The other day I was attacked by 'Antimalware Doctor', a virus that disguises itself as antivirus software in order to prompt you for personal information. Being way too smart to fall for that

Posted 18 August 2010 - 11:46 PM
Posted 19 August 2010 - 12:51 AM
Posted 19 August 2010 - 12:56 AM
Posted 02 October 2010 - 10:41 PM
Edited by kismet, 02 October 2010 - 10:41 PM.
Posted 03 October 2010 - 09:29 AM
The other day I was attacked by 'Antimalware Doctor', a virus that disguises itself as antivirus software in order to prompt you for personal information. Being way too smart to fall for that
, I killed the process and deleted the files and registry entries I could find. Then, I downloaded Prevx virus scan to make sure I got everything since McAfee Virus scan didn't even catch the thing to begin with. It found some viruses but refused to delete them unless I bought the full version. I could just delete most of them manually but one, labeled a 'High Risk Rootkit' won't let me delete it. It's a file called exnbm.sys in C:\WINDOWS\system32\drivers and every time I try to delete it, I get this message: "Cannot delete exnbm: Cannot read from the source file or disk". Since the file properties list its creation date as about the same time as the known infection, so I'm relatively certain it isn't an important system file. How in the name of humanity do get rid of this thing?
Posted 11 October 2010 - 09:04 PM
Edited by Sumol, 11 October 2010 - 09:09 PM.
Posted 12 October 2010 - 07:51 AM
The problem you face is that when windows starts the rootkit has already activated itself and is hiding, you can't touch it. What you want to do is to access your hard drive without activating windows to keep the rootkit sleeping. The easiest way is a bootable dvd with linux as it ignores any right management from windows, if you know the files you can start from cd/dvd delete them and voila windows without rootkit, if you dont know the files: there are already preconfigured disk images with virus/rootkit scanners - since you run the scanner from cd while windows is inactive you can be sure to get all malware that would otherwise hide itself when running windows
Works also with a parallel installed linux as windows cant access linux files so your linux wont get infected by windows
Posted 13 October 2010 - 06:15 AM
Edited by firespin, 13 October 2010 - 06:16 AM.
0 members, 1 guests, 0 anonymous users