| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 51625 | 2004-11-25 20:50:00 | spybot.dn worm | Douglas (6454) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 296432 | 2004-11-25 20:50:00 | How do I remove this from a PC? Can I open the Registry and remove every entry of w32usb2.exe Thanks Doug | Douglas (6454) | ||
| 296433 | 2004-11-25 20:58:00 | Welcome to PF1. Removal instructions are here, click on this link (www.trendmicro.com) |
godfather (25) | ||
| 296434 | 2004-11-25 21:00:00 | Looks like your on the right track, as per Trend Micro (www.trendmicro.com), you'll need to patch your OS. What antivus programme are you using? | Murray P (44) | ||
| 296435 | 2004-11-25 21:00:00 | Yup this is what u do here . It's also a GOOD idea to keep your system up to date . I WOULD also get off the net, until you do the following . This worm propagates via network shares . It takes advantage of the following known Windows vulnerability: Windows LSASS vulnerability For detailed information about these vulnerability, refer to the following Microsoft page: Microsoft Security Bulletin MS04-11 This worm also has backdoor functionalities . It comes with a built-in Internet Relay Chat (IRC) client engine, which enables it to connect to an IRC channel and wait for commands from a malicious user . It processes the commands on the local machine giving remote users virtual control of the infected system . This worm also steals the CD keys of certain game applications . It runs on Windows 2000 and XP . Solution: Restarting in Safe Mode » On Windows 2000 1 . Restart your computer . 2 . Press the F8 key, when you see the Starting Windows bar at the bottom of the screen . 3 . Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter . » On Windows XP 1 . Restart your computer . 2 . Press F8 after the Power-On Self Test (POST) is done . If the Windows Advanced Options Menu does not appear, try restarting and then pressing F8 several times after the POST screen . 3 . Choose the Safe Mode option from the Windows Advanced Options Menu then press Enter . Removing Autostart Entries from the Registry Removing autostart entries from the registry prevents the malware from executing at startup . 1 . Open Registry Editor . Click Start>Run, type REGEDIT, then press Enter . 2 . In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Run 3 . In the right panel, locate and delete the entry: Win32 USB 2 . 0 Driver= "W32USB 2 . EXE" 4 . In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Runservices 5 . In the right panel, locate and delete the entry: Win32 USB 2 . 0 Driver= "W32USB 2 . EXE" 6 . In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Runonce 7 . In the right panel, locate and delete the entry: Win32 USB 2 . 0 Driver= "W32USB 2 . EXE" 8 . In the left panel, double-click the following: HKEY_CURRENT_USER>Software>Microsoft> Windows>CurrentVersion>Run 9 . In the right panel, locate and delete the entry: Win32 USB 2 . 0 Driver= "W32USB 2 . EXE" 10 . In the left panel, double-click the following: HKEY_CURRENT_USER>Software>Microsoft> Windows>CurrentVersion>Runonce 1 1 . In the right panel, locate and delete the entry: Win32 USB 2 . 0 Driver= "W32USB 2 . EXE" 1 2 . In the left panel, locate and delete the following keys: * HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic es \Win32 USB 2 . 0 Driver * HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\R oot \LEGACY_WIN32_USB 2 . 0_DRIVER * HKEY_LOCAL_MACHINE\System\ControlSet001\Services \Win32 USB 2 . 0 Driver * Close Registry Editor . NOTE: If you were not able to terminate the malware process as described in the previous procedure, restart your system . Additional Windows ME/XP Cleaning Instructions Users running Windows ME and XP must disable System Restore to allow full scanning of infected systems . Users running other Windows versions can proceed with the succeeding procedure sets . Running Trend Micro Antivirus Scan your system with Trend Micro antivirus and delete all files detected as WORM_SPYBOT . DN . To do this, Trend Micro customers must download the latest pattern file and scan their system . Other Internet users can use HouseCall, Trend Micros free online virus scanner . Applying Patches This malware exploits known vulnerabilities on certain platforms . Download and install the critical pathes from the following links: |
Spacemannz (808) | ||
| 1 | |||||