From: ijones on
Hi, I have just noticed in Startup I have:

Piylzq2tOn C:\Documents and Settings\Franco\Impostazioni
locali\Temp\lugcmjwv.exe

What is this please?
Could I detete this file manually?
thanks
From: David W. Hodgins on
On Tue, 08 Jul 2008 13:20:22 -0400, <ijones(a)togliinterfree.it> wrote:

> Hi, I have just noticed in Startup I have:
> Piylzq2tOn C:\Documents and Settings\Franco\Impostazioni
> locali\Temp\lugcmjwv.exe

Submit a copy to http://www.virustotal.com/, to find out what it is, and
post back with the results.

Regards, Dave Hodgins

--
Change nomail.afraid.org to ody.ca to reply by email.
(nomail.afraid.org has been set up specifically for
use in usenet. Feel free to use it yourself.)
From: Russg on

<> wrote in message news:
> Hi, I have just noticed in Startup I have:
>
> Piylzq2tOn C:\Documents and Settings\Franco\Impostazioni
> locali\Temp\lugcmjwv.exe
>
> What is this please?
> Could I detete this file manually?
> thanks
You can delete any file in a Temp directory.
Which file is in your startup, piylzq2ton or lugcmjwv.exe? Either way, if
you can
find the file, submit it to:

www.virustotal.com

and see if it is known malware.
The odd names you're talking about are suspicious.
You can also Google those files, but probably won't
get you anywhere.


From: ijones on
>Submit a copy to http://www.virustotal.com/, to find out what it is, and
>post back with the results.


Thanks for your news. This is my post:

Antivirus Versione Ultimo aggiornamento Risultato
AhnLab-V3 2008.7.9.0 2008.07.08 Win-Trojan/Agent.15360.FV
AntiVir 7.8.0.64 2008.07.08 DIAL/15360.A
Authentium 5.1.0.4 2008.07.07 -
Avast 4.8.1195.0 2008.07.08 Win32:Dialer-JC
AVG 7.5.0.516 2008.07.08 Potentially harmful program
Dialer.HVB
BitDefender 7.2 2008.07.08 -
CAT-QuickHeal 9.50 2008.07.08 TrojanDownloader.Agent.spb
ClamAV 0.93.1 2008.07.08 Trojan.Dialer.Egroup
DrWeb 4.44.0.09170 2008.07.08 -
eSafe 7.0.17.0 2008.07.08 Suspicious File
eTrust-Vet 31.6.5937 2008.07.08 -
Ewido 4.0 2008.07.08 -
F-Prot 4.4.4.56 2008.07.07 -
F-Secure 7.60.13501.0 2008.07.08 Dialer.HN
Fortinet 3.14.0.0 2008.07.08 -
GData 2.0.7306.1023 2008.07.08 Win32:Dialer-JC
Ikarus T3.1.1.26.0 2008.07.08 Dialer.Win32.Egroupsexdial
Kaspersky 7.0.0.125 2008.07.08 -
McAfee 5334 2008.07.08 -
Microsoft 1.3704 2008.07.08 Dialer:Win32/Egroupsexdial
NOD32v2 3251 2008.07.08 -
Norman 5.80.02 2008.07.08 Dialer.HN
Panda 9.0.0.4 2008.07.08 -
Prevx1 V2 2008.07.08 Cloaked Malware
Rising 20.52.12.00 2008.07.08 -
Sophos 4.31.0 2008.07.08 -
Sunbelt 3.1.1509.1 2008.07.04 Dialer.15360.A
Symantec 10 2008.07.08 -
TheHacker 6.2.96.374 2008.07.07 -
TrendMicro 8.700.0.1004 2008.07.08 -
VBA32 3.12.6.8 2008.07.08 suspected of
MalwareScope.Dialer.NWMini.1 (paranoid heuristics)
VirusBuster 4.5.11.0 2008.07.08 -
Webwasher-Gateway 6.6.2 2008.07.08 Dialer.15360.A
Informazioni addizionali
File size: 15360 bytes
MD5...: f5cc0a9369e3d3540046c711dfda9f1d
SHA1..: 1f913e506fd94abeb8d9b175c054677d8f3426cf
SHA256:
07774aecd76fd1d6b827339a74c26811e0edf4150367881e88a0dc42b650b19f
SHA512:
0bd4cab4a36ce97555470acd9e110e7eb4052f3d710e73849a54d7fd888c339e
677a62d5d07b08851e973b59be1f85cd9465b91c8ea7844ff9e0f0c204445065
PEiD..: UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John
Reiser
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x1ffd0
timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
UPX0 0x1000 0xc000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
UPX1 0xd000 0x4000 0x3200 7.83 e17935738e7ea1d96920dbed86879e6e
..rsrc 0x11000 0x1000 0x600 4.83 cd91d0935e498b88e28a2a9d5b2505f2

( 4 imports )
> KERNEL32.DLL: LoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
> advapi32.dll: RegCloseKey
> oleaut32.dll: SysFreeString
> user32.dll: GetCursorPos

( 0 exports )
packers (F-Prot): UPX
Prevx info:
http://info.prevx.com/aboutprogramtext.asp?PX5=22A88D36002B949E3C9B00204776A1003906454A
packers (Kaspersky): PE_Patch.UPX, UPX, PE_Patch.UPX, UPX
packers (Avast): UPX

From: David H. Lipman on
From: <ijones(a)TOGLIinterfree.it>

>>Submit a copy to http://www.virustotal.com/, to find out what it is, and
>>post back with the results.


| Thanks for your news. This is my post:

| AhnLab-V3 2008.7.9.0 2008.07.08 Win-Trojan/Agent.15360.FV
| AntiVir 7.8.0.64 2008.07.08 DIAL/15360.A
| Avast 4.8.1195.0 2008.07.08 Win32:Dialer-JC
| AVG 7.5.0.516 2008.07.08 Potentially harmful program Dialer.HVB
| CAT-QuickHeal 9.50 2008.07.08 TrojanDownloader.Agent.spb
| ClamAV 0.93.1 2008.07.08 Trojan.Dialer.Egroup
| eSafe 7.0.17.0 2008.07.08 Suspicious File
| F-Secure 7.60.13501.0 2008.07.08 Dialer.HN
| GData 2.0.7306.1023 2008.07.08 Win32:Dialer-JC
| Ikarus T3.1.1.26.0 2008.07.08 Dialer.Win32.Egroupsexdial
| Microsoft 1.3704 2008.07.08 Dialer:Win32/Egroupsexdial
| Norman 5.80.02 2008.07.08 Dialer.HN
| Prevx1 V2 2008.07.08 Cloaked Malware
| Sunbelt 3.1.1509.1 2008.07.04 Dialer.15360.A
| VBA32 3.12.6.8 2008.07.08 suspected of
| MalwareScope.Dialer.NWMini.1 (paranoid heuristics)
| Webwasher-Gateway 6.6.2 2008.07.08 Dialer.15360.A

As you can see, this is a pr0n dialer.

What AV software are you using ?

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


 |  Next  |  Last
Pages: 1 2
Prev: spybot registey change notice
Next: bios virus