Virus in windows xp




















In the Value data box, type 4, and then click OK. Exit Registry Editor, and then restart the computer. Note The Task Scheduler service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on Windows Vista and Windows Server because this step will affect various built-in Scheduled Tasks. As soon as the environment is cleaned up, re-enable the Server service.

Download and manually install security update MS For more information, visit the following Microsoft Web site:. In this scenario, you must download the update from an uninfected computer, and then transfer the update file to the infected system.

We recommend that you burn the update to a CD because the burned CD is not writable. Therefore, it cannot be infected. If a recordable CD drive is not available, a removable USB memory drive may be the only way to copy the update to the infected system. If you use a removable drive, be aware that the malware can infect the drive with an Autorun. After you copy the update to the removable drive, make sure that you change the drive to read-only mode, if the option is available for your device.

If read-only mode is available, it is typically enabled by using a physical switch on the device. Then, after you copy the update file to the infected computer, check the removable drive to see whether an Autorun. If it was, rename the Autorun. Reset any Local Admin and Domain Admin passwords to use a new strong password. In the details pane, right-click the netsvcs entry, and then click Modify. B, the service name was random letters and was at the bottom of the list.

With later variants, the service name may be anywhere in the list and may seem to be more legitimate. To verify, compare the list in the "Services table" with a similar system that is known not to be infected. Note the name of the malware service.

You will need this information later in this procedure. Delete the line that contains the reference to the malware service. Make sure that you leave a blank line feed under the last legitimate entry that is listed, and then click OK. Notes about the Services table. All the entries in the Services table are valid entries, except for the items that are highlighted in bold.

The highlighted, malicious entry that is supposed to resemble the first letter is a lowercase "L. In a previous procedure, you noted the name of the malware service. In our example, the name of the malware entry was "Iaslogon. In Registry Editor, locate and then click the following registry subkey, where BadServiceName is the name of the malware service:. Right-click the subkey in the navigation pane for the malware service name, and then click Permissions.

In the Advanced Security Settings dialog box, click to select both of the following check boxes:. Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here. Replace permission entries on all child objects with entries shown here that apply to child objects. Press F5 to update Registry Editor. Note the path of the referenced DLL.

Remove the malware service entry from the Run subkey in the registry. In both subkeys, locate any entry that begins with "rundll Delete the entry. Check for Autorun. Use Notepad to open each file, and then verify that it is a valid Autorun. The following is an example of a typical valid Autorun. Set Show hidden files and folders so that you can see the file.

In step 12b, you noted the path of the referenced. For example, you noted a path that resembles the following:. Click Tools , and then click Folder Options. Edit the permissions on the file to add Full Control for Everyone. Click Everyone , and then click to select the Full Control check box in the Allow column. Delete the referenced. Turn off Autorun to help reduce the effect of any reinfection. For more information, click the following article number to view the article in the Microsoft Knowledge Base:.

If you are running Windows Vista or Windows Server , install security update Note Update and security update are not related to this malware issue.

These updates must be installed to enable the registry function in step 23b. If the system is running Windows Defender, re-enable the Windows Defender autostart location.

To do this, type the following command at the command prompt:. To change this setting back, type the following command at a command prompt:.

If, after you complete this procedure, the computer seems to be reinfected, either of the following conditions may be true:. One of the autostart locations was not removed. For example, either the AT job was not removed or an Autorun. This malware may change other settings that are not addressed in this article. To do this, type the following commands at the command prompt. To verify the status of the SvcHost registry subkey, follow these steps:. In the details pane, double-click netsvcs , and then review the service names that are listed.

Scroll down to the bottom of the list. If the computer is reinfected with Conficker, a random service name will be listed. For example, in this procedure, the name of the malware service is "Iaslogon. If these steps do not resolve the issue, contact your antivirus software vendor.

For more information about this issue, click the following article number to view the article in the Microsoft Knowledge Base:. This should be reverted to the default settings by using Group Policy settings. If a policy is only removed, the default permissions may not be changed back. See the table of default permissions in the " Mitigation steps " section for more information.

Update the computer by installing any missing security updates. If you have problems identifying systems that are infected with Conficker, the details provided in the following TechNet blog may help:.

The following table shows default permissions for each operating system. These permissions are in place before you apply the changes that we recommend in this article. These permissions may differ from the permissions that are set in your environment. Therefore, you must note your settings before you make any changes. You must do this so that you can restore your settings after you clean the system. For more help with this issue, if you are located in the United States, you can chat with a live person at Answer Desk:.

Answer Desk. Need more help? Log in Social login does not work in incognito and private browsers. Please log in with your username or email to continue. No account yet? Create an account. Edit this Article. We use cookies to make wikiHow great.

By using our site, you agree to our cookie policy. Cookie Settings. Learn why people trust wikiHow. Download Article Explore this Article parts. Tips and Warnings. Related Articles. Part 1. Whether you know it or not, Windows takes a snapshot of your PC every so often — at least by default upon installation — and you can always restore your system to that snapshot.

This effectively turns your PC back in time to before the virus existed, destroying it. Download an antivirus program if you can. Download other anti-malware software. Not only is doing so thorough, it may not even be a virus you're dealing with: you could be a victim of a Trojan or another type of malware.

Repair Windows if antivirus and other antimalware software don't work. After that, follow the onscreen instructions, choosing to repair Windows instead of reinstalling -- this way you keep your existing files. Perform a total install of Windows.

If you've got your original XP install discs, a full install might help clear things out. After that, follow the onscreen instructions, choosing to totally reformat your hard drive when presented with the reformat utility. Virus repair of Windows XP is difficult and fraught with increasingly diminishing returns the older the operating system gets.

Consider an upgrade to your operating system if all else fails or if you'd like to have fewer problems in the future. Part 2. Some viruses require Internet access to be able to hide, so you need to cut off their Internet supply to find them. Restart the computer. Keep tapping the F8 key as the computer starts. A menu appears with various options available.

If the computer starts normally, restart it and try again. Run your antivirus software. Run a full scan; it may take awhile depending on your computer. I just updated my antivirus program and it now conflicts with remnants of prior antivirus programs on my XP machine. You can find, download, and run an uninstaller program which not only targets and removes the programs, but also removes the residue files. Yes No. Not Helpful 0 Helpful 3.



0コメント

  • 1000 / 1000