WinXPs.com
File size: 305152 bytes
MD5 : 06d3066271ae1fbf9c5df6631e2c0cf8
SHA1 : cfcf3f136381167812ed388cac03470c578c423d
...
Antivirus | Version | Last Update | Result |
---|---|---|---|
a-squared | 5.0.0.31 | 2010.07.02 | - |
AhnLab-V3 | 2010.07.02.00 | 2010.07.02 | - |
AntiVir | 8.2.4.2 | 2010.07.01 | BDS/Hupigon.bhi |
Antiy-AVL | 2.0.3.7 | 2010.07.02 | - |
Authentium | 5.2.0.5 | 2010.07.02 | W32/Hupigon.A.gen!Eldorado |
Avast | 4.8.1351.0 | 2010.07.01 | - |
Avast5 | 5.0.332.0 | 2010.07.01 | - |
AVG | 9.0.0.836 | 2010.07.02 | - |
BitDefender | 7.2 | 2010.07.02 | - |
CAT-QuickHeal | 11.00 | 2010.06.30 | - |
ClamAV | 0.96.0.3-git | 2010.07.02 | - |
Comodo | 5287 | 2010.07.02 | Backdoor.Win32.Hupigon.bhi0 |
DrWeb | 5.0.2.03300 | 2010.07.02 | BackDoor.Pigeon.5102 |
eSafe | 7.0.17.0 | 2010.06.30 | Suspicious File |
eTrust-Vet | 36.1.7680 | 2010.07.01 | - |
F-Prot | 4.6.1.107 | 2010.07.01 | W32/Hupigon.A.gen!Eldorado |
F-Secure | 9.0.15370.0 | 2010.07.02 | - |
Fortinet | 4.1.133.0 | 2010.07.01 | - |
GData | 21 | 2010.07.02 | - |
Ikarus | T3.1.1.84.0 | 2010.07.02 | Backdoor.Win32.Hupigon |
Jiangmin | 13.0.900 | 2010.07.01 | Heur:Backdoor/Huigezi |
Kaspersky | 7.0.0.125 | 2010.07.02 | - |
McAfee | 5.400.0.1158 | 2010.07.02 | - |
McAfee-GW-Edition | 2010.1 | 2010.07.01 | Heuristic.LooksLike.Win32.Suspicious.C!89 |
Microsoft | 1.5902 | 2010.07.02 | - |
NOD32 | 5244 | 2010.07.01 | - |
Norman | 6.05.10 | 2010.07.01 | Hupigon.gen126 |
nProtect | 2010-07-01.01 | 2010.07.01 | - |
Panda | 10.0.2.7 | 2010.07.01 | - |
PCTools | 7.0.3.5 | 2010.07.02 | - |
Prevx | 3.0 | 2010.07.02 | - |
Rising | 22.54.04.03 | 2010.07.02 | Backdoor.Win32.Gpigeon2007.dmy |
Sophos | 4.54.0 | 2010.07.02 | Troj/Bnksa-Fam |
Sunbelt | 6534 | 2010.07.02 | Backdoor.Win32.Hupigon (v) |
Symantec | 20101.1.0.89 | 2010.07.02 | - |
TheHacker | 6.5.2.1.307 | 2010.07.01 | - |
TrendMicro | 9.120.0.1004 | 2010.07.02 | Mal_HPGN-2 |
TrendMicro-HouseCall | 9.120.0.1004 | 2010.07.02 | Mal_HPGN-2 |
VBA32 | 3.12.12.5 | 2010.07.01 | SScope.Backdoor.Hupigon |
ViRobot | 2010.6.29.3912 | 2010.07.02 | - |
VirusBuster | 5.0.27.0 | 2010.07.01 | - |
...
File Added
%WinDir%\WinXPs.com
%WinDir% = C:\Windows or C:\Winnt
HijackThis log
O23 - Service: ฯตอณึุาชธะยฒนถก - Unknown owner - C:\WINDOWS\WinXPs.com
Keys added
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Control
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Security
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Enum
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Control
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Security
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Enum
HKCU\Software\Microsoft\SystemCertificates\CA\Certificates\3EA99A60058275E0ED83B892A909449F8C33B245
Values added
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Control\*NewlyCreated*: 0x00000000
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Control\ActiveService:
"ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Service: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Legacy: 0x00000001
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Class: "LegacyDriver"
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\DeviceDesc: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\NextInstance: 0x00000001
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Enum\0: "Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000"
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Enum\Count: 0x00000001
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Enum\NextInstance: 0x00000001
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Type: 0x00000110
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Start: 0x00000002
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\ErrorControl: 0x00000000
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\ImagePath: "C:\WINDOWS\WinXPs.com"
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\DisplayName: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\ObjectName: "LocalSystem"
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก\Description: "ปาธ๋ืำทฮ๑ถหณฬะ๒กฃิถณฬผเฟุนภํ."
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Control\*NewlyCreated*: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Control\ActiveService: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Service: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000\DeviceDesc: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Enum\0: "Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01\0000"
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Enum\Count: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Enum\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Type: 0x00000110
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Start: 0x00000002
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\ErrorControl: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\ImagePath: "C:\WINDOWS\WinXPs.com"
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\DisplayName: "ฯตอณึุาชธะยฒนถก"
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\ObjectName: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก\Description: "ปาธ๋ืำทฮ๑ถหณฬะ๒กฃิถณฬผเฟุนภํ."
HKCU\Software\Microsoft\SystemCertificates\CA\Certificates\3EA99A60058275E0ED83B892A909449F8C33B245\Blob: 03 00 00 00
=======================================================
วิธีกำจัด/แก้ virus : WinXPs.com
=======================================================
1. ใช้โปรแกรม ExplorerXP เปิดเข้าไปใน C:\Windows or C:\Winnt หาชื่อไฟล์ WinXPs.com
เมื่อพบแล้วให้ Click ขวา ที่ ไฟล์แล้วเลือก Unlocker
(ถ้าเปิดเข้าไปแบบธรรมดาอาจมองไม่เห็นไฟล์ WinXps.com ถ้าไม่ได้ Set folder Option ให้ Show hidden files ไว้)
2. เมื่อขึ้นหน้าต่าง Unlocker แล้ว ให้เลือก Delete จากนั้น click ที่ไฟล์ svchost.exe แล้วเลือก Unlock
ส่วนวิธี ลบ Registry อีกแบบคือเ้ข้าไปลบตรง แต่ว่ายุ่งยากหน่อยครับ
ไปที่ Start > Run พิมพ์ Regedit.exe แล้ว Enter
เมื่อเข้าสู่หน้าต่าง Registry Editor ให้เข้าไป Key เหล่านี้ทิ้ง
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01
HKLM\SYSTEM\ControlSet001\Services\ฯตอณึุาชธะยฒนถก
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*0E2F*0E15*0E2D*0E13*0E36*0E38*0E32*0E0A*0E18*F8C5*0E30*0E22*0E12*0E19*0E16*0E01
HKLM\SYSTEM\CurrentControlSet\Services\ฯตอณึุาชธะยฒนถก
HKCU\Software\Microsoft\SystemCertificates\CA\Certificates\3EA99A60058275E0ED83B892A909449F8C33B245
วิธีการ Set Permission ดู link นี้ครับ
ภาพตัวอย่าง
: ขอบคุณไฟล์ไวรัส จากคุณอ้น
No comments:
Post a Comment