Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

VIRUS SISZYD32.EXE KILLED MY FR COMPUTER
ME | 12-14-09 | Self

Posted on 12/14/2009 12:05:45 PM PST by Lady Jag

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 261-267 next last
To: smokingfrog; TomGuy

First thing is I’ll thank everyone who was kind enough to help try to figure it out.

Is it #1 because other people are searching for it?


121 posted on 12/14/2009 2:18:40 PM PST by Lady Jag (Double your income. Fire the government)
[ Post Reply | Private Reply | To 112 | View Replies]

To: reagan_fanatic; Lady Jag

All kinds of good reasons to be in the BIOS....like allowing USB boots.


122 posted on 12/14/2009 2:18:55 PM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 110 | View Replies]

To: Lady Jag

Will you lose anything valuable by reformatting and reloading the operating system?


123 posted on 12/14/2009 2:19:05 PM PST by listenhillary (I believe AGW is real now. It was caused by scientists and greenies LYING!)
[ Post Reply | Private Reply | To 117 | View Replies]

To: Lady Jag

SISZYD32.exe is a rootkit... much more harmful than your standard Trojan. It’s the reason why your antivirus didn’t catch it in the first place. If in fact you have this rootkit, then a lot of your Windows system files have been overwritten, which is how it remains in your system despite attempting to clean it up. It’s going to be a tough process, but try the resolution given in the Avast forums. Rootkits can’t be quickly removed like virii or trojans.

http://forum.avast.com/index.php?PHPSESSID=d56f2b6f315d12b523b4ba3de4a8e0f1&topic=52134.15

How did you get it if you only browsed FR? Did you read any articles posted on external sites? Some of these can easily be hidden in java/adobe pdf addons for IE and even Firefox. It only takes one.


124 posted on 12/14/2009 2:19:15 PM PST by derekr44
[ Post Reply | Private Reply | To 114 | View Replies]

To: Lady Jag
Get a Knoppix Live CD. You should be able to boot it and have access to your Windows disk without concern about the virus being able to run. You can use the "find" utility to locate the copy of the virus file to delete it. There are text editors as well so you can fix up any "INI" files that have been compromised. That's probably a safe approach than exposing another windows machine to the infected disk contents via an external USB connection.
125 posted on 12/14/2009 2:19:15 PM PST by Myrddin
[ Post Reply | Private Reply | To 12 | View Replies]

To: Myrddin

I was just on Knoppix site looking to see if they had a boot CD.


126 posted on 12/14/2009 2:20:56 PM PST by listenhillary (I believe AGW is real now. It was caused by scientists and greenies LYING!)
[ Post Reply | Private Reply | To 125 | View Replies]

To: Lady Jag

There are ways for the Badguys to slip bad stuff onto good Sites....to cause infections...Michelle should be alerted.


127 posted on 12/14/2009 2:21:08 PM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 113 | View Replies]

To: Lady Jag

Pull the drive and slave it. The more you turn the infected machine on the worse it will get.

However, that being said, I seriously doubt it is a virus stopping you from booting up. The virus has to live in an environment. The OS is the environment. Not being able to get through BIOS to the OS is not a functionality of any virus that I have dealt with. I don’t even know how I would start to get that to work (unless the virus had a built in BIOS flash functionality that would trigger if a base dll in it’s structure was scanned... hmmm....)


128 posted on 12/14/2009 2:22:13 PM PST by Anitius Severinus Boethius
[ Post Reply | Private Reply | To 104 | View Replies]

To: Lady Jag
Feels like it, too.

Chernobyl perhaps, but have you considered the possibility that you're having some sort of hardware failure along with your virus problem?

IIRC, Chernobyl would re-write the firmware of a computer, but it relied on a certain chipset existing in the targeted machine.

How old is the computer?

129 posted on 12/14/2009 2:24:36 PM PST by Calvinist_Dark_Lord ((I have come here to kick @$$ and chew bubblegum...and I'm all outta bubblegum! ~Roddy Piper))
[ Post Reply | Private Reply | To 114 | View Replies]

To: All
For reading:

The Rise of Rootkit-Based Malware: Why anti-spyware and anti-virus software is no longer enough

130 posted on 12/14/2009 2:24:42 PM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 127 | View Replies]

To: derekr44
My Avast anti-virus caught siszyd32.exe and ejozeleqayisado.dll,startup yesterday.

It took care of the dll right off and led me disable siszyd32.

Somehow siszyd32 kept re-enabling itself and I knew that because Win Patrol Plus (Scottie) kept asking me if I would allow siszyd32 access my computer, repeatedly I said no.

That's when I began running other utilities, anti-virus, anti-malware, registry cleaner, everything got blocked in progress, usually when its process was coming to an end. Some had also detected the virus but the virus terminated them before action could be taken.

131 posted on 12/14/2009 2:26:37 PM PST by Lady Jag (Double your income. Fire the government)
[ Post Reply | Private Reply | To 111 | View Replies]

To: dfwgator

bump

As soon as the machine boots up, go to “Start/Run” and type “msconfig”.

On the “General” tab, select “Selective Startup” then unselect “Load Startup Items”, or just to be thorough, go to the “Startup” tab and deselect everything. But do note any startup items that have random letters in their names, that is usually a clue that is a rogue program.


132 posted on 12/14/2009 2:27:07 PM PST by dangerdoc
[ Post Reply | Private Reply | To 92 | View Replies]

To: Anitius Severinus Boethius

Rootkits are nasty buggers than can actually get into your firmware and/or boot loader. They don’t need to thrive in the OS itself. In fact, there are some rootkits out there that can embed themselves in the hardware and survive even if you swap out a new hard drive and start from scratch.


133 posted on 12/14/2009 2:29:48 PM PST by derekr44
[ Post Reply | Private Reply | To 128 | View Replies]

To: All
The article at post #130 is from several years ago...but this was mentioned:

Trlokom's flagship product, SpyWall, addresses the rootkit and keylogger problem by providing IT with the ability to detect, prevent and remove them. In fact, Trlokom is the only vendor that has a dedicated rootkit and keylogger scanner included in its anti-malware product.

SpyWall Anti Spyware

134 posted on 12/14/2009 2:30:22 PM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 130 | View Replies]

To: SkyDancer

Even if you had one, you might need Ubuntu or some other Unix variant, because DOS does not read NTFS, only FAT32.


135 posted on 12/14/2009 2:30:42 PM PST by NathanR (,)
[ Post Reply | Private Reply | To 100 | View Replies]

To: derekr44

Sophos and AVG have [free] rootkit removers.

I’ve never had to use them, but I do have them on my computer.


136 posted on 12/14/2009 2:31:48 PM PST by TomGuy
[ Post Reply | Private Reply | To 124 | View Replies]

To: reagan_fanatic
I’ve done quite a lot of malware and virus repair, and sometimes that is the ONLY way to clean a drive short of re-formatting it and starting over.

I'm of the opinion that that is the only course of action once you've confirmed your system has been compromised. Once you confirm that you have malware working on your system, you can never truly be sure of what its done. Sure you might have cleaned the noisy virus or trojan that got your attention, but you can never really know what else it brought in and installed before you neutralized it. Root kits can be hell to detect once installed. Heck, you can't even be sure you got the virus you found since the determination of whether its on your system is limited to what the scanner or cleaners coders know the virus looks like on the day they wrote the definition. Some malware even goes after your Windows restore point.

No, format and reinstall is the only way to go once an infestation is confirmed. No doubt its a hassle, but its easier than having an undetected root kit.

137 posted on 12/14/2009 2:32:00 PM PST by MichiganMan (Oprah: Commercial Beef Agriculture=Bad, Commercial Chicken Agriculture=Good...Wait, WTF???)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Calvinist_Dark_Lord

Was just wondering if a virus could contribute to a hardware failure.

Otherwise, wouldn’t it be a tremendous coincidence to have occurred at the same time? Unless I mucked up a reboot?

This is when I wish I knew more. Times like this are reminders that I’m not as good as I think.


138 posted on 12/14/2009 2:32:34 PM PST by Lady Jag (Double your income. Fire the government)
[ Post Reply | Private Reply | To 129 | View Replies]

To: Lady Jag
Somehow siszyd32 kept re-enabling itself and I knew that because Win Patrol Plus (Scottie) kept asking me if I would allow siszyd32 access my computer, repeatedly I said no.

Yes, it will continue to do so because the rootkit code has embedded itself into valid Windows system files. On the Avast forum example I linked, the virus attached itself to the atapi.sys file (which is a harddisk controller). That could explain why you can't get very far when you boot it up now.
139 posted on 12/14/2009 2:36:09 PM PST by derekr44
[ Post Reply | Private Reply | To 131 | View Replies]

To: Lady Jag
Was just wondering if a virus could contribute to a hardware failure.

It absolutely can. I've seen it destroy sector construction on a hard disk before. Like I posted before, some hardware-level rootkits can be so embedded into your computer's hardware that it can even survive a brand new hard drive and Windows installation.
140 posted on 12/14/2009 2:38:29 PM PST by derekr44
[ Post Reply | Private Reply | To 138 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 261-267 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson