• Changing RCF's index page, please click on "Forums" to access the forums.

Malware??

Do Not Sell My Personal Information
First and foremost you need to clear out the user temp directories located at "\Documents and Settings\%USERNAME%\Local Settings\Temp" and also "\Documents and Settings\%USERNAME%\Local Settings\Application Data\Temp" Be certain that no hidden files or folders remain in these locations. You may need to boot into safe mode with command prompt and recursively delete the hidden files and folders manually. Use the "attrib" comand with the string "attrib -r -s -h *.*" to remove hidden, system, and read-only attributes from the files in those directories. Feel free to delete everything in these temp directories.

My best advice is to load Process Explorer, add the table header for "Command Line," sort by command line, and find all instances of executables or instances of rundll loading a library that is located in ~\Local Settings\Temp or ~\Local Settings\Application Data.

Particularly these files should be deleted if found in your user directory: winlogon.exe*, winamp.exe*, AVE.exe, AVE99.exe, AVP.exe, taskmgr.exe*, smss.exe*, svchost.exe*, iexplorar.exe (note the "a"), ose00000.exe. I noted several of the filenames with "*" not as a wildcard but to make sure you only delete these files if their found in your temp directories, and/or if you cannot verify their Microsoft signature in the executable. A good rule of thumb is don't delete these files if they happen to reside in the \Windows\ directory.

Beyond that, make sure you can still view hidden files and folders as the FakeRean trojans like to modify the Registry values for explorer to prevent you from finding the files. Also, run a registry scan for the value "ave.exe," particularly checking \HKEY_CLASSES_ROOT\exefile\shell\open\command to verify that AVE.exe has not hijacked executable association. The proper line should read "%1" %*. Feel safe in eliminating all instances of AVE.exe located within your registry. If located in any exefile association, replace the AVE start command (which starts the fake "XP Security Center" trojan) with "%1" %* for default values.

If you find that you can no longer launch the registry editor, even by executing regedit.exe directly from the command prompt; or you are prompted with "Registry editing has been disabled," then you can re-enable the function by launching "gpedit.msc" from either the Start>Run... menu or by using "start.exe" from the command prompt. Once loaded, goto Computer Configuration->Administrative Templates->System->Prevent Registry Editing (or some such). You may find no value has been set, this is fine. First, enable prevention and press Apply, then disable prevention and press Apply. Disabling prevention without first enabling it doesn't actually work due to an unresolved bug. Perform the same step at User Configuration->Administrative Templates->System->Prevent Registry Editing.

Run a good registry cleaner, install an antivirus suite like Avast, and also, make sure to clear out the \Windows\Prefetch directory. (Remember to delete any hidden files or folders there as well).



Other than that if you have any problems just let me know...

This is excellent. Thanks. I already did a lot of what you just wrote, but you added extra stuff I'll get right on. My Symantec Anti-virus software did some of that by itself, but other stuff it did not take care of.

What a nasty, nasty ad. How the hell do ads like this get past a good ad distributor? Amazing.
 
Yeah, I had to run a full scan on my system because Avast kept notifying me of a virus when viewing these forums. I came back with two worms that Avast labeled as level 10 threats(on a scale of 1-10), so I take it those worms were pretty serious.
 
So when are we going to get some input from the 'staff'????
 
Being taken care of as we speak. Give me 3 minutes to finalize the removal of an ad network.
 
The ad network that was infected has been removed from our rotation. We have severed all ties to that company.
 
So when are we going to get some input from the 'staff'????

For serious problems, don't hesitate to PM directly to Administrators and Mods. It's busy around here during playoff time, and we don't all see every thread quick enough. I didn't see this one in time to help. :doh:

This is not meant as an excuse -- but please do feel free to contact us directly if something major is going down.
 
Last edited:
For serious problems, don't hesitate to PM directly to Administrators and Mods. It's busy around here during playoff time, and we don't all see every thread quick enough. I didn't see this one in time to help. :doh:

This is not meant as an excuse -- but please do feel free to contact us directly if something major is going down.

wuck, I don't have a blue name or mod powers. This is clearly a bug within the system that needs fixed now.

I say remove Pip and give me his ban rifle. I'd make much better use of it. And let's be honest, the mod forum would be a lot less gay with me there and no Pip. :chuckles:
 
wuck, I don't have a blue name or mod powers. This is clearly a bug within the system that needs fixed now.

yeah, i agree. has our attention now (aka Ben's attention in this case).

as for Mod stuff, it is Jeter this, A-Rod that, Ruth the other, all day freaking long. :thumbdown
 
What was the exact ad that was infected?

I wouldn't be shocked if it was the annoying flashing audio one, "Congratulations- you've won!"...it's on many less-than-reputable sites.
 
I say remove Pip and give me his ban rifle.

c15794be8902ca02e1e4c4cf66007a73.gif
 
I opened this site and almost immediately after my internet was closed and my computer told me it successfully blocked this virus (and that it was a high risk): ibm-scanner1v.com
 
Spent the better part of an hour attempting to recreate your problem Ice Cream Man and couldn't. I checked the stable of ads to see if anything was placed there without my knowledge and everything is as it should be.

Doesn't mean it didn't happen just means I can't find the culprit. I did send an email to our ad network giving them the information you gave me.
 
I just refreshed the forums main page i got a popup that was ready to open up the file v1.js. Clicked cancel. Anybody else get this?

I think it may have something to do with the kendra wilson sex-tape images someone just posted.....not 100% sure, though.
 
I just refreshed the forums main page i got a popup that was ready to open up the file v1.js. Clicked cancel. Anybody else get this?

I think it may have something to do with the kendra wilson sex-tape images someone just posted.....not 100% sure, though.

Yep. Same thing.
 

Rubber Rim Job Podcast Video

Episode 3-14: "Time for Playoff Vengeance on Mickey"

Rubber Rim Job Podcast Spotify

Episode 3:14: " Time for Playoff Vengeance on Mickey."
Top