Manual Removal of W32/AutoRun-HR Trojan Worm.
W32/AutoRun-HR is a Trojan for the Windows platform. W32/AutoRun-HR includes functionality to access the internet and communicate with a remote server via HTTP.
The file autorun.ini is detected as Mal/AutoInf-A.
The file autorun.ini is detected as Mal/AutoInf-A.
Damage Level : High/Medium
Distribution Level: Unknown
Distribution Level: Unknown
Auto Removal Tool for W32/AutoRun-HR Trojan Worm
Trojan Worm Manual Removal Instructions
Recommend Removal from Safe Mode:
How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
Recommend Removal from Safe Mode:
How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
End the Following Active Process Before Removal
- %Windows%\hinhem.scr
- %Windows%\scvhost.exe
- %System%\blastclnnn.exe
- %System%\scvhost.exe
- %System%\autorun.ini
- %System%\setting.ini
- If you have any of these files in running process from task manger, end the process before removal.
- Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
- Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.
Trojan Worm Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
- Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
Download and run this UnHookExec.inf, and then continue with the removal.
Save it to your Windows desktop. Do not run it at this time, download it only.
After booting into the Safe Mode or VGA Mode
Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messenger
%System%\scvhost.exe
%System%\scvhost.exe
The following registry entry is changed to run scvhost.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell\
Explorer.exe
Explorer.exe
scvhost.exe
The following registry entries are set, disabling system software:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr Value :1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableRegistryTools Value :1
The following registry entry is set:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NofolderOptions Value :1
The following registry entries are set, disabling system software:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr Value :1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableRegistryTools Value :1
The following registry entry is set:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NofolderOptions Value :1
To Activate the Disabled options, Change the Value to 0 or 2
Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.
Edit Menu - Find, enter Keyword and remove all value that find in search.
Exit the Registry Editor,
Restart your Computer.
Recommended Removal Tools:
Kaspersky Antivirus or Internet Security (Shareware)
Spyware Doctor (Shareware)
AVG Antivirus (Freeware)
Spyware Doctor (Shareware)
AVG Antivirus (Freeware)
Killbox (Freeware)
No comments :
Post a Comment
Comment on this Post!!