yea I really like hidemyass too, but i don't thin i'll ever end up getting a "real" proxy

2

(4 replies, posted in Virus talks)

+1
It might also be nice to attach the images, I'd be interested in seeing what this page actually looks like..
Thanks smile

3

(13 replies, posted in Virus talks)

I didnt really understand that last post, and unfortunately I didnt manage to grasp the meaning, even with the help of google translate... sorry sad

Anyways, I haven't had much time to start working on this, but a question just came up...
In order to corrupt the files would merely adding random lines of code suffice, or would it be better to replace some characters, for example to switch around all the 1s with 0s?
Thanks!

Ok, but is the deepfreeze virus still rolling back your system upon every boot?

Don't worry about it smile

Ok, so either you have another virus, or maybe kaspersky is detecting remains of Deepfreeze. Can you find out the path of the file whose behavior is similar to keyloger? If so just try removing it I guess... But if it does turn out to be yet another virus, maybe you're better off backing up your data and simply reinstalling windows...
Otherwise are you 100% sure that deepfrz.sys was deleted (aka is still in the running process list?)
Good Luck!

Oh.. (Cant follow the link cus I just end up sitting in front of a "phishing site blocked" page, and there seems to by no way to ignore it). I commented on this and hopefully they'll review it smile

I'm sorry, but I dont really understand what you're trying to say.
maybe if you tried deleting the file in safe mode... (depfrz.sys doesnt run in safe mode right?)

I've been using the anonymous proxy listed on the bottom of the home page for a while now ([Register or log in to view the URL]), except that openDNS has now marked it as a phishing site and blocked it...

You mean that kaspersky is preventing killbox from deleting deepfrz.sys ?
Is there any way for you to momentarily exit kaspersky (maybe right clicking on the icon in the notification area), as this would probably enable killbox to delete deepfrz.sys

Thanks a lot, I really appreciate all of the hard work you have put into this site smile

11

(9 replies, posted in Virus talks)

Does seem to have some of the same characteristics
i'd like to get my hands on a copy of the Butterfly bot too, if anyone has it big_smile

12

(13 replies, posted in Virus talks)

Ok from what I figured out, I've got two options:

1 I would need to create a fake driver which I would force windows to load (not to sure how that would work out with the digital signatures, windows 7 is quite touchy bout that) and this driver would cause the system to crash. Of course I would then have to also edit the registry in order for the driver to load at every startup...

2 I could try to use an already existing virus to inject some random code (In order to corrupt it, not too sure if that would work tho) in all the .sys files found in C:\WINDOWS\SYSTEM32\DRIVERS and in C:\WINDOWS\SYSTEM32 . But, seeing as the driver files are probably loaded to the ram, the BSOD would only occur upon reboot... maybe I could simply force the computer to reboot after having infected all the .sys files.
I think that corrupting exsisting drivers would probably be easier than creating a fake one, especially as my programming skills aren't the most advanced... (I'll probably be able to use a .bat for corrupting the .sys files and forcing a system reboot)

13

(13 replies, posted in Virus talks)

Haha I copied the eicar code into a simple text file, renamed it .sys and installed it instead of my broadcom ethernet port driver. Eset didnt even notice ^^

14

(26 replies, posted in Virus talks)

Never mind what I said I just saw your attachment and realized we wernt talking about a .exe process. If you can find out where deepfrz.sys is you could either take ownership and try to delete it then, but otherwise you could try using something like killbox (you can find it here [Register or log in to view the URL] ).
Good Luck!

15

(13 replies, posted in Virus talks)

I guess I could try, but eset would deffinetly notice that one ^^
I'm still not to sure how to force windows to install a driver, I know it can be done, I just dont know how big_smile

16

(13 replies, posted in Virus talks)

Right now i'm under control as I'm testing it on this old pc, but the goal would be for the virus to run undetected (UAC is disbled) and cause a BSOD. I'm thinking of doing this by making it load a corrupt driver (still not sure how).. but then I guess a simple "restart with last known good configuration" would be enough to get around the BSOD...
Thanks a lot!

17

(26 replies, posted in Virus talks)

I dont have enough posts yet to download the attachment...

If you want to terminate it run cmd and then enter this:

taskkill /t /f /im JUST ADD THE FULL PROCCESS NAME HERE

Otherwise maybe you have a system restore point that you could try?
Just another idea, if you boot from the windows installation CD, you get to a command prompt, you could try deleting the deepfrz.sys from there and the process associated with it (you can find the proces location by right clicking o it, and then on something like "show in explorer"

18

(26 replies, posted in Virus talks)

I'm no expert at this, but assuming deepfreeze doesn't propagate and is only contained in that specified directory, couldn't one just delete the deepfrz.sys file by taking ownership? Otherwise have you tried forcing the process to terminate using the /F filter in cmd?

19

(13 replies, posted in Virus talks)

Ok thanks alot, I'll try that out. But from what i've seen even if I manage to load the virus onto the PC, nod32 detects modifications in system files. (The goal being to infect and corrupt system files to cause a BSOD)

20

(13 replies, posted in Virus talks)

Hey,
I would like to know which construction tool in the "newest"/most advanced, in order for the virus created not to be detected on a machine running eset nod32.
Thanks a lot!
(I have tried browsing in the "collection index", but I haven't really found what I was looking for)