If this is a confirmed infection, be aware that Virut (Virtob)
are polymorphic file infectors
functionality which infects .exe, .scr files
, downloads more malicious files to your system, and opens a back door
that compromises your computer
. Virux is an even more complex file infector which also infects script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected
properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable
McAfee Risk Assessment and Overview of W32/Virut
The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.
This kind of infection is contracted and spread by visiting remote
sites. These type of sites are infested with a smörgåsbord of malware
and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL
. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired
. When that happens there is nothing you can do besides reformatting and reinstalling the OS.
Keygen and Crack Sites Distribute VIRUX and FakeAV
...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...
If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately
to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised
. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router
, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:
There is no guarantee this infection can be completely removed
. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:However
, a-squared products are prone to "false positives
" and they even acknowledge this.
a-squared HiJackFree: Using security Software to scan dataa-squared Anti-Malware: Using security Software to scan dataa-squared Free: Using security Software to scan data
...Sometimes security software falsely identifies important crucial system components as a threat (hence the term False Positives - FP).
Removing/deleting critical system files, even temporarily, can make a system crash. Sometimes the system will recover after a reboot, and sometimes it will not. Therefore, you may not be able to start your system. Special system restore measures may be needed, or even a full system re-installation.
...If detections are FP's, you run the risk of rendering your system inoperable...
Spyware Traces in Detail
...the a-squared Scanner looks for files, folders, registry entries and Tracking Cookies that are typically created by Spyware programs. Traces are exactly these trails that Spyware leaves behind.
This approach has both advantages and disadvantages for Malware recognition...The negative side is that it provides a relatively inexact, or insufficiently differentiated to be more precise, Malware recognition. Benign software can be falsely recognized, for example, if it uses the same file name or folder as a dangerous Spyware program.
Software discovered via Traces should therefore first be double-checked to see if it is actually Malware before it is finally deleted...
Always get a second opinion. For specific file detections, go to Jotti's virusscan
. In the "File to upload & scan
" box, browse to the location of the suspicious file(s) and submit (upload) it for scanning/analysis.
If there are multiple file detections, perform an online scan with Kaspersky WebScanner
.(Requires free Java Runtime Environment (JRE) be installed before scanning for malware as ActiveX is no longer being used.)