Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Autorun.inf virus

  • Please log in to reply
2 replies to this topic

#1 greeney


  • Members
  • 9 posts
  • Local time:06:17 PM

Posted 25 January 2012 - 02:48 AM

Right then guys,
Looking for some solid responses here, I already don't have much hair and if I start pulling any more out there's going to be trouble! So it would appear that my computers were infected by the autorun.inf virus. It started on one computer, into my external hard drive, and then onto the second computer. Now it would appear that I have removed the virus from the hard drive using command prompt; attrib -s -r -h *.*, followed by del autorun.inf, after which I quickly removed the hard drive and it appears to have worked. Unfortunately the folders were are still shortcuts. It was not a problem on the hard drive as a merely made new folders and copied the old information into them. However I feel there should be a better way, especially now I am looking at the internal hard drives on both laptops.
2 Questions
1) Does the lack of automatic conversion back into folders mean the virus has not been removed (there appears to be no evidence left)
2) Is there any way of converting the shortcuts back into folders without all this crazy copying business?
If you guys sort this for me I'll get my missus to bake you all cookies!

Edited by hamluis, 25 January 2012 - 07:12 AM.
Moved from XP to Am i Infected.

BC AdBot (Login to Remove)


#2 mark1956


  • Security Colleague
  • 271 posts
  • Gender:Male
  • Location:Spain
  • Local time:11:17 AM

Posted 25 January 2012 - 06:29 AM

I will put in a request to move your thread into the "Am I Infected" forum. You should then receive the help required to check to see that the infection has been removed and get you system back to normal.

#3 bloopie


    Bleepin' Sith Turner

  • Malware Response Team
  • 7,927 posts
  • Gender:Male
  • Location:New York
  • Local time:06:17 AM

Posted 27 January 2012 - 10:37 PM

Hello and Welcome greeney,

The autorun virus is spread through flash/USB drives. It's a bit frustrating when it infects other computers you've used the drive on, and other computers on your network.

Those are very good questions and you may have heeded the infection already, but please follow these directions first, then we can get to the bottom of it.

First, let's stop the spread by doing the following:

Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.

After this you should be able to use your flash drive safely. If you need to copy files from a clean computer via USB, you should be able to do so safely now!

Please download Rkill by Grinler and save it to your desktop.Link 1
Link 2
  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista, right-click on it and Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • If the tool does not run from any of the links provided, please let me know.
Do not reboot the computer, or you will need to run the application again!

Now please download Malwarebytes' Anti-Malwareand save it to your desktop.
Download Link 1
Download Link 2Malwarebytes' may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.

  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes' when done.
Note: If Malwarebytes' encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes' from removing all the malware.

Please post the MBAM scan results here for review, and let me know if you are still having the same problems!!

Just as a point, you may want to check for a file named ntdelect.com. This file is bad, but do not confuse with the file named ntdetect.com which is needed.

Chances are, if you've done the steps you've already mentioned, the virus will be removed. However, there are other issues with this virus you may need to consider.

But now, it's important to check all machines on your network for this problem and take precautions so it will not spread further!


Edited by bloopie, 28 January 2012 - 07:01 PM.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users