?
Solved

W32/NGVCK.a cleaning

Posted on 2004-09-27
6
Medium Priority
?
1,091 Views
Last Modified: 2013-12-04
A friend has McAfee Virus Online.  A scan shows 534 files infected, mostly by NGVCK.a virus.

After running the scan, it says it can't clean the files, and gives me the opportunity to quarantine them.  However, some of them are system files and it seems like a quarantine would make the system inoperable.  

I am getting a Windows File Protection asking to replace some of the affected files if I've got the CD  (Home Edition).

What's the best way to clean this?
0
Comment
Question by:kellysmith120
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 12170165
McAfee Stinger...
http://vil.nai.com/vil/stinger/
-rich
0
 

Author Comment

by:kellysmith120
ID: 12170258
Thanks, rich.  I saw the stinger from McAfee, but it doesn't specifically list the virus in question.  Also, the Online version I'm running detects the virus fine, but says they can't be fixed.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 150 total points
ID: 12170430
Did you try stinger anyway?
I don't see any standalone remover's for this- but it's rumored that this tool could do it
http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.removal.tool.html but not guarnteed

http://support.f-secure.com/enu/home/ols.shtml might be able to help...

This virus may be too much for a standalone tool to remove- if you have a friend with an updated AV product, perhaps you can bring your HD over to them, and install it in thier pc as a slave drive, and they can scan you HD and remove the files (like unblaster.exe)
TDS3 may also help you http://tds.diamondcs.com.au/index.php?page=download GL
-rich
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:kellysmith120
ID: 12172012
I've downloaded the stinger for her, but it seems pretty precise about the viruses it detects.

I have a full version of McAfee on line running, so I'm not sure why it wouldn't take care of it.  The only thing I can come up with is disabling the System Restore.  Most of the files aren't don't appear to be system restore locked, so that might not work either.

I'll try both solutions (System Restore and the removal tools).  If the System Restore doesn't fix it, and the tools do, I'll award the points.

Otherwise, to clarify and repeat the question - My virus software found infections with the NGVCK.a on system files (C:\winnt , etc.), and says it can't clean them, and I'm assuming that I can't just 'delete' them.  How do I remove the virus (using McAfee Online) from my system?
0
 

Author Comment

by:kellysmith120
ID: 12172387
FYI - I will be out of town for a couple of days, but will check back  before I leave and again when I return.
0
 

Author Comment

by:kellysmith120
ID: 12221776
Stinger didn't remove it.  She's given up and going to reformat it.  

The answer didn't help me, but I'll award them for maybe helping someone else who reads it and is unaware of Stinger.
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month14 days, 18 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question