D
d.red
im unsure if this is the right room for this but ive think
i have located the folder which contains information for a
virus (a win32 virus) on my pc. wot should i do?
c:/winnt/config/system/emm32/dosboot/windows/startup
the files contained in this folder are:
-2.bat
-ba.bat
-boot.exe
-dcom.exe
-empavms.exe
-epoop.exe
-flood.ocx
-ipservers.dll
-java.dll
-jnco32.exe
-lan.bat
-libparse.exe
-lsass.exe
-moo.dll
-msconfig.exe when open error message says: internal
error...
ABORT: Proxy has been corrupted, please re-install to
correct the problem.
(winmain.c/211)
-msmouse.exe
-nb.bat
-newuser.bat
-nhtml.dll
-regedit.dll
-remote.ini
-restart.exe
-screen.dll
-sipj.ocx
-ss.bat
-sysboot.dll
-sysconfig.ocx
-telnet.dll
-tvchost.exe
-users.dll
-wincmd34.bat
-wind.dll
upon opening the remote.ini file this is what was in there:
[variables]
n0=%chan #.bawt.
n1=%iisfile msmouse.exe
n2=%key accident
n3=%pass pass
n4=%prefix [l33t]
n5=%botserver
n6=%botport 6667
n7=%identd DTGTBOT
n8=%loggedin ****[ $nick ]**** 12°¤o 4Now Has
MASTER Access To DT-GT %ver 12o¤º
n9=%amounts 5
n10=%flchan #gt
n11=%flnick #gt
n12=%fltime 20
n13=%clones 10
n14=%ver TOMMYS A NUB EDITION
n15=%numfloodmessages 23
n16=%proxy.port 31337
n17=%proxy.connecting 6815590 6841006 6923375 6943464
7216116 7323100 7404717 7578917 9456567 9518396 9562570
9695701 10850382 10946329 10971736 11200054 3908039
n18=%prx2
n19=%prx QUIT :
n20=%bnc OFF
n21=%channel
n22=%fldprfix [DT]
n23=%fnick
n24=%fludserver localhost
n25=%fludport 6667
n26=%fludtype Notice
n27=%flamount 1
n28=%floaddelay 1
n29=%dtflud flud13828
n30=%fcon 8
n31=%fljoin #d
n32=%flpart #netbios
n33=%fludvict ##^poop^.
n34=%identdz SUCKA
n35=%dietime 10
n36=%identz2 SUCKAl
n37=%identz3 SUCKAl
n38=%pass2 changepass
n39=%identz4 SUCKAx
n40=%loadfile socketmanager.mrc
n41=%unloadfile socketmanager.mrc
n42=%timeout 10
n43=%dlplace
n44=%dldir ""
n45=%savefile ""
n46=%run no
n47=%installdate Friday October 03 2003
n48=%install 1
n49=%rb_size 10
n50=%rb_used 3
n51=%rb_unused 7
n52=%rb_usedstr |||
n53=%rb_unusedstr -------
n54=%nb.file cool.exe
n55=%zVeN off
n56=%nb.threads 20
n57=%gc 0
n58=%gf 0
n59=%nb.total 4
n60=%nb.start 63.102.173.98
n61=%nb.end 63.102.173.102
n62=%nb.delay 100
n63=%nb.timeout 400
n64=%nb.s.1 63
n65=%nb.s.2 102
n66=%nb.s.3 173
n67=%nb.s.4 102
n68=%nb.time 1039411570
n69=%nb.current 63.102.173.102
n70=%icqsubject OWNED
n71=%icqbody
OWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNE
DOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWN
EDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOW
NEDOWNEDOWNEDOWNEDOWNED
n72=%icqto 117231578
n73=%speed http://www.dslreports.com/archive/ $+
n74=%poop $gettok($host,7-,46)
n75=%silentscan on
n76=%nb.con on
n77=%dlistplace queers/
n78=%weiner off
n79=%port poop
n80=%randscan1 2219840447
n81=%randscan2 3160724722
n82=%scanning no
n83=%change1 96
n84=%change2 255
n85=%change3 0
n86=%fldmsg :TEST testing 2 words and more w00tie testin'
woop de dooie
n87=%cs-key 2607826480345
n88=%winkey 55274-640-0000356-23087
n89=%stopscan no
n90=%445 63.196.0.100
n91=%AIMUserCount 2
n92=%AIMUserHost aliza7196!neils63@=Ho8-2lfqy26-
87.nas51.stockton1.ca.us.da.qwest.net
n93=%icqfrom OWNED
n94=%range0 3635903252
n95=%range1 3635903262
n96=%range2 3635903262
n97=%currentnick jarrad4394
n98=%sckrd owertech.no.eu.dal.net 421 *
NICKcorrie332238 :Unknown command
n99=%Lines 100
n100=%query1 12.30.*.*
n101=%iniscan.stat.bag off
n102=%uniscan.wnick [DTGT][216][595114]
n103=%uni.oneip 3647016037
n104=%uni.twoip 3647016036
n105=%uniscan.work 217.97.12.50 - 217.97.12.100
n106=%uniscan.chan #testbot
n107=%uniscan.found 2
n108=%uniscan.bag 2
n109=%iniscan.stat.server off
n110=%unibag.job on
n111=%subsock Directory of c:\
n112=%uni.bcheck 217.97.12.80
n113=%unibag.page 13
n114=%scanport.status off
n115=%unmask.status off
n116=%sub.unmusk off
n117=%scanip.status off
n118=%targetip.obj #winX.scanner2.
n119=%found.sub 0
n120=%count.sub 1
n121=%count.all.sub 1
n122=%sub.who 12.40.34.2
n123=%scanip.rezult show
n124=%sub.take.ready off
n125=%scan.openip 69
n126=%scanip.end on
n127=%AIMUserPass 5208256754
n128=%AIMSequence 10910
n129=%SequenceNumber 62035
n130=%pw 5208256754
n131=%sn h760qeddy342i
n132=%url http://aim.aol.com/aimnew/create_new.adp?
name=h760qeddy342i&password=0647617715&confirm=0647617715&e
[email protected]&month=01&day=12&year=1945&pro
mo=106712&pageset=Aim&privacy=1&client=no
n133=%blaaaa ""
n134=%em (e-mail address removed)
n135=%name miunowkgal
n136=%window ""
n137=%getscan *
n138=%host
n139=%botstop no
n140=%remove no
n141=%yo Bytes 207876 212533
n142=%yu 207876
n143=%re 191.266
n144=%ya 212533
n145=%rc 207.876
n146=%st 212.533
n147=%one 385.143
n148=%two 420.409
n149=%diff 5.88
n150=%sp.in 2.77
n151=%sp.out 3.11
n152=%netw 5.88
n153=%verbose on
n154=%nickip 195
n155=%codelist 1333
n156=%unihost 217.97.12.77
n157=%lol /bin/scripts/..%%
35c../winnt/system32/cmd.exe?/c+dir+c:\
n158=%t1 /bin/scripts/..%%35c../winnt/system32/cmd.exe?
n159=%step 1
n160=%synport 1
n161=%1p1 61.*.*.*
n162=%1p2 61.80.225.183
n163=%c.re 0
n164=%server poop
n165=%s1 dt1.owned.witdt.powerdns.org:6667
n166=%s2 dt2.owned.witdt.powerdns.org:6667
n167=%s3 dt1.owned.witdt.powerdns.org:6667
n168=%pww 0647617715
n169=%namee qwtpqlsscn
n170=%emm (e-mail address removed)
n171=%rsn h 7 6 0 q e d d y 3 4 2 i
n172=%RCPbeg 405778944
n173=%osrpc 5
n174=%telnet.connection disconnected
n175=%data 150 Opening ASCII mode data connection for
dtgt.exe(1148521 bytes).
n176=%rcpftp rcpftp.cjb.net
n177=%rpc.found 34
n178=%rpcsilentscan on
n179=%rpcbegshortip 24.47.178.0
n180=%rpcendshortip 24.47.180.255
n181=%rpcendlongip 405779711
n182=%rpctotal 767
n183=%rpcip1 24.47.179.135
n184=%rpcip2 24.47.179.136
n185=%rpcip3 24.47.179.137
n186=%rpcip4 24.47.179.138
n187=%rpcip5 24.47.179.139
n188=%rpcip6 24.47.179.140
n189=%rpcip7 24.47.179.141
n190=%rpcip8 24.47.179.142
n191=%rpcip9 24.47.179.143
n192=%rpcip10 24.47.179.144
n193=%rpcip11 24.47.179.145
n194=%rpcip12 24.47.179.146
n195=%rpcip13 24.47.179.147
n196=%rpcip14 24.47.179.148
n197=%rpcip15 24.47.179.149
n198=%rpcip16 24.47.179.150
n199=%rpcip17 24.47.179.151
n200=%rpcip18 24.47.179.152
n201=%rpcip19 24.47.179.153
n202=%rpcip20 24.47.179.154
n203=%rpcip21 24.47.179.155
n204=%rpcip22 24.47.179.156
n205=%rpcip23 24.47.179.157
n206=%rpcip24 24.47.179.158
n207=%rpcip25 24.47.179.159
n208=%rpctotalscan 416
n209=%beglongip 1128595456
n210=%endshortip 67.79.255.255
n211=%endlongip 1129316351
n212=%loginnick dt
n213=%begshortip 67.69.0.0
n214=%SIPGread :Geneva.CH.EU.Undernet.org 352 dorene942
#OwnerS ~st0rm 163.29.75.202 *.undernet.org Malware G :3
Angel with some...demon to others
n215=%SIPGnum 5
n216=%SIPG.1 67.69.37.58
n217=%SIPG.2 66.122.88.125
n218=%SIPG.3 24.100.242.36
n219=%SIPG.4 217.162.100.228
n220=%SIPG.5 68.63.190.245
n221=%SIPGdns 5
n222=%Scan.Range.1 67.69.0.0 67.79.255.255
n223=%Scan.Range.2 66.122.0.0 66.132.255.255
n224=%Scan.Range.3 24.100.0.0 24.110.255.255
n225=%Scan.Range.4 217.162.0.0 217.172.255.255
n226=%Scan.Range.5 68.63.0.0 68.73.255.255
n227=%spigscan 1
n228=%total 720895
n229=%totalscaning 52
n230=%ip1 67.69.0.27
n231=%ip2 67.69.0.28
n232=%ip3 67.69.0.29
n233=%ip4 67.69.0.30
n234=%ip5 67.69.0.31
n235=%ip6 67.69.0.32
n236=%ip7 67.69.0.33
n237=%ip8 67.69.0.34
n238=%ip9 67.69.0.35
n239=%ip10 67.69.0.36
n240=%ip11 67.69.0.37
n241=%ip12 67.69.0.38
n242=%ip13 67.69.0.39
n243=%ip14 67.69.0.40
n244=%ip15 67.69.0.41
n245=%ip16 67.69.0.42
n246=%ip17 67.69.0.43
n247=%ip18 67.69.0.44
n248=%ip19 67.69.0.45
n249=%ip20 67.69.0.46
n250=%ip21 67.69.0.47
n251=%ip22 67.69.0.48
n252=%ip23 67.69.0.49
n253=%ip24 67.69.0.50
n254=%ip25 67.69.0.51
i have located the folder which contains information for a
virus (a win32 virus) on my pc. wot should i do?
c:/winnt/config/system/emm32/dosboot/windows/startup
the files contained in this folder are:
-2.bat
-ba.bat
-boot.exe
-dcom.exe
-empavms.exe
-epoop.exe
-flood.ocx
-ipservers.dll
-java.dll
-jnco32.exe
-lan.bat
-libparse.exe
-lsass.exe
-moo.dll
-msconfig.exe when open error message says: internal
error...
ABORT: Proxy has been corrupted, please re-install to
correct the problem.
(winmain.c/211)
-msmouse.exe
-nb.bat
-newuser.bat
-nhtml.dll
-regedit.dll
-remote.ini
-restart.exe
-screen.dll
-sipj.ocx
-ss.bat
-sysboot.dll
-sysconfig.ocx
-telnet.dll
-tvchost.exe
-users.dll
-wincmd34.bat
-wind.dll
upon opening the remote.ini file this is what was in there:
[variables]
n0=%chan #.bawt.
n1=%iisfile msmouse.exe
n2=%key accident
n3=%pass pass
n4=%prefix [l33t]
n5=%botserver
n6=%botport 6667
n7=%identd DTGTBOT
n8=%loggedin ****[ $nick ]**** 12°¤o 4Now Has
MASTER Access To DT-GT %ver 12o¤º
n9=%amounts 5
n10=%flchan #gt
n11=%flnick #gt
n12=%fltime 20
n13=%clones 10
n14=%ver TOMMYS A NUB EDITION
n15=%numfloodmessages 23
n16=%proxy.port 31337
n17=%proxy.connecting 6815590 6841006 6923375 6943464
7216116 7323100 7404717 7578917 9456567 9518396 9562570
9695701 10850382 10946329 10971736 11200054 3908039
n18=%prx2
n19=%prx QUIT :
n20=%bnc OFF
n21=%channel
n22=%fldprfix [DT]
n23=%fnick
n24=%fludserver localhost
n25=%fludport 6667
n26=%fludtype Notice
n27=%flamount 1
n28=%floaddelay 1
n29=%dtflud flud13828
n30=%fcon 8
n31=%fljoin #d
n32=%flpart #netbios
n33=%fludvict ##^poop^.
n34=%identdz SUCKA
n35=%dietime 10
n36=%identz2 SUCKAl
n37=%identz3 SUCKAl
n38=%pass2 changepass
n39=%identz4 SUCKAx
n40=%loadfile socketmanager.mrc
n41=%unloadfile socketmanager.mrc
n42=%timeout 10
n43=%dlplace
n44=%dldir ""
n45=%savefile ""
n46=%run no
n47=%installdate Friday October 03 2003
n48=%install 1
n49=%rb_size 10
n50=%rb_used 3
n51=%rb_unused 7
n52=%rb_usedstr |||
n53=%rb_unusedstr -------
n54=%nb.file cool.exe
n55=%zVeN off
n56=%nb.threads 20
n57=%gc 0
n58=%gf 0
n59=%nb.total 4
n60=%nb.start 63.102.173.98
n61=%nb.end 63.102.173.102
n62=%nb.delay 100
n63=%nb.timeout 400
n64=%nb.s.1 63
n65=%nb.s.2 102
n66=%nb.s.3 173
n67=%nb.s.4 102
n68=%nb.time 1039411570
n69=%nb.current 63.102.173.102
n70=%icqsubject OWNED
n71=%icqbody
OWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNE
DOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWN
EDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOWNEDOW
NEDOWNEDOWNEDOWNEDOWNED
n72=%icqto 117231578
n73=%speed http://www.dslreports.com/archive/ $+
n74=%poop $gettok($host,7-,46)
n75=%silentscan on
n76=%nb.con on
n77=%dlistplace queers/
n78=%weiner off
n79=%port poop
n80=%randscan1 2219840447
n81=%randscan2 3160724722
n82=%scanning no
n83=%change1 96
n84=%change2 255
n85=%change3 0
n86=%fldmsg :TEST testing 2 words and more w00tie testin'
woop de dooie
n87=%cs-key 2607826480345
n88=%winkey 55274-640-0000356-23087
n89=%stopscan no
n90=%445 63.196.0.100
n91=%AIMUserCount 2
n92=%AIMUserHost aliza7196!neils63@=Ho8-2lfqy26-
87.nas51.stockton1.ca.us.da.qwest.net
n93=%icqfrom OWNED
n94=%range0 3635903252
n95=%range1 3635903262
n96=%range2 3635903262
n97=%currentnick jarrad4394
n98=%sckrd owertech.no.eu.dal.net 421 *
NICKcorrie332238 :Unknown command
n99=%Lines 100
n100=%query1 12.30.*.*
n101=%iniscan.stat.bag off
n102=%uniscan.wnick [DTGT][216][595114]
n103=%uni.oneip 3647016037
n104=%uni.twoip 3647016036
n105=%uniscan.work 217.97.12.50 - 217.97.12.100
n106=%uniscan.chan #testbot
n107=%uniscan.found 2
n108=%uniscan.bag 2
n109=%iniscan.stat.server off
n110=%unibag.job on
n111=%subsock Directory of c:\
n112=%uni.bcheck 217.97.12.80
n113=%unibag.page 13
n114=%scanport.status off
n115=%unmask.status off
n116=%sub.unmusk off
n117=%scanip.status off
n118=%targetip.obj #winX.scanner2.
n119=%found.sub 0
n120=%count.sub 1
n121=%count.all.sub 1
n122=%sub.who 12.40.34.2
n123=%scanip.rezult show
n124=%sub.take.ready off
n125=%scan.openip 69
n126=%scanip.end on
n127=%AIMUserPass 5208256754
n128=%AIMSequence 10910
n129=%SequenceNumber 62035
n130=%pw 5208256754
n131=%sn h760qeddy342i
n132=%url http://aim.aol.com/aimnew/create_new.adp?
name=h760qeddy342i&password=0647617715&confirm=0647617715&e
[email protected]&month=01&day=12&year=1945&pro
mo=106712&pageset=Aim&privacy=1&client=no
n133=%blaaaa ""
n134=%em (e-mail address removed)
n135=%name miunowkgal
n136=%window ""
n137=%getscan *
n138=%host
n139=%botstop no
n140=%remove no
n141=%yo Bytes 207876 212533
n142=%yu 207876
n143=%re 191.266
n144=%ya 212533
n145=%rc 207.876
n146=%st 212.533
n147=%one 385.143
n148=%two 420.409
n149=%diff 5.88
n150=%sp.in 2.77
n151=%sp.out 3.11
n152=%netw 5.88
n153=%verbose on
n154=%nickip 195
n155=%codelist 1333
n156=%unihost 217.97.12.77
n157=%lol /bin/scripts/..%%
35c../winnt/system32/cmd.exe?/c+dir+c:\
n158=%t1 /bin/scripts/..%%35c../winnt/system32/cmd.exe?
n159=%step 1
n160=%synport 1
n161=%1p1 61.*.*.*
n162=%1p2 61.80.225.183
n163=%c.re 0
n164=%server poop
n165=%s1 dt1.owned.witdt.powerdns.org:6667
n166=%s2 dt2.owned.witdt.powerdns.org:6667
n167=%s3 dt1.owned.witdt.powerdns.org:6667
n168=%pww 0647617715
n169=%namee qwtpqlsscn
n170=%emm (e-mail address removed)
n171=%rsn h 7 6 0 q e d d y 3 4 2 i
n172=%RCPbeg 405778944
n173=%osrpc 5
n174=%telnet.connection disconnected
n175=%data 150 Opening ASCII mode data connection for
dtgt.exe(1148521 bytes).
n176=%rcpftp rcpftp.cjb.net
n177=%rpc.found 34
n178=%rpcsilentscan on
n179=%rpcbegshortip 24.47.178.0
n180=%rpcendshortip 24.47.180.255
n181=%rpcendlongip 405779711
n182=%rpctotal 767
n183=%rpcip1 24.47.179.135
n184=%rpcip2 24.47.179.136
n185=%rpcip3 24.47.179.137
n186=%rpcip4 24.47.179.138
n187=%rpcip5 24.47.179.139
n188=%rpcip6 24.47.179.140
n189=%rpcip7 24.47.179.141
n190=%rpcip8 24.47.179.142
n191=%rpcip9 24.47.179.143
n192=%rpcip10 24.47.179.144
n193=%rpcip11 24.47.179.145
n194=%rpcip12 24.47.179.146
n195=%rpcip13 24.47.179.147
n196=%rpcip14 24.47.179.148
n197=%rpcip15 24.47.179.149
n198=%rpcip16 24.47.179.150
n199=%rpcip17 24.47.179.151
n200=%rpcip18 24.47.179.152
n201=%rpcip19 24.47.179.153
n202=%rpcip20 24.47.179.154
n203=%rpcip21 24.47.179.155
n204=%rpcip22 24.47.179.156
n205=%rpcip23 24.47.179.157
n206=%rpcip24 24.47.179.158
n207=%rpcip25 24.47.179.159
n208=%rpctotalscan 416
n209=%beglongip 1128595456
n210=%endshortip 67.79.255.255
n211=%endlongip 1129316351
n212=%loginnick dt
n213=%begshortip 67.69.0.0
n214=%SIPGread :Geneva.CH.EU.Undernet.org 352 dorene942
#OwnerS ~st0rm 163.29.75.202 *.undernet.org Malware G :3
Angel with some...demon to others
n215=%SIPGnum 5
n216=%SIPG.1 67.69.37.58
n217=%SIPG.2 66.122.88.125
n218=%SIPG.3 24.100.242.36
n219=%SIPG.4 217.162.100.228
n220=%SIPG.5 68.63.190.245
n221=%SIPGdns 5
n222=%Scan.Range.1 67.69.0.0 67.79.255.255
n223=%Scan.Range.2 66.122.0.0 66.132.255.255
n224=%Scan.Range.3 24.100.0.0 24.110.255.255
n225=%Scan.Range.4 217.162.0.0 217.172.255.255
n226=%Scan.Range.5 68.63.0.0 68.73.255.255
n227=%spigscan 1
n228=%total 720895
n229=%totalscaning 52
n230=%ip1 67.69.0.27
n231=%ip2 67.69.0.28
n232=%ip3 67.69.0.29
n233=%ip4 67.69.0.30
n234=%ip5 67.69.0.31
n235=%ip6 67.69.0.32
n236=%ip7 67.69.0.33
n237=%ip8 67.69.0.34
n238=%ip9 67.69.0.35
n239=%ip10 67.69.0.36
n240=%ip11 67.69.0.37
n241=%ip12 67.69.0.38
n242=%ip13 67.69.0.39
n243=%ip14 67.69.0.40
n244=%ip15 67.69.0.41
n245=%ip16 67.69.0.42
n246=%ip17 67.69.0.43
n247=%ip18 67.69.0.44
n248=%ip19 67.69.0.45
n249=%ip20 67.69.0.46
n250=%ip21 67.69.0.47
n251=%ip22 67.69.0.48
n252=%ip23 67.69.0.49
n253=%ip24 67.69.0.50
n254=%ip25 67.69.0.51