Hey guys. I have a rootkit that is kicking my ass

Hey guys. I have a rootkit that is kicking my ass.

It resets my computer when I scan it with gmer in safe mode.

Also, I have scanned my pc with malware bytes while in safe mode. The virus appeared for half a second in malware bytes and then my computer reset itself. Now when I run malware bytes it doesn't appear in threats detected.

I have a FRST report but I have no idea what to do with it. Can anyone assist?

Hi Sup Forums I need your help with a rootkit that is kicking my ass. I have tried the following solutions, with no successful results.

I ran malware bytes and eset while in safe mode with networking. This actually detected the rootkit, but my system reset itself within seconds of detecting the rootkit. After the reset, malwarebytes and eset no longer detects the rootkit. They do detect PUP and driver files that the kit is placing on my machine. deleting these are useless because they just come back.

I have also tried to use GMER while in safe mode. This results in a reset whenever GMER scans my sys 32.

In addition to that I have tried FRST scan. Which gives me a report, but I have no idea what to do with it.

Can anyone assist me with this?

bump

Dude just copy important files you need and reformat your box.

At that point I'd just reformat.

Ugh, okay.

>i have a rootkit
copy critical files to external storage.
completely wipe system drive (really you should wipe every drive persistently connected to the infected computer).
reinstall os and copy files back from external storage.

Okay, i'm moving all my pictures over to a USB. I have new drives I wanted to move my raid to anyways. FUCK this sucks. All this because my cunt wife installed Sims 4 from a torrent.

>I share my computer
>I share my computer with a woman
Well there's your issue, OP

Install Gentoo

>Gentoo
why?

Remove the infected drive, connect it to a clean PC and then run your scanners from the there.

Wouldn't that potentially fuck up the clean PC?

This. Why are people so retarded?

Treat the infected disk as data only. Don't run anything from it,

Oh, I see. Any scan software you recommend other than the ones I already tried?

Yes, that is a very real risk. Which is why the proper way to do this is to have a bootable linux USB which you can inspect the drive from safely. But this is only really worth it if you can't reformat for some mysterious reason. Attempting to render an install safe after it has been infected is often very difficult and time consuming. It's easy to miss something and AV software is pretty much all mediocre to terrible (combination of AV being very hard problem to solve and shoddy work by AV vendors).

>Don't run anything from it
This is a common misconception. There are many exploits which abuse automatic system processes, ex: thumbnail generation.

Ok, so you're suggesting I boot to a Linux USB drive and run scan software on the other drives from there?

Use an antivirus livecd. They are gnu+linux based but run the same db as their windows version.

ok thanks guys, i already solved the issue

Reseat ram to wipe it. Lots of rootkits are in the ram

>>being this autistic.

This isn't OP... I have not solved it.

I will try this tomorrow, thank you.

You gave your wife admin permissions!?

This, the rootkit can't interrupt the scans if it doesn't get the chance to run.

I see AVG stopped offering a virus scanning ISO. You could try Kaspersky Rescue Disk, if you trust em.

>my cunt wife
WHAT DID YOU CALLED ME!? FUCK YOU JEFF, I'M LEAVING YOU WITH KIDS, CUNT!

>I have no backup XD

>not using emnisoft
malwarebytes is pretty mediocre these days, there is much better out there.

Get the Kaspersky rescue disc from their website (it's an up-to-date scanner you boot from, free).

>Install Gentoo

>boot linux usb
>delete bad things
>?????
>Profit

>Change rootkit with another one

Came to say this.

/thread

Combofix.

Or reformat

awesome, thanks

Remember that booting an infected OS is always a waste of time.

It's always better to format and re-install the operating system. Anti-malware is rarely useful.

This. It's impossible to know if the infection is every really gone, unless you nuke the system from orbit. It could be hiding in some random ass system .dll, and anti-virus only gets you so far.

Scanning within Windows is futile for a bad infection. Any time I have to clean a friend or family members AIDS riddled PC I use a combo of Bitdefender rescue image and Dr. Web CureIt! on bootable USB drives. I prefer to use Linux Live USB to create the bootable drives, but Rufus works too.

Is sims 4 any good?

This is always the answer. That and install Gentoo after the reformat. There aren't a whole lot of self perpetuating rootkits written for Gentoo.

Honestly how do people get into these situations. I don't store any "files" (like personal pics, porn, media, shit like that) on my main desktop. It's all just on some networked pentium 4 computer mapped as a network drive. If I needed to reinstall windows it'd just take me an afternoon of installing shit like notepad++.

this always works, trust me

I'm the real OP and my issue has been fixed
How do I mark this thread as [Solved]?

Can't you use clamav from a Linux liveusb?

>Allowing a female to use technology