Jump to content
Posted 16 April 2008 - 07:27 AM
Posted 16 April 2008 - 08:22 AM
Posted 22 April 2008 - 01:51 PM
Posted 22 April 2008 - 01:59 PM
Posted 23 April 2008 - 10:33 AM
Posted 23 April 2008 - 11:09 AM
Posted 30 April 2008 - 05:15 AM
Posted 30 April 2008 - 07:15 AM
Posted 30 April 2008 - 08:14 AM
Posted 30 April 2008 - 08:50 AM
Posted 19 October 2009 - 11:57 PM
Flash drive infections usually involve malware that loads an autorun.inf file into the root folder of all drives (internal, external, removable). When the removable media is inserted, autorun looks for autorun.inf and automatically executes another malicious file to run on your computer. When a flash drive becomes infected, the Trojan will infect a system when the removable media is inserted if autorun has not been disabled.
Please insert your flash drive. Hold down the Shift key when inserting the drive until Windows detects it to bypass the autorun feature and keep autorun.inf from executing automatically.
Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
Note: Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that is plugged in when you ran it. Don't delete this folder...it will help protect your drives from future infection.
- Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
- The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
- Wait until it has finished scanning and then exit the program.
- Reboot your computer when done.
Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. Read Danger USB! Worm targets removable memory sticks.
You can hold down the Shift key when inserting the drive into your computer until Windows detects it to keep autorun.inf from executing automatically. However, I recommend disabling the Autorun feature feature on USB and removable drives as a method of prevention. This should keep the malicious file from automatically running upon insertion and infecting your system while allowing you to safely perform a scan.
The easiest way to disable Autorun on a specific drive is to download and use Tweak UI PowerToy.
See "Disable Autorun/AutoPlay" for instructions with screenshots.
- After installation, launch Tweak UI, double-click on My Computer in the tree menu on the left, then click on AutoPlay > Drives. This will allow you to change the system settings for AutoPlay/autorun.
- Uncheck the drives you want to disable AutoPlay on and click on Apply.
- Next, click on the Types in the left tree. This allows you to control whether Autoplay is enabled for CD and DVD drives and removable drives. You may need to restart Tweak UI if it closes after step 2.
- Uncheck the box to disable Autoplay for a particular type of drive.
- Click Apply.
When Autorun is disabled, double-clicking a drive which has autorun.inf in its root directory may still activate Autorun so be careful.
Always scan USB Flash Drives after they have been used in other computer systems, even your own. An easy way to do this is to download "ClamWin Portable", install it on your USB Flash Drive, update its definition files and perform a scan. Also scan the files you backed up to CD.
Posted 20 October 2009 - 06:59 AM
Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that is plugged in when you ran it. Don't delete this folder...it will help protect your drives from future infection.
After I had done these steps, My drive C and D got the autorun.inf folder.. How did this happen? What should I do with it?
0 members, 0 guests, 0 anonymous users