Visualizzazione dei risultati da 1 a 5 su 5

Discussione: mswinvks.exe...aiuto

  1. #1
    Utente di HTML.it
    Registrato dal
    Jan 2010
    Messaggi
    11

    mswinvks.exe...aiuto

    ciao a tutti,
    mi sono appena iscritto al club "quelli che hanno beccato mswinvks.exe" meglio che il rotary, no??! comunque, ho già fatto lo scan con hijackthis, come arabo...AIUTO!!!
    grazie


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12.35.33, on 21/01/2010
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0013)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\Programmi\Nero\Nero8\Nero BackItUp\NBService.exe
    C:\Programmi\CDBurnerXP\NMSAccessU.exe
    C:\WINDOWS\system32\SupportAppXL\onda_mon.exe
    C:\WINDOWS\system32\IoctlSvc.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\WINDOWS\system32\mmm.exe
    C:\Programmi\Unlocker\UnlockerAssistant.exe
    C:\WINDOWS\system32\RunDll32.exe
    C:\WINDOWS\system32\sistray.EXE
    C:\WINDOWS\system32\keyhook.exe
    C:\Programmi\Microsoft Office\Office12\GrooveMonitor.exe
    C:\PROGRA~1\AVG\AVG8\avgtray.exe
    C:\Programmi\PicPick\PicPick.exe
    C:\Programmi\Sony\Content Transfer\ContentTransferWMDetector.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Programmi\File comuni\Nero\Lib\NMIndexStoreSvr.exe
    C:\WINDOWS\mshost.exe
    C:\Programmi\Microsoft Office\Office12\ONENOTEM.EXE
    C:\Programmi\File comuni\Nero\Lib\NMIndexingService.exe
    C:\Programmi\Alice Mobile\Alice Mobile.exe
    C:\Programmi\Internet Explorer\IEXPLORE.EXE
    C:\Programmi\Internet Explorer\IEXPLORE.EXE
    C:\Programmi\Internet Explorer\IEXPLORE.EXE
    C:\PROGRA~1\FOXITR~1\FOXITR~1.EXE
    C:\Programmi\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\System32\svchost.exe
    C:\Programmi\WinRAR\WinRAR.exe
    C:\DOCUME~1\ADMINI~1\IMPOST~1\Temp\Rar$EX00.313\Hi jackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Collegamenti
    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\system32\mswinvks.exe
    F3 - REG:win.ini: load=C:\WINDOWS\system32\mswinvks.exe
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Programmi\AVG\AVG8\avgssie.dll
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~1\MICROS~2\Office12\GRA8E1~1.DLL
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - HKLM\..\Run: [KelsPackSoft] C:\WINDOWS\system32\mmm.exe
    O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Programmi\Unlocker\UnlockerAssistant.exe"
    O4 - HKLM\..\Run: [WinampAgent] C:\Programmi\Winamp\winampa.exe
    O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
    O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
    O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\system32\sistray.EXE
    O4 - HKLM\..\Run: [SiS Windows KeyHook] C:\WINDOWS\system32\keyhook.exe
    O4 - HKLM\..\Run: [GrooveMonitor] "C:\Programmi\Microsoft Office\Office12\GrooveMonitor.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\Programmi\File comuni\Nero\Lib\NeroCheck.exe
    O4 - HKLM\..\Run: [NBKeyScan] "C:\Programmi\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
    O4 - HKLM\..\Run: [PicPick Start] C:\Programmi\PicPick\PicPick.exe
    O4 - HKLM\..\Run: [ContentTransferWMDetector.exe] C:\Programmi\Sony\Content Transfer\ContentTransferWMDetector.exe
    O4 - HKLM\..\Run: [mshost] C:\WINDOWS\mshost.exe
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Programmi\File comuni\Nero\Lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
    O4 - HKLM\..\Policies\Explorer\Run: [Microsoft Driver Setup] C:\WINDOWS\ccdrive32.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVIZIO LOCALE')
    O4 - HKUS\S-1-5-19\..\RunOnce: [nltide_2] regsvr32 /s /n /i:U shell32 (User 'SERVIZIO LOCALE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVIZIO DI RETE')
    O4 - HKUS\S-1-5-20\..\RunOnce: [nltide_2] regsvr32 /s /n /i:U shell32 (User 'SERVIZIO DI RETE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\RunOnce: [nltide_2] regsvr32 /s /n /i:U shell32 (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O4 - HKUS\.DEFAULT\..\RunOnce: [nltide_2] regsvr32 /s /n /i:U shell32 (User 'Default user')
    O4 - Startup: Ritaglio schermata e avvio di OneNote 2007.lnk = C:\Programmi\Microsoft Office\Office12\ONENOTEM.EXE
    O8 - Extra context menu item: E&sporta in Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: Invia a OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: I&nvia a OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~2\Office12\GR99D3~1.DLL
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Programmi\AVG\AVG8\avgpp.dll
    O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Programmi\Nero\Nero8\Nero BackItUp\NBService.exe
    O23 - Service: NMIndexingService - Nero AG - C:\Programmi\File comuni\Nero\Lib\NMIndexingService.exe
    O23 - Service: NMSAccessU - Unknown owner - C:\Programmi\CDBurnerXP\NMSAccessU.exe
    O23 - Service: ONDA Autorun CDROM Monitor - Unknown owner - C:\WINDOWS\system32\SupportAppXL\onda_mon.exe
    O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\WINDOWS\system32\IoctlSvc.exe

    --
    End of file - 6869 bytes

  2. #2
    ciao,
    su hijackthis fixa queste voci
    codice:
    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\system32\mswinvks.exe
    F3 - REG:win.ini: load=C:\WINDOWS\system32\mswinvks.exe
    O4 - HKLM\..\Run: [KelsPackSoft] C:\WINDOWS\system32\mmm.exe
    O4 - HKLM\..\Run: [ContentTransferWMDetector.exe] C:\Programmi\Sony\Content Transfer\ContentTransferWMDetector.exe
    O4 - HKLM\..\Run: [mshost] C:\WINDOWS\mshost.exe
    O4 - HKLM\..\Policies\Explorer\Run: [Microsoft Driver Setup] C:\WINDOWS\ccdrive32.exe
    poi controlla su virustotal.com questo file
    codice:
    C:\Programmi\PicPick\PicPick.exe
    e posta qui il log che ottieni.

  3. #3
    Utente di HTML.it
    Registrato dal
    Jan 2010
    Messaggi
    11

    log picpick

    grazie dell'aiuto,
    fatto come suggerito, segue log


    File picpick.exe ricevuto il 2009.12.18 02:10:01 (UTC)
    Stato corrente: finito

    Risultato: 0/41 (0.00%)
    Formattato Stampa risultati
    Antivirus Versione Ultimo aggiornamento Risultato
    a-squared 4.5.0.43 2009.12.18 -
    AhnLab-V3 5.0.0.2 2009.12.17 -
    AntiVir 7.9.1.114 2009.12.17 -
    Antiy-AVL 2.0.3.7 2009.12.17 -
    Authentium 5.2.0.5 2009.12.02 -
    Avast 4.8.1351.0 2009.12.18 -
    AVG 8.5.0.427 2009.12.17 -
    BitDefender 7.2 2009.12.18 -
    CAT-QuickHeal 10.00 2009.12.17 -
    ClamAV 0.94.1 2009.12.18 -
    Comodo 3279 2009.12.18 -
    DrWeb 5.0.0.12182 2009.12.18 -
    eSafe 7.0.17.0 2009.12.16 -
    eTrust-Vet 35.1.7181 2009.12.17 -
    F-Prot 4.5.1.85 2009.12.17 -
    F-Secure 9.0.15370.0 2009.12.17 -
    Fortinet 4.0.14.0 2009.12.17 -
    GData 19 2009.12.18 -
    Ikarus T3.1.1.79.0 2009.12.18 -
    Jiangmin 13.0.900 2009.12.17 -
    K7AntiVirus 7.10.923 2009.12.17 -
    Kaspersky 7.0.0.125 2009.12.18 -
    McAfee 5835 2009.12.17 -
    McAfee+Artemis 5835 2009.12.17 -
    McAfee-GW-Edition 6.8.5 2009.12.18 -
    Microsoft 1.5302 2009.12.18 -
    NOD32 4697 2009.12.17 -
    Norman 6.04.03 2009.12.17 -
    nProtect 2009.1.8.0 2009.12.17 -
    Panda 10.0.2.2 2009.12.15 -
    PCTools 7.0.3.5 2009.12.18 -
    Prevx 3.0 2009.12.18 -
    Rising 22.26.03.07 2009.12.18 -
    Sophos 4.49.0 2009.12.18 -
    Sunbelt 3.2.1858.2 2009.12.17 -
    Symantec 1.4.4.12 2009.12.18 -
    TheHacker 6.5.0.2.096 2009.12.17 -
    TrendMicro 9.100.0.1001 2009.12.17 -
    VBA32 3.12.12.0 2009.12.17 -
    ViRobot 2009.12.17.2094 2009.12.17 -
    VirusBuster 5.0.21.0 2009.12.17 -
    Informazioni addizionali
    File size: 824320 bytes
    MD5 : 42c1f90baa0d3c1198b4d4cb23c454bc
    SHA1 : d2e872929e22e9539494580e593973b48b8521d4
    SHA256: 644b04b18662879b17e317e7d6e7913ea5d83b7f75131c224b 2ede892d81f52f
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0x294CE0
    timedatestamp.....: 0x2A425E19 (Sat Jun 20 00:22:17 1992)
    machinetype.......: 0x14C (Intel I386)

    ( 3 sections )
    name viradd virsiz rawdsiz ntrpy md5
    UPX0 0x1000 0x1ED000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
    UPX1 0x1EE000 0xA7000 0xA7000 7.94 89ef686e48a990224ce3843b3baeca2e
    .rsrc 0x295000 0x22000 0x22000 4.63 4bf3b784429c84d2c6bc5095f09dc61a

    ( 11 imports )

    > advapi32.dll: RegFlushKey
    > comctl32.dll: ImageList_Add
    > comdlg32.dll: ChooseColorA
    > gdi32.dll: SaveDC
    > kernel32.dll: LoadLibraryA, GetProcAddress, VirtualProtect, ExitProcess
    > ole32.dll: OleDraw
    > oleaut32.dll: VariantCopy
    > shell32.dll: SHGetMalloc
    > user32.dll: GetDC
    > version.dll: VerQueryValueA
    > winmm.dll: timeGetTime

    ( 0 exports )

    TrID : File type identification
    UPX compressed Win32 Executable (42.6%)
    Win32 EXE Yoda's Crypter (37.0%)
    Win32 Executable Generic (11.8%)
    Win16/32 Executable Delphi generic (2.8%)
    Generic Win/DOS Executable (2.7%)
    ThreatExpert: http://www.threatexpert.com/report.a...b4d4cb23c454bc
    ssdeep: 12288:hxPNqjk+oUO4Qk1++kuyj/6vG6SXN7pSThWeA9GGDBuxylloJzWMKtEm:hxgnVTvxyjyWFrG GDBuAll0Ho
    PEiD : UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
    packers (Kaspersky): PE_Patch.UPX, UPX
    packers (F-Prot): UPX
    CWSandbox: http://research.sunbelt-software.com...b4d4cb23c454bc
    RDS : NSRL Reference Data Set
    -

  4. #4
    ok..
    ora scarica ed istalla ccleaner e fai una puliza dei file temporanei,dei cookie e delle vecchie chiavi di registro.

    scarica e istalla spybot search & destroy . aggiornalo ed esegui una scansione

    scarica e istalla mbam , aggiornalo ed esegui una scansione.

    scarica e istallla VirIT ed esegui una scansione.

  5. #5
    Utente di HTML.it
    Registrato dal
    Jan 2010
    Messaggi
    11
    grazie dei consigli,
    le scansioni hanno trovato un sacco di robaccia!!!

Permessi di invio

  • Non puoi inserire discussioni
  • Non puoi inserire repliche
  • Non puoi inserire allegati
  • Non puoi modificare i tuoi messaggi
  •  
Powered by vBulletin® Version 4.2.1
Copyright © 2026 vBulletin Solutions, Inc. All rights reserved.