You can first scan your computer with an unt-virust use in your pc, and if could not respond or not memoved , see the reporting properties,>>if not also you need to do the following:-
a) shut down your computer,
b) scan your pc with unt virus cd
c) if could not auto appear
d) click start button and the
e) click on "run" or command prompt
f) now you can run your cd by scaning your computer using command promt if you're interested with command language
eg \:,,
we know the trojan,virt and worm unt virus always could not be removed completely by scanning only , we actually remove the using command way. AVAST unt virus protection could be the solution and offer many options
Post: HOw can you remove virus.wins32.virut.nopening image card ,un known attachment can be contained some of unt virus which could damage your computer system, to solve the problem is to delete them, if possible spam the unknown URL sender
You can first scan your computer with an unt-virust use in your pc, and if could not respond or not memoved , see the reporting properties,>>if not also you need to do the following:-
a) shut down your computer,
b) scan your pc with unt virus cd
c) if could not auto appear
d) click start button and the
e) click on "run" or command prompt
f) now you can run your cd by scaning your computer using command promt if you're interested with command language
eg \:,,
we know the trojan,virt and worm unt virus always could not be removed completely by scanning only , we actually remove the using command way. AVAST unt virus protection could be the solution and offer many options
Gembe, as i'm yet to be a victim of this virus, my search on the net regarding the description and solution of the virus is as below:Wakuu
how can you remove virus.win32.virut.n?
More about this virus from Trend Micro:Details:
This file infector arrives as an attachment to email messages mass-mailed by another malware or a malicious user.
It may be downloaded from remote site(s) by other malware.
It infects files of the following type(s):It uses any of the following types of infection techniques:
- EXE
- SCR
Infected files are also detected by Trend Micro as PE_VIRUT.XB.
- Appending
- Cavity
- Entry Point Obscuring (EPO)
It does not infect files that contain the following strings in their file names:It creates the following mutex(es) to ensure that only one instance of itself is running in memory:
- WC32
- WCUN
- WINC
- PSTO
This file infector listens to various ports and connects to an Internet Relay Chat (IRC) server where it joins a certain channel. Once connected, it allows a remote user to download and execute files on the affected system. This routine effectively compromises the affected system's security.
- VT_3
Backdoor Capabilities
This file infector connects to the IRC server(s) ircd.zief.pl.
This file infector runs on Windows 98, ME, NT, 2000, XP, and Server 2003.
Analysis By: Benson Sy; Luis Antonio P. Magisa; John Ortiz Luis