Page 2 of 2 FirstFirst 12
Results 11 to 14 of 14
  1. #11
    Member Net_Surfer's Avatar
    Join Date
    May 2008
    Location
    Paradise Ca.
    Posts
    1,179
    Points
    89
    Blog Entries
    4

    Default

    Hi

    Virut is a file infector and there is not cure for it but we can try the following:

    Back up your documents and pictures.......save them to a usb memory stick and do not save any file with the extension of .exe

    We're having a really tough time getting things to run properly.


    These are links to Anti-virus vendors that offer free LiveCD or Rescue CD files that are used to boot from for repair of unbootable and damaged systems, rescue data, scan the system for virus infections. Burn it as an image to a disk to get a bootable CD. All (except Avira) are in the ISO Image file format. Avira uses an EXE that has built-in CD burning capability.

    Avira AntiVir Rescue System - Tutorial for Avira Rescue CD.
    If you encounter problems running the Rescue Disk, you can get further assistance at the Avira Support Forum.
    Dr Web LiveCD. Be sure to print out and follow the instructions provided in the User Manual.
    F-Secure Rescue CD - Rescue CD 3.01 released.
    Video: How to Remove Malware with F-Secure Rescue CD
    If you encounter problems running the Rescue CD, you can get further assistance at the F-Secure Support Forum.
    BitDefender LiveCD - Index of /rescue_cd
    If you encounter problems running the Rescue CD, you can get further assistance at the BitDefender Support Forum.
    Kaspersky RescueDisk - Index of /devbuilds/RescueDisk/
    If you encounter problems running the RescueDisk, you can get further assistance at the Kaspersky Support Forum.

    If you are not sure how to burn an image, please read How to write a CD/DVD image or ISO. If you need a FREE utility to burn the ISO image, download and use ImgBurn.

    Let me know how it goes. See if you are able to and ComboFix afterward.

    Best Regards
    Net_Surfer
    Our help here is always free but it does cost money to keep the site running. If you feel we've helped you kindly, Click here: >> Please Donate to the Forum <<


    "Obstacles are what you see when yo take your eyes off your Goals"

    Net_Surfer is a Graduate of BleepingComputer Malware Removal Training ProgramYou too could train to help others!.

  2. #12
    Member cmasurya's Avatar
    Join Date
    Jul 2007
    Location
    India, New Delhi
    Posts
    77
    Points
    2

    Default hi

    Hi Net surfer,

    Really thanks for your valuable guidence but as i pc was poorly down, I wasnt able to connect to interent also, last option i had is to format it and reinstall all, and i did that yeasterday night,

    but My question remains same, which antivirus, malware, spyware and other tools are usefull to download (I will keep on updated them) as I have a pc as new now and i dont want to take further risk.

    please guided me as you always did.


    thanks
    cma

  3. #13
    Member Net_Surfer's Avatar
    Join Date
    May 2008
    Location
    Paradise Ca.
    Posts
    1,179
    Points
    89
    Blog Entries
    4

    Default

    Hello again cma

    Ok..........follow the steps and skip the ones that are not related to your problem since you re-installed windows........

    This is the regular all clean speech I give to a user when they are clean of malware.........just secure your machine following the instructions that I suggest down below.......and good luck in the future.......stay safe........

    Hello again

    It's time to clean up all of the tools we used and the logs they created.

    Please Follow my next set of final instructions and read how to secure and speed up your computer:

    Clean-up & Prevention:

    Please follow my next set of steps:

    Step 1.

    Uninstall Combofix
    • VERY IMPORTANT: Disable all running antivirus, antimalware and firewall programs as they may interfere with the proper running of ComboFix. Click on this link to see a list of programs that should be disabled. NOTE: This list is not all-inclusive. If yours is not listed and you do not know how to disable it, please ask.
    • Make sure that combofix.exe that you downloaded is on your Desktop but Do not run it!
      o *If it is not on your Desktop, the below will not work.
    • Click on your Start Menu, then Run....
    • Now copy & paste the green bolded text in the run-box and click OK.

      ComboFix /Uninstall

      <Notice the space between the "x" and "/".> <--- It needs to be there
      Windows vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall
    • Please advise if this step is missed for any reason as it performs some important actions:

    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".


    Note: If you have trouble and it doesn't want to uninstall using the method described above, you can rename ComboFix.exe to Uninstall.exe and double click on it to uninstall it.


    Step 2.

    Restart MBAM.

    Click on the Quarantine tab
    Make sure everything is selected and then click Delete All.

    Close MBAM.

    Step 3.

    Since the tools we used to scan the computer, as well as tools to delete files and folders, are no longer needed, they should be removed, as well as the folders created by these tools.

    To help you with this chores do the following:


    • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
    • Then Click the big button.
    • You will get a prompt saying "Begin Cleanup Process". Please select Yes.
    • Restart your computer when prompted.


    OTL will delete itself and any logs that any of the tools produced.

    Step 4.

    Remove any other tools or files we used by right-clicking on them or any folders they created, hold down the Shift key, and select "Delete" by clicking on it. This will delete the files without sending them to the RecycleBin.

    You can also uninstall the other programs (HijackThis or MalwareBytes if we used them) by going to Start > Control Panel > Add/Remove programs (The Control Panel is different in different versions of Windows. It will be Programs and Features in Vista and Programs > Uninstall a Program in 7)

    You might want to keep MalwareBytes AntiMalware though and that's fine Make sure you update it before you run the scans in the future.

    • Use Control Panel, Add or Remove Programs (if Windows Xp, Win7 and Vista: Programs and Features) and Uninstall any entry related to an On-Line scanner we may have used. If you find any files or folders created during this cleanup operation remaining, please feel free to delete them.
    • Configure your Antivirus software to check for updates daily, at a time in which you are sure the computer will be on.
    • If I asked you to Disable something like TeaTimer or another malware blocker, please go ahead an re-enable them if you wish.



    Step 5.

    Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

    The easiest and safest way to do this is:
    • Go to Start > Programs > Accessories > System Tools and click "System Restore".
    • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
    • Then use Disk Cleanup to remove all but the most recently created Restore Point.
    • Go to Start > Run and type: Cleanmgr
    • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
    • Click the "More Options" tab, then click the "Clean up" button under System Restore.
    • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
    • Click Yes, then click Ok.
    • Click Yes again when prompted with "Are you sure you want to perform these actions?"
    • Disk Cleanup will remove the files and close automatically.
    Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

    Windows 7 follow this instructions to delete old restore points and how to create a new one:
    Click on Start... Control Panel... System and Maintenance... System
    Click on System Protection in the left-hand task list.
    Uncheck the checkboxes next to each hard drive listed under the Create restore points automatically on the selected disks: section.

    When you uncheck a disk you will be presented with a screen.
    You should click on the Turn System Protection Off button.
    Click Apply and then OK.

    Reboot your computer.

    Now:
    Click on Start... Control Panel... System and Maintenance... System
    Click on System Protection in the left-hand task list.
    Put a checkmark in the checkboxes next to each hard drive listed under the Create restore points automatically on the selected disks: section.
    Click Apply and then OK.

    Your System restore will now be active again... starting with a new restore point.

    If you have done all of the above, Your Computer should be Clean of Malware.
    CONGRATULATIONS.



    Are things running okay? Do you have any more questions?

    System Still Slow?

    Is your computer running slower? You may have too many startup programs bogging it down. It's easy to address this problem by tweaking the startup programs on your computer.

    Follow these steps on the following tutorial to help speed up your computer.

    >> How to Change Startup Programs on Your Computer manually or using WinPatrol <<

    Choose between doing this manually or with the help of a program. Either way, you need to look up what you can disable and what you need to keep enabled. Keep in mind there are many programs written to make this task easier, using a program might save you some time.

    Simply download WinPatrol tool from: HERE to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.

    If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware

    The following can also help speed up your computer:

    Defragment files (Drive C) Defragmenting is a must.

    It's one of the large reasons for system slowdowns. I use > JkDefrag < to defragment. You can use it forever. I recommend installing it and defragmenting as soon as possible

    To improve performance I recommend to check this LINK.

    Windows7: Optimize Windows 7 for better performance Go to this page

    Having trouble with your computer?

    Even if you don't know a computer language (or want to), you can solve several common PC problems on your own.

    Read this Tutorial: (In this article= F1 is magic: Get help on your PC, The basics, Locating the problem, Software errors, Internet Connectivity, Hardware trouble, System failure)

    >> Fix common PC problems <<

    Is Your Wireless Network Safe?

    The purposes of wireless security is to keep unauthorized parties from using the wireless Internet access that you pay for, and to keep unauthorized parties from accessing the computers on your wireless network. For home and small business wireless network operators, "unauthorized parties" are usually not mastermind cybercriminals but casual freeloaders.

    Your wireless network's range is a few hundred yards, at most. That means the people most likely to "hack" into your WiFi network are your neighbors and transient passersby. Fortunately, it does not take much to deter such gate-crashers. A few easy, free tweaks to your WiFi router's settings are enough.


    See this tutorial: How can I make sure that nobody can secretly access my computers through a wireless connection. By: Bob Rankin.


    ---------------------------^--------------------------------



    Prevention:

    Take the following steps to help prevent infection on your computer:

    Use an AntiVirus Software

    It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future. See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

    Use up-to-date antivirus software
    Most antivirus software can detect and prevent infection by known malicious software. To help protect you from infection, you should always run antivirus software, such as Microsoft Security Essentials, that is updated with the latest signature files.
    For more information, see Windows 7: Consumer security software providers.

    To assist in the prevention of malicious software intrusion and infections:

    Please remember to keep antivirus software on board and always use it's real time protection feature. Run a complete system scan at least once a week...preferably in Safe mode.

    If your antivirus program is a licensed version that is about to expire, you can consider using one of these available free on the public domain:

    Microsoft Security Essentials
    AntiVir Personal Edition Classic
    Avast! 6 Free Home Edition

    Those of us in the online safety/security community have tried and tested these programs to determine their abilities. Having in mind, nothing is ever a guarantee regarding computer security, these programs nevertheless, combined with the rest of these recommendations are certain to have an impact in helping to keep your system running free and clear. I personally have been completely satisfied from having tested and used each one of those at one time or another.

    Windows Vista and Windows 7 have a software firewall built in and activated by default. And, just as with Windows XP, it's not quite the best defense, although it is a little better than it's predecessor.

    Below you can choose from several of the freeware Firewalls available on the public domain. Even though you may have a Firewall already installed, keep this list handy should you choose not to renew your subscription for whatever reason.

    You should always have at least (but not more than ) one of these types of third party firewalls running on board:
    Sunbelt Personal Firewall

    *** Zone Alarm Beware This download includes the Ask Toolbar...The ZoneAlarm Spy Blocker toolbar is powered by "Ask.com". The "Ask" search engine will cause "targeted" ads to be presented to you based upon the content of the web pages you visit, any personally identifiable information you have provided to "Ask.com", or keywords appearing in your search queries. Many security experts consider this type of behavior offensive...Windows 2k/XP/Vista

    Outpost Free

    Comodo...I highly recommend this firewall, but it may just be best suited for advanced users.


    Enable a firewall on your computer:

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

    Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.
    Visit Microsoft's Windows Update Site Frequently

    It is important that you visit Microsoft Windows Update regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

    Get the latest computer updates
    Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor websites.

    You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.
    ==============***============

    Recommended Programs:

    To help protect your computer in the future I would recommend the download and installation of some or all of the following free programs (if not already present), and the updating of them on a regular basis:
    .
    • WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:
      *Green to go
      *Yellow for caution
      *Red to stop
      WOT has an addon available for both Firefox and IE.
    • WinPatrol
      As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. For more information, please visit > HERE <.
    • McAfee Site Advisor --free version.
      To give you an indication of which sites may contain bad links or suspect downloads. It loads an icon to the taskbar of your browser (versions for IE and Firefox), As you browse, a small button on your browser toolbar changes color based on SiteAdvisor's safety results indicating the trustworthiness of the site you are on. Green for safe and Red for suspicious. Click on the icon to access details that SiteAdvisor has about the site. It also gives the same colour indications in the results page when you do a Google search, making it easier to decide which sites are safe to visit. The folks there check out websites and based on their findings, rate it as Safe, Unknown, Caution, or Bad. Safety ratings from McAfee SiteAdvisor appear next to search results. Works with Google, Yahoo!, Live Search, AOL or ASK.
      This is a utility that can be downloaded and installed it from: > HERE <
    • SpywareBlaster
      SpywareBlaster sets killbits in the registry to prevent known malicious ActiveX controls from installing on your computer. If you don't know what ActiveX controls are, see > HERE <. You can download SpywareBlaster from HERE.
    • ERUNT (Emergency Recovery Utility NT):
      This utility allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.
      You can get this utility from: > HERE < and instructions how to Practice "Safe Computer" with regular automated Registry Backups with ERUNT from: > HERE <
    • Use an alternative Internet Browser
      Many of the exploits are directed to users of Internet Explorer. Try using a different browser instead:
      Firefox
      Opera
      If you choose to use Firefox, I highly recommend these add-ons to keep your PC even more secure.
    • NoScript - for blocking ads and other potential website attacks
    • McAfee SiteAdvisor - this tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling
    • MVPs hosts file.
      A tutorial for MVPs hosts file can be found here. If you would like automatic updates you might want to take a look at HostMan host file manager. For more information on the hosts file, and what it can do for you, please consult the Tutorial on the Hosts file.



    Limit user privileges on the computer:
    Starting with Windows Vista and Windows 7, Microsoft introduced User Account Control (UAC), which, when enabled, allowed users to run with least user privileges. This scenario limits the possibility of attacks by malware and other threats that require administrative privileges to run.

    You can configure UAC in your computer to meet your preferences:

    Secure Your Software: Update Non-Microsoft Programs by using PSI Secunia Personal Software Inspector:

    Microsoft isn't the only company whose products can contain security vulnerabilities.

    Is your computer really secure?
    If you have antivirus software, malware scanners and a firewall, you might think you'e safe from hackers, crackers and identity thieves. But chances are, you're missing one critical piece of the security puzzle. Read on to learn how to secure your software and truly lock down your computer:

    What's the Missing Link in Computer Security?

    You may feel safe behind a firewall and anti-virus software. But you're not. Bad guys can still get to your personal information stored on your computer, and even take over your computer and run it as if it was their own. The gap in your armor? It's the application software you use every day. Let's look at just one recent example.

    Do you ever read Adobe PDF files, in your browser or with Adobe Reader after downloading? Tens of millions of people do; PDF is one of the most widely used file formats. In July 2009, hackers found a way to embed malware in PDF files using the equally popular Adobe Flash animation format. Even anti-virus software developers like Symantec were caught off-guard by this obscure vulnerability. New vulnerabilities are discovered in application software every hour, it seems.

    Software developers issue patches and updates that close these doors to hackers in a never-ending game of Whack-A-Mole. Vulnerability pops up here, hit it with a patch. Another pops up over there, hit it with another patch. Developers provide the patches, but it's up to you, the end user, to whack the moles.
    Staying on Top of Application Security

    It's vital to keep all your software up to date with the latest patches and upgrades. But the average computer holds about 80 application programs! How can you keep up with it all?

    _First, concentrate on the programs that are most often targeted by bad guys. They are the most commonly used programs: Microsoft Office, Adobe Reader, Internet Explorer, etc. The more people there are using a program, the more targets there are for a hacker's arrows. Naturally, the hacker goes after the biggest potential "market" for his malware.

    _Second, activate automatic update
    features when they are available. Then your software will check its home site for patches and upgrades every day, or week, or whatever. It can download and install updates without bothering you at all, or tell you when updates are available and give you the choice of when to install them.

    Some security experts tell you to turn off automatic updates because a connection to a server is an open line through which hackers can invade your computer. But turning off auto-update closes one door while leaving untold numbers of others wide open. Who are you kidding? You're not going to remember to check for updates manually on a regular basis. You'll let it slide until your software is so outdated it contains dozens of vulnerabilities. Leave auto-update on and let the software remember for you.

    _Third, you can check all the software on your computer for vulnerabilities using something like the >> Secunia Personal Software Inspector << (PSI). This free program comes from a trusted security site, and scans your software for known vulnerabilities. It will tell you which programs need updating and provide links to sites where you can download patches.

    I ran PSI while researching the issue of software security, and I was very surprised by the results. I have security software in place, and I thought I was keeping up with all my patches. I felt pretty confident about the security of my computer. But PSI flagged Adobe Reader, Flash, Skype, iTunes, QuickTime, Java and a few others as needing updates. At least SIX of the vulnerabilities were marked Critical, meaning that under certain circumstances, an Evil Hacker could exploit them to gain complete control over my computer. Yikes.


    Bottom line... the software you use every day is the biggest source of danger to your personal information. Keeping your software up to date is your best defense. You cannot afford to let vulnerabilities go unpatched.


    Use caution when opening attachments and accepting file transfers:
    Exercise caution with email and attachments received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources.

    Use caution when clicking on links to web pages:
    Exercise caution with links to web pages that you receive from unknown sources, especially if the links are to a webpage that you are not familiar with, unsure of the destination of, or suspicious of. Malicious software may be installed in your computer simply by visiting a webpage with harmful content.

    Avoid downloading pirated software:
    Threats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal. For more information, see 'The risks of obtaining and using pirated software'.

    Protect yourself from social engineering attacks:
    While attackers may attempt to exploit vulnerabilities in hardware or software to compromise a computer, they also attempt to exploit vulnerabilities in human behavior to do the same. When an attacker attempts to take advantage of human behavior to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted computer. For more information, see 'What is social engineering?'.

    Use strong passwords:
    Attackers may try to gain access to your Windows account by guessing your password. It is therefore important that you use a strong password one that cannot be easily guessed by an attacker. A strong password is one that has at least eight characters, and combines letters, numbers, and symbols.
    For more information, see Strong Passwords | Microsoft Security.
    The top 50 passwords you should never use

    To protect yourself against malware and reduce your chance of reinfection in the future, I strongly recommend you have a look at following links (giving some advice and tips), (Tip of the hat to htv8):If you are interested in learning more and joining the fight against malware please visit the Malware Removal Trainning Program thread.

    Finally I am trying to make one point very clear. It is absolutely essential to keep all of your security programs up to date.

    Stay clean and be safe

    That's it!!!

    Happy surfing!

    Cheers
    Net_Surfer



    ***If ComboFix tool helped you***, please kindly consider a donation to it's author, As you just experienced for yourself, ComboFix is a very effective tool. Should you wish to contribute to the ongoing development of ComboFix, donations are being accepted via:


    I'll leave this thread open for a couple days in case you come across any lingering problems that need fixing, then I'll close it up. If you need it reopened for any reason just shoot me a PM. It's been a pleasure working with you, now best of luck!

    I'd be grateful if you could reply to this post so that I know you have read it and if you've no other questions, the thread can be closed.
    =========
    Our help here is always free but it does cost money to keep the site running. If you feel we've helped you kindly, Click here: >> Please Donate to the Forum <<


    "Obstacles are what you see when yo take your eyes off your Goals"

    Net_Surfer is a Graduate of BleepingComputer Malware Removal Training ProgramYou too could train to help others!.

  4. #14
    Member cmasurya's Avatar
    Join Date
    Jul 2007
    Location
    India, New Delhi
    Posts
    77
    Points
    2

    Thumbs up hi net surfer

    Hi net


    I would really like to thank you for the guidence and information provided by you, I have worked according to you,right now my pc is safe and clean, thanks for the support.

    We can close the matter now.
    thanks
    cma

Page 2 of 2 FirstFirst 12