Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

auto.vbs


  • Please log in to reply
30 replies to this topic

#1 raindrops

raindrops

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 09 January 2009 - 06:07 AM

i neeed help... everytime i start mg laptop there is a pop up that says can not find script file "C:\\WINDOWS\auto.vbs"

what will i do?

BC AdBot (Login to Remove)

 


#2 koriks

koriks

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:31 PM

Posted 09 January 2009 - 04:45 PM

we have d same prob, still looking for a solution. this is my 2nd tym to have this prob. the first tym, i had to reformat. now its back. any solution for this? using avast 4.0 as my anti-virus. but looks like it cant block or clean it.

#3 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 AM

Posted 09 January 2009 - 06:27 PM

Hello.

Seems like a flash-drive infection. That file is usually caused by an infection called "Sowar.vbs Virus"

i neeed help... everytime i start mg laptop there is a pop up that says can not find script file "C:\\WINDOWS\auto.vbs"

That usually means that the file itself is gone, but the offending registry key for startup is still there and cause this error. We'll see if Malwarebytes anti-malware can remove that key if not we will try something else to remove that key if it still exist.

First run flash-drive disinfector first.

Download and Run FlashDisinfector
  • Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone. Please do so and allow the utility to clean up those drives as well.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: Flash_Disinfector will create a hidden file named autorun.inf in each partition and every USB drive plugged in when you ran it. Don't delete this folder. It will help protect your drives from future infection.

Download and run MalwareBytes Anti-Malware

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

For complete or visual instructions on installing and running Malwarebytes Anti-Malware please read this link

Post back with the Malwarebytes Anti-Malware log once it's complete.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#4 raindrops

raindrops
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 10 January 2009 - 02:21 AM

Malwarebytes' Anti-Malware 1.32
Database version: 1637
Windows 5.1.2600 Service Pack 2

1/10/2009 3:20:53 PM
mbam-log-2009-01-10 (15-20-53).txt

Scan type: Quick Scan
Objects scanned: 48874
Time elapsed: 2 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#5 koriks

koriks

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:31 PM

Posted 10 January 2009 - 02:23 AM

hi, thanx for the quick reply. i performed d quick scan as u stated, plus d full scan. same result. here are d logs. hope u can help me on this prob. ... d first tym i encounterd this prob b4 i restored my sys, but nothing happened. until i reformated because my laptop wont start up. it hangs in the windows xp logo while starting up. .... can u suggest an effective anti-virus to counter this prob? my avast anti-virus is updated but doesnt seem to block this prob. tnx and more power



Malwarebytes' Anti-Malware 1.32
Database version: 1637
Windows 5.1.2600 Service Pack 3

1/10/2009 2:21:02 PM
mbam-log-2009-01-10 (14-21-02).txt

Scan type: Quick Scan
Objects scanned: 68721
Time elapsed: 6 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


_______________________________________________________________
______________________________________________________________

Malwarebytes' Anti-Malware 1.32
Database version: 1637
Windows 5.1.2600 Service Pack 3

1/10/2009 3:12:01 PM
mbam-log-2009-01-10 (15-12-01).txt

Scan type: Full Scan (C:\|D:\|E:\|F:\|)
Objects scanned: 116534
Time elapsed: 45 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#6 raindrops

raindrops
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 10 January 2009 - 12:24 PM

help? do i need to reformat my laptop? (i hope not... )

#7 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 AM

Posted 10 January 2009 - 12:49 PM

Hello.

Please perform the following step. The step requires to export a registry key, although we aren't physically doing anything to it, we still need to backup your registry. Also did you run flash-drive disinfector?

Backup Registry with ERUNT

This tool will create a complete backup of your registry. A backup is created to ensure we have backup so encase anything goes wrong we can deal with it. Do not delete these backups until we are finished.
  • Please download erunt-setup.exe to your desktop.
  • Double click erunt-setup.exe. Follow the prompts and allow ERUNT to be installed with the settings at default. If you do not want a Desktop icon, feel free to uncheck that. When asked if you want to create an ERUNT entry in the startup folder, answer Yes. You can delete the installation file after use.
  • Erunt will open when the installation is finished. Check all items to be backed up in the default location and click OK.
You can find a complete guide to using the program here:
http://www.larshederer.homepage.t-online.de/erunt/erunt.txt


How to Restore from the ERUNT Backup
Only restore from the backups if instructed to, or you need to do so. You need it if after doing something, your computer will only boot in Safe Mode and you are unable to contact us (or anyone else) for help by other means, or if your computer will not boot into Windows at all.

To restore if you can boot, navigate to C:\WINDOWS\erdnt, choose the folder with the most recent date, and double click ERDNT.EXE. Check all boxes in the restoration options.

To restore from the Recovery Console using the Windows CD:
  • Turn on your machine with the disk in the drive.
  • Type in the number of the Windows installation you want to repair (usually 1), then press Enter.
  • Type in the Administrator password (leave blank if you are unsure what it is or if you do not have one) and press Enter.
  • Type without quotes "cd erdnt" followed by Enter.
  • Type without quotes "dir" followed by Enter. This will list out the available folders, whose names are the date on which the backup was taken in (M)M-DD-YYYY format. Try the most recent dates first.
  • Type without quotes "cd **name of the folder**" followed by Enter.
  • Type without quotes "batch erdnt.con" followed by Enter.
  • Type without quotes "exit" followed by Enter.
  • Remove your CD from the drive and reboot your computer into the restored registry. If you still cannot boot, try again with an earlier restore date.

Use Msconfig to find registry key

Go to start>>Run>> In the open field type in Msconfig and hit enter
The system configuration utility will open, please go to the startup tab
Under the command column you may see the file path of "C:\\WINDOWS\auto.vbs"
Next to it there should be a registry key, please write down that location if it's still there
If that startup item for that file (auto.vbs) is checked, please uncheck it and click apply then close.
Reboot when prompted.

Create and Run batch script
  • Copy the following into a notepad (Start>Run>"notepad"). Do not copy the word "quote".

    @Echo off

    Regedit /e "%userprofile%/desktop/look.txt" "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
    Regedit /e "%userprofile%/desktop/peek.txt" "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig"
    Notepad look.txt

    Exit

  • Click File, then Save As... .
  • Click Desktop on the left.
  • Under the Save as type dropdown, select All Files.
  • In the box File Name, input export.bat.
  • Hit OK.
When done properly, the icon should look like Posted Image for the .bat file.

Double click on export.bat, and Black DOS window shall appear and then notepad will open. This is normal please do not panic.

@koriks
Please start your own topic instead of using raindrops thread, this will cause confusion for me and raindrops. Thanks for understanding.

Post back with:
-Location of auto.vbs from Msconfig
-look.txt (located on your desktop)
-peek.txt (located on your desktop)
-Is the error still there?


I need to run, get back to you soon.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#8 raindrops

raindrops
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 11 January 2009 - 02:39 AM

thanks extremeboy for replying! i havent run the flash disinfector yet since my usb isnt with me..

heres the location of the auto.vbs
HKLM\SOFTWARE\Microsoft\Windows\CurrentVer...

but when i restarted it heres the new location of the auto.vbs
SOFTWARE\Microsoft\Windows\CurrentVersion\Run


the look notepad had this in it...

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="C:\\WINDOWS\\system32\\igfxtray.exe"
"HotKeysCmds"="C:\\WINDOWS\\system32\\hkcmd.exe"
"Persistence"="C:\\WINDOWS\\system32\\igfxpers.exe"
"RTHDCPL"="RTHDCPL.EXE"
"Alcmtr"="ALCMTR.EXE"
"BluetoothAuthenticationAgent"="rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent"
"IRW"="C:\\WINDOWS\\system32\\IRW.exe"
"Apple_KbdMgr"="C:\\Program Files\\Boot Camp\\KbdMgr.exe"
"avast!"="C:\\PROGRA~1\\ALWILS~1\\Avast4\\ashDisp.exe"
"SunJavaUpdateSched"="\"C:\\Program Files\\Java\\jre1.6.0_07\\bin\\jusched.exe\""
"LogonStudio"="\"C:\\Program Files\\WinCustomize\\LogonStudio\\logonstudio.exe\" /RANDOM"
"Malwarebytes Anti-Malware (reboot)"="\"C:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe\" /runcleanupscript"
"KernelFaultCheck"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,\
00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,\
5c,00,64,00,75,00,6d,00,70,00,72,00,65,00,70,00,20,00,30,00,20,00,2d,00,6b,\
00,00,00
"MSConfig"="C:\\WINDOWS\\pchealth\\helpctr\\Binaries\\MSCONFIG.EXE /auto"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
"Installed"="1"


this is the peek notepad...

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\services]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupfolder]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\autoMe]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="auto"
"hkey"="HKLM"
"command"="wscript.exe \"C:\\WINDOWS\\auto.vbs\""
"inimapping"="0"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\state]
"system.ini"=dword:00000000
"win.ini"=dword:00000000
"bootini"=dword:00000000
"services"=dword:00000000
"startup"=dword:00000002

so the auto.vbs message doesnt appear anymore but a new pop up window says

You have used the System Configuration Utility to make change to the way Windows starts.
The System Configuration Utility is currently in Diagnostic or Selective Startup mode, causing this message to be displayed and the utility to run every time windows starts.
Choose the NormalStartup mode on the General tab to start Windows normally and undo the changes you made using the System Configuration Utility.
theres a checkbox on the side and besid it says Don't show this message or launch the System Configuration Utility when Windows start:

then when i click ok the System Configuration Utility opens up..

i also havent restored the backup registry.

what will i do with this? and do i need to restore the registry?

Edited by raindrops, 11 January 2009 - 02:56 AM.


#9 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 AM

Posted 11 January 2009 - 11:35 AM

Hello.

Great, we fixed it. So do you have any other problems?

Although the popup itself is gone we should remove the following key because it is where it is stored after you unchecked it from MSconfig.

so the auto.vbs message doesnt appear anymore but a new pop up window says

Yes, when it comes up again in your next reboot, please place a checkmark next to it and click Ok. Then it won't pop up anymore :thumbsup:

i also havent restored the backup registry.

what will i do with this? and do i need to restore the registry?

No. We backed up the registry for 1 main purpose only in this situation because we were dealing with the registry.
1. If you or me accidentally made a mistake and something happens to your machine you can easily restore it to fix everything, including using the Recovery Console if you have it installed or using your XP CD.

Create and Run Registry Script
  • Copy the following into a notepad (Start>Run>"notepad"). Do not copy the word "quote".

    REGEDIT4

    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\autoMe]

  • Click File, then Save As... .
  • Click Desktop on the left.
  • Under the Save as type dropdown, select All Files.
  • In the box File Name, input remove.reg.
  • Hit OK.
When done properly, the icon should look like Posted Image for the .reg file.

Doube-click on remove.reg, you will get a warning saying something like: "do you wish to merge/add the following information to the registry?". Please say Yes. Next you will get a confirmation telling you if it was merged successfully.

Tell me in your next reply if the reg script got merged successfully.

Download and Run RegSearch
Let's do a reg search for that name of the file, I'm pretty sure that there's still some leftover keys for it.

Please download RegSearch and save it to your desktop.
  • Extract the folder regsearch onto your desktop
  • Double-click on regsearch folder and then find regsearch.exe and double click it
  • A Security Window will open please select Run.
  • The Registry Search window will appear please make sure under the Search everything is checked.
  • At the top of the Regsearch where it says: "Enter Search string (case independent) and click Ok..." please input:

auto.vbs
  • After inputing the name, please click Ok
  • It will begin searching, once it is finished
Disable Autorun on Removable Drives

Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. Read USB-Based Malware Attacks and Please disable Autorun ASAP!.

The post is from Quietman7, the "real" post from Quietman7 can be found over here.

Run Flash-Drive Disinfector

Once you disabled autorun please make sure to run Flash-Drive Disinfector once you get your flash-drive back. In fact you can run it now without your flash-drive and run it again once your flash-drive is back. Your flash-drive may still have the infection, by running flash-drive disinfector now it will prevent that worm to spread to your computer. Also if you disabled autorun that will also prevent it from spreading over your computer.

Post back with:
-Did the registry script merge successfully?
-RegSearch log


We will remove any leftover entries next round.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#10 raindrops

raindrops
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 11 January 2009 - 12:15 PM

the merge was successful!

this is the log...


Windows Registry Editor Version 5.00

; Registry Search 2.0 by Bobbi Flekman © 2005
; Version: 2.0.6.0

; Results at 1/12/2009 1:13:44 AM for strings:
; 'auto.vbs'
; Strings excluded from search:
; (None)
; Search in:
; Registry Keys Registry Values Registry Data
; HKEY_LOCAL_MACHINE HKEY_USERS


[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{42b2da09-a96c-11dd-9eea-001f5be3ded0}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{42b2da09-a96c-11dd-9eea-001f5be3ded0}\Shell\Open\Command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{446b6f4f-c912-11dd-9f48-001f5be3ded0}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{446b6f4f-c912-11dd-9f48-001f5be3ded0}\Shell\Open\Command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9447b218-c8cf-11dd-9f47-001f5be3ded0}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9447b218-c8cf-11dd-9f47-001f5be3ded0}\Shell\Open\Command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9cfc2108-bc51-11dd-9f1d-001ff3540bb2}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9cfc2108-bc51-11dd-9f1d-001ff3540bb2}\Shell\Open\Command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9cfc2109-bc51-11dd-9f1d-001ff3540bb2}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9cfc2109-bc51-11dd-9f1d-001ff3540bb2}\Shell\Open\Command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0c35b10-db29-11dd-9f79-001f5be3ded0}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0c35b10-db29-11dd-9f79-001f5be3ded0}\Shell\Open\Command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{f4ee787d-b065-11dd-9eff-001f5be3ded0}\Shell\AutoRun\command]
@="wscript.exe auto.vbs"

[HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{f4ee787d-b065-11dd-9eff-001f5be3ded0}\Shell\Open\Command]
@="wscript.exe auto.vbs"

; End Of The Log...

#11 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 AM

Posted 11 January 2009 - 01:17 PM

Hello.

I need to leave soon, so let's take care of the remaining reigstry itmes. Those are from your flash-drive. Just want to make sure you did what I said:

1. Did you run flash-drive disinfector yet?
2. Did you disable autorun?

Create and Run Registry Script
  • Copy the following into a notepad (Start>Run>"notepad"). Do not copy the word "quote".

    REGEDIT4

    [-HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{42b2da09-a96c-11dd-9eea-001f5be3ded0}]

    [-HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{446b6f4f-c912-11dd-9f48-001f5be3ded0}]

    [-HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9447b218-c8cf-11dd-9f47-001f5be3ded0}]

    [-HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9cfc2109-bc51-11dd-9f1d-001ff3540bb2}]

    [-HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0c35b10-db29-11dd-9f79-001f5be3ded0}]

    [-HKEY_USERS\S-1-5-21-484763869-1580436667-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{f4ee787d-b065-11dd-9eff-001f5be3ded0}]

  • Click File, then Save As... .
  • Click Desktop on the left.
  • Under the Save as type dropdown, select All Files.
  • In the box File Name, input delete.bat.
  • Hit OK.
When done properly, the icon should look like Posted Image for the .reg file.

Doube-click on delete.reg, you will get a warning saying something like: "do you wish to merge/add the following information to the registry?". Please say Yes. Next you will get a confirmation telling you if it was merged sucessfully.

Tell me in your next reply if the reg script got merged sucessfully.

How is your computer now? No more error message now, correct?

You should run an online scan as well to see if there's anything else.

Run Scan with Kaspersky

Please do a scan with Kaspersky Online Scanner.

If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.

  • Please disable your realtime protection software before proceeding. Refer to this page if you are unsure how.
  • Open the Kaspersky Scanner page.
  • Click on Accept and install any components it needs.
  • The program will install and then begin downloading the latest definition files.
  • After the files have been downloaded on the left side of the page in the Scan section select My Computer
  • This will start the program and scan your system.
  • The scan will take a while, so be patient and let it run.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.
You can refer to this animation by sundavis.

Post back with:
-Did the script merge successfully?
-Kaspersky log
-How is your computer now?


With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#12 raindrops

raindrops
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 11 January 2009 - 01:26 PM

[*]In the box File Name, input delete.bat.
[*]Hit OK.
[/list]When done properly, the icon should look like Posted Image for the .reg file.

Doube-click on delete.reg, you will get a warning saying something like: "do you wish to merge/add the following information to the registry?". Please say Yes. Next you will get a confirmation telling you if it was merged sucessfully.

Tell me in your next reply if the reg script got merged sucessfully.

umm is it delete.reg or delete.bat?

#13 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 AM

Posted 11 January 2009 - 02:27 PM

Hello.

Sorry about that, I mean delete.reg.

Now double click it, tell me how it goes. Run the Kaspersky scan as well.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#14 raindrops

raindrops
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:09:31 PM

Posted 11 January 2009 - 06:19 PM

the merge was successful

when i ran the kaspersky scan it had another infection..

KASPERSKY ONLINE SCANNER 7 REPORT
Monday, January 12, 2009
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Sunday, January 11, 2009 17:36:27
Records in database: 1603648
Scan settings
Scan using the following database extended
Scan archives yes
Scan mail databases yes
Scan area My Computer
C:\
D:\
Scan statistics
Files scanned 56684
Threat name 1
Infected objects 1
Suspicious objects 0
Duration of the scan 00:48:54

File name Threat name Threats count
C:\WINDOWS\psshutdown.exe Infected: not-a-virus:RiskTool.Win32.PsKill.au 1
The selected area was scanned.

i think it runs ok now but theres a new virus that kaspersky found

#15 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 AM

Posted 12 January 2009 - 03:36 PM

Hello.

Nope, that one is fine. Notice how it says "not-a-virus" "risk tool". You don't need to worry about that, it's not a virus and it's not infected. Looks good, glad you have no more problems.

Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok"
  • Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" Tab.
  • Click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Preventing Infections in the Future

Please also have a look at the following links, giving some advice and Tips to protect yourself against malware and reduce the potential for re-infection:
  • Avoid gaming sites, underground web pages, pirated software sites, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.
I recommend you regularly visit the Windows Update Site!
  • Lots of Hacking/Trojans use the methods found (plugged by the updates) that have not been stopped by people not updating.
  • By updating your machine, you have one less headache! Posted Image
  • Update ALL Critical updates and any other Windows updates for services/programs that you use.
  • If you wish, you can also use automatic updates. This is a good thing to have if you want to be up-to-date all the time, but can also be a bit of an annoyance due to its handling and the sizes of the updates. If you wish to turn on automatic updates then you will find here is a nice little article about turning on automatic updates.
  • Note that it will download them for you, but you still have to actually click install.
  • If you do not want to have automatic updates turned on, or are on dial-up, you can always download updates seperately at: http://windowsupdate.microsoft.com.
It is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

For a nice list of freeware programmes in all categories, please have a look at this thread with freeware products that are regarded as useful by the users of this forum: Commonly Used Freeware Replacements.

Update all programs regularly - Make sure you update all the programs you have installed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.

Follow this list and your potential for being infected again will reduce dramatically.

Finally, and definitely the MOST IMPORTANT step, click on the following tutorial and follow each step listed there:

Simple and easy ways to keep your computer safe and secure on the Internet


Glad I was able to help and thank you for choosing Bleeping Computer as you malware removal source.
Don't forget to tell your friends about us and Good luck :thumbsup:

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users