Jump to content
Posted 05 March 2009 - 03:49 PM
Posted 05 March 2009 - 04:17 PM
Posted 05 March 2009 - 04:48 PM
Posted 05 March 2009 - 05:08 PM
Is a Backdoor Trojan horse that gives an attacker full control over your computer.
Opens a port on the system.
Is written in Delphi.
Is packed with UPX.
Posted 05 March 2009 - 06:40 PM
Posted 05 March 2009 - 08:09 PM
Current systems: WHAT OS, BackTrack-raw, PCLinuxOS, Peppermint OS 6, Kali Linux
and a custom Linux From Scratch server hosting a bunch of top secret stuff.
Posted 05 March 2009 - 08:21 PM
I see, but my main message in my first post was to warn you that your computer may be compromised and to allow you to change any passwords etc... in case you do any financial dealings or anything related to that fast. I was not forcing you to format the computer. I just wanted to let you know the infection you have currently. If you do not want to format, just reply back telling us so.
Formating is the sure fire best best but i have data on here that is not replacable and i have no way of transfering it off as this problem has spread across the board and is affecting my burner and other applications in which i would use to aid myself in fixing the problem.
Posted 05 March 2009 - 11:31 PM
Posted 06 March 2009 - 02:00 PM
Edited by Obeyance, 06 March 2009 - 02:22 PM.
Posted 06 March 2009 - 03:33 PM
Posting in that topic might be better right now. If userinit.exe is really infected then I suggest you even more to start a topic over there. Quick note, if your computer does NOT have a clean copy of userinit.exe then you would need your windows disk to repair that specfic file. That was why you might first want to do a repiar install and then format the computer. Anyways, since you don't want to please start a topic in that forum.
Preparation Guide: http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/
HJT-Malware Removal forum: http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/
What to do when you have no reply for 5 days: http://www.bleepingcomputer.com/forums/t/176012/post-in-this-thread-when-you-havent-received-an-answer-in-five-days/
Posted 06 March 2009 - 08:04 PM
Posted 06 March 2009 - 08:37 PM
Posted 07 March 2009 - 02:52 AM
Posted 07 March 2009 - 11:30 AM
USB worms work by creating a file called AUTORUN.INF on the root of USB drives. These INF files then use Autorun or Autoplay (not the same thing!) to execute themselves either when the stick is inserted, or more commonly, when the user double-clicks on the USB drive icon from My Computer (Windows Explorer)...
Edited by extremeboy, 07 March 2009 - 11:31 AM.
0 members, 0 guests, 0 anonymous users