Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

can't open C drive double clicking


  • Please log in to reply
1 reply to this topic

#1 bloodymary

bloodymary

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:14 AM

Posted 09 April 2009 - 01:29 AM

When i try to open my C drive from My computer i get "recycler\s-4-11-100015524-100025730-10002321902572.com"
I just took a backdoor worm off of this computer, i also get redirected to a site when i try to google something it's called info-feed.com

heres my AVG scan results

"Scan ""Scan whole computer"" was finished."
"Infections";"7";"7";"0"
"Folders selected for scanning:";"Scan whole computer"
"Scan started:";"Wednesday, April 08, 2009, 11:01:10 PM"
"Scan finished:";"Thursday, April 09, 2009, 12:08:26 AM (1 hour(s) 7 minute(s) 16 second(s))"
"Total object scanned:";"441293"
"User who launched the scan:";"BloodyRawr"

"Infections"
"File";"Infection";"Result"
"C:\Documents and Settings\BloodyRawr\Desktop\alot of stuff\hackz\Steam Hack\Steam Hack.EXE";"Virus identified Worm/Agobot.HEY";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Desktop\alot of stuff\hackz\Steam Hack\Steam Hack.EXE:\Royal.exe";"Virus identified Worm/Agobot.HEY";"Moved to Virus Vault"
"C:\WINDOWS\system32\spoolsv.exe (212)";"Trojan horse Downloader.Zlob_r.FF";"Reboot is required to finish the action"
"C:\Downloads\VideoCodec.exe";"Virus found Win32/Heur.dropper";"Moved to Virus Vault"
"C:\Program Files\Winamp Now Playing AutoHotkey script\winamp_now_playing.exe";"Virus identified Worm/Autoit.CJG";"Moved to Virus Vault"
"C:\RECYCLER\S-1-4-11-100015524-100025730-100023219-2572.com";"Virus found Win32/Heur";"Moved to Virus Vault"
"C:\WINDOWS\TEMP\tempo-820953.tmp";"Trojan horse Downloader.Zlob_r.FF";"Moved to Virus Vault"

"Warnings"
"File";"Infection";"Result"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite";"Found Tracking cookie.Atdmt";"Healed"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\adrevolver.com.9b9d670a";"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\adrevolver.com.f6cfcad4";"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\atdmt.com.b3e33b5f";"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\m.webtrends.com.b4ca7df0";"Found Tracking cookie.Webtrends";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\advertising.com.525a5fb9";"Found Tracking cookie.Advertising";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\burstnet.com.a3218a37";"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\burstnet.com.c4fe2ebb";"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\media.adrevolver.com.5fed601d";"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\realmedia.com.68087763";"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\doubleclick.net.bf396750";"Found Tracking cookie.Doubleclick";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\fastclick.net.8a6435e9";"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\fastclick.net.8dd1284a";"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\fastclick.net.9b41aa53";"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\fastclick.net.c38980e4";"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\revsci.net.50e13b1b";"Found Tracking cookie.Revsci";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\tribalfusion.com.dcc03271";"Found Tracking cookie.Tribalfusion";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\zedo.com.27f1639b";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\zedo.com.c1dd09f2";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\BloodyRawr\Application Data\Mozilla\Firefox\Profiles\a9j3j8w6.default\cookies.sqlite:\zedo.com.ff8ec9c0";"Found Tracking cookie.Zedo";"Moved to Virus Vault"


My brother uses this computer so when i got back on he left me with these viruses...

thanks for your time.

Edited by bloodymary, 09 April 2009 - 01:31 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,734 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:14 AM

Posted 09 April 2009 - 01:40 PM

From what you describe, it appears to be a USB flash drive infection which usually involve malware that modifies and loads an autorun.inf (configuration) file into the root folder of all drives (internal, external, removable) along with a malicious executable. When removable media such as a CD/DVD is inserted (mounted), autorun looks for autorun.inf and automatically executes the malicious file to run silently on your computer. In USB drives, it modifies Windows Explorer's right-click context menu and redirects to executing the malicious file if the "Open" command is used or double-clicking on the drive icon. When a flash drive becomes infected, the Trojan will infect a system when the removable media is inserted if autorun has not been disabled. To learn more about this risk, please read:Please insert your flash drive before we begin. Hold down the Shift key when inserting the drive until Windows detects it to bypass the autorun feature and keep autorun.inf from executing automatically.

Then download Flash_Disinfector by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run the tool and follow any prompts that may appear.
  • If asked to insert your USB flash drive and other removable drives, please do so and allow the utility to clean up them as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.

Alternatively, you can download and use Panda USB Vaccine. Computer Vaccination will prevent any AutoRun file from running, regardless of whether the removable device is infected or not. USB Vaccination disables the autorun file so it cannot be read, modified or replaced by malicious code. The Panda Resarch Blog advises that once USB drives have been vaccinated, they cannot be reversed except with a format. If you do this, be sure to back up your data files first or they will be lost during the formatting process.

Next download and scan with Dr.Web CureIt.
Follow these instructions for performing a scan in "safe mode".
If you cannot boot into safe mode, then perform your scan in normal mode. Be aware, this scan could take a long time to complete.
-- Post the log in your next reply.

Then download Malwarebytes Anti-Malware and save it to your desktop.
Print out and follow these Instructions for scanning with Malwarebytes Anti-Malware and perform a Quick Scan in normal mode.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users