Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Massive Infection. What Do I Do? Help


  • Please log in to reply
2 replies to this topic

#1 error65vai

error65vai

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:06 AM

Posted 26 March 2008 - 08:38 AM

Can anyone please help me. I have a massive infestation of viruses that I am trying to get rid of. During Safe Mode I used Luke Filewalker put it could not complete the scanning process because it detected HEUR/Malware as a possible virus but only gives me two options Quratine or ignore, only I cant chose becuase there is no enter button at the bottom of the message whice hinders me from continuing the scan.

Another problem, I cannot install Adware during Safe Mode becuase I get a message that says "Window Installer- The System administrator has set policies to prevent this installations". I dont know how to curve this.

Furthermore, there are several suspicious start up programs in my registry, specifically (14d7bd38--->rundll32.exe, avgnt, SC2, svchost, TKBellExe, and userfaultcheck), all of which seem suspect.

Please help me out I need to get this problem fixed. I have installed Luke Filewalker and its found 20 viruses, eveything from (TR/Crypt.ULPM.GEN, TR/SrchSpy.Gen, TR/Clicker.C680.A, and HEUR/Malware).

I have Windows XP.

Any help is appreciated. Thanks

Edited by error65vai, 26 March 2008 - 08:42 AM.


BC AdBot (Login to Remove)

 


m

#2 error65vai

error65vai
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:06 AM

Posted 26 March 2008 - 11:22 AM

BUMP

Please, can anyone help me with this situation. Thanks.

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,576 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:06 AM

Posted 26 March 2008 - 10:27 PM

Some anti-virus programs have the ability to detect unknown viruses of various types using heuristic algorithms detection routine designed to detect common malware characteristics. This technology uses an expert system to analyze the cataloged behaviors and assess the likelihood of viral infection. HEUR/Malware is a heuristic detection routine and is often reported when a program seems to contain suspicious functionality.

Heuristic analysis is the ability of an anti-virus program to detect new viruses before the vendor can get samples and update the program's definitions for detection. Heuristics uses non-specific detection methods to find new or unknown malware which allows the anti-virus to detect and stop if before doing any harm to your system. The techniques involves inspecting the code in a file to see if it contains virus-like characteristics. If the number of these characteristics/instructions exceeds a pre-defined threshold, the file is flagged as a possible virus.

The disadvantage to using heuristics is that it is not as reliable as signature-based detection (blacklisting) and can potentially increase the chances that a non-malicious program is flagged as malicious. With heuristics, there is always a potential risk for a "False Positive" if virus detection technology are set to High and the heuristic analysis flags a file as suspicious or infected that contains no malware.

Try performing an Online Virus Scan like BitDefender.
(These require Internet Explorer to work. Watch the Address bar in IE. You may receive alerts that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then Click Install ActiveX component. If given the option, choose "Quarantine" instead of delete.)

Furthermore, there are several suspicious start up programs in my registry, specifically (14d7bd38--->rundll32.exe, avgnt, SC2, svchost, TKBellExe, and userfaultcheck), all of which seem suspect.

Anytime you come across a suspicious file or one that you do not recognize, search the name using Google or the following links:
BC's File Database
BC's Startup Programs Database
File Research Center
ThreatExpert Malware Search
If no search results are found, you are given the option to "Submit a New Sample".

Determining whether a file is malware or a legitimate process sometimes depends on the location (path) it is running from. One of the ways that malware tries to hide is to give itself the same name as a critical system file. However, it then places itself in a different location on your computer. A file's properties may give a clue to identifying it. Right-click on the file, Properties and examine the General and Version tabs.

You can download and use Process Explorer or System Explorer to investigate all running processes and gather additional information to identify and resolve problems. These tools will show the process CPU usage, a description and its path location. If you right-click on the file in question and select properties, you will see more details about the file.

If you cannot find any information, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to jotti's virusscan or virustotal.com. In the "File to upload & scan" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
-- Then post back with the results of the file analysis.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users