Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

HOw can you remove virus.wins32.virut.n

Discussion in 'Tech, Gadgets & Science Forum' started by Gembe, Apr 30, 2008.

  1. Gembe

    Gembe JF-Expert Member

    #1
    Apr 30, 2008
    Joined: Sep 25, 2007
    Messages: 2,506
    Likes Received: 8
    Trophy Points: 135
    Wakuu

    how can you remove virus.win32.virut.n?
     
  2. R

    Rena New Member

    #2
    Apr 30, 2008
    Joined: Apr 25, 2008
    Messages: 3
    Likes Received: 0
    Trophy Points: 0
    You can first scan your computer with an unt-virust use in your pc, and if could not respond or not memoved , see the reporting properties,>>if not also you need to do the following:-
    a) shut down your computer,
    b) scan your pc with unt virus cd
    c) if could not auto appear
    d) click start button and the
    e) click on "run" or command prompt
    f) now you can run your cd by scaning your computer using command promt if you're interested with command language
    eg \:,,
    we know the trojan,virt and worm unt virus always could not be removed completely by scanning only , we actually remove the using command way. AVAST unt virus protection could be the solution and offer many options
     
  3. Gembe

    Gembe JF-Expert Member

    #3
    Apr 30, 2008
    Joined: Sep 25, 2007
    Messages: 2,506
    Likes Received: 8
    Trophy Points: 135
    how can i scan after shutting down th PC??
     
  4. R

    Rena New Member

    #4
    Apr 30, 2008
    Joined: Apr 25, 2008
    Messages: 3
    Likes Received: 0
    Trophy Points: 0
    Rena has reported a post.

    Reason:
    Post: HOw can you remove virus.wins32.virut.n
    Forum: Hoja mchanganyiko (Miscellaneous)
    Assigned Moderators: N/A

    Posted by: Rena
    Original Content:
     
  5. R

    Rena New Member

    #5
    Apr 30, 2008
    Joined: Apr 25, 2008
    Messages: 3
    Likes Received: 0
    Trophy Points: 0
    how to scan after shutting down the pc?

    >> you start again your pc (switch on) without removing the CD unt virus soft ware
    >> wait the an o/s to be complite
    >> there after click on start button >>run>> if is win xp type the word "cmd" on the dialogbox provided >> the click ok
    >> an system. exe ( command prompt will appear now you can begin scan so that to remove them direct
    >>> when ready restart your computer using command promt,
    >> and scan again in normal way eg right click on your unt virus icon and select scan so that to see if the virus is completly removed
    >> before update you need also check the report about home many files scanned>> how many virus removed>> what renamed>> what not removed.etc doing so you will knowing where the problem are<
     
  6. Gembe

    Gembe JF-Expert Member

    #6
    Apr 30, 2008
    Joined: Sep 25, 2007
    Messages: 2,506
    Likes Received: 8
    Trophy Points: 135
    use Kaspersky Version 7
     
  7. Steve Dii

    Steve Dii JF-Expert Member

    #7
    Apr 30, 2008
    Joined: Jun 25, 2007
    Messages: 6,414
    Likes Received: 40
    Trophy Points: 145
    Gembe, as i'm yet to be a victim of this virus, my search on the net regarding the description and solution of the virus is as below:

    (My ACKNOWLEDGEMENT: TREND MICRO website)

    Gembe, as you might using a different anti virus program, i still hope that you will be able to follow the instructions given by trend micro and modify it them to suit your situation.

    Malware Overview:

    This file infector arrives on a system as a downloaded or dropped file of other malware. It may also arrive attached to spammed email messages.


    It infects executed files that have .EXE and .SCR as file name extensions. It checks if the target files are in PE format before infecting it. It uses several types of infection techniques. Execution of the infected files perpetuates this virus' infection cycle. All infected files are also detected by Trend Micro as PE_VIRUT.L.


    It avoids files with certain strings in their file names. It also ensures that only one instance of itself is running on the affected system's memory. These actions help prevent its immediate detection and consequent removal from an infected system.
    This file infector listens to various ports and connects to an Internet Relay Chat (IRC) server where it joins a certain channel. Once connected, it allows a remote user to download and execute files on the affected system, effectively compromising the affected system's security as executed files may be malicious.

    Description:

    This file infector arrives as an attachment to email messages mass-mailed by another malware or a malicious user. It may be downloaded from remote sites by other malware.
    It infects files of certain types. It does not infect files that contain certain strings in their file names.
    It creates mutex(es) to ensure that only one instance of itself is running in memory.

    Depending on your Virus Scanner, the following are its Aliases:

    Virus.Win32.Virut.n (Kaspersky), W32/Virut.gen (McAfee), W32.Virut!gen (Symantec), W32/Virut.I (Avira), W32/Vetor-D (Sophos),


    Solution:

    Identifying the Malware Program
    To remove this malware, first identify the malware program.
    1. Scan your computer with your Trend Micro antivirus product.
    2. NOTE the path and file name of all files detected as PE_VIRUT.XB.(and indeed any other alias; pls see further down highlighted in blue)
    Trend Micro customers need to download the latest virus pattern file before scanning their computer. Other users can use Housecall, the Trend Micro online virus scanner.
    Terminating the Malware Program
    This procedure terminates the running malware process. You will need the name(s) of the file(s) detected earlier.
    If the process you are looking for is not in the list displayed by Task Manager, proceed to the succeeding solution set.
    1. Open Windows Task Manager.
      &#8226; On Windows 98 and ME, press
      CTRL+ALT+DELETE
      &#8226; On Windows NT, 2000, XP, and Server 2003, press
      CTRL+SHIFT+ESC, then click the Processes tab.
    2. In the list of running programs*, locate the malware file(s) detected earlier.
    3. Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your computer.
    4. Do the same for all detected malware files in the list of running processes.
    5. To check if the malware process has been terminated, close Task Manager, and then open it again.
    6. Close Task Manager.
    *NOTE: On computers running Windows 98 and ME, Windows Task Manager may not show certain processes. You can use a third party process viewer such as Process Explorer to terminate the malware process.

    On computers running all Windows platforms, if the process you are looking for is not in the list displayed by Task Manager or Process Explorer, continue with the next solution procedure, noting additional instructions. If the malware process is in the list displayed by either Task Manager or Process Explorer, but you are unable to terminate it, restart your computer in safe mode.


    Important Windows ME/XP Cleaning Instructions
    Users running Windows ME and XP must disable System Restore to allow full scanning of infected computers.


    Users running other Windows versions can proceed with the succeeding solution set(s).


    Running Trend Micro Antivirus

    If you are currently running in safe mode, please restart your computer normally before performing the following solution.


    Scan your computer with Trend Micro antivirus and clean files detected as PE_VIRUT.XB. To do this, Trend Micro customers must download the latest virus pattern file and scan their computer. Other Internet users can use HouseCall, the Trend Micro online virus scanner.




    More about this virus from Trend Micro:

    Virus.Win32.Virut.n = PE_VIRUT.L; PE_VIRUT.K-O; PE_VIRUT.DD-O; PE_VIRUT.XL; PE_VIRUT.XA; PE_VIRUT.XB


    To get a one-glance comprehensive view of the behavior of this malware, refer to the Behavior Diagram shown below. (Image Ref: Trendmicro.com)

    [​IMG]


    Gembe, I hope you manage to sort out your computer problem.
    My advice to everyone, please take time and revisit the following thread: http://www.jamboforums.com/showthread.php?t=616. Problems, solutions and other similar issues have already been discussed.

    SteveD.
     
Loading...