Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

definitely infected, help!


  • Please log in to reply
2 replies to this topic

#1 alicia37

alicia37

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 04 February 2010 - 12:31 AM

Last week my brother used my comp to play games with his friend, and since
I can't access microsoft.com, kaspersky.com any more (I don't have kaspersky or
any antiviruses installed btw)


I've run mbam before, but now I can't even open it unless I change the filename

i've got spybot and done immunised, and removed a "conficker.b" worm by using Microsoft windows malicious
removal (downloaded off cnet.com because microsoft.com/etc doesn't open) but I'm still infected
mbam.exe doesn't open unless renamed, and those websites still blocked.

Few months ago I removed an H8srt rootkit with TDSS killer because of some annoying fake anti-spyware
protection thing kept opening.


Don't know what to do now. I'm thinking of just formatting the damn thing if there wasn't so much on it and
I had more time :thumbsup:


can anybody help me please?

Thanks, Alicia

BC AdBot (Login to Remove)

 


#2 alicia37

alicia37
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 04 February 2010 - 07:23 AM

OK Did another scan with MBAM and it's all been cleared hopefully

Files Infected:
1 C:\WINDOWS\system32\H8SRTlktxocogmj.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
2 C:\WINDOWS\system32\vmoyadf.dll (Worm.Autorun) -> Delete on reboot.
3 C:\Documents and Settings\All Users\Application Data\sysReserve.ini (Malware.Trace) -> Quarantined and deleted
successfully.
4 C:\WINDOWS\system32\H8SRTrdqpsbiyou.dat (Rootkit.TDSS) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.



My problem is, I'm sure I deleted 1(fakealert) and 4(TDSS) in the past.
And the websites being blocked was fixed last week by scanning only to reappear today.

So that's why I panicked, because it's like I didn't completely removing them.
:thumbsup: hopefully it's all clear now

Edited by alicia37, 04 February 2010 - 07:27 AM.


#3 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,805 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:03:45 AM

Posted 20 February 2010 - 08:12 PM

Hello,

Sorry for the delay. The forum is very busy and things slip past us. It appears as though you have or had a bad rootkit. In order to completely get rid of it, you will need to use tools specific to the log forum. Please follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<==

If you can post at least some of the logs, please post the new topic. If you cannot produce any of the logs, then post back here and we will provide you with further instructions.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users