Last week I got IRC bot virus in my server. I don’t know the virus name but I cleaned it manually. We’re not talking about this IRC bot virus cause it really simple cleaned manually using ANSAV UPX tools and Hidden Revealer I cleaned it in within short 1 minutes 😛 In this article we will write to clean YM and Skype bot virus Worm:Coutsonif.A

This virus spreading using social technique and autorun.inf, since it using social technique this virus can spreading easy. Did you ever received message from your TRUSTED friend like this sample?


Listen to me, don’t so easy clicked any link in email or anything! even it come from trusted source. In this case social technique can make you in danger position, Think if virus collecting your financial information :p

When you download this virus it will making 2 random file in %systemroot%\Documents and Settings\%user%\Local Settings\Temp with extension .tmp and .exe then created vshost.exe with size 122kb, file will available on every drive root.

Virus will also make another files:

  • %systemroot%\autorun.inf [all drive]
  • %systemroot%\RECYCLER\S-1-5-21-9949614401-9544371273-983011715-7040\winservices.exe
  • %systemroot%\WINDOWS\system32\sysmgr.exe
  • %systemroot%\WINDOWS\TEMP\5755.tmp
  • %systemroot%\windows\system32\crypts.dll
  • %systemroot%\windows\system32\msvcrt2.dll

It wil also change your registry to automatically started when your computers booting. Beside that, old autorun.inf technique also adopted in this virus spreading:


Virus will change your registry to allowed only 11 maximum active application, it also blocking your maximum port to only port 8000.

Automatic Update:

This virus will try to automatically update himself to this address list: .exe .exe
TCP: Port:27
TCP: Port:30
TCP: Port:29
TCP: Port:30
TCP: Port:30
Port 80 IP:
Port 80 IP:
Port 25 IP:
Port 80 IP:
TCP: Port:17
TCP: Port:17
Port 80 IP:
TCP: Port:21
Port 80 IP:
Port 80 IP:
Port 80 IP:
Port 80 IP:
TCP: Port:28
TCP: Port:28
TCP: Port:28
TCP: Port:29
TCP: Port:29
TCP: Port:18
TCP: Port:2
TCP: Port:27
TCP: Port:27
TCP: Port:27
TCP: Port:28
TCP: Port:28
TCP: Port:21

Simple steps to cleaning Coutsonif.A:

1. Disable “System Restore” when in cleaning process.

2. Disable “autoplay/autorun” function by:

  • Start -> Run -> Type “gpedit.msc” -> Computer Configuration -> Administrative Templates -> System -> look on “Turn off autoplay” -> Properties -> Setting tab -> Enabled



3. Kill active virus process in background, You can use any task manager tools such as Security Task Manager, just killed sysmgr.exe, vshost.exe, winservices.exe, *.tmp

*TMP is random.

4. Repair your registry files using code below or download repair.inf



HKLM, Software\CLASSES\batfile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\comfile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\exefile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\piffile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\regfile\shell\open\command,,,”regedit.exe “%1″”
HKLM, Software\CLASSES\scrfile\shell\open\command,,,”””%1″” %*”
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, “Explorer.exe”
HKCU, SessionInformation, ProgramCount, 0x00010001,3
HKCU, AppEvents\Schemes\Apps\Explorer\BlockedPopup\.current,,,”C:\WINDOWS\media\Windows XP Pop-up Blocked.wav”
HKCU, AppEvents\Schemes\Apps\Explorer\EmptyRecycleBin\.Current,,,”C:\Windows\media\Windows XP Recycle.wav”
HKCU, AppEvents\Schemes\Apps\Explorer\Navigating\.Current,,,”C:\Windows\media\Windows XP Start.wav”
HKCU, AppEvents\Schemes\Apps\Explorer\SecurityBand\.current,,,”C:\WINDOWS\media\Windows XP Information Bar.wav”

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, Microsoft(R) System Manager
HKCU, Software\Microsoft\Windows\CurrentVersion\Run, bMaxUserPortWindows Service help
HKLM, SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, MaxUserPort

5. Deleted this file list, when it hard you can use File Assasin tools:

  • \vshost.exe [all drive]
  • \autorun.inf [all drive]
  • \RECYCLER\S-1-5-21-9949614401-9544371273-983011715-7040\winservices.exe
  • \Documents and Settings\%user%\Local Settings\Temp

A415.tmp (random)
034.exe (Random)

  • \WINDOWS\system32\sysmgr.exe
  • \WINDOWS\TEMP\5755.tmp
  • \windows\system32\crypts.dll
  • \windows\system32\msvcrt2.dll

6. Re-checking your system to make sure it clean using your best antivirus or use Norman Malware Cleaner

Done, Have a good day everyone 🙂

Similar Posts:

Related Search Terms:

    Digg StumbleUpon Reddit Twitter RSS

If you're new here, you may want to subscribe to my RSS feed. You may copy or publish this article to your blog or other site as long you give credit link back to this site article. Thanks for visiting my blog!