MushroomNZ said:
got hit by one of those
had to use a Kaspersky program to get rid of it on the disk
it wasnt in the windows startup autoruns.
is it in the regsitry somewhere
or in part of the drive when the PC boots ?
http://en.wikipedia.org/wiki/TDSS
"it first hijacks the print spooler service (spoolsv.exe)
to write a filesystem at the end of the disk; it then
infects low level system drivers such as those responsible
for PATA operations (atapi.sys) to implement its rootkit."
When you modify system files, you can make it so things can be
hidden from view (not seen in the file manager).
What can't be hidden, is when the network light is blinking
on your networking equipment, when you're not doing anything.
If your network setup is normally fairly quiet, the presence
of extra network traffic is easy to view via the blinking
network lights.
The "root" in rootkit, means running in Ring0. The atapi.sys
file runs in Ring0, because it's a driver. The kernel and drivers
live in Ring0, and Ring0 is a higher privilege level than
Ring3 (where applications run).
http://en.wikipedia.org/wiki/Rootkit
"Once installed it becomes possible to hide the intrusion
as well as to maintain privileged access."
HTH,
Paul