in an old hard drive and its back!  I threw away the last computer due to this!  Scans are from a PC i imaged about 3 hours ago.  Created the DVD with a laptop i purchased just 3 hours before.  I downloaded source media from techbench.


Main symptoms include - completely reinitializing a disk and formatting it, then I go ahead and throw an installation it and files start to make their way back to the machine!  Services wont stay in a disabled state, the firewall changes by itself.  Group policy doesnt seem to slow anyone down but me.  


Specific things - launching a inf update utility, looking at the logs and it says that burnpipe launched it non-elevated or something (no wonder all my devices were generic)

I have a USB Synopsys Controller on my board now, and i think thats related to raspberry pi.  this is a brand new gigabyte gaming 7.


Strange services run time to time - DFS, NFS etc..  This is a stand alone workstation.  And logs were telling me Hyper-V was fully active, when it was never even installed!


Anyways, plz help :) 



Attached Files

BC AdBot (Login to Remove)


#2 nasdaq


  • Malware Response Team
  • 40,754 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:09:53 AM

Posted 18 October 2016 - 10:41 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.

Press the windows key Windows_Logo_key.gif+ r on your keyboard at the same time. This will open the RUN BOX.
Type Notepad and and click the OK key.
Please copy the entire contents of the code box below to the a new file.


CHR Extension: (Chrome Web Store Payments) - C:\Users\amrak\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-10-16]
CHR Extension: (Chrome Media Router) - C:\Users\amrak\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2016-10-16]
S3 4kd7akwd; C:\Windows\SysWOW64\drivers\4kd7akwd.sys [35904 2016-10-16] (VirusBlokAda Ltd.)
C:\Users\amrak\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda
C:\Users\amrak\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm

Save the file as fixlist.txt in the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the Farbar log you have submitted.

Run FRST and click Fix only once and wait.

Restart the computer normally to reset the registry.

The tool will create a log (Fixlog.txt) please post it to your reply.

Please post the Fixlog.txt and let me know what problem persists.

#3 nasdaq


  • Malware Response Team
  • 40,754 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:09:53 AM

Posted 24 October 2016 - 09:13 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users