"Malware Fix รวมวิธีแก้ปัญหา virus computer โครงการทำดีเพื่อสังคม" "เนื่องจากภาระหน้าที่ทางการงาน ต้องขออภัยผู้เยี่ยมชมทุกท่านนะครับ ที่เ้ข้ามาแล้ว ไม่มีการ update virus ตัวใหม่ นะครับ"

Information

http://malwarefighting.blogspot.com


Photobucket
แจ้งเตือนภัย ! Crypt0L0cker (Ransomware)
เข้ารหัสข้อมูลใน คอมพิวเตอร์ กำลังระบาดในไทย
และกำลังระบาดหนักในเกาหลี
ThaiCERT , Crytpo Prevention Tool

*ห้ามจ่ายเงินโดยเด็ดขาด เพราะจะเสียทั่้งเงินและกู้ข้อมูลไม่ได้
รบกวนคนที่เข้ามาอ่านช่วยแชร์ด้วยนะครับ
http://hotzone-it.blogspot.com/2015/07/how-to-remove-crypt0l0cker-not.html
==============================================
PeeTechFix >> JupiterFix
==============================================
Photobucket

วิธีใช้งาน : JupiterFix-Win32.PSW.OnlineGames
ท่านสามารถตรวจสอบรายชื่อ Virus ที่โปรแกรม สามารถ Clean ได้ ใน VirusList.txt
-------------------------------------------------------------------------------------
ท่านใดที่ Download PeeTechFix tool ไปใช้แล้วมีปัญหาหรือลบไม่ออก โปรดแจ้งปัญหา ที่ email : MalwareHunter.info@gmail.com ด้วยครับ หรือส่งไฟล์ virus ให้ด้วย จะขอบพระคุณอย่างยิ่ง
-------------------------------------------------------------------------------------
Safemode Recovery (.reg) แก้ปัญหา Virus ลบ Key Safeboot แล้วเข้า safemode ไม่ได้
------------------------------------------------------------------------------------
วิธีแก้ Error message (แก้อาการเปิดไฟล์ .exe ใน USB Drive ไม่ได้)
"Windows cannot open this program because it has been prevented by a software restriction policy. For more information, open Event Viewer or contact your system administrator"
วิธีแก้ ดูที่ link นี้ครับ
-------------------------------------------------------------------------------------
วิธีแก้ MSN /Windows Live Messenger Disconnect (จาก virus OnlineGames)
-------------------------------------------------------------------------------------
How to start Windows in Safe Mode


Tuesday

Fake Alert: Your Protection

Fake Alert : Your Protection

Photobucket

Photobucket
------------------------------------------------------------------------------
Files Test : adobeflashplayer.exe
File size: 21504 bytes
MD5 : 1e6917e807955dda548a5688d455e319
SHA1 : f40d1ab6dc7bde9ace35a84801799cb20df06cf6
------------------------------------------------------------------------------
AntivirusVersionLast UpdateResult
a-squared4.5.0.502010.04.06-
AhnLab-V35.0.0.22010.04.05-
AntiVir7.10.6.282010.04.06-
Antiy-AVL2.0.3.72010.04.06-
Authentium5.2.0.52010.04.06-
Avast4.8.1351.02010.04.06-
Avast55.0.332.02010.04.06-
AVG9.0.0.7872010.04.06-
BitDefender7.22010.04.06-
CAT-QuickHeal10.002010.04.06-
ClamAV0.96.0.3-git2010.04.06-
Comodo45162010.04.06-
DrWeb5.0.2.033002010.04.06-
eSafe7.0.17.02010.04.01-
eTrust-Vet35.2.74102010.04.06-
F-Prot4.5.1.852010.04.05-
F-Secure9.0.15370.02010.04.06-
Fortinet4.0.14.02010.04.06-
GData192010.04.06-
IkarusT3.1.1.80.02010.04.06-
Jiangmin13.0.9002010.04.06-
Kaspersky7.0.0.1252010.04.06-
McAfee-GW-Edition6.8.52010.04.06-
Microsoft1.56052010.04.06-
NOD3250032010.04.06-
Norman6.04.112010.04.06-
nProtect2009.1.8.02010.04.06-
Panda10.0.2.22010.04.05Suspicious file
PCTools7.0.3.52010.04.06-
Prevx3.02010.04.06-
Rising22.42.01.042010.04.06-
Sophos4.52.02010.04.06Mal/FakeAV-CS
Sunbelt61432010.04.06-
Symantec20091.2.0.412010.04.06Packed.Generic.295
TheHacker6.5.2.0.2562010.04.06-
TrendMicro9.120.0.10042010.04.06-
VBA323.12.12.42010.04.05-
ViRobot2010.4.6.22632010.04.06-
VirusBuster5.0.27.02010.04.06-
-------------------------------------------------------------------------------
Files Added
%Temp%\TMPA2C3.tmp
%Temp%\TMPA37E.tmp
%Temp%\TMPA38E.tmp
%Temp%\TMPA39D.tmp
%Temp%\TMPA3AD.tmp
%Temp%\TMPA3BD.tmp
%Temp%\TMPA3CC.tmp
%Temp%\mplay32xe.exe
%Temp%\_VOIDa1c9.tmp
%Temp%\_VOIDa1e8.tmp
%Temp%\_VOIDab6d.tmp
%System%\_VOIDvblxqyddpb.dll
%System%\_VOIDyfwnktfxxn.dat
%Windir%\_VOIDqdnfyxegob\_VOIDd.sys

%System% = C:\Winnt\System32
%Windir% = C:\Windows

Registry Modifications
Keys Added
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY__VOIDQDNFYXEGOB
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000\Control
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY__VOIDQDNFYXEGOB
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000\Control
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\
feature_enable_ie_compression
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
HKLM\SOFTWARE\_VOID
HKLM\SOFTWARE\_VOID\versions
HKLM\SYSTEM\ControlSet001\Services\_VOIDd.sys
HKLM\SYSTEM\ControlSet001\Services\_VOIDqdnfyxegob

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\
DisableTaskMgr = 0x00000001

HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000\Control
*NewlyCreated* = 0x00000000
ActiveService = "_VOIDqdnfyxegob"

HKLME\SYSTEM\ControlSet001\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000
Service = "_VOIDqdnfyxegob"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "_VOIDqdnfyxegob"

HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY__VOIDQDNFYXEGOB\
NextInstance = 0x00000001

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY__VOIDQDNFYXEGOB\
0000\Control\
NewlyCreated* = 0x00000000
ActiveService = "_VOIDqdnfyxegob"

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY__VOIDQDNFYXEGOB\0000\
Service = "_VOIDqdnfyxegob"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"

HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY__VOIDQDNFYXEGOB\
NextInstance = 0x00000001

HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\
feature_enable_ie_compression

HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
ProxyEnable = 0x00000000

HKCU\Printers\Connections\
ver = "3.0"

HKCU\Software\
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\
DisableTaskMgr = 0x00000001

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
mplay32xe.exe = "%Temp%\mplay32xe.exe"


HKLM\SOFTWARE\_VOID\
affid = "traf"
subid = "void"
type = "no"
build = "bbr"

HKLM\SYSTEM\ControlSet001\Services\_VOIDqdnfyxegob\
start = 0x00000001
type = 0x00000001
imagepath = "\systemroot\_VOIDqdnfyxegob\_VOIDd.sys"

Values modified
HKLM\SOFTWARE\Microsoft\Security Center\
AntiVirusDisableNotify =
HKLM\SYSTEM\ControlSet001\Control\ServiceCurrent\
(Default) = ""
HKLM\SYSTEM\CurrentControlSet\Control\ServiceCurrent\
(Default) = ""
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\
Cookies = ""
Cache = ""
History = ""

Download Fake Alert: Your Protection
Files Added
%Temp%\mplay32xe.exe
%UserProfile%\Start Menu\Programs\Your Protection
%UserProfile%\Start Menu\Programs\Your Protection\About.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Activate.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Buy.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Scan.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Settings.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Update.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Your Protection Support.lnk
%UserProfile%\Start Menu\Programs\Your Protection\Your Protection.lnk
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Your Protection.lnk
%UserProfile%\Desktop\Your Protection Support.lnk
%UserProfile%\Desktop\Your Protection.lnk

C:\Program Files\Your Protection\urphook.dll
C:\Program Files\Your Protection\urpprot.exe
C:\Program Files\Your Protection\about.ico
C:\Program Files\Your Protection\activate.ico
C:\Program Files\Your Protection\buy.ico
C:\Program Files\Your Protection\help.ico
C:\Program Files\Your Protection\scan.ico
C:\Program Files\Your Protection\settings.ico
C:\Program Files\Your Protection\splash.mp3
C:\Program Files\Your Protection\uninstall.exe
C:\Program Files\Your Protection\update.ico
C:\Program Files\Your Protection\urp.db
C:\Program Files\Your Protection\urpext.dll
C:\Program Files\User Protection\virus.mp3
-------------------------------------------------------------------------
วิธีกำจัด / แก้ไข : Fake Alert : Your Protection
-------------------------------------------------------------------------
Download Fix Tool : TDSS.Killer , Malwarebytes' Anti-Malware (Last Update)

1. Run TDSS Killer

Photobucket

2. Run Malwarebytes' Anti-Malware (update signature database)



...

No comments:

Post a Comment

Exploit-DB updates

Exploits Database by Offensive Security

Metasploit

Metasploit Framework: Activity

iDefense Labs Software Releases