How to remove c6x.exe

c6x.exe , cyban.exe
File size: 185344 bytes
MD5 : 39313a3da276a15367907f069eca5d05
SHA1 : 331e84f0003210fa636f59702382b9713e08692e
=======================================================
AntivirusVersionLast UpdateResult
a-squared4.5.0.502010.05.09Worm.Win32.Taterf!IK
AhnLab-V32010.05.09.002010.05.08Trojan/Win32.OnlineGameHack
AntiVir8.2.1.2362010.05.07-
Antiy-AVL2.0.3.72010.05.07-
Authentium5.2.0.52010.05.08W32/Taterf.B!Generic
Avast4.8.1351.02010.05.09Win32:Rootkit-gen
Avast55.0.332.02010.05.09Win32:Rootkit-gen
AVG9.0.0.7872010.05.09-
BitDefender7.22010.05.09-
CAT-QuickHeal10.002010.05.08Backdoor.Singu.by
ClamAV0.96.0.3-git2010.05.09PUA.Packed.ASPack
Comodo48002010.05.09TrojWare.Win32.Trojan.Agent.Gen
DrWeb5.0.2.033002010.05.09-
eSafe7.0.17.02010.05.06-
eTrust-Vet35.2.74742010.05.07-
F-Prot4.5.1.852010.05.08W32/Taterf.B!Generic
F-Secure9.0.15370.02010.05.09-
Fortinet4.1.133.02010.05.09-
GData212010.05.09-
IkarusT3.1.1.84.02010.05.09Worm.Win32.Taterf
Jiangmin13.0.9002010.05.09-
Kaspersky7.0.0.1252010.05.09-
McAfee5.400.0.11582010.05.09-
McAfee-GW-Edition2010.12010.05.08Artemis!39313A3DA276
Microsoft1.57032010.05.09Worm:Win32/Taterf.DM
NOD3250972010.05.09-
Norman6.04.122010.05.09-
nProtect2010-05-09.012010.05.09-
Panda10.0.2.72010.05.09Suspicious file
PCTools7.0.3.52010.05.07-
Prevx3.02010.05.09-
Rising22.46.06.042010.05.09-
Sophos4.53.02010.05.09-
Sunbelt62812010.05.09-
Symantec20091.2.0.412010.05.09-
TheHacker6.5.2.0.2772010.05.09-
TrendMicro9.120.0.10042010.05.09-
TrendMicro-HouseCall9.120.0.10042010.05.09-
VBA323.12.12.42010.05.06BScope.Trojan-PSW.AmGames
ViRobot2010.5.8.23062010.05.08-
VirusBuster5.0.27.02010.05.08Trojan.Magania.Gen!Pac.3
PeeTechFix 2.0.7.073 2010.05.11Win32.PSW.OnlineGames
------------------------------------------------------------------------------
Files Added
%System%\cyban.exe
%System%\cyban0.dll (0-9)
%System%\ieban0.dll (0-9)
%Windir%\AhnRpta.exe
X:\c6x.exe
X:\autorun.inf

%System% = C:\Windows\System32
%Windir% = C:\Windows
X:\ = C:\- Z:\

Registry Modifications
Keys Added
HKLM\SOFTWARE\Classes\CLSID\MNDOWN
HKLM\SOFTWARE\Classes\CLSID\NOD32KVBIT
HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}
HKLM\SOFTWARE\Classes\
CLSID\{70F6E582-8FF4-4082-829E-C172131DE31A}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}\ProgID
HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}\Programmable
HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}\VersionIndependentProgID
HKLM\SOFTWARE\Classes\CLSID\
{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}
HKLM\SOFTWARE\Classes\CLSID\
{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\
{B03A4BE6-5E5A-B9B3-483E-C484D4B20B72}
HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}
HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}\ProxyStubClsid
HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}\ProxyStubClsid32
HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}\TypeLib
HKLM\SOFTWARE\Classes\TypeLib\{70F6E522-8FF4-4082-829E-C172131DE31A}
HKLM\SOFTWARE\Classes\TypeLib\{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0
HKLM\SOFTWARE\Classes\TypeLib\{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\0
HKLM\SOFTWARE\Classes\TypeLib\{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\0\win32
HKLM\SOFTWARE\Classes\TypeLib\{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\FLAGS
HKLM\SOFTWARE\Classes\TypeLib\{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\HELPDIR
HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj
HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer
HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1
HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70F6E582-8FF4-4082-829E-C172131DE31A}

Values are Added
HKLM\SOFTWARE\Classes\CLSID\MNDOWN
urlinfo = "chwgvr.s"
HKLM\SOFTWARE\Classes\CLSID\NOD32KVBIT
KVBIT_2 = "677"
HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}\VersionIndependentProgID
(Default) = "IEHlprObj.IEHlprObj"

HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}\ProgID
(Default) = "IEHlprObj.IEHlprObj.1"

HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}\InprocServer32
(Default) = "%System%\ieban0.dll"
ThreadingModel = "Apartment"

HKLM\SOFTWARE\Classes\CLSID\
{70F6E582-8FF4-4082-829E-C172131DE31A}
(Default) = "IEHlprObj Class"

HKLM\SOFTWARE\Classes\CLSID\
{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}\InprocServer32
(Default) = "%System%\softqq0.dll"
ThreadingModel = "Apartment"

HKLM\SOFTWARE\Classes\CLSID\
{B03A4BE6-5E5A-B9B3-483E-C484D4B20B72}
VcbitExeModuleName = "[file and pathname of the sample #1]"
VcbitDllModuleName = "%System%\softqq0.dll"
VcbitSobjEventName = "CVBASDDOOPADSAMN_0"

HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}\TypeLib
(Default) = "{70F6E522-8FF4-4082-829E-C172131DE31A}"
Version = "1.0"

HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}\ProxyStubClsid32
(Default) = "{00020424-0000-0000-C000-000000000046}"

HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}\ProxyStubClsid
(Default) = "{00020424-0000-0000-C000-000000000046}"

HKLM\SOFTWARE\Classes\Interface\
{70F6E583-8FF4-4082-829E-C172131DE31A}
(Default) = "IIEHlprObj"

HKLM\SOFTWARE\Classes\TypeLib\
{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\0\win32
(Default) = "%System%\ieban0.dll"

HKLM\SOFTWARE\Classes\TypeLib\
{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\HELPDIR
(Default) = "%System%\"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\
{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\FLAGS
(Default) = "0"

HKLM\SOFTWARE\Classes\TypeLib\
{70F6E522-8FF4-4082-829E-C172131DE31A}\1.0
(Default) = "IEHelper 1.0 Type Library"

HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer
(Default) = "IEHlprObj.IEHlprObj.1"

HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj
(Default) = "IEHlprObj Class"

HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID
(Default) = "{70F6E582-8FF4-4082-829E-C172131DE31A}"

HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1
(Default) = "IEHlprObj Class"

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
ShellExecuteHooks
{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72} = "hook dll rising"

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
cybansos = "%System%\cyban.exe"

Values modified
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\ Folder\Hidden\SHOWALL\CheckedValue = 0x00000000

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\Hidden = 0x00000002

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\ShowSuperHidden = 0x00000000

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\
NoDriveTypeAutoRun: 0x00000091

Remote host
202.111.175.157 port 80

See all so
http://www.robtex.com/ip/202.111.175.157.html

URL to be download/data identified
http://www.googlejpo.com/1hg/ah1.txt
http://www.googlejpo.com/1hg/ah2.txt
http://www.baiduter.com/1hg/ah.rar
http://www.baiduwda.com/1hg/ah1.rar
http://www.baiduwda.com/1hg/ah.rar
=======================================================
วิธีกำจัด/แก้ virus : c6x.exe , cyban.exe
=======================================================



------------------------------------------------------------------------------

หลังจากกำจัด virus ได้แล้ว แนะนำให้ติดตั้งโปรแกรมเพิ่มเติม เพื่อป้องกันการเรียกใช้ autorun
เช่น

Program Advice (Stop AutoRun)

NoAutoRun (.REG)
http://www.mediafire.com/?ammmxwhqmnm
or

Panda USB Vaccine
http://www.mediafire.com/download.php?qig0nmnm4ld

or
KB971029, KB967715
http://hotzone-it.blogspot.com/2009/08/kb971029-fix-autorun-microsoft.html

or
CPE17 AutoRun Killer
http://www.mediafire.com/download.php?hxoyjj0hyfh
...

No comments:

Post a Comment