Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected by W32.Blaster.Worm, can't run ANY programs


  • Please log in to reply
5 replies to this topic

#1 tellia

tellia

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 24 January 2011 - 07:23 PM

My computer got infected with (apparently) W32.Blaster.Worm, all programs shut down immediately. Some program I don't remember having (which makes me think is part of the scam), "Spyware Protection", keeps telling me my computer's infected with that worm and other stuff. I've looked for help, I've tried all the options a computer newbie like me can afford to try without risking mesing up with the entire system and I still can't do anything about it!!

What I've tried is:

-Restart in Safe Mode: the screen dissappears immediately when I press F8 when the computer's booting.
-Restoring to last time the system was working correctly: the malware shuts down the System Restore window immediately.
-Stopping bizarre processes in the Task Manager: the malware shuts down the Task Manager immediately.

I need help FAST, please!! Years of work are in that computer. If there's nothing that can be done about it, can I still make a backup of my files?

Thank you!!!

Edited by Budapest, 24 January 2011 - 08:02 PM.
Moved from AII ~BP


BC AdBot (Login to Remove)

 


#2 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,702 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:10:48 PM

Posted 01 February 2011 - 11:11 PM

Hello and :welcome: to BleepingComputer.

Sorry for the delay.

Let's see what we're dealing with here.

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable any anti-malware software you have installed so it does not interfere with RKill running. This is because some anti-malware software mistakenly detects RKill as malicious. Please refer to this page if you are not sure how to disable your security software.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply
***************************************************

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link

IMPORTANT!!! - when you save the file, rename it to something random, such as bubbles.exe This must be done before beginning the download!

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

~Blade


In your next reply, please include the following:
Malwarebytes Log

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+


#3 fitzsteve

fitzsteve

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 03 April 2011 - 06:38 AM

Just registered to say thanks :thumbup2:

The above steps cured a similar problem I was having.

Cheers!

#4 NatP

NatP

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:48 AM

Posted 06 August 2011 - 03:28 AM

Hi

My computer was also infected by W32.Blaster.Worm and I attempted to follow the steps given by Blade however I was unable to even run RKill.exe
It was infected by the worm straight away =/

Now, I can't even run the computer in safe mode because every application closes once I open it =(

Kaspersky's virus removal tool also failed to open and was infected when I tried to open it.

I have downloaded FixBlast.exe by symantec to remove specifically W32.Blaster.Worm (although I know there's a Trojan somewhere inside too..)
This particular worm removal tool somehow managed to run and hopefully it manages to remove the worm...
I also downloaded HouseCall by TrendMicro and am prepared to run it after FixBlast.exe

Will updated to let you know if FixBlast.exe works!

Thanks,
Nat

#5 NatP

NatP

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:48 AM

Posted 06 August 2011 - 03:43 AM

Hi

My computer was also infected by W32.Blaster.Worm and I attempted to follow the steps given by Blade however I was unable to even run RKill.exe
It was infected by the worm straight away =/

Now, I can't even run the computer in safe mode because every application closes once I open it =(

Kaspersky's virus removal tool also failed to open and was infected when I tried to open it.

I have downloaded FixBlast.exe by symantec to remove specifically W32.Blaster.Worm (although I know there's a Trojan somewhere inside too..)
This particular worm removal tool somehow managed to run and hopefully it manages to remove the worm...
I also downloaded HouseCall by TrendMicro and am prepared to run it after FixBlast.exe

Will updated to let you know if FixBlast.exe works!

Thanks,
Nat



ok FixBlast.exe says it fails to find the worm even though it's obviously still there =/
does anyone have any solution? T.T

Thanks,
Nat

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,964 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:48 PM

Posted 06 August 2011 - 08:44 AM

Welcome to BC NatP

If you have an issue or problem you would like to discuss, please start your own topic. Doing that will help to avoid the confusion that often occurs when trying to help two or more members at the same time in the same thread. Even if your problem is similar to the original poster's problem, the solution could be different based on the kind of hardware, software, system requirements, etc. you are using and the presence of other malware. Further, posting for assistance in someone else's topic is not considered proper forum etiquette.

Thanks for your cooperation.
The BC Staff

BTW, W32.Blaster.Worm (Win32/Msblast) is an older infection that targeted a security issue related to the Remote Procedure Call (RPC) function. Symptoms of infection included the computer restarting every few minutes without user input or receiving a System Shutdown dialog box with the message: "This system is shutting down. Please save all work...This shutdown was initiated by NT Authority\System...Windows must now restart because because the Remote Procedure Call [RPC] service terminated unexpectanly."

Microsoft addressed this vulnerability with a security update several years ago. Blaster targets computers with out-of-date software, and those computers remain at risk of infection until the update is installed. However, if your machine has been kept updated with all service packs and critical patches and you do not have these symptoms, I doubt you actually have this infection so earlier fix tools for Blaster will not work.

You are most likely receiving a bogus warning message or fake alert from a Rogue security program indicating that your computer is infected. These rogue programs are one of the most common sources of malware infection encountered today.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users