Hi Uskasin,

Apakah kamu memiliki source file yang terkena virusnya?
Jiakalau masih ada mungkin bisa kamu submit ke : virusscan.jotti.org untuk scan 
file tersebut.

Kemudian silahkan untuk dapat mengikuti langkah-langkah sbb:


Step 1: Windows Disk Cleanup Utility ============

1   Press Windows Key + R
2   Type in: cleanmgr
3   Put a check beside: Temporary Internet Files and Temporary Files. 
Optionally, you may check other options too
4   Click OK

Step 2: avast! Boot Time Scan ============

1   Double click avast! antivirus desktop icon and wait for memory test to 
complete
2   avast GUI will appear. Right click anywhere on avast!'s window and select 
Schedule Boot Time Scan...
3   Click Advanced options and select Move infected file to Chest on the first 
dropdown list and leave the other one as it was. Click Schedule
4   You will be asked for a system restart. Click Yes to do it now or No to let 
avast wait for you to manually restart your PC
 
      NOTE: Optionally, you may enable scanning of archive files. If it
is enabled, scanning would be more thorough but would take more time

Step 3: Malwarebytes Antimalware (MBAM) ============ 

1   Download Malwarebyes' Antimalware here
2   Proceed to installing MBAM after downloading
3   On the last dialog box, do not forget to leave Update Malwarebytes' 
Antimalware and Run Malwarebytes' Antimalware checked
4   Malwabytes' Antimalware GUI would appear, from there select Perform Quick 
Scan and click Scan
5   When scan is completed, click Show Results 
6   Click Remove Selected and then, a notepad file will appear.
7   On the notepad window, click File > Save As and save it on your desktop. 
You may now close MBAM.

Step 4: Hijack This (HJT) ============

1   Download Trend Micro Hijack This here
2   Install HJT in C:\Program Files\Trend Micro\HijackThis (the location is 
already displayed by default). Click Install
3   HJT Window will appear. Click Do a system scan and save a logfile. A 
notepad file will pop-up once the scan is completed
5   Click on the Notepad window and click File > Save As and save the file on 
your desktop
6   Go back here on your topic and start a reply. On the Reply window, click 
Additional Options
7   Attach the two .txt files that we created and saved on your desktop (click 
more attachmentsto have more slots for attaching files) or if you understand 
how to use HijackThis plese go to http://hijackthis.de
        NOTE: Do not have HJT fix anything yet.
Download avast antivirus di : http://www.avast.com/eng/download-avast-home.html


 Thanks and Regards,


Yanto




________________________________
From: Uskasin <[email protected]>
To: [email protected]
Sent: Monday, November 16, 2009 9:56:08
Subject: [BinusNet]  ANSAV - NOD - PCMAV

  
Kebetulan sekali lg bahas av..

Minggu lalu saya instal ANSAV di pc.. 

Iseng2 saya mau merubah tanggal / jam dobel klik di pojok kanan bawah, tiba2 
muncul mssg THREAD FOUND.

Nama thread nya- Honey.romantic 

Object location: c:\windows\system32 \rundl32. exe

Link: *ttp://s520.photobuc ket.com/albums/ w325/uskasin/ ?action=view& 
current=av. jpg

(tanda bintang diganti “H”…)

1.      File tersebut tidak bisa di-delete oleh ANSAV.
2.      Ketika mencari file tersebut di lokasinya, saya tidak menemukan file 
rundl32.exe tersebut…
3.      Selain ANSAV, saya menggunakan av NOD32 versi ESSET v.4 – namun NOD 
tidak menemukan thread tersebut…kenapa yah ?
4.      So, posisi nya saya tidak bisa edit tanggal.
5.      kemudian saya un-instal ANSAV diganti dgn PCMAV… hasilnya thread 
tersebut tidak ditemukan & saya bisa edit settingan tanggal / jam.

Kenapa bs gt yah ?

Kenapa thread tersebut hanya di detect oleh ANSAV sebagai thread…







Uskasin

PT. BORAL PIPE & PRECAST INDONESIA

GRAHA MOBISEL 3RD Fl

Jl. Buncit Raya no. 139

Jakarta Selatan

www.boral.au

_____ 

From: binus...@yahoogroup s.com [mailto:binus...@yahoogroup s.com] On Behalf Of 
Aay Cosmas
Sent: Monday, 16 November 2009 9:11 AM
To: binus...@yahoogroup s.com
Subject: Re: [BinusNet] (unknown)

Yanto Chiang, terima kasih atas infonya.

Akhirnya saya pake smadav.

Tapi anehnya setelah saya pake smadav, software excel & vypress tidak bisa 
dipake.

Ok. Tq.

--- On Wed, 11/11/09, yanto chiang <HYPERLINK "mailto:yanto_ chiang%40yahoo. 
com"yanto_ chi...@-yahoo. com> wrote:

From: yanto chiang <HYPERLINK "mailto:yanto_ chiang%40yahoo. com"yanto_ 
chi...@-yahoo. com>
Subject: Re: [BinusNet] (unknown)
To: HYPERLINK "mailto:binusnet% 40yahoogroups. com"binus...@yahoogroup -s.com
Date: Wednesday, November 11, 2009, 1:15 PM

HI Aay,

Berdasarkan referensi dari avast antivirus bahwa webpage ini telah terinfeksi 
oleh HTML:i-frame yang dimana script pada webpage HTML telah di injeksi oleh 
perintah, salah satu contohnya adalah sebagai berikut :

2.1 - Web page infection

Among the new features is the ability to infect Web pages on the

local machine. Whenever the file infector has an access to a file on

the hard drive, it checks whether the files is EXE, SCR, HTM, PHP, or

ASP, and then acts accordingly. For the PE files, the code discussed

above is used for the infection. For HTML pages, the virus actually

injects an iframe at the very end of the page:

NOTE: Just before the actual iframe code, we can see a string used

in the virus. This isn't added to Web pages, but to the host file.

Since the machine is already infected, the virus author doesn't want

the machine to be infected again, and therefore blocks access to the

malicious page with the host file modification.

(Source : HYPERLINK "http://securitylabs"http://securitylabs .websense. 
com/content/ Blogs/3300. aspx)

Sedangkan hasil scan kami menemukan :

Source code of submitted URL:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional/ /EN">

<html>

<head>

<title>Send big files the easy way. Files too large for email attachments? No 
problem!</title>

<script language="JavaScrip t1.1" type="text/javascri pt">

<!--

location.replace( "HYPERLINK "http://hisoftdream."http://hisoftdream. com");

//-->

</script>

<noscript>

</noscript>

</head>

<body>

Click here to download file

</body>

</html>

Source : HYPERLINK "http://jutaky."http://jutaky. no-ip.org/ index.php? 
option=com_ content&task= view&id=19& Itemid=32

HTML:iFrame sendiri adalah sejini trojan yang dimana hacker melakukan injeksi 
baik melalui Webpage ataupun Email, dimana pada saat korban melakukan atau klik 
website tersebut, secara otomatis file injeksi itu akan terinstall di dalam 
PC/Notebook korban.

Jadi mohon untuk tetap berhati hati dalam melakukan aktifitas dalam dunia 
internet.

Proteksi diri Anda dengan tool antivirus ataupun anti rootkit ataupun anti 
malware yang benar benar bisa dihandalkan.

Jenis jenis i frame dapat dibaca di: HYPERLINK 
"http://www.avast."http://www.avast. com/eng/search. php?searchFor= iframe&fnc= 
search〈=ENG&x=0&y=0

Thanks and Regards,

Yanto

____________ _________ _________ __

From: Aay Cosmas <aay_intermilan@ yahoo.com>

To: binus...@yahoogroup s.com

Sent: Tuesday, November 10, 2009 10:33:51

Subject: Re: [BinusNet] (unknown)

apakah ini virus ?

kalo yg sudah terlanjur klik link-nya gimana ya ?

Cara mengatasi virus ini gimana ya ?

Thanks

--- On Mon, 11/9/09, HILARIUS JANUARFIAN <hillbi...@yahoo. com> wrote:

From: HILARIUS JANUARFIAN <hillbi...@yahoo. com>

Subject: [BinusNet] (unknown)

To: to=val_hendri@ yahoo.com, thomas_...@yahoo. com, aidah...@yahoo. com, 
bpkm_...@yahoogroup s.com, ka...@realta. net, beloved_niken@ yahoo.com, 
tunj...@ftr. co.id, andr...@sentral- sistem.com, Ita_godilove@ yahoo.com, 
TemuKeluarga@ yahoogroups. com, binus...@yahoogroup s.com

Date: Monday, November 9, 2009, 11:17 AM

HYPERLINK "http://taquarigas."http://taquarigas. com.br/swCgi9csY 4.html

[Non-text portions of this message have been removed]

New Email addresses available on Yahoo!

Get the Email name you&#39;ve always wanted on the new @ymail and @rocketmail. 

Hurry before someone else does!

HYPERLINK "http://mail."http://mail. promotions. yahoo.com/ newdomains/ aa/

[Non-text portions of this message have been removed]

[Non-text portions of this message have been removed]

Internal Virus Database is out-of-date.
Checked by AVG.
Version: 7.5.560 / Virus Database: 270.5.12/1599 - Release Date: 7/08/2008 8:49 
PM

Internal Virus Database is out-of-date.
Checked by AVG. 
Version: 7.5.560 / Virus Database: 270.5.12/1599 - Release Date: 7/08/2008 8:49 
PM



[Non-text portions of this message have been removed]


 


      Get your preferred Email name!
Now you can @ymail.com and @rocketmail.com. 
http://mail.promotions.yahoo.com/newdomains/aa/

[Non-text portions of this message have been removed]

Kirim email ke