virus lssrv.exe - Windows & Software
Marsh Posté le 13-11-2004 à 19:37:33
Je vais essayer de donner un peu plus d'infos ... j'ai donc un processus nommé lssrv.exe qui tourne en permanence et bouffe de la bande passante. En effet je visualise ce qui transite en temps réel sur les ports de sortie de mon firewall et visiblement quand ce process tourne le port 150 est saturé. C'est flagrant. Si je le kill, plus rien ne transite via ce port.
Les articles de virus qui se rapprochent de mon pb parle d'un virus de type worm Rbot mais ca doit être une variante parce qu'aucun ne correspond à 100%.
Qu'est ce que processus lssrv.exe qui tourne ??? Qui le créé dès qu'une session lancée ??? J'en appelle à votre aide. Merci d'avance ...
Marsh Posté le 13-11-2004 à 20:27:14
Et 1)
W32/Rbot-LT is a worm which attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process.
W32/Rbot-LT spreads to network shares with weak passwords and via network security exploits as a result of the backdoor Trojan element receiving the appropriate command from a remote user.
W32/Rbot-LT copies itself to the Windows system folder as LSSRV.EXE and creates entries at the following locations in the registry with the value Microsoft Services so as to run itself on system startup, resetting them multiple times every minute:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
W32/Rbot-LT also sets the following registry entry with the same value to point to itself:
HKCU\Software\Microsoft\OLE
W32/Rbot-LT may attempt to sets the following registry entries:
HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM = "N"
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous = "1"
W32/Rbot-LT may attempt to delete network shares on the host computer.
W32/Rbot-LT may attempt to log keystrokes to the file KEY32.TXT in the Windows
et 2)
Please follow the instructions for removing worms.
You will also need to edit the following registry entries, if they are present. Please read the warning about editing the registry.
At the taskbar, click Start|Run. Type 'Regedit' and press Return. The registry editor opens.
Before you edit the registry, you should make a backup. On the 'Registry' menu, click 'Export Registry File'. In the 'Export range' panel, click 'All', then save your registry as Backup.
Locate the HKEY_LOCAL_MACHINE entries:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
and remove any reference to any file you deleted.
Each user has a registry area named HKEY_USERS\[code number indicating user]\. For each user locate the entry:
HKU\[code number]\Software\Microsoft\Windows\
CurrentVersion\Run\
and remove any reference to any file you deleted.
Close the registry editor.
Check the following items
To renable DCOM you can edit the registry, but it's better to use Dcomcnfg.exe. See Microsoft article 825750 for details.
The HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous = "1" setting does not allow enumeration of SAM accounts and names. The default is "0". It can be changed in Local Security Policy. See Microsoft article 246261 for details.
Check your administrator passwords and review network security.
Delete the file KEY32.TXT in the Windows system folder, if it is present.
et 3)
http://www.sophos.com/virusinfo/an [...] botlt.html
et
Marsh Posté le 12-11-2004 à 17:48:42
Salut à tous,
j'ai un gros problème de virus infectant uniquement des postes windows XP. un process du nom de lssrv.exe tourne et essaye de se propager via le port 135. Il créé un fichier LSSRV.EXE-1F62787A.pf dans le répertoire c:\windows\prefetch\. Aucuns antivirus ne le trouve pour l'instant (secuser, etrust, stinger (mcafee) ...) et je ne trouve aucun topic qui parle de ce pb ... si vous avez des idées merci d'avance ...