![]() |
TargetSaver spyware!? How the fuck do you get rid of it?
I clean up registry and still TSA shit's is back on restart. Fuckheads don't have an install or anything available? Who owns this sgit?
|
Behavior
Adware.TargetSaver monitors open windows and displays ads. Symptoms Files are detected as Adware.TargetSaver. Transmission This adware is installed manually File names: ts2.exe; tsl2.exe; tsm2.exe; tsp2.exe When Adware.TargetSaver is executed, it performs the following actions: Creates the following files in C:\Program Files\Common Files\tsa: inst.dat ts2.exel ts2lock tsl2.exe tsm2.exe tsm2lock tsm2.exe tsm2lock tsp2.exe tsuninst.exe wu Creates the following files in C:\Program Files\Common Files\tsa\rainbow: class-barrel classify.dll vocabulary Adds the value: "Tsa2"="C:\PROGRA~1\COMMON~1\tsa\tsm2.exe" to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run so that the adware runs every time Windows starts. Creates the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\TSA HKEY_LOCAL_MACHINE\SOFTWARE\Uninstall\TSA HKEY_CURRENT_USER\SOFTWARE\TSA Downloads updates from a remote site. Monitors open windows for words from the vocabulary file. Displays advertisements using pop-up and pop-under windows. Before you begin: This adware may include an uninstaller. The uninstaller file is usually C:\Program Files\Common Files\tsuninst.exe. Using Windows Explorer, see if this file exists. If you cannot find the file, follow the instructions below. If the file does exist, double-click it and follow any prompts. After the uninstaller is finished, to make sure that the threat has been removed, follow the instructions below. The following instructions pertain to all Symantec antivirus products that support Security Risk detection. Update the definitions. Restart the computer in Safe mode. Run a full system scan. Delete the value that was added to the registry. For specific details on each of these steps, read the following instructions. 1. To update the definitions To obtain the most recent definitions, start your Symantec program and run LiveUpdate. 2. To restart the computer in Safe mode Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode. For instructions, read the document, "How to start the computer in Safe Mode." 3. To run the scan Start your Symantec antivirus program, and then run a full system scan. If any files are detected as Adware.TargetSaver and depending on which software version you are using, you may see one or more of the following options: Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator. Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer. Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan. Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan. To actually delete the security risk: Click its file name (under the Filename column). In the Item Information box that displays, write down the full path and file name. Then use Windows Explorer to locate and delete the file. Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this. If you see a message, "Delete Failed" (or similar message), manually delete the file. Click the file name of the threat that is under the Filename column. In the Item Information box that displays, write down the full path and file name. Then use Windows Explorer to locate and delete the file. 4. To delete the value from the registry Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions. Click Start > Run. Type regedit Then click OK. Navigate to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run In the right pane, delete the value: "Tsa2"="C:\PROGRA~1\COMMON~1\tsa\tsm2.exe" Navigate to and delete the following keys: HKEY_LOCAL_MACHINE\SOFTWARE\TSA HKEY_LOCAL_MACHINE\SOFTWARE\Uninstall\TSA HKEY_CURRENT_USER\SOFTWARE\TSA Exit the Registry Editor http://securityresponse.symantec.com...rgetsaver.html :winkwink: |
did this stuff over and over... yet it's still comes back. I think there is another process that brings it back up.. Now if I knew which one that is ... :disgust
|
Quote:
Also, did you search you drive for the uninstall file, tsuninst.exe? |
Quote:
I'll run it right now and post it. |
Quote:
Logfile of HijackThis v1.99.1 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe C:\WINDOWS\Explorer.EXE C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe C:\Program Files\Belkin\Belkin Wireless Network Utility\WLanCfgG.exe C:\Program Files\Norton AntiVirus\navapsvc.exe C:\Program Files\Norton AntiVirus\SAVScan.exe C:\WINDOWS\system32\slserv.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\MsPMSPSv.exe C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe C:\Program Files\Common Files\Symantec Shared\ccApp.exe C:\WINDOWS\system32\Rundll32.exe C:\WINDOWS\system32\keyhook.exe C:\Program Files\Synaptics\SynTP\SynTPLpr.exe C:\Program Files\Synaptics\SynTP\SynTPEnh.exe C:\Program Files\Phoenix Technologies\cME\RPro\ XP\VBPTASK.EXE C:\Program Files\Phoenix Technologies\cME\Guard\Guard.exe C:\PROGRA~1\COMMON~1\roku\rokum.exe C:\PROGRA~1\COMMON~1\roku\rokua.exe C:\WINDOWS\system32\PhnxCDSvr.exe C:\WINDOWS\system32\sistray.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Internet Explorer\iexplore.exe C:\temp\erasable\hijackthis\HijackThis.exe R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.averatec.com R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.averatec.com/ O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe" O4 - HKLM\..\Run: [Symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent O4 - HKLM\..\Run: [SiS Windows KeyHook] C:\WINDOWS\system32\keyhook.exe O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe O4 - HKLM\..\Run: [RestoreIT!] "C:\Program Files\Phoenix Technologies\cME\RPro\ XP\VBPTASK.EXE" VBStart O4 - HKLM\..\Run: [Guard] "C:\Program Files\Phoenix Technologies\cME\Guard\Guard.exe" /background O4 - HKLM\..\Run: [hyj] C:\WINDOWS\hyj.exe O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe O4 - HKLM\..\Run: [Dell Photo AIO Printer 922] "C:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe" O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [roku] C:\PROGRA~1\COMMON~1\roku\rokum.exe O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe O4 - Global Startup: Utility Tray.lnk = C:\WINDOWS\system32\sistray.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O14 - IERESET.INF: START_PAGE_URL=http://www.averatec.com O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.co...?1107337314015 O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Belkin 54g Wireless USB Network Adapter (Belkin 54g Wireless USB Network Adapter Service) - Unknown owner - C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe O23 - Service: dlbt_device - Dell - C:\WINDOWS\system32\dlbtcoms.exe O23 - Service: Gene6 FTP Server (G6FTPServer) - Unknown owner - C:\Program Files\Gene6 FTP Server\G6FTPSERVER.EXE (file missing) O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe O23 - Service: Phoenix VCD Service (PhnxVCDService) - Phoenix Technologies Ltd. - C:\WINDOWS\system32\PhnxCDSvr.exe O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe |
Do you know what these are?
C:\WINDOWS\hyj.exe C:\PROGRA~1\COMMON~1\roku\rokum.exe If you don't, kill 'em. Make a restore point before you delete them. If you know what those processes are and still have problems, I'd recommend just going back to a previous restore point, or perhaps trying Adaware to see if it does the trick. I see you already use SpyBot. Lemme know how you make out. |
Ok, I'll give it a try...
Thanks for your help.. |
| All times are GMT -7. The time now is 03:34 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123