![]()
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Removing W32.Wargbot or Cuebot-L Worm There is a worm called W32.Wargbot or Cuebot-L by Sophos spreading on campus. The worm infects Windows 2000, Windows XP and Windows 2003 Server computers that have not been patched with the Microsoft patch MS06-040. All customers are strongly encouraged to always keep the Microsoft patches up to date using Windows Automatic Update and turning on Windows Firewall. See http://www.mcmaster.ca/ctl/winupdate.htm and http://www.mcmaster.ca/ctl/firewall.htm. If you are unable to run the Windows Automatic update at this time, download the MS06-040 patch from http://www.microsoft.com/technet/security/Bulletin/MS06-040.mspx to a CD. More information about the worm can be found at: http://www.symantec.com/enterprise/security_response/print_writeup.jsp?docid=2006-081312-3302-99 . Removal Instructions: - Using an account with Administrative privileges on the computer set the computer to show hidden folders and files. - Turn off System Restore (Applies to Windows XP) - Disable the service Windows Genuine Advantage Registration Service. - Reboot into Safe Mode. (Restart the computer and press F8) - Delete the file wgareg.exe and nsms.exe in the System32 folder. The location of the system32 folder is C:\winnt or C:\Windows based on the operating system. - Empty the Recycle bin. - Run Regedit or regedt32. - Backup the Registry before removing the following entries created by the worm. Delete the following registry folder create for the Windows Genuine Advantage Registration Service: Go to: Go to: Go to: Go to: Go to: Go to: Delete from %windir%\system32 .exe delete the following {Keys} HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\nsms HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\nsms {Values} these should read as - HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userint REG_SZ %windir%\system32\userinit.exe
- Search the entire registry for nsms.exe and delete any subkeys related to that executable. - Delete the following file: %Windir%\debug\dcpromo.log. You may have to remove the “read only” mark before you can delete this file - Reboot the computer and apply all critical patches from Microsoft using Windows Automatic update. Note: The Microsoft site may be slow due to high volumes. It is important for you to keep trying to get the updates to avoid reinfection. If Windows Update fails see Recovering from a failed Windows Update. - Make sure your Anti-virus is up to date and scan your computer. There may be other viruses and trojans as a result of other missing Windows system patches. If you encounter malware such as *.tmp use tools such Microsoft Windows Defender or Google for malware removal tools such as AVG Anti-spyware. -Turn on Windows XP Firewall. (Applies to Windows XP) - If clean turn on System Restore. (Applies to Windows XP)
If you have questions or need a blocked port opened after the computer is clean, please contact the Service Desk at extension 24357 or send email to
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Contact Us | Legal & Privacy Policy |
|||||||||||||||||||||||||||||||||||||||||||||||||||||