loads of infected files!!!!!what do i do?

xp home edition

ok i just downloaded avast.
it scanned my entire pc and came back with all of this.
win32 adware gen
win32 spyware gen
all in system volume info file, system 32, windows, documents and settings and programme files.
i couldnt repair them and when i did the cleaner thing it said no infected files.
there are 16 of these and i have them in the chest, what do i do with them?
also when i did the scan it said some were trojens but i dont see them in the chest.
i regularly delete temp internet files and cookies.
i also noticed when i try to burn films onto disc my pc crashes and i have to reboot! whats up with that???

Let the files into Chest there… they won’t harm you.

If a virus is replicant (coming and coming again), you should:

  1. Disable System Restore on Windows XP: http://support.microsoft.com/default.aspx?scid=kb;[LN];310405
  2. Clean your temporary files.
  3. Schedule a boot time scanning with avast. Start avast! > Right click the skin > Schedule a boot-time scanning. Select for scanning archives. Boot.
  4. Use a-squared, ewido or Spyware Terminator (trojan removers).

:slight_smile: Hi dfarmer :

“So how did I get infected in the first place?” © Tony Klein

You usually get infected because your security settings are too low.

Here are a number of recommendations that will help tighten them, and which will contribute to making you a less likely victim:

1.) Watch what you download!
Many freeware programs, and P2P programs like Grokster, Imesh, Kazaa and others are amongst the most notorious, come with an enormous amount of bundled spyware that will eat system resources, slow down your system, clash with other installed software, or just plain crash your browser or even Windows itself. If you insist on using a P2P program, please read an article written by Mike Healan of Spywareinfo.com fame. It is an updated and comprehensive article that gives in-depth detail about which P2P programs are “safe” to use.

2.) Go to IE > Tools > Windows Update > Product Updates, and install ALL High-Priority Security Updates listed.
If you’re running Windows XP, that of course includes the Service Pack 2! If you suspect your computer is infected with Malware of any type, we advise you to not install SP2 if you don’t already have it. You can post a HijackThis log on Forums to get free Expert help cleaning your machine. Once you are sure you have a clean system, it is highly recommended to install SP2 to help prevent against future infections.

It’s important to always keep current with the latest security fixes from Microsoft.
Install those patches for Internet Explorer, and make sure your installation of Java VM is up-to-date. There are some well known security bugs with (Microsoft) Java VM which are exploited regularly by browser hijackers.

3.) Open IE and go to Internet Options > Security > Internet, then press “Default Level”, then OK.

Now press “Custom Level.”

In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to “Prompt”, and (“Initialize and Script ActiveX controls not marked as safe”) to “Disable”.

Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed.
Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Option > Security.

So why is ActiveX so dangerous that you have to increase the security for it?
When your browser runs an activex control, it is running an executable program. It’s no different from doubleclicking an exe file on your hard drive.
Would you run just any random file downloaded off a web site without knowing what it is and what it does?

4.) Install Javacool’s SpywareBlaster

It will protect you from most spy/foistware in it’s database by blocking installation of their ActiveX objects.

Download and install, download the latest updates, and you’ll see a list of all spyware programs covered by the program (NOTE: this is NOT spyware found on your computer)
Press “Enable All Protection”, and you’re done.
The spyware that you told Spywareblaster to set the “kill bit” for won’t be a hazard to you any longer.
Although it won’t protect you from every form of spyware known to man, it is a very potent extra layer of protection.
Don’t forget to check for updates every week or so.

5.) Let’s also not forget that Spybot Search & Destroy has the Immunize feature which works roughly the same way. Another feature within Spybot is the TeaTimer option. This option immediately detects known malicious processes wanting to start and terminates them. TeaTimer also detects when something wants to change some critical registry keys and gives you an option to allow them or not.

6.) Microsoft now offers their own free malicious software blocking tool. Windows Defender improves Internet browsing safety by guarding over fifty (50) ways spyware can enter your PC.

7.) Another excellent program by Javacool we recommend is SpywareGuard.
It provides a degree of real-time protection solution against spyware that is a great addition to SpywareBlaster’s protection method.

8.) IE-SPYAD puts over 5000 sites in your restricted zone, so you’ll be protected when you visit innocent-looking sites that aren’t actually innocent at all. Another good hosts program is mvpshosts. This little program packs a powerful punch as it block ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers.

It is important to note that all of the above programs/files can be run simultaneously on your system. They will work together in layers, so to speak, to help protect your computer. However, the following suggestions are designed to only run one of each. It is not a good idea to run more than one firewall, and one anti-virus program. Running more than one of these at a time can cause system crashes, high system usage and/or conflicts with each other.

9.) It is critical that you use a firewall to protect your computer from hackers. We don’t recommend the firewall that comes built in to Windows. It doesn’t block everything that may try to get in, and the entire firewall is written to the registry. As various kinds of malware hack the Registry in order to disable the Windows firewall, it’s far preferable to install one of the excellent third party solutions. Three good ones that are freeware to boot are ZoneAlarm, Kerioand Sygate

10.) An Anti-Virus product is a necessity. There are many excellent programs that you can purchase. However, we choose to advocate the use of free programs whenever possible. Some very good and easy-to-use free A/V programs are AVG, Avast, and AntiVir. It’s a good idea to set these to receive automatic updates so you are always as fully protected as possible from the newest virus threats.

11.) Finally, after following up on all these recommendations, why not run Jason Levine’s Browser Security Tests
They will provide you with an insight on how vulnerable you might still be to a number of common exploits.

Happy safe computing!!

Credits : Anti-spyware Community - for suggesting additions to this article

Revised: TonyKlein,Oct 30 2005, 05:00 AM
Reproduced with permission of the author.


Whilst browsing or collecting email, etc. if you get infected then the malware by default inherits the same permissions that you have for your user account. So if the user account has administrator rights, the malware has administrator rights and can reap havoc. With limited rights the malware can’t put files in the system folders, create registry entries, etc. This greatly reduces the potential harm that can be done by an undetected or first day virus, etc.

Check out the link to DropMyRights (in my signature below) - Browsing the Web and Reading E-mail Safely as an Administrator. This obviously applies to those NT based OSes that have administrator settings, winNT, win2k, winXP.