Trojan DD:

If you touch your software enough does it become hardware?

Moderator: Forum Moderators

TezzRexx
Dr Zoidberg
Dr Zoidberg
Posts: 4072
Joined: February 8th, 2005, 15:54
Location: BURMINGHUM, England
Contact:

Post by TezzRexx »

Dr. kitteny berk wrote: keygens
My downfall, lul
cheeseandham
Shambler In Drag
Shambler In Drag
Posts: 780
Joined: March 16th, 2007, 20:22
Location: on the sofa
Contact:

Post by cheeseandham »

TezzRexx wrote:Cheers Ham! Btw how's the sprog?
np. sprog is actually pretty great - I'm starting to be afraid that I'll turn into one of those parents that says "look at my kids" whilst slapping people in the face repeatedly with said sprog photos (a la Family Guy)
TezzRexx
Dr Zoidberg
Dr Zoidberg
Posts: 4072
Joined: February 8th, 2005, 15:54
Location: BURMINGHUM, England
Contact:

Post by TezzRexx »

Well the Trojans have been removed allegedly, they were in my system restore folder.

I'm still nervous and tempted to format, I'm just unsure if that would be of use or would the Trojan still be lurking?
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

:lol: always scan them with your resident AV, and the one I linked up there a bit.

then use them on someone else's machine, or at least from sandboxie, or a sacrificial machine. :)
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

TezzRexx wrote:Well the Trojans have been removed allegedly, they were in my system restore folder.

I'm still nervous and tempted to format, I'm just unsure if that would be of use or would the Trojan still be lurking?
If it's smart enough to lurk in system restore, it's quite possible it's lurking elsewhere too, but it might not be - Unless you're doing a full format of all your currently connected storage, it's probably not worth doing.

My usual course of action is to get the machine as clean as possible, reboot, scan again, clean (if needed) and repeat.

Using different AV apps can help a little, but I'd honestly just use nod32, then buy it off mr. ham.
Last edited by Dr. kitteny berk on August 13th, 2008, 23:40, edited 1 time in total.
cheeseandham
Shambler In Drag
Shambler In Drag
Posts: 780
Joined: March 16th, 2007, 20:22
Location: on the sofa
Contact:

Post by cheeseandham »

:above: ... or a virtual machine (except probably not a good idea on a games machine, but I find them great for testing stuff in the ultimate of sandboxes)
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

cheeseandham wrote::above: ... or a virtual machine (except probably not a good idea on a games machine, but I find them great for testing stuff in the ultimate of sandboxes)
:above: I use one for such things, but I'm not completely confident that evil can't get out.
cheeseandham
Shambler In Drag
Shambler In Drag
Posts: 780
Joined: March 16th, 2007, 20:22
Location: on the sofa
Contact:

Post by cheeseandham »

Remember this
http://www.5punk.co.uk/wiki/index.php?t ... quest_Help
If you do reformat, get yourself an imaged up. And take an image before doing anything risky.
Forget my last comment, an image is the ultimate sandbox :)
cheeseandham
Shambler In Drag
Shambler In Drag
Posts: 780
Joined: March 16th, 2007, 20:22
Location: on the sofa
Contact:

Post by cheeseandham »

Dr. kitteny berk wrote:
:above: I use one for such things, but I'm not completely confident that evil can't get out.
If you switch off the virtual network adapter once moving said risky items to it then I can't imagine any way that it could.
Maybe osmosis?
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

the network is my main worry, but yup, disabling once the questionable app is there should be fine.
FatherJack
Site Owner
Site Owner
Posts: 9597
Joined: May 16th, 2005, 15:31
Location: Coventry, UK
Contact:

Post by FatherJack »

cheeseandham wrote: If you switch off the virtual network adapter once moving said risky items to it then I can't imagine any way that it could.
Maybe osmosis?
I think it could potentially still write to the ..//xphost or whatver the default share is called, and perhaps mess with the VM tools if they're installed.
cheeseandham
Shambler In Drag
Shambler In Drag
Posts: 780
Joined: March 16th, 2007, 20:22
Location: on the sofa
Contact:

Post by cheeseandham »

FatherJack wrote:and perhaps mess with the VM tools if they're installed.
And therein shows the mind of a cold bloodied killer :P
Good point
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

cheeseandham wrote: And therein shows the mind of a cold bloodied killer :P
Good point
:lol: It's always the quiet ones.
fabyak
Home-made Big Daddy
Home-made Big Daddy
Posts: 5681
Joined: October 14th, 2004, 14:02
Location: Oxford, England

Post by fabyak »

Fire up this:

http://technet.microsoft.com/en-us/sysi ... 63902.aspx

then go to options up the top and hide Microsoft Entries and then scour the remaining list. If there is anything fishy there or claiming to be MS stuff, chances are it is a nasty. The majority of them will have a publisher listed which bad things won't (or not a legit one anyway) but that's not to say that ones without a publisher are bad (see: 7zip/winRAR)
Post Reply