Concrete buffer gone wild (Full Version)

All Forums >> [Casual Banter] >> Off the Grid



Message


Duskypearls -> Concrete buffer gone wild (12/18/2011 6:04:24 PM)

Oh crap, this is good! I dare ya not to laugh.

http://www.noob.us/humor/concrete-buffer-gone-wild/




Kirata -> RE: Concrete buffer gone wild (12/19/2011 12:32:13 AM)


FYI

Malwarebytes blocked a malicious process (a rootkit install) at the link you posted.

K.




Duskypearls -> RE: Concrete buffer gone wild (12/19/2011 4:59:20 AM)


quote:

ORIGINAL: Kirata


FYI

Malwarebytes blocked a malicious process (a rootkit install) at the link you posted.

K.



Uh oh, does that mean the link should be pulled?




Kirata -> RE: Concrete buffer gone wild (12/19/2011 10:56:35 AM)


quote:

ORIGINAL: Duskypearls
quote:

ORIGINAL: Kirata

FYI

Malwarebytes blocked a malicious process (a rootkit install) at the link you posted.

Uh oh, does that mean the link should be pulled?


I don't know. I don't know if it's being delivered by the site you linked to, or by an ad on the page. I don't remember what was on the page, and I'm not going back for a look. But if you didn't experience a problem, possibly it's a roll of the dice depending on what ad content is loaded.

The malicious package, by the way, is "Win 7 Antispyware 2012," a particularly nasty fucker that disables the Windows firewall, introduces a slew of changes to the registry, installs a rootkit, and is a real bitch to get rid of. You have to reverse the registry changes and block the running process before you can even start removing its components, and even then you may have use system restore to recover your firewall services.

K.




Duskypearls -> RE: Concrete buffer gone wild (12/19/2011 11:00:11 AM)

K,

The malicious package, by the way, is "Win 7 Antispyware 2012," a particularly nasty fucker that disables the Windows firewall, introduces a slew of changes to the registry, installs a rootkit, and is a real bitch to get rid of. You have to reverse the registry changes and block the running process before you can even start removing its components, and even then you may have use system restore to recover your firewall services.

I'm afraid I haven't a clue how to reverse registry changes and block the running process. System restore I can do. Any suggestions?





Kirata -> RE: Concrete buffer gone wild (12/19/2011 11:14:16 AM)


quote:

ORIGINAL: Duskypearls

I'm afraid I haven't a clue how to reverse registry changes and block the running process. System restore I can do. Any suggestions?

You've got it??

K.




Duskypearls -> RE: Concrete buffer gone wild (12/19/2011 1:42:12 PM)


quote:

ORIGINAL: Kirata


quote:

ORIGINAL: Duskypearls

I'm afraid I haven't a clue how to reverse registry changes and block the running process. System restore I can do. Any suggestions?

You've got it??

K.



Got what, K?




kalikshama -> RE: Concrete buffer gone wild (12/19/2011 4:35:57 PM)

I think he meant "did you get the virus?"

http://www.bleepingcomputer.com/virus-removal/remove-win-7-antispyware-2012

When installed, this rogue pretends to be a security update for Windows installed via Automatic Updates. It will then install itself as a single executable that has a random consisting of three characters, such as kdn.exe, that uses very aggressive techniques to make it so that you cannot remove it. First, it makes it so that if you launch any executable it instead launches Vista Home Security 2012, XP Internet Security 2012, Win 7 Security 2012, or any of the other names it goes under. If the original program that you wanted to launch is deemed safe by the rogue, it will then launch it as well. This allows the rogue to determine what executables it wants to allow you to run in order to protect itself. It will also modify certain keys so that when you launch FireFox or Internet Explorer from the Window Start Menu it will launch the rogue instead and display a fake firewall warning stating that the program is infected.

You can get rid of it by downloading http://www.malwarebytes.org/ - there's a free and pay version.




Duskypearls -> RE: Concrete buffer gone wild (12/19/2011 5:49:01 PM)

Thanks Kali, I followed your advice, which will hopefully rectify matters

Does the fact that the url in the OP had a virus in it mean I shouldn't open any other urls from that site (wimp dot com) or share them with anyone anywhere?




JstAnotherSub -> RE: Concrete buffer gone wild (12/19/2011 5:51:07 PM)

I have kick ass virus software, that has literally slapped me and closed sites.  I watched your link this morning, with no problems at all.  Well, I laughed and dribbled a lil coffee, but nothing happened with my puter.




Duskypearls -> RE: Concrete buffer gone wild (12/19/2011 6:10:44 PM)

Jst, then what might account for K having had a problem with it?

I did the Malwarebytes thingy Kali suggested, and if found and removed beau coup boogity oogities.




Termyn8or -> RE: Concrete buffer gone wild (12/19/2011 10:18:27 PM)

I did nothing. Know why ?

T^T




kalikshama -> RE: Concrete buffer gone wild (12/20/2011 4:49:31 AM)

quote:

Does the fact that the url in the OP had a virus in it mean I shouldn't open any other urls from that site (wimp dot com) or share them with anyone anywhere?


I didn't get a virus either, but I did panic, as I currently use this computer for both work and personal. It looks like other people have rec'd viruses from wimp.com:http://forum.ebaumsworld.com/showthread.php?t=83190

The link in your OP is from noob.us though, and while I didn't get any results for "noob.us virus" that is not enough to guarantee safety.




Page: [1]

Valid CSS!




Collarchat.com © 2025
Terms of Service Privacy Policy Spam Policy
0.03125