arch5
Spy
- Joined
- Apr 18, 2009
- Messages
- 836
- Reaction score
- 0
Block this website to prevent FPSB viruses: lau9.cn AND o9Ji.cn <----DO NOT GO THERE, ITS A VIRUS!
More Info: http://www.gamespot.com/pages/forums/show_msgs.php?topic_id=26890398
More Info 2: http://www.facepunch.com/showthread.php?t=743732
WARNING: If when this page loads an installer comes up, close it immedatly, and if it dosen't close immediatly shut off the PWS on your computer.
REMOVAL INSTRUCTIONS!!!!!
How to remove:
How the virus installs itself onto your computer:
More Info: http://www.gamespot.com/pages/forums/show_msgs.php?topic_id=26890398
More Info 2: http://www.facepunch.com/showthread.php?t=743732
WARNING: If when this page loads an installer comes up, close it immedatly, and if it dosen't close immediatly shut off the PWS on your computer.
REMOVAL INSTRUCTIONS!!!!!
How to remove:
Removal instructions
Use Task Manager to terminate the Trojan process.
Delete the original Trojan file (its location will depend on how it initially penetrated the victim machine).
Delete the files created by the Trojan:
%System32%\KB896425.log
c:\nxldr.dat
Delete the following system registry keys:
[HKLM\System\CurrentControlSet\Services\NetWorkLogo n]
Update your antivirus databases and perform a full scan of the computer.
How the virus installs itself onto your computer:
Installation
Once launched, the Trojan creates a DLL file in the C:\ root directory:
c:\nxldr.dat
It then launches this file and calls the "start" function:
When launching, the DLL file copies its executable file to the Windows system directory:
%System32%\KB896425.log
The Trojan creates a service called NetWork Logon in order to ensure that it is automatically run each time Windows is restarted:
[HKLM\System\CurrentControlSet\Services\NetWorkLogo n]
When launching, the DLL file gets a list of processes. It then loads itself to the address space of a process chosen at random from the list, as well as to the processes listed below:
EXPLORER.EXE
IEXPLORE.EXE
where the DLL file will install a hook for the send function of WS2_32.dll which is used to track the user's HTTP requests. For POST requests where the URL contains the following string:
/vk/unblock_deal.php
the Trojan gets the values of the following parameters:
account=
pin=
If the URL contains the string /dologin.php, the Trojan will get the value of the parameters listed below:
loginname=
&password=
For processes called WOW.EXE the Trojan gets the values entered in dialogue boxes, and will also take screenshots of some dialogue boxes.
The Trojan sends the harvested information to the remote malicious user's site.
The Trojan will also delete all links containing the string "the9.com" from the browser cache.