Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

first XP antivirus 2011 and now win32/olmarik trojan


  • Please log in to reply
1 reply to this topic

#1 computerbigproblem

computerbigproblem

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 21 April 2011 - 10:49 AM

Please, help!!!! I am so frustated with this people infecting computers and now it was our laptop turn. First, we accidently allowed the instruction from XP Anti-Virus 2011 to enter the computer, which I think I got rid of by using rkill because it does not pop any of those annoying windows anymore. However, i ran eset nod and it detects win32/olmarik trojan in the system and it obviously does not get rid of it. I cannot get the computer to go to a previous date to see if that helps nor I can get it to run malwarebytes, spybot, combofix (the .exe files seem to get blocked) or anything per some previous blogs running it in both normal windows or safe mode. Your help would be greatly appreciated.

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,141 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:27 AM

Posted 21 April 2011 - 11:53 AM

Please see the self-help guide: Remove XP Anti-Spyware 2011, Vista Security 2011, and Win 7 Internet Security 2011. Be sure to follow the instructions exactly as written using FixNCR.reg, RKill and then an immediate scan by Malwarebytes.

IMPORTANT!: If you ran or want to run ComboFix on your own due to malware infection, please be aware that using it is only one part of the disinfection process. Preliminary scans from other tools like DDS, RSIT and GMER should be used first because they provide comprehensive logs with specific details about files, folders and registry keys which may have been modified by malware infection. Analysis of those logs allows planning an strategy for effective disinfection and a determination if using ComboFix is necessary.

Further, when issues arise due to complex malware infections, possible false detections, problems running ComboFix or with other security tools causing conflicts, experts are usually aware of them and can advise what should or should not be done while providing individual assistance. When false detections are identified, experts have access to the developer and can report them so he can investigate, confirm and make corrections. Those attempting to use ComboFix on their own do not have such information and are at risk when running the tool in an unsupervised environment. Please read the pinned topic ComboFix usage, Questions, Help? - Look here.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users