logins32.exe - Dangerous
%windir%\logins32.exe
Manual removal instructions:
Antivirus Report of %windir%\logins32.exe:
%windir%\logins32.exe
logins32.exe is rootkit W32/Tilebot-HC.
logins32.exe is used to hide files, processes and registry.
logins32.exe is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
logins32.exe spreads by chat programs and via open network shares.
logins32.exe opens a back door on IRC channels.
logins32.exe monitors user Internet activity and private information.
It sends stolen data to a hacker site.
logins32.exe created new system drivers:
service name: "Java development Services"
display name: "Java development Services"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Java development Services\
to the Windows startup registry keys.
oreans32.sys created new system drivers:
service name: "oreans32"
display name: "oreans32"
Added to registry:
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\
rdriv.sys created new system drivers:
service name: " rdriv"
display name: " rdriv"
Added to registry:
HKLM\SYSTEM\CurrentControlSet\Services\rdriv\
Related files:
%WinDir%\logins32.exe
%SysDir%\drivers\oreans32.sys
%SysDir%\rdriv.sys
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
Start
4
to the Windows startup registry keys.
Added to registry:
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
UpdatesDisableNotify
1
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Control\
WaitToKillServiceTimeout
7000
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
%windir%\logins32.exe | Malware |
%windir%\logins32.exe | Dangerous |
%windir%\logins32.exe | High Risk |
logins32.exe is used to hide files, processes and registry.
logins32.exe is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
logins32.exe spreads by chat programs and via open network shares.
logins32.exe opens a back door on IRC channels.
logins32.exe monitors user Internet activity and private information.
It sends stolen data to a hacker site.
logins32.exe created new system drivers:
service name: "Java development Services"
display name: "Java development Services"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Java development Services\
to the Windows startup registry keys.
oreans32.sys created new system drivers:
service name: "oreans32"
display name: "oreans32"
Added to registry:
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\
rdriv.sys created new system drivers:
service name: " rdriv"
display name: " rdriv"
Added to registry:
HKLM\SYSTEM\CurrentControlSet\Services\rdriv\
Related files:
%WinDir%\logins32.exe
%SysDir%\drivers\oreans32.sys
%SysDir%\rdriv.sys
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
Start
4
to the Windows startup registry keys.
Added to registry:
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
UpdatesDisableNotify
1
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Control\
WaitToKillServiceTimeout
7000
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.