C:\WINDOWS\system32\drivers\termdd.sys
Threat: Rootkit: system modification
When I ask for any of the available options (move to chest, repair, delete) Avast says it will do it on the next reboot. It doesn’t, because even if I let Avast do it’s pre-boot (Safe Mode?) scan, the same advice as above comes up next time I run the same Avast scan.
How can I find out whether or not this is a real problem?
upload suspicious file(s) to www.virustotal.com and test with 44 malware scanners
when you have the result, copy the url in the address bar and post it here for us to see
Some opinions - please? Having Googled Alureon, Bill Gates says use the Windows Malicious Software tool, which I have always refused to download, on the grounds that I don’t want any conflict (remember Norton?) between Avast, which has always served me well and some other programme. On the other hand, Avast (automatically updated) has allowed Alureon into my machine (Sygate firewall, Spybot and SpywareBlaster protected). Advice, about getting rid of Alureon and stopping any other attacks, please?
Unfortunately this is a TDL3 type infection which aswMBR cannot kill… But I do have a tool that will
Please read carefully and follow these steps.
[*]DownloadTDSSKiller and save it to your Desktop.
[*]Extract its contents to your desktop.
[*]Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
[*]If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
[*]If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of “TDSSKiller.[Version][Date][Time]_log.txt”. Please copy and paste the contents of that file here.
Essexboy - I ran TDSSKiller and it objected to termdd.sys and then produced a log, but I hit the wrong tit, so I don’t have a log for you. However, running a second time says I’m clean, so does Avast. One rootkit gone. Tell me, what was the rootkit for - are my (KMeleon) saved passwords at risk? If Avast didn’t stop it getting on my machine, should I be using something else? Pontus - thanks for your help and thank you and Essexboy both for your expertise. Cheers, David
Passwords changed. So - please tell me - did Alureon go into my hard disk, or did it just observe and note what I did with my keyboard? Should I (against my better judgement) be using the Windows Malicious Software Tool? Thanks
[*]Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
[*]Select All Users
[*]Under the Custom Scan box paste this in netsvcs
%SYSTEMDRIVE%*.exe
/md5start
explorer.exe
winlogon.exe
Userinit.exe
svchost.exe
/md5stop
C:\Windows\assembly\tmp\U /s
CREATERESTOREPOINT
[*]Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
[*]When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
[*]Attach both logs
Essexboy - thanks for staying with it and apologies for the delay - I’ve been away the last few days.
I downloaded OTL and ran it, and it produced OTL.txt and Extras.txt as you said. I then noticed I’d forgotten to click “Scan All Users” before scanning, so I did it again that box ticked. However, it then only gave me one file on completion, OTL.txt. I’ve tried running it again a few times, but still get just the one notepad file as a result. Herewith then, are “OTL single user.txt” and Extras single user.txt" (the results of the first scan with “Scan All Users” unselected, together with the single file, “OTL All users.txt”. Hope this makes sense. Many thanks.