Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 07/01/2009 7:12:27 AM PDT by Oshkalaboomboom
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last
To: Oshkalaboomboom
I use a USB pendrive to remove rootkits off of infected computers. (Well, actually, I use write protected SD cards in an SD card reader, swapping in tools as I need it.)
28 posted on 07/01/2009 7:47:01 AM PDT by kingu (Party for rent - conservative opinions not required.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

OK, if none of that stuff works, go to www.majorgeek.com and follow their instructions TO THE LETTER for removing malware. Why are they different? Because they walk you through the process (in part using the hijackthis tool) of actually digging into the registry, bootup process, etc where malware hides and manually ripping it out by the roots. Warning: The process is long and tedious and if you mess up a step, you just might (in fact probably will) trash your computer. Its where I go when all else fails (and I have both trashed and saved my computer on different occassions).


31 posted on 07/01/2009 7:49:25 AM PDT by piytar (Take back the language: Obama axing Chrystler dealers based on political donations is REAL fascism!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom
It is a pain to remove. I finally started pulling the hard drive out of systems and installed them onto a known good system I use for Folding@home and virus removal.

Depending on the age of your hard drive and type, buy a SATA/IDE-to-USB adapter or an external drive enclosure. Pull your hard drive, plug it into the USB adapter and then plug into a system with the very latest Windows updates, AVG/other antivirus and spyware removal tools.

Once mounted externally, you can treat it as another drive. I start with an AVG scan and finish with a Malwarebytes scan.

There are a few extra “super-hidden” files that you can't get into on a drive that is the boot drive. I typically find these infected files in “Recycler”.

While you have the drive out, go ahead and run a defrag of the drive.

If this is a true rootkit then you will need better tools, but for most things AVG, Windows Defender and Amlwarebytes work fine.

There comes a time that you may be well advised to take the system into a local nerdshop and pay them to help.

If you can wait a day, I can build you a BartPE and send it over. FReepmail me if you need it.

33 posted on 07/01/2009 7:57:09 AM PDT by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

Well, “delete computer” and then “get a Mac” and you’re home free... :-)


34 posted on 07/01/2009 8:01:10 AM PDT by Star Traveler (The God of Abraham, Isaac and Jacob is a Zionist and Jerusalem is the apple of His eye.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

Did you turn off/disable Windows Restore before trying to delete the trojan?

If not, you need to do that.


36 posted on 07/01/2009 8:04:49 AM PDT by smokingfrog ( Don't mess with the mockingbird! /\/\ http://tiny.cc/freepthis)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: jersey117

Bookmark


37 posted on 07/01/2009 8:07:29 AM PDT by jersey117
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

bump for later


40 posted on 07/01/2009 8:11:57 AM PDT by GOPJ (Duke University official offers to SELL a black five year old for rape parties & the MSM looks away?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom
I had a similar problem and ended up reformatting my hard drive. I bought an $80 external hard drive and copied all my data files to it and then reformat ed the disk and reloaded all the software. It took me all weekend and I ended up having to purchase Norton Anti-Virus Subscriptions again because I had purchased it on line.

Reformatting got rid of the problem and cleaned up two years worth of crap on the hard drive. The system runs faster and I think it was worth it.

45 posted on 07/01/2009 8:40:09 AM PDT by mbynack (Retired USAF SMSgt)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

As a small business owner who deals with this for a living, I’d say: do a reload. Save all your data on an external drive, then reload all your operating systems and programs. Then update them all.

You may never be able to find out where you got it, but be sure to have antivirus, spyware, and malware detector programs on your system and keep them up to date. If you don’t have all of them, get them.

Of course, you could always call a pro if you don’t have a spare 6 to 8 hours ;)


46 posted on 07/01/2009 8:47:02 AM PDT by worst-case scenario (Striving to reach the light)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

Many times some viruses will effectively go into ‘hide’ mode and reassert themselves after running a virus cleaner by pulling new code from the web. When you run a virus cleaner, update the cleaner to make sure you have all the latest and greatest virus-killing love, and then disconnect your computer from the internet. Run the virus cleaner. Reboot and run it again. Then reconnect to the internet and run it a third time to see if it still detects the virus.


47 posted on 07/01/2009 8:55:26 AM PDT by AzSteven ("War is less costly than servitude, the choice is always between Verdun and Dachau." Jean Dutourd)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

One little trick the virus writers used almost made me format my hard drive in exasperation. They created a registry entry under a certain user name that would replicate the virus then deleted that user.

I tried all the above (Malwarebytes, ComboFix, etc...) following the directions to the letter and they would do everything but could not delete the registry entry that would replicate the virus. I finally nailed down the the hex signature of this virus registry entry, found it in the registry and tried to delete it as the Administrator but it would not delete. I had to change the permissions of the virus entry first, then I was able to delete the virus registry entry. ***DISCLAIMER*** be VERY careful when dealing with the registry. Be sure you have it backed up and be sure you only delete the virus registry key.


50 posted on 07/01/2009 9:27:10 AM PDT by copaliscrossing (Progressives are Socialists)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

I have one that killed my mouse in windows I went to ubuntu instead.

But I still want to go back to windows. I just cannot get the mouse to work or kill the virus.


51 posted on 07/01/2009 9:34:23 AM PDT by usmcobra (Your chances of dying in bed are reduced by getting out of it, but most people still die in bed)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Oshkalaboomboom

For what its worth, google rootrepeal. I use it on occasion to delete core rootkit files, specifically the files that lock the rest down, usually found in the system32 folder.


65 posted on 07/02/2009 7:25:55 AM PDT by Malsua
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson