Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ktaskr.dll


  • Please log in to reply
7 replies to this topic

#1 4ward_tristan

4ward_tristan

  • Members
  • 211 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:beachmere qld aus
  • Local time:03:16 AM

Posted 22 October 2007 - 08:17 PM

Hi guys

got a cust's pc in here, pretty infected(and dodgy).

pretty much any .exe ran will error with "cannot find ktaskr.dll - the specified module could not be found"

file association is whacky - but what do i set .exe back to from this ktaskr.dll?cause i can change it, but im lost as to what to change it to...

will run HJT etc. when the associations are normal, cant do much atm.

what i have done: hooked up hdd as slave and ran AVGAV, AVGAS, housecallx2 and totalscan

thanks alot for your time =)

tristan.

EDIT: ok got a .reg that restored the association, now just ask away as to what logs you want etc. :D

Edited by 4ward_tristan, 22 October 2007 - 08:20 PM.

=)

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,122 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:16 PM

Posted 22 October 2007 - 08:37 PM

ktaskr.dll is a Trojan downloader (variant of Win32.Trojan-Spy.Banker.EGJ}

Backdoor Trojans, IRCBots and Infostealers are very dangerous because they provide a means of accessing a computer system that bypasses security mechanisms and steal sensitive information which they send back to the hacker. Remote attackers use backdoor Trojans as part of an exploit to to gain unauthorized access to a computer and take control of it without your knowledge. Read the Danger: Remote Access Trojans.

If this computer was used for online banking, has credit card information or other sensitive data on it, you should immediately disconnect it computer from the Internet until the system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay and forums. Consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breech.

Although the backdoor Trojan has been identified and may be removed, the PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the backdoor Trojan has been removed the computer is now secure. Many experts in the security community believe that once infected with this type of malware, the best course of action is to reformat and reinstall the OS - "When should I re-format?".

While we are always willing to assist with malware removal there is no guarantee of success. For XP users, the easiest thing is to do a System Restore and choose a restore point with a creation date before the date of infection. However, should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy. Let me know how you wish to proceed.

Edited by quietman7, 22 October 2007 - 08:40 PM.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 4ward_tristan

4ward_tristan
  • Topic Starter

  • Members
  • 211 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:beachmere qld aus
  • Local time:03:16 AM

Posted 22 October 2007 - 08:46 PM

thanks for the reply quiteman7

unfortunatly where i work, re-formatting is the absolute last option - not due to me being stubborn :thumbsup:, but due to my boss's wanting the customers pc back the way they gave it to us(without the virus's lol) etc. so =(..

i would really appreciate your help, but if u really do recommend that a format is the best/shortest-time-consuming/less hassle way then ill try to do that....thanks again

tristan

Edited by 4ward_tristan, 22 October 2007 - 08:47 PM.

=)

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,122 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:16 PM

Posted 22 October 2007 - 08:58 PM

A decision to reformat should be based on the information provided in the "When should I reformat?" link. Its not a matter of shortest-time-consuming/less hassle. We normally can clean the infection but there is no way to be sure the computer can ever be trusted again. So I would say try System Restore first. If that does not resolve the problem, then you should explain to your customer what type of infection they have so they can make that decision. Regardless, they still need to be advised about changing their passwords and notifying financial institutions.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 4ward_tristan

4ward_tristan
  • Topic Starter

  • Members
  • 211 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:beachmere qld aus
  • Local time:03:16 AM

Posted 22 October 2007 - 09:16 PM

interesting points raised quiteman7

i guess in a way it is a matter of shortest-time/less-hassle....more hassle=more time...at $100 p/h i think that they would like the shortest-time route :thumbsup:..

i will tell him what you have told me..thanks alot for your time/info and ill post back as to what decision is made :flowers:

thanks again,

tristan
=)

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,122 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:16 PM

Posted 22 October 2007 - 10:13 PM

Your welcome.

If he decides to proceed, we will do our best to assist with removal.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 4ward_tristan

4ward_tristan
  • Topic Starter

  • Members
  • 211 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:beachmere qld aus
  • Local time:03:16 AM

Posted 22 October 2007 - 11:17 PM

just an update:

clients xp is cracked, doesnt even have sp1a -____- (was wondering why there was such little information on the safe mode screens)

he is gonna leave it as be and buy a new machine.

thanks again quiteman7 you clarified the situiation for me =) n i look forward to chatting in the future!

tristan
=)

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,122 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:16 PM

Posted 23 October 2007 - 08:18 AM

Well welcome tristan

clients xp is cracked, doesnt even have sp1a

Well that explains why he got infected in the first place. No security patches combined with visiting those kinds of sites = sure disaster. Some of the worst types of malware infections can be contracted and spread by visiting, pirate, crack and keygen sites. Those who attempt to get software for free can end up with a computer system so badly damaged that it cannot be repaired.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users