Enter your Keyword, Search here,

Manual Removal of W32/AutoIt.S Worm

Manual Removal of W32/AutoIt.S Worm
W32/AutoIt.S is a worm. The worm will infect Windows systems.
This Worm Copies its files to Windows\System Folder as hidden files.
This worm information updated on April 21, 2009.
Other names of W32/AutoIt.S Worm:
This worm is also known as Worm.Win32.AutoIt.s, Worm:AutoIt/Sohanad.CL, W32.SillyFDC.

Damage Level : Medium/High
Distribution Level:
Medium
W32/AutoIt.S Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/AutoIt.S Worm Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\regsvr.exe
  • %Windows\System\rundll.exe
  • %Windows\System\COMCTL32.OCX
  • %Windows\System\ijl11pro.dll
  • %Windows\System\MSINET.OCX
  • %Windows\System\regsvr.exe
  • %Windows\System\winhelp.exe'
  • %Windows\System\setup.ini
  • %Windows\Tasks\At1.job
  • %Windows\Tasks\At2.job
  • %Windows\Tasks\At3.job
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/AutoIt.S Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/AutoIt.S Worm modifies registry at the following locations to ensure its automatic execution at every system startup:
Delete The Entries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Delete - NofolderOptions = 0x00000000
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
Delete - DisableTaskMgr = 0x00000000
Delete - DisableRegistryTools = 0x00000001
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Delete - Yahoo Messengger = "%System%\regsvr.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Delete - Shell = "Explorer.exe rundll.exe"
Delete - System = "Winhelp.exe"

Delete file entries from right side
Search Registry For W32/AutoIt.S Worm File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/AutoIt.K Trojan

Manual Removal of W32/AutoIt.K Trojan
W32/AutoIt.K is a trojan. The trojan will infect Windows systems.
This Worm Copies its files to Windows Folder as hidden files.
This trojan information updated on April 20, 2009.
Other names of W32/AutoIt.K Trojan:
This trojan is also known as W32.SillyFDC, Trojan-Dropper.Win32.Autoit.k.

Damage Level : Medium/High
Distribution Level:
Medium
Removal Tool for W32/AutoIt.K Trojan
W32/AutoIt.K Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/AutoIt.K Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Documents and Settings\Default User\Local Settings\Application Data\Microsoft\CD Burning\KHATRA.exe
  • %Documents and Settings\Default User\Local Settings\Application Data\Microsoft\CD Burning\Autoplay.inF
  • %Documents and Settings\Default User\Local Settings\Application Data\Microsoft\CD Burning\Default User.exe
  • %Documents and Settings\Default User\Local Settings\Application Data\Microsoft\CD Burning\New Folder(3).exe
  • %Windows\Xplorer.exe
  • %Windows\KHATARNAKH.exe
  • %Windows\System32\KHATRA.exe
  • %Windows\System\gHost.exe
  • %Windows\inf\Autoplay.inF
  • %Windows\Tasks\At1.job
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/AutoIt.K Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/AutoIt.K Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:
Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
Delete file entries from right side
Search Registry For W32/AutoIt.K Trojan File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Mytob.GGE Worm

Manual Removal of W32/Mytob.GGE Worm
W32/Mytob.GGE is a worm. The worm will infect Windows systems.
This Worm Copies its files to Windows Folder as hidden files.
This worm information updated on April 18, 2009.
Other names of W32/Mytob.GGE Worm:
This worm is also known as Net-Worm.Win32.Mytob.gge, TROJ_DELF.NZO.

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Mytob.GGE Worm
More Information on Wintask.exe from Symantec

W32/Mytob.GGE Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Mytob.GGE Worm Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\wintask.exe
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Mytob.GGE Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Mytob.GGE Worm modifies registry at the following locations to ensure its automatic execution at every system startup:
Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Delete file entry from right side
Search Registry For W32/Mytob.GGE Worm File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/AutoRun.EPN Worm

Manual Removal of W32/AutoRun.EPN Worm
W32/AutoRun.EPN is a worm. The worm will infect Windows systems.
This Worm Copies its files to Windows\System Folder as hidden files.
This worm information updated on April 17, 2009.
Other names of W32/AutoRun.EPN Worm:
This worm is also known as PSW.OnlineGames_r.G, Worm.Win32.AutoRun.epn, Worm:Win32/Taterf.B.

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/AutoRun.EPN Worm
W32/AutoRun.EPN Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/AutoRun.EPN Worm Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\System\ckvo.exe
  • %Windows\System\ckvo0.dll
  • %Windows\System\olhrwef.exe
  • %Windows\System\nmdfgds0.dll
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/AutoRun.EPN Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/AutoRun.EPN Worm modifies registry at the following locations to ensure its automatic execution at every system startup:
Delete The Entries
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Explorer
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run

Delete file entry from right side
Search Registry For W32/AutoRun.EPN Worm File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

More Posts that you may be interested...