Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Urgent reply plz donot have time to serch on google plz
reply
the questions is how to remove newfolder.exe virus from my
windows 2003 server
i have all ready tried quick heal.spy hunter mcafee server .
plz reply



Urgent reply plz donot have time to serch on google plz reply the questions is how to remove new..

Answer / murthyrajuch

I want to tell you a story, two days back i got affected by
this virus very badly as it eat up all my empty hard disk
space of around 700 MB .

I was surprised that my most reliable friend Avast, for the
first time failed me in this war against viruses but then
again avg and bitdiffender also failed against it. This
virus is know popularly as regsvr.exe virus, or as new
folder.exe virus and most people identify this one by
seeing autorun.inf file on their pen drives, But trend
micro identified it as WORM_DELF.FKZ. It is spreading
mostly using pen drives as the medium.



Well, so here is the story of how i was able to kill the
monster and reclaim my hard disk space.

Manual Process of removal


I prefer manual process simply because it gives me option
to learn new things in the process.


So let’s start the process off reclaiming the turf that
virus took over from us.

Cut The Supply Line
Search for autorun.inf file. It is a read only file so you
will have to change it to normal by right clicking the
file , selecting the properties and un-check the read only
option
Open the file in notepad and delete everything and save the
file.
Now change the file status back to read only mode so that
the virus could not get access again.

Click start->run and type msconfig and click ok
Go to startup tab look for regsvr and uncheck the option
click OK.
Click on Exit without Restart, cause there are still few
things we need to do before we can restart the PC.
Now go to control panel -> scheduled tasks, and delete the
At1 task listed their.
Open The Gates Of Castle
Click on start -> run and type gpedit.msc and click Ok.

If you are Windows XP Home Edition user you might not have
gpedit.msc in that case download and install it from
Windows XP Home Edition: gpedit.msc and then follow these
steps.

Go to users configuration->Administrative templates->system
Find “prevent access to registry editing tools” and change
the option to disable.

Once you do this you have registry access back.
Launch The Attack At Heart Of Castle
Click on start->run and type regedit and click ok
Go to edit->find and start the search for regsvr.exe,

Delete all the occurrence of regsvr.exe; remember to take a
backup before deleting. KEEP IN MIND regsvr32.exe is not to
be deleted. Delete regsvr.exe occurrences only.
At one ore two places you will find it after explorer.exe
in theses cases only delete the regsvr.exe part and not the
whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just
delete the regsvr.exe and leave the explorer.exe
Seek And Destroy the enemy soldiers, no one should be left
behind
Click on start->search->for files and folders.
Their click all files and folders
Type “*.exe” as filename to search for
Click on ‘when was it modified ‘ option and select the
specify date option
Type from date as 1/31/2003 and also type To date as
1/31/2003

Now hit search and wait for all the exe’s to show up.
Once search is over select all the exe files and
shift+delete the files, caution must be taken so that you
don’t delete the legitimate exe file that you have
installed on 28st January.
Also selecting lot of files together might make your
computer unresponsive so delete them in small bunches.
Also find and delete regsvr.exe, svchost .exe( notice an
extra space between the svchost and .exe)
Time For Celebrations
Now do a cold reboot (ie press the reboot button instead)
and you are done.
I hope this information helps you win your own battle
against this virus. Soon all antivirus programs will be
able to automatically detect and clean this virus. Also i
hope Avast finds a way to solve this issues.

As a side note i have found a little back dog( winpatrol )
that used to work perfectly on my old system. It was not
their in my new PC, I have installed it again , as I want
to stay ahead by forever closing the supply line of these
virus. You can download it form Winpatrol website.

UPDATE : Avast Boot Time Scheduling



Check out How to stop regedit, task manager and msconfig
from closing automatically if your regedit or msconfig
closes automatically.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

I want to configure a serial interface on a 7500 with a VIP card. What global config command would give me access to a serial interface on a 7500? A.) int 1/0/0 B.) int s 1/0/0 C.) int s 1/1 D.) int s0.1 E.) int s1

2 Answers  


Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Router# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes

1 Answers   ABC,


Wild card mask always in odd value or even?

0 Answers  


Identify the components in the following command 'interface serial0/1/1' A.) Serial interface, port number 0, slot 1, port adapter 1 B.) Serial interface, slot 1, port number 1, port adapter 0 C.) Serial interface, slot 0, port adapter 1, port number 1

2 Answers  


Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17

2 Answers  


When determining whether or not to route a LAN segment, which rule of thumb do you use? A.) 60/40 B.) 50/50 C.) 80/20 D.) 90/10 E.) 70/30

2 Answers  


Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking

2 Answers  


Define ios?

0 Answers  


The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric

1 Answers  


What does the command show access-lists 101 list? A. all defended access lists B. all access lists within the router C. the contents of standard access list 101 D. the contents of defended access list 101

1 Answers  


how to find network ID from IP address?without using network calc...

12 Answers   Idea, Karbon, NIIT,


Which OSI layer end to end communication, segmentation and re-assembly? A.) Network B.) Transport C.) Physical D.) Application E.) Data-Link F.) Presentation

3 Answers  


Categories