Search the Community
Showing results for tags 'usb'.
Found 4 results
I have a suspicious file named gbhvexig.exe that keeps coming back after a restart or two. I suspect it to be causing multiple instances of iexplore.exe (reaches up to 4 instances when my normal number of instances is only 2) upon startup and these instances are detected as malicious ads. I also think it is responsible for breaking the .dll files of two games in my PC. Another concern is, all USB sticks I insert in my PC gets infected with the RECYCLER folder and "shortcut virus". I have ran several scans already using Malwarebytes but still my USBs are getting infected. I have attempted to run some scans using FRST and ADWCleaner as I have seen in other threads with similar problems as mine but I always seem to get lost in the way. Please do help me because I have grown tired of reinstalling my affected programs again and again.
Hello, Im new to this forum and I would be extremely grateful if anyone here could give me some advice on how to remove encrypted syswow64, (possibly zero access rootkit), from several usbs that I got that have been infected when they where inserted in windows computers that I got that were attacked by hackers. The hackers installed a system administration server on my network and attacked my computers with some kind of synzcronization worm/virus that synced and even infected offline devices, (that contained Bluetooth and smartcard etc), like Television, digital TV box, dvd, printer and phones. Programs that I detected on my computers that they were using were among others, syswow64, bluetoothshare, various installation hooks, svchost, microsoft synchronization feeds, keyloggers, infrared, remote Control programs, malicious code and code changer programs etc. When I scan the usbs with regular virus Scans like Kaspersky or Norton they all comes out Clean and no names shows up during the scan but when I scan the usbs with microsoft forefront scanner it also comes out as Clean but during the scan all the rootkit names show up though. The names that comes up includes for example syswow64, catroot, system root: nearby devices, hkmmodule installation hook, netframework installation hook, microsoft feeds synchronization, subsystem spooler system, mobilesynch.exe, tablet/pcsynch.exe, rundll.32.exe and many more. I have run the scan on all photos separately that is stored on the usbs and the same rootkit names shows up during the scan on every single photo and also, when I did a test and removed all files from one usb, so that it was empty, all the names still showed up when I scanned it and I could also see that the rootkit, (although I cant see it as it is encrypted), took up 0,8 gb of space on the usb since there was only 7,2 gb left for me to use although the size of the usb is 8 gb so if the usb were really empty there should be 8 gb space left for me to use, not 7.2 gb. What I would like to know is if anyone here knows if theese types of encrypted rootkits is possible to remove at all fro usbs so that I can get my photos, and if so how? Is there any antivirus website where I can upload the photos that can Clean the rootkit completely out of the usb and photos or should I go visit some computer specialist store instead, or is it enough if I just burn the photos over to a dvd and then the rootkit will dissapear byitself, or is there nothing that can be done at all? Anyone that knows the answer to theese questions please feel free to send me messages either in this thread or you can send me private messages to my profile here on this forum aswell if you like. All answers are extremely appreciated
I made a really big mistake the other day installing something onto my machine that had not been properly checked for malware and viruses. It turned out that it had some really nasty virus and also installed something called the YeaHelpdesk onto my machine which has run riot through my system. I have read online that Malwarebytes can get rid of it but sadly, one of the effects of the virus was to take away my administrative rights to my own PC and is able to prevent me installing Malwarebytes on my system, saying that I do not have permission to. I want to know if it is possible to install Malwarebytes onto a datastick from my laptop and then be able to plug that into my PC and be able to run it from off the stick. Anyone?
I have a Win 10 setup with the in-built Defender, and the free version of Avast AV - but I still manage to find the occasional PUP when I run Adwcleaner (preferably in Safe Mode) Question:- is it possible to set Adwcleaner to scan a USB memory stick for PUPs - or does it do that by default? Many thanks! richard