Click the Start scan button to start scanning, the application will search all files that have been encrypted and decrypt them. Select Delete crypted files after decryption to delete all copies of the encrypted file with the extension like vscrypt, .infected, .bloc, .korrektor . When this process is complete, the program will create a log file. The whole detail works at the system drive (usually drive C) as UtilityName.Version_Date_Time_log.txt , for example, C: RectorDecryptor.2.2.0_12.08.2010_15.31.43_log.txt
In essence, the Trojan-Ransom.Win32.Rector template usually targets only files with extensions such as .jpg, .doc, .pdf, .rar. The hacker will then contact the victim to decrypt the data via the nickname †† KOPPEKTOP †† or the following information:
ICQ: 557973252 or 481095
EMAIL: v-martjanov@mail.ru
Or the following website address:
http:///trojan.sooot.cn/
http:///malware.66ghz.com/
This information is displayed on the victim's desktop computer screen.
TDSSKiller
This is the 'special remedy' of malicious code Rootkit.Win32.TDSS , the latest version 2.4.2.1, small capacity - 1.13 MB, you can download directly here. Rootkit.Win32.TDSS line includes various variants such as Tidserv, TDSServ, Alureon . when these Rootkits successfully penetrate the user's computer, the system will be very difficult to remove, even if supported. support of Kaspersky Lab products. As for the basic way, TDSSKiller will replace users who interfere with the Registry to correct the changed keys. For Windows-based computers, the term rootkit is used to refer to a particular type of program that can 'sneak' into all system functions (Windows API). By infiltrating and modifying these low-level functions - other types of malicious code can hide more easily, interfere with the operating system's processes, hide folders and data files, edit registry . TDSSKiller is simple, easy to use because it has a graphical interface, good support for Windows 32 and 64 bit operating systems. To use, download directly from the above path, unzip to any folder on the hard drive and run the file TDSSKiller.exe:
Click the Start Scan button to start scanning the entire system, the program will review and detect all infected objects, files . The results are divided into 2 main groups: malicious (identified) and suspicious (unrecognizable). When the scanning process is finished, the program will display a list of detected objects with specific details. With malicious objects the program automatically applies the Cure or Delete method, to suspicious objects, the user will apply the method themselves (the program's default is Skip). Or you can choose Quarantine to completely isolate the infected object, they will be saved to the folder on the system drive, for example C: TDSSKiller_Quarantine23.07.2010_15.31.43
After clicking Next , the program will apply the user selected methods and finally display the results. You should restart your computer to complete the process:
This log file is usually saved at the system drive as UtilityName.Version_Date_Time_log.txt . The example here is C: TDSSKiller_Quarantine23.07.2010_15.31.43
Symptoms of a computer infected with Rootkit.Win32.TDSS (first generation - TDL1 and 2nd - TDL2), for experienced people they will try to track the following functions: IofCallDriver , IofCompleteRequest, NtFlushInstructionCache, NtEnumerateKey, NtSaveKey, NtSaveKeyEx . using Gmer utility:
For those infected by the 3rd generation Rootkit.Win32.TDSS (TDL3), they frequently 'cling' to the system driver file atapi.sys and replace the original device object in which:
KidoKiller
The name Kido is probably not too strange to the computer user community, with the original name Net-Worm.Win32.Kido (or also called Conficker, Downadup), they mainly attack computers Use Microsoft Windows operating system based on workstation and server platforms.
The most noticeable features of this Net-Worm.Win32.Kido line are that they create the autorun.inf and RECYCLED {SID} file_name_nien.vmx files on removable storage devices, or on storage devices. and sharing data on the local network, on the other hand they themselves store on the system as a DLL file with any name, for example, c: windowssystem32zorizr.dll . Self-created system services with random names, for example knqdgsm. At the same time, they try to attack and infiltrate computer systems through port 445 or 139 with MS Windows MS08-067 vulnerability, on the other hand they try to detect the computer's correct IP address by the following address:
- http://www.getmyip.org/
- http://getmyip.co.uk/
- http://www.whatsmyipaddress.com/
- http://www.whatismyip.org/
- http://checkip.dyndns.org/
Next are the signs of the network, with the data traffic increasing dramatically, originating from the infected computer. Security programs will activate the Intrusion Detection System mode to inform the Intrusion.Win.NETAPI.buffer-overflow.exploit vulnerability. And most notably, computers cannot access the websites of security companies such as avira, avast, esafe, drweb, eset, nod32, f-secure, panda, kaspersky . and so you cannot copyright activation of security applications over the Internet, very common is the case of Kaspersky (many customers encounter this situation and assume that the activation key is inappropriate, incorrect or the provider sent the wrong code to they). But for 'ancient' operating systems such as MS Windows 95, MS Windows 98 or MS Windows ME are not affected by Kido. In order to limit the vulnerabilities on the system - through which Kido is easy to exploit and invade, Microsoft security experts require users to apply the following patches: MS08-067, MS08-068 and MS09-001.
On the other hand, users should be equipped with password protection long enough and difficult to guess (at least 6 characters and contain no information related to themselves such as birthdays, phone numbers, addresses .), turn off Remove the system's autorun feature, download KidoKiller from the above path, unzip to any folder on the drive and run the kk.exe file, block access to ports TCP 445 and 139 in the firewall section. After scanning with kk.exe, you can free access to the two ports as usual.
If the computer has the following applications installed:
- Kaspersky Internet Security 2009;
- Kaspersky Anti-Virus 2009;
- Kaspersky Internet Security 7.0;
- Kaspersky Anti-Virus 7.0;
- Kaspersky Internet Security 6.0;
- Kaspersky Anti-Virus 6.0;
- Kaspersky Anti-Virus 6.0 for Windows Workstations;
- Kaspersky Anti-Virus 6.0 SOS;
- Kaspersky Anti-Virus 6.0 for Windows Servers.
Then turn off the File Anti-Virus feature (or Disable temporarily Kaspersky) then activate kk.exe.
SalityKiller
Many people call this 'virus' specializing in 'eating' * .exe files in Windows operating system, the most noticeable symptom is that users cannot use * .exe files as usual, and icons theirs are changed to the Classic template. SalityKiller tool works well for Sality models after Virus.Win32.Sality.aa , Virus.Win32.Sality.ag and Virus.Win32.Sality.bh .
If the infected computer is in the local and domain network model: first, you need to download SalityKiller.zip, unzip to any folder and run the SalityKiller.exe file on each computer on the system ( can be applied using Kaspersky Administration Kit or server group policy). Then completely delete the changed registry keys with the following tool Sality_RegKeys.zip, unzip and run the file Disable_autorun.reg :
After the scanning process is over, run the reg files corresponding to the operating system from the Sality_RegKeys.zip compressed file on:
- with Windows 2000 - SafeBootWin200.reg
- with Windows XP - SafeBootWinXP.reg
- with Windows 2003 - SafeBootWinServer2003.reg
- with Windows Vista / 2008 - SafebootVista.reg
- with Windows 7/2008 R2 - SafebootWin7.reg
For standalone computers (not belonging to any local network), you first need to turn off the iSwift and iChecker functions of the following Kaspersky applications:
- Kaspersky Anti-Virus 7.0
- Kaspersky Internet Security 7.0
- Kaspersky Anti-Virus 6.0
- Kaspersky Internet Security 6.0
- Kaspersky Anti-Virus 2009;
- Kaspersky Internet Security 2009;
- Kaspersky Anti-Virus 2010;
- Kaspersky Internet Security 2010;
- Kaspersky Anti-Virus 2011;
- Kaspersky Internet Security 2011;
- Kaspersky PURE;
- Kaspersky Anti-Virus 6.0 for Windows Workstations
- Kaspersky Anti-Virus 6.0 SOS
- Kaspersky Anti-Virus 6.0 for Windows Servers
klwk.com
Specially used to "treat" Trojan-Dropper.Win32.Agent.ztu and its "allies", including:
I-Worm.Zafi.b
I-Worm.Bagle.at, au, cx-dw
Virus.Win32.Implinker.a
Not-a-virus.AdWare.Visiter
Trojan.Win32.Krotten
Email-Worm.Win32.Brontok.n
Backdoor.Win32.Allaple.a
Trojan-Spy.Win32.Goldun.mg
Email-Worm.Win32.Warezov
Virus.Win32.VB.he
IM-Worm.Win32.Sohanad.as
P2P-Worm.Win32.Malas.b
Virus.Win32.AutoRun.acw
Worm.Win32.VB.jn
Trojan.Win32.KillAV.nj
Worm.Win32.AutoRun.cby
Trojan.Win32.Agent.aec
Trojan-Downloader.Win32.Todon.an
Trojan-Downloader.Win32.Losabel.ap
Worm.Win32.AutoRun.czz, daa, dhq, dfx
Net-Worm.Win32.Rovud.ac
Trojan.Win32.ConnectionServices.x-aa
Worm.Win32.AutoRun.dtx
Worm.Win32.AutoRun.hr
Backdoor.Win32.Agent.lad
FraudTool.Win32.UltimateDefender.cm
Trojan-Downloader.Win32.Agent.wbu
Backdoor.Win32.Small.cyb
FraudTool.Win32.XPSecurityCenter.c
Downloader.Win32.VistaAntivirus.a
FraudTool.Win32.UltimateAntivirus.an
FraudTool.Win32.UltimateAntivirus.ap
Trojan-Spy.Win32.Zbot.dlh
Trojan-Downloader.Win32.Small.abpz
Rootkit.Win32.Ressdt.br
Worm.Win32.AutoRun.lsf
Worm.Win32.AutoRun.epo
Worm.Win32.AutoRun.enw
Backdoor.Win32.UltimateDefender.a
Worm.Win32.AutoRun.pwi
Worm.Win32.AutoRun.pfh
Worm.Win32.AutoRun.qhk
Worm.Win32.AutoRun.ouu
Worm.Win32.AutoRun.bnb
Worm.Win32.AutoRun.ll
AdWare.Win32.Cinmus.sxy
Trojan.Win32.Autoit.eo
Worm.Win32.AutoRun.sct Worm.Win32.AutoRun.qkn
AdWare.Win32.Cinmus.wsu
Trojan-Ransom.Win32.Taras.a
Trojan-Dropper.Win32.Agent.ztu
Trojan-Downloader.Win32.Agent.Apnd
Worm.Win32.Autorun.qpa
Net-Worm.Win32.Kido.j
Worm.Win32.Autorun.dcw
Trojan.Win32.Feedel.gen
Trojan.Win32.Pakes.mak
Net-Worm.Win32.Kido.r
Net-Worm.Win32.Kido.t
Worm.VBS.Autorun.cq
Worm.Win32.Pinit.ac
Worm.Win32.Pinit.ae
Worm.Win32.Pinit.af
Worm.Win32.Pinit.gen
Net-Worm.Win32.Kido.bw
Net-Worm.Win32.Kido.db
Net-Worm.Win32.Kido.fk
Net-Worm.Win32.Kido.fx
Net-Worm.Win32.Kido.fo
Net-Worm.Win32.Kido.s
Net-Worm.Win32.Kido.dh
Net-Worm.Win32.Kido.ee
Net-Worm.Win32.Kido.gh
Net-Worm.Win32.Kido.fa
Net-Worm.Win32.Kido.gy
Net-Worm.Win32.Kido.ca
Net-Worm.Win32.Kido.by
Net-Worm.Win32.Kido.if
Net-Worm.Win32.Kido.eo
Net-Worm.Win32.Kido.bx
Net-Worm.Win32.Kido.bh
Net-Worm.Win32.Kido.bg
Net-Worm.Win32.Kido.ha
Net-Worm.Win32.Kido.hr
Net-Worm.Win32.Kido.da
Net-Worm.Win32.Kido.dz
Net-Worm.Win32.Kido.cg
Net-Worm.Win32.Kido.eg
Net-Worm.Win32.Kido.eq
Net-Worm.Win32.Kido.bz
Net-Worm.Win32.Kido.do
Net-Worm.Win32.Kido.fw
Net-Worm.Win32.Kido.du
Net-Worm.Win32.Kido.cv
Net-Worm.Win32.Kido.dv
With extremely small capacity of only about 166 KB, extract any folder or drive (here is drive F), activate the file klwk.com :
Run the file klwk.com in the above way to review the memory and turn off the operation of the virus.
When using klwk.com/s syntax, the application will scan all hard drives and partitions on the system, remove infected files, lock registry keys containing malicious code.
ZbotKiller
The most recent version is 1.2.0.0, which is about 98.9 KB in size, specialized to remove the malicious program Trojan-Spy.Win32.Zbot - used by hackers to steal personal information related to bank, account number, password .
Some signs of the computer are infected with this type of Trojan in the system directory (% windir% system32 and% AppData% - with Windows Vista are: C: WindowsSystem32 and C: The UsersAppData is still with Windows XP Professional, it will be C: WINDOWSsystem32 and C: Documents and SettingsApplication Data will suddenly appear one or more of the following strange files: ntos.exe, twex.exe, twext.exe, oembios.exe, sdra64.exe, lowseclocal.ds or lowsecuser.ds.
The path to the above files is stored here:
- HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogonUserinit o
- HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
How to use is very simple, just download the file from the above path, extract and run the file ZbotKiller.exe, wait for the process to finish and restart the system.
KatesKiller
Created to thoroughly remove the Trojan-PSW.Win32.Kates line, the latest version is now 1.2.2, which is only about 91.1 KB.
Some signs of Trojan-PSW.Win32.Kates infected computer:
- Security programs detect the presence of trojans on the computer, when deleting these files, they immediately recover under other names (especially for Kaspersky products, this does not happen)
- The explorer.exe application is immediately canceled when the user executes the following command: regedit.exe, cmd.exe and Total Commander
- Files with extension * .bat and * .reg cannot be activated
- The following functions are loaded into most active processes on the system: CreateProcessW, WSARecv, WSASend, send, connect and recv
When using Gmer, you can clearly see the operation of the following functions:
Or with Rootkit Unhooker:
Users only need to download KatesKiller here, extract and activate the KatesKiller.exe file, the program will search and delete dangerous applications, detect hidden functions and cancel the operation of application functions. This: CreateProcessW, WSASend, WSARecv, send, recv and recv, delete the changed registry keys:
clrav.com
Clrav.com can be applied to the following types of malicious code by Kaspersky experts: I-Worm.BleBla.b, I-Worm.Navidad, I-Worm.Sircam, I-Worm. Goner, I-Worm.Klez.a, I-Worm.Klez.e, I-Worm.Klez.f, I-Worm.Klez.g, I-Worm.Klez.h, Win32.Elkern.c, I- Worm.Lentin.a, I-Worm.Lentin.b, I-Worm.Lentin.c, I-Worm.Lentin.d, I-Worm.Lentin.e, I-Worm.Lentin.f, I-Worm. Lentin.g, I-Worm.Lentin.h, I-Worm.Lentin.i, I-Worm.Lentin.j, I-Worm.Lentin.k, I-Worm.Lentin.l, I-Worm.Lentin. m, I-Worm.Lentin.n, I-Worm.Lentin.o, I-Worm.Lentin.p, I-Worm.Tanatos.a, I-Worm.Tanatos.b, I-Worm.Win32.Opasoft. a, I-Worm.Win32.Opasoft.b, I-Worm.Win32.Opasoft.c, I-Worm.Win32.Opasoft.d, I-Worm.Win32.Opasoft.e, I-Worm.Win32.Opasoft. f, I-Worm.Win32.Opasoft.g, I-Worm.Win32.Opasoft.h, I-Worm.Win32.Opasoft.i, I-Worm.Win32.Opasoft.j, I-Worm.Win32.Opasoft. k, I-Worm.Win32.Opasoft.l, I-Worm.Win32.Opasoft.m, I-Worm.Win32.Opasoft.n, I-Worm.Win32.Opasoft.o, I-Worm.Win32.Opasoft. p, I-Worm.Avron.a , I-Worm.Avron.b, I-Worm.Avron.c, I-Worm.Avron.d, I-Worm.Avron.e, I-Worm.LovGate.a, I-Worm.LovGate.b, I -Worm.LovGate.c, I-Worm.LovGate.d, I-Worm.LovGate.e, I-Worm.LovGate.f, I-Worm.LovGate.g, I-Worm.LovGate.h, I-Worm .LovGate.i, I-Worm.LovGate.j, I-Worm.LovGate.k, I-Worm.LovGate.l, I-Worm.Fizzer, I-Worm.Magold.a, I-Worm.Magold.b , I-Worm.Magold.c, I-Worm.Magold.d, I-Worm.Magold.e, Worm.Win32.Lovesan, Worm.Win32.Welchia, I-Worm.Sobig.f, I-Worm.Dumaru .a - I-Worm.Dumaru.m, Trojan.Win32.SilentLog.a, Trojan.Win32.SilentLog.b, Backdoor.Small.d, I-Worm.Swen, Backdoor.Afcore.l - Backdoor.Afcore.ad , I-Worm.Sober.a, I-Worm.Sober.c, I-Worm.Mydoom.a, I-Worm.Mydoom.b, I-Worm.Mydoom.e, I-Worm.Torvil.d, I -Worm.NetSky.b - I-Worm.NetSky.d, TrojanDownloader.Win32.Agent.a - TrojanDownloader.Win32.Agent.j, I-Worm.Bagle.a - I-Worm.Bagle.j, I-Worm .Bagle.n- I-Worm.Bagle.r, I-Worm.Bagle.z, Worm.Win32.Sasser.a - Worm.Win32.Sasser.d, Worm.Win32.Sasser.f, Backdoor.Agent.ac , Trojan.Win32.StartPage.fw
The latest version is currently 11.0.0.2, small and light ~ 139 Kb, like other Kaspersky support tools, users just need to download, unzip and run the file clrav.com.
VirutKiller
The main function of this tool is to detect and remove traces of the virus bot. Virus.Win32.Virut.ce , q - they are used to steal and 'transport' data from infected computers. To ensure the successful processing of this virus, you should first turn off System Restore of Windows first, download VirutKiller, extract it to any folder on your hard drive and run the VirutKiller.exe file, and the You just need to wait for the scan to finish and restart once. At the beginning of the review, the application will search and disable malicious processes, combined with the search for the following functions: NtCreateFile, NtCreateProcess, NtCreateProcessEx, NtOpenFile and NtQueryInformationProcess. Next, the program will take over the task of reviewing, terminating the spread process and isolating the affected files on the entire hard drive.
Antiboot
Specially used to kill malicious code Backdoor.Win32.Sinowal.deg - they have a very sophisticated mechanism of hiding and hiding themselves, so they are almost impossible to detect on any computer that has been infected. infected. They hide the infected objects behind their original file. Besides, the main body of this malicious program (kernel level driver) is not in the file system. They often hide in unused areas at the last partition of the hard drive. These Backdoor malicious programs do not need an operating system to launch their 'working' process, so they are especially dangerous because users cannot know how many hackers are 'sniffing'. 'in their own computer.
To use Antiboot, download the archive here, extract any folder or hard drive and run antiboot.exe:
Press Y to start the system recovery process:
Select Y, then exit the program and restart the system.
XoristDecryptor
Trojan-Ransom.Win32.Xorist - a type of Trojan created to steal user's personal information on an infected computer, and makes the computer's operation become unstable and unstable. After capturing the data, hackers will return it to users who require them to pay for the data back.
Some symptoms of Trojan-Ransom.Win32.Xorist computers are that they receive a request to send any message to decrypt those files, the text font used is Cyrillic - so almost Everyone just saw the squares and strange characters. Another sign is the appearance of a file named in Russian - Прочти Меня - как расшифровать файлы :
Accompany it is the file CryptLogFile.txt in the Windows folder. They can encrypt files with the following extensions: doc, xls, docx, xlsx, db, mp3, waw, jpg, jpeg, txt, rtf, pdf, rar, zip, psd, msi, tif, wma, lnk, gif, bmp, ppt, pptx, docm, xlsm, pps, ppsx, ppd, tiff, eps, png, ace, djvu, xml, cdr, max, wmv, avi, wav, mp4, pdd, html, css, php, aac, ac3, amf, amr, mid, midi, mmf, mod, mp1, mpa, mpga, mpu, nrt, oga, ogg, pbf, ra, ram, raw, saf, val, wave, wow, wpk, 3g2, 3gp, 3gp2, 3mm, amx, avs, bik, bin, dir, divx, dvx, evo, flv, qtq, tch, rts, rum, rv, scn, srt, stx, svi, swf, trp, vdo, wm, wmd, wmmp, wmx, wvx, xvid, 3d, 3d4, 3df8, pbs, adi, ais, amu, arr, bmc, bmf, cag, orange, dng, ink, jif, jiff, jpc, jpf, jpw, mag, mic, mip, msp, nav, ncd, odc, odi, opf, qif, qtiq, srf, xwd, abw, act, adt, aim, ans, asc, ase, bdp, bdr, bib, boc, crd, diz, dot, dotm, dotx, dvi, dxe, mlx, err, euc, faq, fdr, fds, gthr, idx, kwd, lp2, ltr, man, mbox, msg, nfo, now, odm, oft, pwi, rng, rtx, run, ssa, text, unx, wbk, wsh, 7z, arc, ari, arj, car, cb r, cbz, gz, gzig, jgz, pak, pcv, puz, r00, r01, r02, r03, rev, sdn, sen, sfs, sfx, sh, shar, shr, sqx, tbz2, tg, tlz, vsi, wad, war, xpi, z02, z04, zap, zipx, zoo, ipa, isu, jar, js, udf, adr, ap, aro, asa, ascx, ashx, asmx, asp, aspx, asr, atom, bml, cer, cms, crt, dap, htm, moz, svr, url, wdgt, abk, bic, big, blp, bsp, cgf, chk, col, company, dem, elf, ff, gam, grf, h3m, h4r, iwd, ldb, lgp, lvl, map, md3, mdl, mm6, mm7, mm8, nds, pbp, ppf, pwf, pxp, sad, sav, scm, scx, sdt, spr, sud, uax, umx, unr, uop, usa, usx, ut2, ut3, utc, utx, uvx, uxx, vmf, vtf, w3g, w3x, wtd, wtf, ccd, cd, cso, disk, dmg, dvd, fcd, flp, img, iso, isz, md0, md1, md2, mdf, mds, nrg, nri, vcd, vpb, dic, cch, ctt, dal, ddc, ddcx, dex, dif, dii, itdb, itl, kmz, lcd, lcf, mbx, mdn, odf, odp, ods, pab, pkb, pkh, qdf, qel, rgn, rrt, rsw, rte, sdb, sdc, sds, sql, stt, t01, t03, t05, tcx, thmx, txd, txf, upoi, vmt, wks, wmdb, xlc, xlc, xlr, xlsb, xltx, ltm, xlwx, mcd, cap, cc, cod, cp, cpp, cs, csi, dcp, dcu, dev, dob, dox, dpk, dpl, dpr, dsk, dsp, eql, ex, f90, fla, for, fpp, jav, java, lbi, owl, pl, plc, pli, pm, res, rnc, rsrc, so, swd, tpu, tpx, tu, tur, vc, yab, 8ba, 8bc, 8be, 8bf, 8bi8, bi8, 8bl, 8bs, 8bx, 8by, 8li, aip, amxx, ape, api, mxp, oxt, qpx, qtr, xla, xlam, xll, xlv, xpt, cfg, cwf, dbb, slt, bp2, bp3, bpl, clr, dbx, jc, potm, ppsm, prc, prt, shw, std, ver, wpl, xlm, yps, md3.
To use XoristDecryptor, download the compressed file here, extract any folder or any hard drive and run the XoristDecryptor.exe file. Wait for the scan to finish, you should restart the computer.
PmaxKiller
This is a utility tool used to remove Rootkit.Win32.PMax lines - they infect Microsoft Windows 2000, XP, 2003, Vista, 2008 and 7 32 bit versions. As for 64-bit systems, it is not affected by this malicious code.
Some typical signs of the computer when infected with this Rootkit type, security programs are interrupted in the middle of a scan or operation. In addition, the DACL (Discretionary Access Control List) feature set for executable files is prevented from starting, so when you try to activate a program, the system will display a message. Unauthorized error due to no rights.
If you use Gmer to track processes, you will see hidden modules with links containing strange characters __max ++> :
Like other Kaspersky tools, you only need to download the compressed file of PMaxKiller here to your computer, unzip and activate the file PMaxKiller.exe. Wait for the scan to finish and restart the computer.
KL Anti-FunLove
This is a specialized support tool to completely remove the presence of Win32.FunLove worm from your computer. The installation and usage process is very simple, since this is a graphical user interface, download KL Anti-FunLove's compressed file here, extract and run KL Anti-FunLove.exe file:
Click Install to install, then restart the computer. When the operating system boots up, the program will scan in the memory, hard drive . the whole process is fully displayed. Sau khi quá trình quét và xóa bỏ mã độc kết thúc, bạn nên khởi động lại hệ thống 1 lần nữa. Nếu hệ thống hoạt động không ổn định, hãy gỡ bỏ các chương trình bảo mật và cài lại.
Digita_Cure
Khi máy tính của bạn không thể kết nối Internet, đồng thời nhận được những thông báo bằng ngôn ngữ lạ thì có thể máy tính đã bị nhiễm Trojan-Ransom.Win32.Digitala – bao gồm các biến thể sau Get Accelerator, Digital Access, Get Access, Download Manager v1.34. Chúng có khả năng ngăn chặn các kết nối từ hệ thống tới Internet, đồng thời thông báo với người sử dụng phải chấp nhận thỏa thuận từ phía tin tặc bằng cách cung cấp thông tin cá nhân cho chúng, sau đó sẽ được 'mở khóa' và truy cập Internet như bình thường.
Dưới đây là 1 số mẫu, với dòng Digital Access:
Get Accelerator:
Get Access:
và Download Manager v1.34:
Để sử dụng Digita_Cure, các bạn tải file này về máy tính, giải nén và chạy file Digita_Cure.exe:
Lưu ý rằng tiện ích này chỉ hoạt động với bản 32 bit của hệ điều hành Microsoft Windows 2000, XP, 2003, Vista, 2008 và 7, vì bản 64 bit không bị ảnh hưởng bởi Trojan-Ransom.Win32.Digitala.
Anti-Nimda
Đây là công cụ cuối cùng trong danh sách hỗ trợ của Kaspersky, chuyên dùng để 'điều trị' loại virus I-Worm.Nimda , vốn lây lan mạnh mẽ qua Internet bằng trình duyệt Internet Explorer. Tải file antinimd, giải nén và chạy file antinimd.exe. Chờ quá trình quét này kết thúc và khởi động lại máy tính. Kiểm tra lại sự tồn tại của các thư viện hệ thống bằng chức năng Search với tên: MMC.EXE, RICHED20.DLL, LOAD.EXE RICHED20.DLL, MMC.EXE (Microsoft Management Console). Nếu bất kỳ file DLL nào bị phát hiện có dấu hiệu bị lây nhiễm, các bạn nên xóa bỏ chúng đi và thay thế bằng DLL 'sạch' trên máy tính khác có cùng hệ điều hành.
Một lần nữa, chúng tôi khuyên các bạn nên sử dụng các chương trình an ninh của những hãng danh tiếng, có uy tín như Kaspersky, BitDefender, Avira, Norton, Panda … tất cả đều có sẵn trên gian hàng của công ty cổ phần mạng trực tuyến Meta. Các bạn có thể tham khảo thêm chi tiết tại đây hoặc đây. Good luck!