Solved

How to remove W32.Korgo.W

Posted on 2004-08-10
10
842 Views
Last Modified: 2010-04-12
Symantec unable to remore W32.Korgo.W. I support the laptops in the office and Sysmantec finds W32.Korgo.W on one of my users but is unable to remove it and just quarintines them. I ran Symantec from the safe mode and it has found more than 6000 files and just on the letter G's... If anyone can help I'd appreciate it very much.

DK
0
Comment
Question by:daniels48
  • 4
  • 2
  • 2
10 Comments
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 11765790
Hello daniels48 =)

Have u tried the Instructions here >> http://securityresponse.symantec.com/avcenter/venc/data/w32.korgo.w.html
0
 

Author Comment

by:daniels48
ID: 11771930
Thanks but that was what I tried and it ran over night finding 10,000 afected files and was only up to the files with the letter G and was never able todelete any of them but was able to Quaritine them and there were no entries in regedit. It never finishes. It's like the darn thing keep populating itself as to where you can't keep up..

Thanks
Dan
0
 
LVL 21

Accepted Solution

by:
jvuz earned 500 total points
ID: 11771959
Do a check with Stinger:

http://vil.nai.com/vil/stinger/
0
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 11771977
Its wierd =|

Can u Download HijackThis v1.98.2, run it, Save the LOG file and Post it here:
http://tools.radiosplace.com/HijackThis.exe

let's see what is really going on ur system :-?
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 

Author Comment

by:daniels48
ID: 11785782
Jvuz,
      Thanks so much about stinger. It ran all night and was able to find and delete all the infected files it created which were well over 15,000. All cleaned and good to go. I want to also thank everyne for their suggestions also and you made me a hero.... Just for a day.. Ha!

DK
0
 
LVL 21

Expert Comment

by:jvuz
ID: 11807284
Is your problem solved? If so, please accept the answer that helped you most or if it were more then 1 answer, you can split the points.

Jvuz
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12023941
Fine by me,

Jvuz
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12051641
Thanx,

Jvuz
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now