clmss.exe - Dangerous

%windir%\clmss.exe

Manual removal instructions:

Antivirus Report of %windir%\clmss.exe:
%windir%\clmss.exe Malware
%windir%\clmss.exeDangerous
%windir%\clmss.exeHigh Risk
%windir%\clmss.exe
clmss.exe is rootkit W32/Tilebot-AO.
clmss.exe is used to hide files, processes and registry.
clmss.exe is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
clmss.exe spreads via open network shares.
clmss.exe opens a back door on IRC channels.
clmss.exe created new system drivers:
service name: "Content List Management Sub System"
display name: " clmss"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Content List Management Sub System\
to the Windows startup registry keys.

hpdriver.sys is created new system driver:
service name: " hpdriver"
display name: " hpdriver"
Added to registry:
HKLM\SYSTEM\CurrentControlSet\Services\hpdriver\

Related files:
%WinDir%\clmss.exe
%SysDir%\hpdriver.sys
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4

HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4

HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
to the Windows startup registry keys.
Added to registry:
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1

HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N

HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1

HKLM\SOFTWARE\Microsoft\Security Center\
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\

Remove clmss.exe now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.