answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

What are the names of the computer viruses?

HiHere are some names of viruses I found while Googling.
  • 1260
  • 4K
  • 5lo
  • A and A
  • A-403
  • Abraxas
  • Acid
  • Acme
  • ABC
  • A ctifed
  • Ada
  • Agena
  • AGI-Plan
  • Ah
  • AI
  • AIDS
  • AIDS II
  • AirCop
  • Ajax
  • Alabama
  • Albanet
  • Alcon
  • Alien
  • Ambulance
  • Amstrad
  • Ancient
  • Andre
  • Andre2
  • Andromeda
  • Angelina
  • Anna
  • Anna Kournikova
  • Anninja
  • ANT
  • Ant-Cow
  • Anthrax - Boot
  • Anthrax - File
  • ANTI
  • AntiCMOS
  • AntiHeuristica
  • Anti-D
  • Anti-Daf
  • Anti-MIT
  • Anti-Pascal II
  • Anti-Pascal
  • Anti-Tel
  • Anti-Telefonica
  • Apadana
  • Arab
  • Aragon
  • Aragorn
  • ARCV-n
  • Argentina
  • Arka
  • Arma
  • Armagedon The Greek
  • Armagedon
  • Arriba
  • Arusiek
  • ASC
  • Ash
  • ASP-472
  • Astra
  • AT 144
  • AT 149
  • Atas
  • Atas3321
  • Atas-400
  • Atom
  • Atomic1A
  • Atomic1b
  • Atomic2A
  • Atomic2b
  • Atte-629
  • August 16
  • AusPar
  • Australian
  • Azusa
  • B Ugly
  • B3
  • B-52
  • BA101
  • Back Time
  • Bacros
  • Bad Boy
  • Bad Brains
  • Bad Command
  • Bad Guy
  • Bad Sectors 1.2
  • Bad-389
  • Bak
  • Bamestra
  • Banana
  • Bandit
  • Baobab 731
  • Barcelona
  • Barrotes 2
  • Barrotes
  • Basil
  • Bat
  • Beach
  • Beaches
  • Beast
  • BeBe
  • Beeper
  • Beer
  • Benoit
  • Real PvP Flava
  • Berlin
  • Best Wishes
  • Beta
  • Beva-32
  • Beva-33
  • Beva-96
  • Beware
  • BFD
  • Big 2000
  • Bit Addict
  • Black Knight
  • Black Monday
  • Blackjack
  • Black Pegasus
  • Blaze
  • Bljec
  • Blood Lust
  • Blood Rage
  • Blood
  • Blood-2
  • Bob
  • Bomber
  • Boot Killer
  • Bounce
  • Bouncing Dot
  • Bow
  • Boys
  • Brainy
  • BrO_AcT
  • Brotherhood
  • Brothers
  • Browser Enhancement
  • Bryansk
  • Bubbles 2
  • Bubbles
  • Bubonic
  • Budo
  • Burger
  • Burghofer
  • Busted
  • Butterfly
  • Butthole
  • Byte Bandit
  • Byte Warrior
  • (c)Brain
Pakistani flu,
  • C
  • Cabanas
  • Caco-Daemon
  • CAD Kill
  • C-A-D
  • Cannabis
  • Cansu
  • Capital
  • Cara
  • Caribe
  • Carioca
  • CaroEvil
  • Cartuja
  • Casc1621
  • Casc-2
  • Cascade
  • Casino
  • Casper
  • Casteggio
  • Caterpillar
  • Catman
  • Catphish
  • Caz
  • CB-1530
  • CD
  • CDEF
  • CDFL Mac
  • CD-10
  • Century
  • Cerburus
  • CFSK
  • Chad
  • Chang
  • Chaos
  • Chaser
  • Chasna
  • Chcc
  • Cheeba
  • Cheesy
  • Chemist
  • Chemnitz
  • Chernobyl
  • Chile Mediera
  • Chinese Blood
  • Chr-869
  • Chrisj13
  • Christmas Tree
  • Christmas Violator
  • CIH
  • Cinderella
  • Civil Service
  • Civil War II
  • Civil War III
  • Civil War IV
  • Civil War V
  • Civil War
  • CkSum
  • Clagger
  • Clint
  • Clonewar 2
  • Clonewar
  • Clust
  • Coahuila
  • CODE 1
  • CODE 252
  • Code Zero
  • Coffee Shop
  • Collor de Mello
  • Color
  • Com16850
  • Com2S
  • Comdex
  • Commentator
  • Commwarrior
  • Como
  • Compiler2
  • Comspec
  • Conficker
  • Cop-Mpl
  • Copyright
  • Copyr-ug
  • Coruna
  • Coruna3
  • Cossiga No Grazie
  • Cossiga
  • Costeau
  • CPXK
  • Cracker Jack
  • Cracky
  • Crash
  • Crasher
  • Crazy Eddie
  • Crazy Imp
  • CrazyI B
  • CRF
  • Cross Over
  • Crystal
  • CSL
  • CV4
  • D1
  • DKid
  • Dada
  • Damage
  • Danny
  • Dark Apocalypse
  • Dark Avenger
  • Dark End
  • DataLock
  • Datos
  • Davis
  • D-Day
  • Death
  • Deathead
  • Deceide 2
  • Dedicated
  • Deicide
  • Demolition
  • Demon
  • Den Zuk
  • Dennis
  • Deranged
  • Diablo
  • Dial
  • DigiDeliver
  • Dima
  • Disk Killer
  • Dismember
  • Dodgy 1024
  • Dodo 2456
  • Dodo
  • Doodle
  • Dorn
  • Dose-A
  • Druid
  • Dudley
  • Dutch Tiny
  • Dutch
  • Eclypse
  • ECV
  • Ed
  • Edcl
  • EDV
  • Egg
  • Eggdrop
  • Ein Volk
  • Einstein
  • Ekoterror
  • E1ectr0n
  • Eliza
  • Elk Cloner
  • Elvirus
  • Elvira
  • EMF 625
  • EMF
  • Emmie
  • EMO
  • Empire
  • End-of
  • Enemy
  • Enigma
  • Enola
  • Error 412 virus
  • Error
  • Essex
  • Estepa
  • ETC
  • Europe-92
  • Evil Genius
  • Exper416
  • Explode
  • Exploration
  • Exterminator
  • Eziarch
  • Family Q
  • Farcus
  • Father Christmas
  • Faust
  • Fax Free
  • Fear
  • Feist
  • Fellowship
  • Fich
  • Fich897
  • Filedate
  • Filename
  • Filler
  • Fingers
  • Finn-357
  • Fish 1100
  • Fish 2
  • Fish 2420
  • Fish Boot
  • Fish
  • Flagyll
  • Flash
  • Flex
  • Flip
  • Flower
  • Flu-2
  • Fly11
  • Fone Sex
  • Fotomoto
  • Forger2
  • Form
  • Fortran
  • Frajer
  • Francois
  • Frankie
  • Fratricide
  • Free
  • Frere Jacques
  • Fri13-nz
  • Friday 13th COM
  • Friday 13th
  • Friday the 13th - Version A
  • Frodo Soft
  • Frodo-458
  • Frogs
  • Fu Manchu
  • Fune
  • Fun.exe virus
  • Fvhs-a
  • Fvhs-B
  • F-Word
  • paul eduard
  • G
  • Galicia
  • Ganeu
  • Gedza
  • Geek
  • Gergana
  • Germ
  • Get Password 1
  • Ghost Boot
  • Ghost COM
  • Ghost Dos-62
  • Gijon
  • Gliss
  • Goblin
  • Gomb
  • Gorlovka
  • Gotch 4
  • Gotcha 1
  • Gotcha 2
  • Gotcha 3
  • Gotcha 9e
  • Gotcha
  • Got-you
  • Grapje
  • Graveyard
  • Graybird (Backdoor Graybird, Backdoor Graybird P)
  • Green
  • Grog31
  • Groovy
  • Growing Block
  • Grue
  • Grunt
  • Grunt-3
  • Guppy
  • H-2
  • H-457
  • HA
  • Happy virus
  • Hack-83
  • HACKER
  • Hacktic
  • Hafen
  • Haifa
  • Hallo
  • Halloechen
  • Halloween
  • Hammer
  • Happy N. Y.
  • Happy
  • Hara
  • Harakiri
  • Hare
  • Harm
  • Hary
  • Hastings
  • Hate
  • HBT
  • Heevahava
  • Hello
  • Hellween 1182
  • Hellween
  • Here
  • Hero
  • Hero-394
  • Hi
  • Hidrag
  • Highland
  • Hiperion
  • Hitchcock
  • Hitler
  • Holland Girl
  • Holo/Holocaust
  • Holiday
  • Horror
  • Horse Boot
  • Horse
  • HS
  • Huge
  • Hungarian
  • Hybrid
  • Hymn
  • IB Demonic
  • I-B
  • Ice 9
  • ICE9-159
  • ICE9-199
  • ICE9-224
  • Ice9-250
  • Icelandic II
  • Icelandic
  • Icelandic-3
  • IDF
  • Idle
  • Ieronim
  • IKV528
  • Ill
  • ILOVEYOU
  • Incom
  • Infinity
  • INIT 17
  • INIT 29
  • INIT 1984
  • INIT 9403
  • INIT-M
  • Inofensivo
  • Inrud-B
  • Internal
  • Intruder
  • Invader
  • Invitation
  • Invol
  • IOU
  • Iranian
  • Iraqi Warrior
  • IT
  • IVP EX1
  • IVP EX2
  • IVP
  • Japan
  • Jeefo
  • Jeff
  • Jerk
  • Jeru-1663
  • Jerusalem
  • Joanna
  • Jobbie
  • John
  • JoJo
  • Joke
  • Joker
  • Joker-1602
  • Joker3
  • Jonathan (malware)
  • Joshi
  • Joshua
  • July 13th
  • July 26
  • June 16th
  • June1530
  • Junky
  • Justice
  • Kamasutra
  • Kak worm
  • killerjeff.exe
  • L1
  • Label
  • Lamer Exterminator
  • Lanc
  • Lanc5476
  • Lanc5882
  • Larry
  • Lazy
  • LCV
  • Leapfrog
  • Leech
  • Lehigh
  • Leper AOD
  • Leprosy
  • Les
  • Lib1172
  • Liberty
  • Liquid Code - 2
  • Liquid Code
  • Lisbon
  • Little Brother
  • Little Girl
  • Little Pieces
  • Little
  • LixoNuke
  • Loa Duong
  • LockJaw
  • Lockz
  • LPT-OFF
  • Lycee
  • Mabuhay
  • Macedonia
  • MacMag
  • Madcow
  • Magnitogorski 3
  • Magnum
  • Malage
  • Malaise
  • Malign
  • Malmsey Habitat v3.b
  • Malmsey2
  • Malmsey
  • Maltese Amoeba
  • Malware Defense
  • Mannequin
  • Manola
  • Manta
  • Many Fingers
  • Marauder
  • Mardi Bros .
  • MAS
  • Mark II
  • Marzia
  • Math Test
  • Matura
  • Mayak
  • Mazor
  • MBDF
  • MCWH1022
  • McWhale
  • MDEF
  • Meditation
  • MegM
  • Melissa
  • Memory Lapse
  • MG
  • Michelangelo
  • Michelangelo II
  • Mindless
  • Mini
  • Mini-125
  • Mini-132
  • Mini-195
  • Mini-207
  • Minimax
  • Minimite
  • Minsk-GH
  • Mir
  • Mirror
  • Missouri
  • Mix2
  • Moctezuma
  • Monika
  • Monkey
  • Mono
  • Monxla
  • Monxla-B
  • More
  • Mosquito
  • Mozkin
  • Mr. G
  • Mr. Vir
  • MS Antivirus
  • Msk
  • Mudd
  • Mugshot
  • Mule
  • Multi
  • Multi-11
  • Multi-2
  • Mummy
  • Munich
  • Murphy
  • Music Bug
  • Mutant
  • Mutating Interrupt
  • Mutation Engine
  • Mystic
  • NAPC
  • Navidad
  • Nazi
  • Natas
  • N-Beta
  • NCU Li
  • Necro
  • Necrophilia
  • Necrosoft
  • NED
  • New Sunday
  • Vesion 1.0.0.0
  • New-1701
  • NewBug
  • Newcom
  • Next Generation
  • Neznamy
  • Night Grawler
  • Nina
  • Nines Compliment
  • Ninja
  • No Par
  • No Wednesday
  • Nobock
  • NoCopy
  • No-Int
  • Nomenclature
  • NOP
  • Not-586
  • Nov17
  • NPox 2.0
  • NPox 2.1
  • Null
  • Number 6
  • Number of The Beast
  • nVIR
  • Nygus-KL
  • Nutty Mouse
  • Offspring
  • Off Stealth
  • Ohio
  • Omega
  • Omt
  • OneHalf
  • Ontario.1024
  • Ontario.2048
  • Ontario
  • Oropax
  • Otto-415
  • Over4032
  • Oxana
  • P1
  • P-45
  • P529
  • PA-5792
  • Page B
  • Page
  • Parite
  • Parity B
  • Payday
  • PC Cyborg
  • PC Flu
  • PCBB11
  • PCBB3072
  • PCBB5B
  • PCV
  • PE2
  • Peach
  • Peek
  • Pegg
  • Peking
  • Penis Size
  • Pentagon
  • Penza
  • Perfume
  • Phantom
  • Phoenix
  • PI
  • Pig
  • Pikachu virus
  • Ping-pong
  • Pizelun
  • PL
  • Platinum
  • PLO
  • Popular
  • Porridge
  • Poshkill
  • Possessed
  • Predator Dropper
  • Prabhagaran
  • Predator
  • Pregnant
  • Prime Evil B
  • Prime
  • Print Monster
  • Print Screen
  • Prism
  • Prob-734
  • Problem
  • Proto-T
  • Prudents
  • Quamo
  • Rabbit
  • Random
  • Rattle
  • Raubkopi
  • RavMonE.exe
  • Reaper
  • Reader_s
  • Rebo-715
  • Red Cross
  • Red Team
  • RedX
  • Reklama
  • Relzfu
  • Replicator
  • Reset
  • Revelation
  • Rigel
  • Romanian
  • Russian Tiny
  • S-847
  • Sabath
  • Sacramento
  • Saddam
  • Sadist
  • Sair
  • Sakora
  • San Diego
  • Sandra
  • Sandwich
  • Saratoga
  • Satan
  • Saturday 14th
  • Saturday
  • Sayha Waptpu
  • SBC
  • SCA
  • Schrunch
  • Scores
  • Scott's Valley
  • Scream 2
  • Screaming Fist
  • Scribble
  • Scroll
  • SCT
  • Scythe2D
  • Sdir
  • Secrets
  • Selectronics
  • Semtex
  • Sentinel
  • Sentinel-X
  • Seoul
  • Serena
  • Sergeant
  • SevenDust
  • Sh
  • Shadow
  • Shake
  • Shaman
  • Shanghai
  • Shankar's Virus
  • Shatin
  • Shiny Happy
  • Shock Therapy
  • Shoerec
  • Show Game
  • Silence
  • Silent Banker
  • Silly Willy
  • Silver Dollar
  • Silver3b
  • Simile
  • Simple 1992
  • Simulati
  • Sis
  • Sk
  • Sk1
  • Skeleton
  • Skew 469
  • Skism 808
  • Skism
  • SkyTap Gen
  • Slant
  • Slayer
  • Slovak
  • Slow
  • Sma-108a
  • Small 129
  • Small 132B
  • Small 146
  • Small 157
  • Small 178
  • Small 185
  • Small 187
  • Small
  • Small-38
  • Smily
  • Smithsonian
  • Solano
  • Something
  • Soupy
  • Sov
  • Soyun
  • Spanish April Fool
  • Spanish
  • Spanz
  • Spar
  • Sparta
  • Sp0rk3h
  • Spyer
  • SQR
  • Squawk
  • Squeaker
  • Squisher
  • SRE
  • Staf
  • Stahl Platte
  • Stealth_C
  • Stoned
  • Striker
  • Stupid
  • Subliminal
  • SubZero
  • Suicide
  • Sunday
  • Sunday-2
  • Sundevil
  • Suriv 402
  • Suriv A
  • Suriv B
  • Surrender
  • Susan
  • SVC 5.0/6.0
  • Sverdlov
  • SVir
  • Swap Boot
  • Swen - "News" spelled backwards
  • Swiss 143
  • Swiss Phoenix
  • SX
  • Sylvia
  • Sys
  • Syslock/3551
  • saplad, roberto
  • T-1
  • T4
  • T297
  • Tabulero 2
  • Taiwan
  • Taiwan3
  • Taiwan4
  • Taocheng
  • Techno
  • Tecla
  • Telecom Boot
  • Telecom File
  • Telekom
  • Teletype
  • Teletype-2
  • Tentacle
  • Terror
  • Tester
  • Tigraa
  • TMTM
  • TP
  • Tremor2
  • TridenT
  • Triple Shot
  • Troi Two
  • Tschantches
  • T-series
  • TU-482
  • Tuesday
  • Tula
  • Tumen V0.5
  • Tumen V2.0
  • Tumen
  • Turbo
  • Turkey
  • Tver
  • Twin Peaks
  • Twin-351
  • twoneight
  • Typo Boot
  • Ucender
  • Ugur
  • Undressed
  • Unk
  • Uriel
  • Uruk 300
  • Uruk 361
  • Uruk-Hai
  • USSR
  • USSR 1049
  • USSR 2144
  • USSR 256
  • USSR 257
  • USSR 3103
  • USSR 311
  • USSR 394
  • USSR-394
  • USSR 492
  • USSR 516
  • USSR 600
  • USSR 696
  • USSR 707
  • USSR 711
  • USSR 830
  • USSR 948
  • V1 0
  • V1 1
  • V1028
  • V125
  • V1463
  • V163
  • V1-Not
  • V2 0
  • V2000
  • V2100
  • V270X
  • V299
  • V2P2
  • V2P6
  • V-351
  • V-388
  • V400
  • V483
  • V5
  • V600
  • V800
  • V801
  • V82
  • V914
  • V961
  • VA
  • Vacsina
  • VCL
  • VCL-HEEvE
  • Vcomm
  • VCS
  • VDV-853
  • VHP
  • VHP-2
  • V-Label
  • VM
  • VP
  • VTS
  • VVF-34
  • Venge-E
  • Vera Cruz
  • Victor
  • Vienna/648
  • Vietnamese
  • Violator
  • Viper
  • Viperizer B
  • Viral Messiah
  • Virdem
  • Virflop
  • virus-101
  • virus-90
  • Voco
  • Vootie
  • Voronezh
  • Vote/Vote1000
  • Vriest
  • W13
  • WAVE
  • Warbiest Terminator
  • Warbiest Terminator v.2.0
  • WWT
  • Walkabout
  • Walker
  • Warez
  • Warrior 2
  • Warrior
  • Wazoo
  • WDEF
  • Weak
  • Whale
  • Wharps
  • WhoCares
  • Why win
  • Wilbur 3
  • Wild trojan
  • Wild Thing A
  • Willistrover III
  • Willow
  • Willow 2
  • WinAble
  • Windmill
  • Winvir
  • Wisconsin
  • Wizard 3.0
  • Wolfman
  • Wonder
  • Word Atom Macro
  • Word Color Macro
  • Word Concept Macro
  • Word Hot Macro
  • Wordswap
  • World Peace
  • Wsnpoem
  • X-1
  • X-2
  • X-3A
  • X-3B
  • X77
  • Xabaras
  • Xpeh
  • XTAC
  • Xuxa
  • Yale
  • Yan2505a
  • Yankee
  • Yankee - 2
  • Yap
  • Year 1993
  • Yerg
  • Youth
  • Yukon
  • Z10
  • ZK900
  • ZRK
  • ZU1
  • Zak2
  • Zaragosa
  • Zeppelin
  • Zero Bug
  • Zero Time
  • ZeroHunt
  • ZMist
  • Zoda

Or you can use the link below to go to the Wiki Page.

http://en.wikipedia.org/wiki/List_of_computer_viruses_%28all%29

How do you remove brontok virus?

Manual removal steps: Disconnect your computer from the network and disable file sharings, if any.

Disable System Restore (for Windows XP/Windows Me only).

For Windows XP:

Click Start.

Right-click My Computer, and then click Properties.

Click the System Restore tab.

Select "Turn off System Restore" or "Turn off System Restore on all drives" check box. Start your machine in Safe mode.

How to start a computer in safe mode, pls refer to: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406?OpenDocument&src=sec_doc_nam

Update your Anti-virus software with the latest signature files and scan your computer withthe Anti-virus to detect the worm and delete any files detected as the worm by clicking the DELETE button.

Delete the value from the registry.

You need to back up the registry before making any changes to it. In correct changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only.

How to make a backup of the Windows registry, pls refer at: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/199762382617?OpenDocument&src=sec_doc_nam

Click Start > Run. Type regedit Click OK.

Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. You can used a tool to resolve this problem.

Download this tool. Once downloaded, �right-click� the UnHookExec.inf file and click install. Then continue with the removal steps. http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.HTML

Other alternative way to enable registry, please refer to: http://www.patheticcockroach.com/mpam4/index.php?p=28

Navigate to the subkey that was detected by the anti-virus and delete the value.

Exit the Registry Editor.

If you are still unable to open your registry, you may try the following steps.

Boot up the infected computer, but do not login to the server, leave it at the login prompt.

Start up another clean computer, worm-free computer which has an updated anti-virus software running and an active firewall running preventing all inbound connections.

From the clean computer, start REGEDIT.EXE and click on File -> File -> Connect Network Registry. Connect to the infected computer.

Modify the following values in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\NT\CurrentVersion\Winlogon to the following values:

"Userinit" = "C:\WINNT\system32\userinit.exe," "Shell" = "Explorer.exe"

(make sure that you enter the correct path to where Windows is installed. For example on NT4.0 it is WINNT)

After completing the above steps, reboot the infected computer.

Using the clean computer, map the C$ share and scan it using the up to date anti-virus to remove any infected files on the infected computer. Then, you should be able to boot to the computer and then follow Steps 6 - Steps 11.

Run a full system scan using an updated version of Anti-virus software and delete any files detected as worm.

Download and run a process management tool or process viewer to kill all worm processes running on the infected machine. The process management tool or the process viewer is available according to the machine's platform and can be downloaded free from the internet. For example users can download and use the following process viewer: http://www.sysinternals.com/Utilities/ProcessExplorer.HTML

Delete the scheduled tasks added by the worm. Click Start, and then click Control Panel. (In Windows XP, switch to Classic View.) In the Control Panel window, double click Scheduled Tasks. Right click the task icon and select Properties from pop-up menu. The properties of the task is displayed. Delete the task if the contents of the Run text box in the task pane matches the worm.

Enable the System Restore (for Windows XP/Windows Me only).

Re-scan your computer with an updated version of Anti-virus to confirm the computer is clean.

Re-connect your computer to the network once confirmed clean.

IMPROVED ANSWER WITH LINKS TO TOOLS (SOLVED BY A SENIOR IT SYSTEMS ADMIN) BY: Ian Gardiner

Brontok Virus Manual Removal Instructions

  1. Disconnect your computer from the network and disable file sharings, if any exist on the PC.
  2. Disable System Restore (for Windows XP/Windows Me only).

For Windows XP:

  1. Click Start.
  2. Right-click My Computer, and then click Properties.
  3. Click the System Restore tab.
  4. Select Turn off System Restore or Turn off System Restore on all drives check box.
  1. Start your machine in Safe mode. Reboot and repeatedly press F8. If you cannot boot into safe mode, you should still be able to get rid of the virus, however, safe mode is recommended.
  2. Update the anti-virus software for any latest updates.
  3. You will have to use the regedit function to remove a lot of infected/newly created values in the registry.
  4. Click Start>Run. Then type regedit, click OK.
    1. You will need to use Internet Explorer to download this file.
    2. Go to http://www.symantec.com/security_response/writeup.jsp?docid=2004-050614-0532-99 and download the UnHookExec.inf file at the bottom of the page. (you will have to download this file on another PC and save it on a drive and move it over to the infected PC)
    3. Once you have put this file onto the infected PC's Desktop, Right-click the file and click Install. You won't really notice anything happen, however, this will enable the regedit function.
  5. If the registry editor fails to open, the threat may have modified the registry to prevent it from opening. You can use a tool to resolve this problem:
  6. Once you can use the regedit function check to see if there is a scheduled task named A1 or something along those lines (scheduled to run at 5:08pm) in All Programs\Accessories\System Tools\Scheduled Tasks. If you can't reach that location try: Control Pannel in classic view and look for the Scheduled Tasks icon/folder. Delete the task.
    1. The tool can also be found at: http://www.kaer-media.org/penawar-brontok/Download.htm
  7. Next, before going ahead and deleting anything in the registry. You will need to use this German Brontok Removal tool
  8. Click on the link that says: PenawarB.exe and save the file.
    1. Double click the file, click Run
    2. In the bottom right hand corner click the button that says: Percubaan Percuma!
    3. On the next screen click on the button on the left that says: Tidak mengapa, saya hendak cuba dahulu…
    4. On the next screen click the button that says: Scan sekarang!
    5. Once the tool has run it will show the location of all of the infected files
    6. Click the button that says: Buang ! & Repair to delete the infected files
    7. Note: This tool is free so when you click Repair it will delete all of the files except for 10 of them. For the remaining 10 you will have to take not of the infected files' locations and manually delete them. Also, if there are less than 10 files that are infected to begin with you will have to manually delete all of them.
  9. Once the file has been saved to the infected PC's Desktop
  10. Once this is done follow the instructions below on deleting all other files and registry values. This step is very important and crucial to the final removal of the virus!

The worm may use various methods to run automatically each time Windows starts. Automatic startup methods that the worm employs may include:

  • Placing a copy of itself in the user's startup folder, i.e. %homepath%\Start Menu\Programs\Startup\Empty.pif. Delete the file.
  • Adding a scheduled task to run %homepath%\Templates\A.kotnorB.com each day at 5:08 pm. Also check to see if there is a scheduled task named A1 or something along those lines in All Programs\Accessories\System Tools\Scheduled Tasks. If you can't reach that location try: Control Pannel in classic view and look for the Scheduled Tasks icon/folder. Delete the task.
  • Adding a registry value: "Tok-Cirrhatus"

With data:

In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Delete the key.

  • Adding registry value: "Bron-Spizaetus"

with data: <path to Win32/Brontok worm>

in subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Delete the key.

  • Adding registry value: Shell

    with data: "explorer.exe " <path to Win32/Brontok worm>

in registry subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogon. Delete the key.

  • Modifies registry value: AlternateShell

    with data: <Win32/Brontok file name>

    in registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot

    Note: the default setting for this key is "AlternateShell"="cmd.exe"

Win32/Brontok may attempt to lower security settings by making the following changes:

  • Prevents the user from accessing the Registry Editor by making the following registry edit:

Adds value: DisableRegistryTools

With data: 1

In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System. Change the Data to 0.

  • Prevents the display of files and folders with the 'hidden' attribute set:

Adds value: Hidden

With data: 0

In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.

  • Prevents the display of Windows system files:

Adds value: ShowSuperHidden

With data: 0

In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 1.

  • Prevents the display of executable file extensions:

Adds value: HideFileExt

With data: 1

In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Change the Data to 0.

  • Prevents access to the Folder Options menu:

Adds value: NoFolderOptions

With data: 1

In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Change the Data to 0.

  • Modifies the Windows HOSTS file to prevent access to certain Internet sites, the majority of which are antivirus or security-related.
  • Attempts ping attacks against certain Web sites, presumably to launch a form of denial of service (DoS) attack.
  • Terminates applications or restarts Windows when the title of the active window contains certain strings, many of which may be representative of antivirus or system tools that might ordinarily be used to detect or remove the worm.
  • Overwrites the autoexec.bat file with the word "pause", causing systems that employ the autoexec.bat file to pause on bootup. Some variants of Win32/Brontok may modify the autoexec.bat in order to display a message during bootup.
  1. You will also want to go into msconfig. Start>Run, type msconfig. And disable any startup items (under the startup tab) that look suspicious; you may have to run an internet search to determine which are normal processes and which may be a threat.
    1. make sure the scheduled task is no longer there
    2. make sure you can open regedit
    3. re-run the scanner for any infected files. If it finds anything delete them, restart the PC, and then re-run the scanner and delete files until nothing shows up again.
    4. Make sure the registry is back to normal and that you can view hidden files and folders.
  2. Once this has been done, restart the PC, and check over everything in the following order:

How to control computer virus?

1st Option : You can install the AVG Anti-Virus Free Edition (Year)

It Will Tell You Whether You Have A Virus.

2nd Option: Is That You Can Restart Your WHOLE Computer

3rd Option : You can Have Advice from somebody that studies or works in technical Work ... He/She Might Be Able to help YOU and Your COMPUTER .

4th Option : If you are really tired of dealing with it you should ask in the computer how to RESTART the whole computer if you need help.

I Hope I Helped !

Will speekonia give my computer a virus?

Speekonia does not give your computer a virus and it is designed in a way that will not give your computer any malware.

When i open Sxe Injected it says load error try again it keeps doing that help?

theres a virus in the computer please reinstall your sxe or scan the whole PC

How do you stop security tools from popping up on your screen every 2 mins and Can you restore the computer to an earlier date before singing into windows. i have a toshiba satellite L500 windows 7?

This sounds like a virus that i have had about 4 times. im sorry to say this is a huge pain in the a$$. find out what the name of the tool(s) it is trying to have you install (and usually buy) go to another computer and google the name, you will find instructions on how to uninstall it. My advice is while you are searching keep that computer turned off or at minimum unplug it from the internet so the virus cannot spread.

How can you get rid of computer viruses for free?

You need to run these 4 essential steps to remove all the spyware on your computer.

1. Run Malwarebytes Anti-Malware

2. Run the anti spyware removal programs spybot

3 Run Superantispyware

4. Run a complete scan with free curing utility Dr.Web CureIt!

Install ThreatFire

ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.

Install a good antivirus in your computer.

Keep your antivirus updated. If automatic updates are available, configure your antivirus to use them.

Keep your permanent antivirus protection enabled at all times.

How can a computer virus affect your CPU?

Viruses affect your computer's CPU by consuming both CPU time and resources. A virus is just like any other program: it needs dedication from the CPU to properly execute. This can cause the CPU to slow down significantly if your computer is infested with viruses, since the computer cannot respond to each and every process in a timely manner. There is also such thing as a "CPU virus". These viruses infect and damage the actual hardware of a computer. Since it is damaging the hardware of a computer rather than the software, the restoration afterwards can be pricey and there can be little to do to stop the virus from destroying your computer.

What parts of a computer do viruses infect?

Their are many parts of a computer that viruses infect. Most viruses infect a certain file or program so that whenever that file is run, the virus is also executed.

Some viruses called Master Boot Record viruses infect the Master Boot Record of your computer. The Master Boot Record is the partition of your computer first executed when you boot up your computer. When you turn on your computer, it runs all the programs inside the Master Boot Record partition and then passes control to other child processes. Viruses in this class infect the Master Boot Record so that whenever your turn on your computer, the viruses runs at startup too. These viruses are very tricky to find as they hide in a very deep part of your Operating System and manually deleting them could damage your computer.

Can a virus auto-fill computers browsing history?

Yes, virus can change anything on your computer!! So be careful.

What is ieuser exe?

an item for internet explorer

-------------------------------------------------------------------------

Ieuser.exe is located in the folder C:\Program Files\Internet Explorer\. When you start Internet Explorer, it will first launch IEUser.exe, which sets the security settings of Internet Explorer to the medium level. When Internet Explorer requires administrative privileges (such as to install an ActiveX control), the Admin Broker IEInstall.exe is used (which runs at high security). ieuser.exe is a Internet Explorer from Microsoft Corporation belonging to Microsoft® Windows® Operating System . ieuser.exe is launched before starting Internet Explorer and sets the security settings of the medium level. When administrative privileges are required in Internet Explorer (e.g. install an ActiveX), IEInstall.exe is used.

ieuser.exe error is classified by PC experts to be one of the most severe system errors for it is commonly caused by ieuser.exe process issues. ieuser.exe serves as a critical system component which is designed to enable functionality combined in associated shared .dll files for they can't be enable themselves directly and enable them running smoothly, in order to keep the system operating stably.

In addition, ieuser.exe can be utilized by hazardous parasites as a hidden utility to gain remote access to compromised PC, for the purpose of gaining users' personal or commercial information. The information contains identity details, email information, online behaviors and login credentials to credit card and online bank account.

Who has the best computer virus software?

The best answer is to go to Consumer Reports Magazine and look up the answer. They did a recent look and comparison of the various anti virus software. There are many excellent anti virus, but, no system is perfect. There are some very good anti virus software that is free. You might also go to CNET .com and look at what they say in their reviews of down loaded anti virus software. That's Consumer Reports Magazine, and CNET.com. Both can give you a very detailed answer to your question. Just because a product is free does not mean it's bad.

Kingsoft Free Antivirus is the "very powerful antivirus", i have used before.i have tested most av programs but for me this one is clearly the best we will be friends for a very long time i think^^

i recommend u to install an anti-virus software which is free for our user

Source(s):

http://www.kingsoftsecurity.com/kingsoft…

If my computer gets a virus can i buy a new hard drive and not worry about the virus and were do the virus go when you get one?

The virus is on the hard drive so if you get a new hard drive the virus will be gone. A cheaper option would be to just reinstall the operating system though. (Vista, Win 7)

How do you remove autorun.inf on PSP?

1) get an anti virus for the handheld

The know virus right now for psp is Trojan.PSPBrick

You need to supply more information how you get the virus, why do you suspect you have a virus on your psp

How do you remove silicon.exe virus?

we can remove it through registered norton antivirus & macfee antivirus. thank you

How do you remove the virus where on msn it sends a audio helloooo to whoever you talk to?

there are a couple of ways you can remove a virus. first is to go to msn home page, know what system your machine is using to operate, i.e windows xp, 2000 etc. they have ssome fixes on their web site at microsoftwindows.com or google your question and you will intendated with all sorts of software. some is free, most cost, but it may be worth it for furture attacks from most virus' good luck.

Does redtubecom give viruses?

yes you do redtube.com had so many viruses on it it crashed my laptop