<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HijackThis in Operating System - Microsoft</title>
    <link>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428175#M5444</link>
    <description>Danny,  &lt;BR /&gt;&lt;BR /&gt;You came to the right place.  My company was one of the first ones attacked by this malware.  See my post:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=711683" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=711683&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Yours is a slightly newer version and uses a few different names.&lt;BR /&gt;&lt;BR /&gt;You got it because your PC did not have the latest Microsoft updates and you will get it again until you get the updates or download and run Zone Alarm.  It is a good idea to run Zone Alarm.  It will give you a chance to download the updates without being reinfected.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp" target="_blank"&gt;http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Boot into Safe Mode (F8 - without networking)&lt;BR /&gt;and check the following then Fix Checked:&lt;BR /&gt;&lt;BR /&gt;R3 - Default URLSearchHook is missing&lt;BR /&gt;O4 - HKLM\..\Run: [Microsoft update service] systemm.exe&lt;BR /&gt;O4 - HKLM\..\Run: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;O4 - HKLM\..\RunServices: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;O4 - HKLM\..\RunServices: [Microsoft update service] systemm.exe&lt;BR /&gt;&lt;BR /&gt;O4 - HKCU\..\Run: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;O4 - HKCU\..\RunServices: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Before you reboot open Explore (Right click on Start and select Explore) and locate the folder C:\Windows\System32.  You will probably have to tell it you want to see the hidden files.  See the following article:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.bleepingcomputer.com/forums/tutorial62.html" target="_blank"&gt;http://www.bleepingcomputer.com/forums/tutorial62.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Change it to display Details instead of Icons then find one of the files that you know belongs to the virus.  msfirewall.exe winssv.exe or bling.exe.  Sort by Date by clicking on the top of the date column.  Find all other programs that have the same date.  You may want to open the file O (or it may use another letter by now) with notepad to see who you got the virus from.  If it says 0.0.0.0 then I think you opened an email but usually it will tell you what IP address infected it. Delete all of the files from the same date and time.  Repeat for the C:\Windows and C:\ folders. &lt;BR /&gt;&lt;BR /&gt;Reboot with the network cable disconnected and you should be clear of the virus now.  As I mentioned earlier if you don't patch your system or run Zone Alarm the virus will get you almost as soon as you reconnect the cable. Patches are at:  &lt;A href="http://windowsupdate.microsoft.com" target="_blank"&gt;http://windowsupdate.microsoft.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Ron</description>
    <pubDate>Tue, 23 Nov 2004 11:49:30 GMT</pubDate>
    <dc:creator>Ron Kinner</dc:creator>
    <dc:date>2004-11-23T11:49:30Z</dc:date>
    <item>
      <title>HijackThis</title>
      <link>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428173#M5442</link>
      <description>My PC is being attacked by bling.exe ,winssv ,&lt;BR /&gt;winfirewall virus. Can someone please help.&lt;BR /&gt;Attached are my HijackThis Log.&lt;BR /&gt;Your help will be much appreciated&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Nov 2004 00:23:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428173#M5442</guid>
      <dc:creator>Danny Lim_3</dc:creator>
      <dc:date>2004-11-23T00:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: HijackThis</title>
      <link>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428174#M5443</link>
      <description>Have a look at these:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank"&gt;http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=711683" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=711683&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Nov 2004 03:07:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428174#M5443</guid>
      <dc:creator>Georg Tresselt</dc:creator>
      <dc:date>2004-11-23T03:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: HijackThis</title>
      <link>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428175#M5444</link>
      <description>Danny,  &lt;BR /&gt;&lt;BR /&gt;You came to the right place.  My company was one of the first ones attacked by this malware.  See my post:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=711683" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=711683&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Yours is a slightly newer version and uses a few different names.&lt;BR /&gt;&lt;BR /&gt;You got it because your PC did not have the latest Microsoft updates and you will get it again until you get the updates or download and run Zone Alarm.  It is a good idea to run Zone Alarm.  It will give you a chance to download the updates without being reinfected.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp" target="_blank"&gt;http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Boot into Safe Mode (F8 - without networking)&lt;BR /&gt;and check the following then Fix Checked:&lt;BR /&gt;&lt;BR /&gt;R3 - Default URLSearchHook is missing&lt;BR /&gt;O4 - HKLM\..\Run: [Microsoft update service] systemm.exe&lt;BR /&gt;O4 - HKLM\..\Run: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;O4 - HKLM\..\RunServices: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;O4 - HKLM\..\RunServices: [Microsoft update service] systemm.exe&lt;BR /&gt;&lt;BR /&gt;O4 - HKCU\..\Run: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;O4 - HKCU\..\RunServices: [MS FIREWALL] msfirewall.exe&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Before you reboot open Explore (Right click on Start and select Explore) and locate the folder C:\Windows\System32.  You will probably have to tell it you want to see the hidden files.  See the following article:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.bleepingcomputer.com/forums/tutorial62.html" target="_blank"&gt;http://www.bleepingcomputer.com/forums/tutorial62.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Change it to display Details instead of Icons then find one of the files that you know belongs to the virus.  msfirewall.exe winssv.exe or bling.exe.  Sort by Date by clicking on the top of the date column.  Find all other programs that have the same date.  You may want to open the file O (or it may use another letter by now) with notepad to see who you got the virus from.  If it says 0.0.0.0 then I think you opened an email but usually it will tell you what IP address infected it. Delete all of the files from the same date and time.  Repeat for the C:\Windows and C:\ folders. &lt;BR /&gt;&lt;BR /&gt;Reboot with the network cable disconnected and you should be clear of the virus now.  As I mentioned earlier if you don't patch your system or run Zone Alarm the virus will get you almost as soon as you reconnect the cable. Patches are at:  &lt;A href="http://windowsupdate.microsoft.com" target="_blank"&gt;http://windowsupdate.microsoft.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Ron</description>
      <pubDate>Tue, 23 Nov 2004 11:49:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-microsoft/hijackthis/m-p/3428175#M5444</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2004-11-23T11:49:30Z</dc:date>
    </item>
  </channel>
</rss>

