msvnc.sys - Dangerous
%sysdir%\msvnc.sys
Manual removal instructions:
Antivirus Report of %sysdir%\msvnc.sys:
%sysdir%\msvnc.sys
msvnc.sys is rootkit W32/Tilebot-E.
msvnc.sys is used to hide files, processes and registry.
msvnc.sys is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
msvnc.sys spreads via open network shares.
msvnc.sys opens a back door on IRC channels.
msvnc.sys tries to terminate antiviral programs installed on a user computer.
vsmom.exe created new system drivers:
service name: "Zonelaps"
display name: "AntiSpyUltra"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Zonelaps\
to the Windows startup registry keys.
msvnc.sys created new system drivers:
service name: " msvnc"
display name: " msvnc"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\msvnc\
Related files:
%WinDir%\vsmom.exe
%SysDir%\msvnc.sys
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
to the Windows startup registry keys.
Added to registry:
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyEnable
1
HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyEnable
1
HKLM\SOFTWARE\Microsoft\Security Center\
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\
%sysdir%\msvnc.sys | Malware |
%sysdir%\msvnc.sys | Dangerous |
%sysdir%\msvnc.sys | High Risk |
msvnc.sys is used to hide files, processes and registry.
msvnc.sys is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
msvnc.sys spreads via open network shares.
msvnc.sys opens a back door on IRC channels.
msvnc.sys tries to terminate antiviral programs installed on a user computer.
vsmom.exe created new system drivers:
service name: "Zonelaps"
display name: "AntiSpyUltra"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Zonelaps\
to the Windows startup registry keys.
msvnc.sys created new system drivers:
service name: " msvnc"
display name: " msvnc"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\msvnc\
Related files:
%WinDir%\vsmom.exe
%SysDir%\msvnc.sys
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
to the Windows startup registry keys.
Added to registry:
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyEnable
1
HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyEnable
1
HKLM\SOFTWARE\Microsoft\Security Center\
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.