Enter your Keyword, Search here,

Manual Removal of W32/Bdoor-ZAR Backdoor Worm

Manual Removal of W32/Bdoor-ZAR Backdoor Worm.
W32/Bdoor-ZAR is a network worm with backdoor functionality for the Windows platform.
The backdoor component accepts commands from remote users.
Other names of
W32/Bdoor-ZAR Worm:
This Worm is also known as Worm.Win32.AutoRun.skg, WORM_AUTORUN.CCJ.
Damage Level : High/Medium
Distribution Level: Unknown
No Auto Removal Tool for W32/Bdoor-ZAR Backdoor Worm
Try ProtectorPlus W32/Autorun Worm Removal 1.0

Mirror Link 2
Worm Manual Removal Instructions

Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • %\Windows\System\cfg.exe
  • %\config\cfg.exe [ Runs on Startup ]
  • %\config\s-1-5-21-1482476501-1644491937-682003330-1013\cfg.exe
    • If you have any of these files in running process from task manger, end the process before removal.
    • Note: if task manager is disabled
      Download the following file[ Right click and select "Save Target as" ]
      Click to Download - Enable Registry.reg
    • Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.
Backdoor Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
  • Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download and run this UnHookExec.inf, and then continue with the removal.
  • Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components
HKLM\SYSTEM\CurrentControlSet\Services\cfg
Type dword:00000010

HKLM\SYSTEM\CurrentControlSet\Services\cfg
Start dword:00000002

HKLM\SYSTEM\CurrentControlSet\Services\cfg
ErrorControl dword:00000000

HKLM\SYSTEM\CurrentControlSet\Services\cfg
ImagePath (may be encoded)

HKLM\SYSTEM\CurrentControlSet\Services\cfg
DisplayName cfg

HKLM\SYSTEM\CurrentControlSet\Services\cfg
ObjectName LocalSystem

HKLM\SYSTEM\CurrentControlSet\Services\cfg\Security
Security

HKLM\System\CurrentControlSet\Enum\Root\LEGACY_CFG

Read More on: Sophos Security

Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

No comments :

Post a Comment

Comment on this Post!!

More Posts that you may be interested...