[Virus] Endommage les logiciels
franckyll
-
don vincenzoo -
don vincenzoo -
Salut a tous,Voila je post sur ce forum, car j'ai récemment été infecté d'un virus ( dont je ne connais pas l'origine).Ce virus Endommage certaines applications, comme NERO,Ewio anti-malware,Hitman Pro etc... Cela est assez embarassant.tant donné que je ne peut pas me débarasser de ce virus, je vous joint un rapport de Hijackthis! :
Logfile of HijackThis v1.99.1
Scan saved at 18:45:21, on 09/06/2006
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)
Running processes:
H:\WINDOWS\System32\smss.exe
H:\WINDOWS\system32\winlogon.exe
H:\WINDOWS\system32\services.exe
H:\WINDOWS\system32\lsass.exe
H:\WINDOWS\System32\Ati2evxx.exe
H:\WINDOWS\system32\svchost.exe
H:\WINDOWS\System32\svchost.exe
H:\WINDOWS\system32\spoolsv.exe
H:\WINDOWS\system32\Ati2evxx.exe
H:\WINDOWS\Explorer.EXE
C:\Program Files\MessengerPlus! 3\MsgPlus.exe
H:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
H:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
H:\Program Files\Outlook Express\wmsimn.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4ss.exe
C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4gui.exe
C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4gui.exe
C:\Program Files\Teamspeak2_RC2\TeamSpeak.exe
C:\Program Files\Steam\steam.exe
H:\WINDOWS\System32\taskmgr.exe
C:\Program Files\Hitman Pro\hitmanpro2.exe
H:\Program Files\Internet Explorer\iexplore.exe
H:\Documents and Settings\Fr@nckyll\Local Settings\Temporary Internet Files\Content.IE5\CT8PS383\HijackThis[2].exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
F2 - REG:system.ini: UserInit=H:\WINDOWS\System32\userinit.exe,H:\WINDOWS\winsock\csrss.exe
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - h:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - H:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: TextAloud - {F053C368-5458-45B2-9B4D-D8914BDDDBFF} - C:\PROGRA~1\TEXTAL~1\TAForIE.dll
O4 - HKLM\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] H:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [TkBellExe] "H:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] H:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
O4 - HKCU\..\Run: [Steam] "c:\program files\steam\steam.exe" -silent
O8 - Extra context menu item: &Traduire à partir de l'anglais - res://H:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Pages liées - res://H:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Pages similaires - res://H:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Recherche &Google - res://H:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Version de la page actuelle disponible dans le cache Google - res://H:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - H:\Program Files\Java\jre1.5.0_03\bin\npjpi150_03.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - H:\Program Files\Java\jre1.5.0_03\bin\npjpi150_03.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: @H:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - H:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: @H:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - H:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://software-dl.real.com/1639cfa6571f3c0fbe05/netzip/RdxIE601_fr.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site....
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O20 - AppInit_DLLs: H:\WINDOWS\System32\wmfhotfix.dll H:\WINDOWS\System32\cmd.dll
O20 - Winlogon Notify: WRNotifier - H:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - H:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - H:\WINDOWS\system32\ati2sgag.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: Sunbelt Kerio Personal Firewall 4 (KPF4) - Sunbelt Software - C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4ss.exe
O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Windows TCP/IP Socket Driver (winsck) - Unknown owner - H:\WINDOWS\winsock\csrss.exe (file missing)
Merci a tous
++
Logfile of HijackThis v1.99.1
Scan saved at 18:45:21, on 09/06/2006
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)
Running processes:
H:\WINDOWS\System32\smss.exe
H:\WINDOWS\system32\winlogon.exe
H:\WINDOWS\system32\services.exe
H:\WINDOWS\system32\lsass.exe
H:\WINDOWS\System32\Ati2evxx.exe
H:\WINDOWS\system32\svchost.exe
H:\WINDOWS\System32\svchost.exe
H:\WINDOWS\system32\spoolsv.exe
H:\WINDOWS\system32\Ati2evxx.exe
H:\WINDOWS\Explorer.EXE
C:\Program Files\MessengerPlus! 3\MsgPlus.exe
H:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
H:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
H:\Program Files\Outlook Express\wmsimn.exe
C:\Program Files\ewido anti-malware\ewidoctrl.exe
C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4ss.exe
C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4gui.exe
C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4gui.exe
C:\Program Files\Teamspeak2_RC2\TeamSpeak.exe
C:\Program Files\Steam\steam.exe
H:\WINDOWS\System32\taskmgr.exe
C:\Program Files\Hitman Pro\hitmanpro2.exe
H:\Program Files\Internet Explorer\iexplore.exe
H:\Documents and Settings\Fr@nckyll\Local Settings\Temporary Internet Files\Content.IE5\CT8PS383\HijackThis[2].exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
F2 - REG:system.ini: UserInit=H:\WINDOWS\System32\userinit.exe,H:\WINDOWS\winsock\csrss.exe
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - h:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - H:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: TextAloud - {F053C368-5458-45B2-9B4D-D8914BDDDBFF} - C:\PROGRA~1\TEXTAL~1\TAForIE.dll
O4 - HKLM\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] H:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [TkBellExe] "H:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] H:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
O4 - HKCU\..\Run: [Steam] "c:\program files\steam\steam.exe" -silent
O8 - Extra context menu item: &Traduire à partir de l'anglais - res://H:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Pages liées - res://H:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Pages similaires - res://H:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Recherche &Google - res://H:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Version de la page actuelle disponible dans le cache Google - res://H:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - H:\Program Files\Java\jre1.5.0_03\bin\npjpi150_03.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - H:\Program Files\Java\jre1.5.0_03\bin\npjpi150_03.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll
O9 - Extra button: @H:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - H:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: @H:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - H:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://software-dl.real.com/1639cfa6571f3c0fbe05/netzip/RdxIE601_fr.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site....
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O20 - AppInit_DLLs: H:\WINDOWS\System32\wmfhotfix.dll H:\WINDOWS\System32\cmd.dll
O20 - Winlogon Notify: WRNotifier - H:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - H:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - H:\WINDOWS\system32\ati2sgag.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
O23 - Service: Sunbelt Kerio Personal Firewall 4 (KPF4) - Sunbelt Software - C:\Program Files\Kerio Personal Firewall\Personal Firewall\kpf4ss.exe
O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - C:\Program Files\Spyware Doctor\sdhelp.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
O23 - Service: Windows TCP/IP Socket Driver (winsck) - Unknown owner - H:\WINDOWS\winsock\csrss.exe (file missing)
Merci a tous
++
A voir également:
- [Virus] Endommage les logiciels
- Logiciels sauvegarde - Guide
- Virus mcafee - Accueil - Piratage
- Reparer fichier word endommagé - Guide
- Virus facebook demande d'amis - Accueil - Facebook
- Télécharger logiciels gratuits pour pc - Télécharger - Montage photo
24 réponses
Par contre, j'ai un problème avec AVAST!
Apres le 1er reboot ( pour finaliser l'installation) Avast! me signale plusieurs warning :
-Avast! detected unauthorized modification of this program file ( C:\Program Files\Avast4\ashMaisv.exe) Continuing can be Dangerous. Run the program anyway ?
-Avast! detected unauthorized modification of this program file ( C:\Program Files\Avast4\ashWebsv.exe) Continuing can be Dangerous. Run the program anyway ?
J'ai compris ce que veulent dire ces warning mais je n'ose pas continuer ( pour pas me prendre encore plus de virus, a mon avis)
Il y'a aussi Ewido qui n'arrete pas de prendre des mise a jour ( surement pour tenter de réparer le log , car il dit qu'il est endommagé et qu'une mise a jour permettrai de le récuperer)
Donc voila je suis a bout la, qu'est ce qu'il faut que je fasse ?
Merci
Apres le 1er reboot ( pour finaliser l'installation) Avast! me signale plusieurs warning :
-Avast! detected unauthorized modification of this program file ( C:\Program Files\Avast4\ashMaisv.exe) Continuing can be Dangerous. Run the program anyway ?
-Avast! detected unauthorized modification of this program file ( C:\Program Files\Avast4\ashWebsv.exe) Continuing can be Dangerous. Run the program anyway ?
J'ai compris ce que veulent dire ces warning mais je n'ose pas continuer ( pour pas me prendre encore plus de virus, a mon avis)
Il y'a aussi Ewido qui n'arrete pas de prendre des mise a jour ( surement pour tenter de réparer le log , car il dit qu'il est endommagé et qu'une mise a jour permettrai de le récuperer)
Donc voila je suis a bout la, qu'est ce qu'il faut que je fasse ?
Merci
salut !!!
je pense avoir trouver des solutions car g le meme probleme !
ce virus m'a pourri avg anti virus ! puis apres m'etre rappatrié sur avast de nouveau plantage de l'antivirus !
donc j'etais infecté par Looktome. Suit cette procédure je te prie :
Télécharge L2MRemover.zip : http://www.simplytech.it/L2MRemover/L2MRemover.zip
Dézippe le, installe l'exécutable dans C:\Program Files\Look2meRemover
Supprime le Système de restauration :
http://www.libellules.ch/desactiver_restauration.php
Citation:
1. Clique sur L2MRemover.exe, pour lancer le programme.
2. Clique sur "About" > "Check for updates..." dans le menu du programme pour le mettre a jour.
3. Clique sur "Scan" et attendre que le scan complet soit fait.
4. Clique sur "Delete Keys" Boutton, pour nettoyer la base de registre.
Si tu n'es pas sûr, tu peux cocher "Save before delete"
pour avoir une sauvegarde des clés supprimées ; ceci créera un fichier .reg)
Citation:
Note :
Si tu as un message d'erreur qui dit qu'il te faut le fichier Msinet.ocx ou Comctl32.ocx :
Télécharge DLLs.zip et extrais les (en suivant les instructions du fichier ReadMe.txt), ou simplement télécharge Look2Me Remover Setup Kit
Plus d'information sur Look2Me Remover V.1.0.0
Remettre le Système de restauration :
http://www.libellules.ch/desactiver_restauration.php
Merci à SimplyTech, le concepteur de ce programme
puis va sur ce lien pour detruire win32/virut car c'est ca qui fout la merde !!!!
http://www.grisoft.com/doc/52/ww/crp/0/ndi/67762
voila apres refait des scans complets avec differents logiciels et tout sera ok !!!
je pense avoir trouver des solutions car g le meme probleme !
ce virus m'a pourri avg anti virus ! puis apres m'etre rappatrié sur avast de nouveau plantage de l'antivirus !
donc j'etais infecté par Looktome. Suit cette procédure je te prie :
Télécharge L2MRemover.zip : http://www.simplytech.it/L2MRemover/L2MRemover.zip
Dézippe le, installe l'exécutable dans C:\Program Files\Look2meRemover
Supprime le Système de restauration :
http://www.libellules.ch/desactiver_restauration.php
Citation:
1. Clique sur L2MRemover.exe, pour lancer le programme.
2. Clique sur "About" > "Check for updates..." dans le menu du programme pour le mettre a jour.
3. Clique sur "Scan" et attendre que le scan complet soit fait.
4. Clique sur "Delete Keys" Boutton, pour nettoyer la base de registre.
Si tu n'es pas sûr, tu peux cocher "Save before delete"
pour avoir une sauvegarde des clés supprimées ; ceci créera un fichier .reg)
Citation:
Note :
Si tu as un message d'erreur qui dit qu'il te faut le fichier Msinet.ocx ou Comctl32.ocx :
Télécharge DLLs.zip et extrais les (en suivant les instructions du fichier ReadMe.txt), ou simplement télécharge Look2Me Remover Setup Kit
Plus d'information sur Look2Me Remover V.1.0.0
Remettre le Système de restauration :
http://www.libellules.ch/desactiver_restauration.php
Merci à SimplyTech, le concepteur de ce programme
puis va sur ce lien pour detruire win32/virut car c'est ca qui fout la merde !!!!
http://www.grisoft.com/doc/52/ww/crp/0/ndi/67762
voila apres refait des scans complets avec differents logiciels et tout sera ok !!!
et voila les infos sur ce virus et pourquopi il n'est pas detecté !!!!
merci grisoft!
nfector:
polymorphic
Names,aliases:
Win32/Virut.D (AhnLab-V3), W32/Virut.E (AntiVir), Win32.Virtob.2.Gen (BitDefender), W32.Virut.ci (ClamAV), Win32.Virut.5 (DrWeb), W32/Virut.E (Fortinet), Virus.Win32.Virut.e (F-Secure), Virus.Win32.Virut.d (Ikarus), Virus.Win32.Virut.e (Kaspersky), W32/Virut (McAfee), Virus:Win32/Virut.D (Microsoft), Win32/Virut (NOD32v2), W32/Virutas.G (Panda), W32/Vetor-A (Sophos), W32.Virut.B (Symantec), Win32.Virut.Gen (VirusBuster), Win32.Virut.E (Webwasher-Gateway)
Behavior:
Parasitic file infector of PE files with .EXE extension.
Acts like an IRC bot, communicating on TCP port 65520, it opens channel #virtu on the proxim.ircgalaxy.pl IRC server.
Its first step upon running is injecting the process (winlogon.exe), for this reason firewalls will not identify the virus. The virus will infect files on local and shared drives. It does not depend on usage of these files.
Infected files are approx. 9kB longer, and will not keep the original timestamp, (the timestamp will change to the time when the virus was written into the file).
The virus is activated in the "classical" way:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Note: the name of the infected file can be variable. It selects a name from the infected files in the folder %SystemRoot%\system32.
It doesn't use any stealth or rootkit techniques for hiding infected files. It uses process injection technology, which provides good camouflage.
There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus.
Remover:
Usage:
Rmvirut (check and repair all accessible disk drives)
Rmvirut C: (check and repair the entire C drive)
Rmvirut C: D: (check and repair the C a D drives)
Rmvirut C:\Windows (check and repair files in the C:\Windows folder)
Rmvirut C:\Windows\explorer.exe (check and repair C:\Windows\explorer.exe)
Remover features:
- if AVG is installed, it correctly registers itself in the resident shield to avoid collision with it.
- If it detects a locked file (unable to open), the remover arranges removal for immediately after booting the computer - when system files are not yet locked.
- Files RMVIRUS.DOS and Rmvirus32.nt are part of the remover for repairing before booting Windows 98 or Windows 2000
- You must have administrator privileges to run the remover, the remover tests this at the beginning.
- Repaired files are usually different to the originals, but they are working.
- Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.
merci grisoft!
nfector:
polymorphic
Names,aliases:
Win32/Virut.D (AhnLab-V3), W32/Virut.E (AntiVir), Win32.Virtob.2.Gen (BitDefender), W32.Virut.ci (ClamAV), Win32.Virut.5 (DrWeb), W32/Virut.E (Fortinet), Virus.Win32.Virut.e (F-Secure), Virus.Win32.Virut.d (Ikarus), Virus.Win32.Virut.e (Kaspersky), W32/Virut (McAfee), Virus:Win32/Virut.D (Microsoft), Win32/Virut (NOD32v2), W32/Virutas.G (Panda), W32/Vetor-A (Sophos), W32.Virut.B (Symantec), Win32.Virut.Gen (VirusBuster), Win32.Virut.E (Webwasher-Gateway)
Behavior:
Parasitic file infector of PE files with .EXE extension.
Acts like an IRC bot, communicating on TCP port 65520, it opens channel #virtu on the proxim.ircgalaxy.pl IRC server.
Its first step upon running is injecting the process (winlogon.exe), for this reason firewalls will not identify the virus. The virus will infect files on local and shared drives. It does not depend on usage of these files.
Infected files are approx. 9kB longer, and will not keep the original timestamp, (the timestamp will change to the time when the virus was written into the file).
The virus is activated in the "classical" way:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Note: the name of the infected file can be variable. It selects a name from the infected files in the folder %SystemRoot%\system32.
It doesn't use any stealth or rootkit techniques for hiding infected files. It uses process injection technology, which provides good camouflage.
There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus.
Remover:
Usage:
Rmvirut (check and repair all accessible disk drives)
Rmvirut C: (check and repair the entire C drive)
Rmvirut C: D: (check and repair the C a D drives)
Rmvirut C:\Windows (check and repair files in the C:\Windows folder)
Rmvirut C:\Windows\explorer.exe (check and repair C:\Windows\explorer.exe)
Remover features:
- if AVG is installed, it correctly registers itself in the resident shield to avoid collision with it.
- If it detects a locked file (unable to open), the remover arranges removal for immediately after booting the computer - when system files are not yet locked.
- Files RMVIRUS.DOS and Rmvirus32.nt are part of the remover for repairing before booting Windows 98 or Windows 2000
- You must have administrator privileges to run the remover, the remover tests this at the beginning.
- Repaired files are usually different to the originals, but they are working.
- Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.