Results 1 to 7 of 7
http://idgs.in/198421
  1. #1
    gegehare's Avatar
    Join Date
    Oct 2007
    Location
    root@linux:~#
    Posts
    5,365
    Points
    11.50
    Thanks: 153 / 213 / 165

    Cool [Info] Virus HuhuHaha

    Windows Vista yang diklaim jauh lebih aman dari Windows XP ternyata menjadi tak berarti saat diserang virus ini. Virus Huhuhaha yang saat ini sedang marak menyebar di Indonesia berhasil menembus salah satu gerbang keamanan Windows Vista sehingga rentan serangan masuk.

    Target serangan virus ini adalah UAC (User Account Control), salah satu fitur yang digunakan untuk mencegah program tidak diinginkan berjalan secara otomatis tanpa persetujuan pengguna komputer. Dengan melumpuhkan fungsi ini, komputer tak lagi meminta persetujuan untuk melakukan perintah.

    Virus ini menyebar melalui USB (Flash maupun Drive) dan dilaporkan telah menyerang sejumlah instansi Pemerintah, BUMN, Perusahaan Swasta, Instansi Pendidikan, serta warnet-warnet di Indonesia.

    Pembuat virus VBS (visual basic script) ini menamainya virus "HUHUHAHA". Namun, Norman Security Suite mendeteksi varian virus tersebut sebagai VBS/Autorun.AO.
    Kenapa dinamakan "HUHUHAHA" karena pembuat virus tersebut ingin memberitahukan bahwa ia tertawa melihat adanya kelemahan pada sistem keamanan Windows Vista.

    Ciri File Virus

    Virus Huhuhaha dibuat dengan menggunakan bahasa pemrograman VBScript. File virus berukuran 6 kb, dan agar dapat menyebar secara otomatis ia akan membuat file pendamping yaitu "autorun.inf" yang berisi script untuk menjalankan file virus.

    Jika virus berhasil menginfeksi, ia akan membuat beberapa file virus diantaranya :

    • autorun.inf (pada semua root drive)
    • huhuhaha.vbs (pada semua root drive)
    • C:-WINDOWS-system32-XpWin.vbs

    Virus juga akan mengcopy file "autorun.inf" dan "huhuhaha.vbs" pada setiap usb (flash/drive) yang ditancapkan/dicolokkan pada komputer yang terinfeksi. Semua file virus tersebut memiliki atribut file RHSA (Read, Hidden, System, Archive), sehingga tidak terlihat jika user tidak memunculkan menu hidden. (Lihat Gambar 2)

    Gejala/Efek Virus

    Jika sudah terinfeksi virus huhuhaha, akan menimbulkan gejala/efek berikut :

    • Memunculkan text virus pada menu "Run". (Lihat Gambar 3)
    • Menonaktifkan system restore. Hal ini dilakukan agar user tidak dapat mengembalikan setingan system windows kembali seperti sebelum terinfeksi virus ini.
    • Menambah header text virus pada Internet Explorer. (Lihat Gambar 4)
    • Disable fungsi UAC (User Account Control) Windows Vista. (Lihat Gambar 5)
    • Merubah nama registrasi computer dengan text virus. (Lihat Gambar 6)
    • Menonaktifkan fungsi "safe mode" dan membuat "blue screen" windows. Saat user berusaha masuk melalui fitur safe mode, maka akan muncul blue screen. (Lihat Gambar 7)
    • Mematikan fungsi Security Center Windows. Fitur ini digunakan untuk memastikan kondisi komputer dari 3 aspek keamanan yaitu Automatic Updates, Firewall dan Software Antivirus.

    Metode Penyebaran

    Sama seperti virus lokal lainnya, virus huhuhaha masih menggunakan media USB (flash/drive) sebagai penyebarannya. Virus akan membuat file "autorun.inf" dan "huhuhaha.vbs" pada setiap usb (flash/drive) yang ditancapkan/dicolokkan pada komputer yang terinfeksi. Kedua file tersebut akan aktif secara otomatis dengan hanya mengkases usb (drive/flash) tersebut.

    Modifikasi Registry

    Agar dapat aktif saat komputer dijalankan, virus membuat string berikut :

    • HKEY_LOCAL_MACHINE-SOFTWARE -Microsoft-Windows-CurrentVersion-Run
    Ageia = C:-WINDOWS-system32-XpWin.vbs
    • HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Run
    Systemdir = C:-WINDOWS-huhuhaha.vbs
    Agar dapat muncul pada menu Run, virus membuat string berikut :
    • HKEY_CURRENT_USER-Software-Microsoft-Windows-CurrentVersion-RunMRU
    a = huhuhaha

    Walau tidak men-disable fungsi windows seperti task manager, folder options, regedit, dll, virus men-disable system restore dengan membuat string berikut :
    • HKEY_LOCAL_MACHINE-SOFTWARE- Microsoft-Windows NT-CurrentVersion-SystemRestore
    DisableSR = 1
    Serta men-disable fungsi UAC (User Account Control) dengan membuat string berikut :
    • HKEY_LOCAL_MACHINE-SOFTWARE- Microsoft-Windows-CurrentVersion-Policies-System
    EnableLUA = 0x00000000

    Selain itu, virus menambah caption text pada Internet Explorer dengan membuat string berikut :
    • HKEY_CURRENT_USER-Software-Microsoft-Internet Explorer-Main
    Window Title = huhuhaha
    Kemudian, virus juga merubah registrasi komputerdengan membuat string berikut :
    • HKEY_LOCAL_MACHINE-SOFTWARE- Microsoft-Windows NT-CurrentVersion
    RegisteredOrganization = huhuhaha
    RegisteredOwner = huhuhaha

    Agar dapat muncul text virus saat login windows, virus membuat string berikut :
    • HKEY_LOCAL_MACHINE-SOFTWARE- Microsoft-Windows NT-CurrentVersion
    LegalNoticeCaption = huhuhaha virus
    LegalNoticeText = huhuhaha

    Untuk men-disable fungsi safe mode, virus men-"delete" string berikut :
    • HKEY_LOCAL_MACHINE-SYSTEM-ControlSet001-Control-SafeBoot, AlternateShell
    • HKEY_LOCAL_MACHINE-SYSTEM-ControlSet002-Control-SafeBoot, AlternateShell
    • HKEY_LOCAL_MACHINE-SYSTEM-ControlSet003-Control-SafeBoot, AlternateShell
    • HKEY_LOCAL_MACHINE-SYSTEM-CurrentControlSet-Control-SafeBoot, AlternateShell

    Serta men-"delete" key berikut :
    • HKEY_LOCAL_MACHINE-SYSTEM- CurrentControlSet-Control-SafeBoot-Minimal
    • HKEY_LOCAL_MACHINE-SYSTEM-CurrentControlSet-Control-SafeBoot-Network
    Terakhir, virus berusaha mematikan fungsi Security Center dengan membuat string berikut :
    • HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Security Center
    AntivirusDisableNotify = 1
    FirewallDisableNotify = 1
    UpdatesDisableNotify = 1

    Sumber: Vaksincom

    TIPS : 5 Langkah Membersihkan Virus HUHUHAHA

    1. Putuskan komputer yang akan dibersihkan dari jaringan/internet.
    2. Matikan proses virus yang aktif pada memori.

    Gunakan Windows Task Manager untuk mematikan proses virus, yaitu dengan nama "wscript.exe". (wscript.exe merupakan file windows yang digunakan untuk menjalankan file vbscript). (Lihat Gambar)

    3. Hapus file virus berikut:
    • autorun.inf (pada semua root drive)
    • huhuhaha.vbs (pada semua root drive)
    • C:-WINDOWS-system32-XpWin.vbs

    Catatan:
    • Sebaiknya tampilkan file yang tersembunyi agar mempermudah dalam proses pencarian file virus. (virus memiliki atribut file Hidden, Archive, System, dan Read-Only). Caranya pada Windows Explorer pilih Tools>>Folder Options>>View>>Show hidden files and folders
    • Untuk mempermudah proses pencarian sebaiknya gunakan fasilitas "Search" Windows dengan filter file autorun.inf dan *.vbs yang mempunyai ukuran 6 KB.

    4. Hapus string registry yang dibuat oleh virus. Untuk mempermudah dapat menggunakan script registry di bawah ini :

    [Version]
    Signature="$Chicago$"
    Provider=Vaksincom Oyee

    [UnhookRegKey]
    HKLM, SOFTWARE-Microsoft-Security Center, AntiVirusDisableNotify, 0x00000000,0
    HKLM, SOFTWARE-Microsoft-Security Center, FirewallDisableNotify, 0x00000000,0
    HKLM, SOFTWARE-Microsoft-Security Center, UpdatesDisableNotify, 0x00000000,0
    HKLM, SOFTWARE-Microsoft-Windows NT-CurrentVersion, RegisteredOrganization, 0, "Organization"
    HKLM, SOFTWARE-Microsoft-Windows NT-CurrentVersion, RegisteredOwner, 0, "Owner"
    HKLM, SOFTWARE-Microsoft-Windows NT-CurrentVersion-SystemRestore, DisableSR, 0x00000000,0
    HKLM, SYSTEM-ControlSet001-Control-SafeBoot, AlternateShell, 0, "cmd.exe"
    HKLM, SYSTEM-ControlSet002-Control-SafeBoot, AlternateShell, 0, "cmd.exe"
    HKLM, SYSTEM-ControlSet003-Control-SafeBoot, AlternateShell, 0, "cmd.exe"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot, AlternateShell, 0, "cmd.exe"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{36FC9E60-C465-11CF-8056-444553540000}, (default), "Universal Serial Bus controller"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E965-E325-11CE-BFC1-08002BE10318}, (default), "CD-ROM Drive"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E967-E325-11CE-BFC1-08002BE10318}, (default), "DiskDrive"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E969-E325-11CE-BFC1-08002BE10318}, (default), "Standar floppy disk controller"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E96A-E325-11CE-BFC1-08002BE10318}, (default), "Hdc"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E96B-E325-11CE-BFC1-08002BE10318}, (default), "Keyboard"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E96F-E325-11CE-BFC1-08002BE10318}, (default), "Mouse"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E977-E325-11CE-BFC1-08002BE10318}, (default), "PCMCIA Adapters"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E97B-E325-11CE-BFC1-08002BE10318}, (default), "SCSIAdapters"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E97D-E325-11CE-BFC1-08002BE10318}, (default), "System"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{4D36E980-E325-11CE-BFC1-08002BE10318}, (default), "Floppy disk drive"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{71A27CDD-812A-11D0-BEC7-08002BE2092F}, (default), "Volume"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-{745A17A0-74D3-11D0-B6FE-00A0C90F57DA}, (default), "Human Interfaces Devices"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-AppMgmt, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-Base, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-Boot Bus Extender, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-Boot file system, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-CryptSvc, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-DcomLaunch, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-dmadmin, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-dmboot.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-dmio.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-dmload.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-dmserver, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-EventLog, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-File system, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-Filter, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-HelpSvc, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-Netlogon, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-PCI Configuration, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-PlugPlay, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-PNP Filter, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-Primary disk, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-RpcSs, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-SCSI Class, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-sermouse.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-sr.sys, (default), "FSFilter System Recovery"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-SRService, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-System Bus Extender, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-vga.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-vgasave.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Minimal-WinMgmt, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{36FC9E60-C465-11CF-8056-444553540000}, (default), "Universal Serial Bus controller"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E965-E325-11CE-BFC1-08002BE10318}, (default), "CD-ROM Drive"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E967-E325-11CE-BFC1-08002BE10318}, (default), "DiskDrive"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E969-E325-11CE-BFC1-08002BE10318}, (default), "Standar floppy disk controller"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E96A-E325-11CE-BFC1-08002BE10318}, (default), "Hdc"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E96B-E325-11CE-BFC1-08002BE10318}, (default), "Keyboard"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E96F-E325-11CE-BFC1-08002BE10318}, (default), "Mouse"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E972-E325-11CE-BFC1-08002BE10318}, (default), "Net"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E973-E325-11CE-BFC1-08002BE10318}, (default), "NetClient"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E974-E325-11CE-BFC1-08002BE10318}, (default), "NetService"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E975-E325-11CE-BFC1-08002BE10318}, (default), "NetTrans"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E977-E325-11CE-BFC1-08002BE10318}, (default), "PCMCIA Adapters"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E97B-E325-11CE-BFC1-08002BE10318}, (default), "SCSIAdapters"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E97D-E325-11CE-BFC1-08002BE10318}, (default), "System"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{4D36E980-E325-11CE-BFC1-08002BE10318}, (default), "Floppy disk drive"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{71A27CDD-812A-11D0-BEC7-08002BE2092F}, (default), "Volume"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-{745A17A0-74D3-11D0-B6FE-00A0C90F57DA}, (default), "Human Interfaces Devices"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-AFD, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-AppMgmt, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Base, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Boot Bus Extender, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Boot file system, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Browser, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-CryptSvc, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-DcomLaunch, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Dhcp, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-dmadmin, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-dmboot.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-dmio.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-dmload.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-dmserver, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-DnsCache, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-EventLog, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-File system, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Filter, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-HelpSvc, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-ip6fw.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-ipnat.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-LanmanServer, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-LanmanWorkstation, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-LmHosts, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Messenger, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NDIS, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NDIS Wrapper, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Ndisuio, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NetBIOS, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NetBIOSGroup, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NetBT, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NetDDEGroup, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Netlogon, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NetMan, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Network, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NetworkProvider, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-NtLmSsp, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-PCI Configuration, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-PlugPlay, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-PNP Filter, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-PNP_TDI, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Primary disk, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-rdpcdd.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-rdpdd.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-rdpwd.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-rdsessmgr, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-RpcSs, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-SCSI Class, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-sermouse.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-SharedAccess, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-sr.sys, (default), "FSFilter System Recovery"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-SRService, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Streams Drivers, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-System Bus Extender, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-Tcpip, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-TDI, (default), "Driver Group"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-tdpipe.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-tdtcp.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-termservice, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-vga.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-vgasave.sys, (default), "Driver"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-WinMgmt, (default), "Service"
    HKLM, SYSTEM-CurrentControlSet-Control-SafeBoot-Network-WZCSVC, (default), "Service"

    [del]
    HKCU, Software-Microsoft-Windows-CurrentVersion-RunMRU, a
    HKCU, Software-Microsoft-Internet Explorer-Main, Window Title
    HKLM, SOFTWARE-Microsoft-Windows-CurrentVersion-Run, Ageia
    HKLM, SOFTWARE-Microsoft-Windows-CurrentVersion-Run, Systemdir
    HKLM, SOFTWARE-Microsoft-Windows-CurrentVersion-Policies-system, EnableLUA
    HKLM, SOFTWARE-Microsoft-Windows-CurrentVersion-Winlogon

    Copy paste script tersebut ke dalam notepad kemudian simpan dengan nama "repair.inf" (gunakan pilihan Save As Type menjadi All Files agar tidak terjadi kesalahan).

    5. Buka file repair.inf kemudian jalankan dengan cara klik kanan file tersebut kemudian pilih install.

    Sumber: Vaksincom

    Semoga Bermanfaat...
    Salam
    Ya Tuhan Berikan GRP Untukku...

    Who is Trafalgar Law? The Captain and Doctor of the Heart Pirates? a Man with bounty 200.000.000 Beli? Surgeon of Death? No , He is just a Rookie Pirate who know the meaning about "Will of D."

    "I told you, I'm waiting for the right time...Dont get rushed, "One Piece" isn't going anywhere...Now, enough talking, Shut up and follow my orders...I'll be sure, To steal the proper throne" - Trafalgar Law

    GeGeHaRe One Piece Predictions
    New Nakama - Country Of Brigands - Wano Country - X Mark - Fire Sword

  2. Hot Ad
  3. #2
    Kurt.D.Cobain's Avatar
    Join Date
    Apr 2008
    Location
    =
    Posts
    1,974
    Points
    4,012.20
    Thanks: 0 / 20 / 17

    Default

    GRP Sent..............

    btw... Pake PCMAV Valkyrie kedetect juga tuh
    For Fun
    www.R-L.me

  4. #3
    koker123's Avatar
    Join Date
    Jan 2007
    Location
    Somewhere on Earth
    Posts
    838
    Points
    993.90
    Thanks: 1 / 2 / 2

    Default

    anti virus apa aj yg bisa detect ya ?
    serem juga euy virusnya xD
    bener kata bl00d13z matiin autorun di flash disk dah klo kaya gini
    Last edited by koker123; 19-05-09 at 22:24.

  5. #4
    fire_god's Avatar
    Join Date
    Jun 2008
    Posts
    1,477
    Points
    2,789.00
    Thanks: 0 / 15 / 6

    Default

    PCMAV >>>>> virus lokal!!

    btw ini vista doang kan ya?

  6. #5
    rulez's Avatar
    Join Date
    Feb 2008
    Location
    Bandung
    Posts
    2,011
    Points
    2,416.90
    Thanks: 1 / 0 / 0

    Default

    iya itu klo ada auto run di flash disk..

    nah klo auto run detect flash disk. virus nya di komp.. trus lgs masuk gmn ??

    soalnya gw ngalamin hehehe. beda virus nya sih.. tar gw coba share hehehe..

  7. #6
    gegehare's Avatar
    Join Date
    Oct 2007
    Location
    root@linux:~#
    Posts
    5,365
    Points
    11.50
    Thanks: 153 / 213 / 165

    Default

    Quote Originally Posted by Kurt.D.Cobain View Post
    GRP Sent..............

    btw... Pake PCMAV Valkyrie kedetect juga tuh
    thx...
    ternyata bukan Tuhan yg memberiku GRP....

    anti virus apa aj yg bisa detect ya ?
    serem juga euy virusnya xD
    bener kata bl00d13z matiin autorun di flash disk dah klo kaya gini

    Baru PC Mav yg gw tau....
    Norman Security Suite juga mendeteksi tapi sebagai VBS/Autorun.AO.....

    gw soalnya masi make XP...

    Who is Trafalgar Law? The Captain and Doctor of the Heart Pirates? a Man with bounty 200.000.000 Beli? Surgeon of Death? No , He is just a Rookie Pirate who know the meaning about "Will of D."

    "I told you, I'm waiting for the right time...Dont get rushed, "One Piece" isn't going anywhere...Now, enough talking, Shut up and follow my orders...I'll be sure, To steal the proper throne" - Trafalgar Law

    GeGeHaRe One Piece Predictions
    New Nakama - Country Of Brigands - Wano Country - X Mark - Fire Sword

  8. #7
    op3l's Avatar
    Join Date
    Oct 2006
    Location
    Surabaya
    Posts
    1,787
    Points
    2,028.60
    Thanks: 1 / 1 / 1

    Default

    wah niat panjang bener, SAV uda download buat versi Vista kebal laptop gw mah
    Yang Penting NgeJUNK

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •