Tuesday, 26 April 2011

Heroes of Newerth Maphack

 From my good friend Sheppard at HonHacks.

1. Start HoN
2. Run HoNMaphack.exe
3. Switch back to HoN
4. Join any game
5. Press Home/Pos1 button to toggle it on/off. It's off by default.

HoNMaphack History - by Sheppard

. Updated to Patch 0.1.35
. Rewrote Hero-Picker

. Updated to Patch 0.1.34

. Added Configuration file (HoNMaphack.cfg)
. Added Hero-Picker
(will instantly pick the hero of your choice once you're in the hero pick menu).

. Updated to Patch 0.1.33

. Updated to Patch 0.1.31

. Updated to Patch 0.1.30

. First Release

You can download the Maphack from his page here: http://map-hon-hacks.blogspot.com/2009/08/heroes-of-newerth-maphack-for-latest.html

Remember, DONT GET CAUGHT. Its an instant ban.

The Annoying Vundo Virus

The Vundo Trojan (commonly known as Vundo, Virtumonde or Virtumondo, and sometimes referred to as MS Juan) is a Trojan horse that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.

A Vundo infection is typically caused either by opening an e-mail attachment carrying the trojan, or through a variety of browser exploits, including vulnerabilities in popular browser plug-ins, such as Java. Many of the popups advertise fraudulent programs such as AntiSpywareMaster, WinFixer, AntiVirus 2009.
There are two main components to Virtumonde.dll which are Browser Helper Objects and Class ID. Each of these components is in the Windows Registry under HKEY LOCAL MACHINE, and the file names are dynamic. It attaches to the system using bogus Browser Helper Objects and DLL files attached to winlogon.exe and explorer.exe and more recently lsass.exe.
Vundo inserts registry entries to suppress Windows warnings about the disabling of firewall, antivirus, and the Automatic Updates service, disables the Automatic Updates service and quickly re-disables it if manually re-enabled, and attacks Malwarebytes' Anti-Malware, Spybot Search & Destroy, Lavasoft Ad-Aware, HijackThis, and several other malware removal tools. It frequently hides itself from Vundofix & Combofix. Rather than pushing fake antivirus products, the new "ad" popups for the drive-by download attacks are copies of ads by major corporations, faked so that simply closing them allows the drive-by download exploit to insert the payload into the user's computer. (Fortunately, this is hindered, if not prevented altogether by Vista's User Account Control feature.) Its filenames are categorized by having the "hidden" flag set and being .dll files with 8-character randomly arranged names alternating consonants and vowels.

Since there are many different varieties of Vundo trojans, symptoms of Vundo vary widely, ranging from the relatively benign to the severe. Almost all varieties of Vundo feature some sort of pop-up advertising as well as rooting themselves to make them difficult to delete.
Computers infected exhibit some or all of the following symptoms:
  • Vundo will cause the infected web browser to pop up advertisements, many of which claim a need for software to fix system "deterioration".
  • The desktop background may be changed to the image of an installation window saying there is adware on the computer.
  • The screensaver may be changed to the Blue Screen of Death.
  • In the Display Properties Control Panel, the background and screensaver tabs are missing because their "Hide" values in the Registry were changed to 1.
  • Both the background and screensaver are in the System32 folder, however the screensaver cannot be deleted.
  • Windows Automatic Updates (and other web-based services) may also be disabled and it is not possible to turn them back on.
  • Infected DLLs (with randomized names such as "__c00369AB.dat" and "slmnvnk.dll") will be present in the Windows/System32 folder and references to the DLLs will be found in the user's start up (viewable in MSConfig), registry, and as browser add ons in Internet Explorer.
  • Vundo may attempt to prevent the user from removing it or otherwise impede its operation, such as by disabling the task manager, registry editor, and msconfig, thereby preventing the system from booting into safe mode.
  • Some firewalls or antivirus software may also be disabled by the virus leaving the system even more vulnerable. Especially, it disables Norton AntiVirus and in turn uses it to spread the infection. Norton will show prompts to enable phishing filter, all by itself. Upon pressing OK, it will try to connect to real-av.org and try to download more malware.
  • Popular anti-malware programs such as Spybot - Search & Destroy or Malwarebytes' Anti-Malware may be deleted or immediately closed upon loading. Renaming the program executable can work around this. Malwarebytes' Anti-Malware's executable may be deleted as soon as it is installed (depending on your infection). Installing the program on another computer and copying the executable into the infected computer's Malwarebytes' Anti-Malware directory usually works too.
  • Web access may also be negatively affected. Vundo may cause many websites to be inaccessible.
  • Google search links may be directed to rogue antispyware sites, which can be avoided by copy and pasting addresses
  • Vundo may cause webpages to fail to load after sessions of browsing and present a blank page in the browser instead of the webpage. When this happens any programs may also fail to start and it may become impossible to use windows shutdown.
  • The hard drive may start to be constantly accessed by the winlogon process, thus periodic freezes may be experienced.
  • Warnings about SuperMWindow not shutting down
  • Explorer.exe may constantly crash resulting in an endless loop of crashing then restarting.
  • Creates a virus critical driver in C:/Windows/system32/drivers/ (ati0dgxx.sys)
  • The virus can "eat" away at available hard drive space; hard drive space can fluctuate so much as +3 to -3 Gb of space, evident of Vundo's attempt at "hiding" when being antagonized.
  • Vundo can impede download progress.
  • Entering safe mode after attempting to use HijackThis results in a true blue screen of death, which cannot be recovered from without either restoring the deleted safe mode registry keys, or a reinstall of Windows.
  • Sometimes gives a "Run a DLL as an APP" error when some of the randomly named DLLs have been deleted.
  • Will rewrite randomly named DLLs while any of them reside on machine.
  • Changes \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and RunOnce entries to start itself when Windows starts.
  • Installs adware that 25% of the time is pornographic
  • Installs adware and malware Desktop Defender 2010 and Security Center with voice wav file telling you your system is infected.
  • Will cause the Network driver to be corrupt which even after going into regedit to delete the winsock 1 and 2 and trying to reinstall the driver makes it virtually impossible.
  • Deletes the network connection under My Network Places.
You can find the root cause of Vundo via your computer's system registry. On infected systems, there is usually a listing for "MS Juan" inside of the registry. This registry key causes a browser hijack, disallowing navigation to certain sites. There will be an entry listing the search page, which also calls upon a random Windows DLL file, causing the search functions on that site to fail. Google searches are disabled, as is access to Hotmail, Gmail, MySpace, and Facebook, whose pages usually become unresponsive.
Often infects files on peer sharing and bittorrent sites, or shared connections on an unsecured network.

Fortunately Vundo is very easy to fix!

Just download Malwarebytes Anti-Malware program, Its free and easy to use. http://www.bleepingcomputer.com/download/anti-virus/malwarebytes-anti-malware

It scans your computer and displays a list of known infections, and allows you to select which ones to remove.