Trojan. win32.killfiles. M, Packer. mian007, etc.

Source: Internet
Author: User

Trojan. win32.killfiles. M, Packer. mian007, etc.

EndurerOriginal
1Version

Just now, a netizen said that his computer was very slow recently and asked me to remotely assist in the inspection through QQ.

Download pe_xscan to scan logs and analyze the logs. The following suspicious items are found:
/=
Pe_xscan 07-08-30 by Purple endurer

Windows XP Service Pack 2 (5.1.2600)
Administrator user group

C:/Windows/system32/explorer. EXE * 1428 | 8:32:36 | MICROSOFT (r) Windows (r) Operating System | 6.2900.2180 | Windows Explorer | (c) Microsoft Corporation. all rights reserved. | 6.2900.2180 | Microsoft Corporation |? | Explorer | EXPLORER. EXE

C:/Windows/svchost.exe * 1768 | 15:42:16 | 1.00 |? |? | 1.00 |? |? | 1 | 1.exe

C:/program files/yayad/adpop. EXE * 2440 | 1:54:32 | ad. pop | 1.0.0.1 | ad. popup | (c) CDM. all rights reserved. | 1.0.0.1 | CDM |? | Adpop.exe
C:/program files/yayad/AutoUpdate. dll | 1:53:46 | AutoUpdate | 1.0.0.1 | AutoUpdate | (c) <yayad>. All Rights Reserved. | 1.0.0.1 | CDM |? | AutoUpdate. dll | AutoUpdate. dll

C:/program files/Internet Explorer/iw.e. EXE * 1484 | MICROSOFT (r) Windows (r) Operating System | 6.00.2900.2180 | Internet Explorer | (c) Microsoft Corporation. all rights reserved. | 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158) | Microsoft Corporation |? | Iexplore. exe
C:/program files/yayad/adcore. dll | 1:54:52 | ad core | 1.0.0.1 | ad core | (c) CDM. All Rights Reserved. | 1.0.0.1 | CDM |? | Adcore. dll | adcore. dll

F2-Reg: system. ini: userinit.exe, EXPLORER. EXE

O4-hkcu/../run: Invalid wsctf.exe] wsctf.exe
O4-hkcu/../run: [EXPLORER. EXE] EXPLORER. EXE

O4-Global startup: Windows. HTA-> invalid lnk file

I:/autorun. inf
/-----
[Autorun]
Opentracing autorun.exe
Iconw.pr2.exe
-----/

O23-service: c12063328 (c12063328)-system32/Drivers/c12063328.sys (pilot)

O23-service: Internet Explorer Service-C:/Windows/svchost.exe | 15:42:16 | 1.00 |? |? | 1.00 |? |? | 1 | 1.exe( automatic)

O23-service: mysee2_runtime ()-C:/Windows/system32/svchost.exe-K mysee2-> C:/Windows/system32/Gy/runtime. DLL | 14:59:14 | runtime application | 1, 0, 0, 3 | <mysee live!> Runtime | (c) Beijing high-dimensional video Technology Co., Ltd. All rights reserved. | 1, 0, 0, 3 | Beijing high-dimensional video Technology Co., Ltd. |? | <Mysee live!> Runtime | runtime.exe (manual)

O23-service: npkycryp (npkycryp)-C:/Windows/system32/npkycryp. sys (manual)
O23-service: pohci13f (pohci13f)-C:/docume ~ 1/www/locals ~ 1/temp/pohci13f. sys (manual)
O23-service: ws2ifsl (Windows Socket 2.0 non-ifs service provider support environment)-C:/Windows/system32/Drivers/ws2ifsl. sys | MICROSOFT? Windows? Operating System | 5.1.2600.0 | Winsock2 ifs layer |? Microsoft Corporation. All Rights Reserved. | 5.1.2600.0 (xpclient000017-1148) | Microsoft Corporation |? | Ws2ifsl. sys | ws2ifsl. sys (disabled)
===/

Download procview and hijackthis from http://endurer.ys168.com.

Terminate a process with procview:

C:/Windows/system32/EXPLORER. EXE
C:/Windows/svchost.exe

Use hijackthis to fix F2 and O4.

Unmount yayad from the Add/delete program on the control panel

Open Registry Editor to delete the o23 project.

Download fileinfo and bat_do to the http://purpleendurer.ys168.com to extract file information, package the backup, and then delete it.

File Description: C:/Windows/svchost.exe
Attribute: ---
Language: Chinese (China)
File version: 1.00
Note:
Copyright:
Note:
Product: 1.00
Product Name:
Company Name:
Legal trademark:
Internal name: 1
Source File Name: 1.exe
Creation Time: 15:42:15
Modification time: 15:42:16
Access time:
Size: 16384 bytes, 16.0 KB
MD5: d339fe10cf5ccd99bc95a4e702579301
Hsa1: 8aef0adde759af973ed10d798cc067c8ba2e4373

RisingTrojan. win32.killfiles. m

Scanned file: svchost.exe-infected

Svchost.exe-infected by Trojan. win32.killfiles. m

File Description: C:/Windows/system32/EXPLORER. EXE
Property:-SHR
Language: Chinese (China)
File version: 6.2900.2180
Note: Windows Explorer
Copyright: (c) Microsoft Corporation. All rights reserved.
Note:
Product Version: 6.2900.2180
Product Name: Microsoft (r) Windows (r) Operating System
Company Name: Microsoft Corporation
Legal trademark:
Internal name: Explorer
Source File Name: EXPLORER. EXE
Creation Time: 20:52:35
Modification time: 8:32:36
Access time:
Size: 84701 bytes, 82.733 KB
MD5: 1a58d82fe73fb4e9de10facb0ef22881
Hsa1: 71b949acebb15da95057b3f9fbc1be4cac461b69

RisingPacker. mian007

Scanned file: EXPLORER. EXE-infected

EXPLORER. EXE-infected by virus. win32.vb. Bu

File Description: C:/Windows/system32/Gy/runtime. dll
Attribute: ---
Language: Chinese (China)
File version: 1, 0, 0, 3
Note: <mysee live!> Runtime
Copyright: (c) Beijing high-dimensional video Technology Co., Ltd. All rights reserved.
Note:
Product Version: 1, 0, 0, 3
Product Name: runtime Application
Company: Beijing high-dimensional video Technology Co., Ltd.
Legal trademark:
Internal name: <mysee live!> Runtime
Source File Name: runtime.exe
Creation Time:
Modification time: 14:59:14
Access time:
Size: 569344 bytes, 556.0 KB
MD5: d99151f4e4fecac91862edaad4e3c055
Hsa1: 45a1b6ee195f537b58e8791e593f93ee21df2389

File Description: I:/pr2.exe
Attribute: --- R
Language: German (Germany)
File version: 1.1.1.8
Description: Port Royal 2
Copyright: Copyright (c) 2002-2004
Note:
Product Version: 1.1.1.8
Product Name:
Company: ascaron entertainment GmbH
Legal trademark:
Internal Name:
Source File Name:
Creation Time: 23:30:16
Modification time: 23:30:16
Access time: 1601-1-1
Size: 7847936 bytes 7.496 MB
MD5: 3f5e3ac92cd73f92024a4eedc0ddc512
Hsa1: e1f514fa33f82e40a83d7bae964b1bf2e9dd1539

File Description: I:/autorun.exe
Attribute: --- R
Language: German (Germany)
File version: 1, 0, 0, 0
Description: Autorun
Copyright: Copyright (c) 2002
Note: scripted Autorun
Product Version: 1, 0, 0, 0
Product Name: Scriptable Autorun
Company: ascaron entertainment GmbH
Legal trademark:
Internal name: Autorun
Source File Name: autorun.exe
Creation Time: 9:53:44
Modification time: 9:53:44
Access time: 1601-1-1
Size: 270336 bytes, 264.0 KB
MD5: 494e74d927921d8da85b3a5e7ae93652
Hsa1: d962a1d0ef216b9c56f21b87e1565ae31e3acd6c

C:/Documents and Settings/all users/Start Menu/Program/start/Windows. HTA
Contains JavaScript scripts. The function is to run IE and move the window out of the display range on the screen. Open hxxp: // www. I *** F5 ** 6.cn/l1_o#/downmm.html, and then run abc1_1cmd.exe In the IE cache.

Use WinRAR to delete windows temporary folders, ie temporary folders, and files and folders that can be deleted in D:/Windows/prefetch.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.