Mislim da se kod tebe radi o ovome:
Backdoor.Zdemon.126 gives its author remote access to your computer. Although the listening ports are configurable, by default, the Trojan listens on ports 10001 and 10002.
o Deletes files: Allows the hacker to delete files
o Modifies files: Allows the hacker to modify files
o Causes system instability: Allows the hacker to disrupt normal system functions
o Releases confidential info: Allows the hacker access to passwords and files
o Compromises security settings: Allows the hacker to change security settings
Distribution Ports: 10001, 10002
When Backdoor.Zdemon.126 is executed, it does the following:
1. Moves itself to the %System% folder as Z100.exe.
NOTE: %System% is a variable. The Trojan locates the System folder and copies itself to that location. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
2. Appends Z100.exe to the shell= line of the System.ini file, so that the Trojan runs when you start Windows 95/98/Me computers.
3. Adds the value:
"Micro"="%system%\Z100.exe"
to the registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
so that the Trojan runs when you start Windows.
4. Opens a port, allowing the Trojan's creator to remotely control an infected computer and do any of the following:
* Terminate processes with names that match certain antivirus and firewall products.
* Send files, including itself, by email and by accessible network shares.
* Use a built-in FTP server to gain file access to the infected computer.
* Log keystrokes.
* Take screenshots.
* Execute arbitrary commands.
* Perform various harassing actions.
* Start the Web cam.
* Send confidential information including:
o ICQ information including your Unique Identification Number (UIN).
o Computer system information.
o Dial-up networking passwords
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":
* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
Removal:
1. Click Start, and then click Run. (The Run dialog box appears.)
2. Type regedit
Then click OK. (The Registry Editor opens.)
3. Navigate to the key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
4. In the right pane, delete the value:
"Micro"="%system%\Z100.exe"
5. Exit the Registry Editor.
MAlo je podugacko objasnjenje ali ako ce ti pomoci, izdrzace se.
Javi da li ti je to bilo potrebno