How :

Posted on 2006-04-10
Last Modified: 2010-03-05
Hi experts,

  In our Domain, Many Computers are infected By

and the number of that are increising rapidly

we can remove that worm manualy because the intivirus cann't remove it unless through SAVE MODE

Q1-Are There Any Way To remove it Automatically

Q2- How Can I protect the Rest of Our Machine From the Infection,

Question by:kfna_it
    LVL 65

    Expert Comment

    Im afraid that there is no automatically removal procedure for this nasty worm!

    Your best option is to disconnect the un-infected machines from the domain immediately to protect them, and then run the Updated AV scans on the infected machines one by one to get rid of the virus after disabling system restore
    LVL 7

    Expert Comment


    There is a removal tool here

    If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

    For instructions on how to do this, refer to your Windows documentation, or the document: How to configure shared Windows folders for maximum network protection.

    If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only.
    This tool is not designed to run on Novell NetWare servers. To remove this threat from a NetWare server, first make sure that you have the current virus definitions, and then run a full system scan with the Symantec antivirus product.

    How to download and run the tool

    Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.

    Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: XADM: Do Not Back Up or Scan Exchange 2000 Drive M (Article 298924).

    Follow these steps to download and run the tool:
    Download the FixMytob.exe file from:
    Save the file to a convenient location, such as your Windows desktop.
    Optional: To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.

    Note: If you are sure that you are downloading this tool from the Security Response Web site, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the "Digital signature" section before proceeding with step 4.

    Close all the running programs.
    If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
    If you are running Windows Me or XP, turn off System Restore. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
    How to disable or enable Windows Me System Restore
    How to turn off or turn on Windows XP System Restore

    Locate the file that you just downloaded.
    Double-click the FixMytob.exe file to start the removal tool.
    Click Start to begin the process, and then allow the tool to run.
    Restart the computer.
    Run the removal tool again to ensure that the system is clean.
    If you are running Windows Me/XP, then reenable System Restore.
    If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.
    Run LiveUpdate to make sure that you are using the most current virus definitions.

    When the tool has finished running, you will see a message indicating whether the threat has infected the computer. The tool displays results similar to the following:
    Total number of the scanned files
    Number of deleted files
    Number of repaired files
    Number of terminated viral processes
    Number of fixed registry entries

    What the tool does

    The Removal Tool does the following:
    Terminates the associated processes
    Deletes the associated files
    Deletes the registry values added by the threat
    Repairs the hosts file


    The following switches are designed for use by network administrators:



    /HELP, /H, /?
    Displays the help message.

    Disables the registry repair (We do not recommend using this switch).

    /SILENT, /S
    Enables the silent mode.

    Creates a log file where [PATH NAME] is the location in which to store the tool's output. By default, this switch creates the log file, FixMytob.log, in the same folder from which the removal tool was executed.

    Scans the mapped network drives. (We do not recommend using this switch. See the following Note.)

    Forces the tool to immediately start scanning.

    Excludes the specified [PATH] from scanning. (We do not recommend using this switch. See the following Note.)

    Prevents the scanning of the file system.

    Important: Using the /MAPPED switch does not ensure the complete removal of the virus on the remote computer, because:
    The scanning of mapped drives scans only the mapped folders. This may not include all the folders on the remote computer, which can lead to missed detections.
    If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file.

    Therefore, you should run the tool on every computer.

    The /EXCLUDE switch will only work with one path, not multiple. An alternative is the /NOFILESCAN switch followed by a manual scan with AntiVirus. This will let the tool alter the registry. Then, scan the computer with AntiVirus with current virus definitions. With these steps, you should be able to clean the file system.

    The following is an example command line that can be used to exclude a single drive:

    "C:\Documents and Settings\user1\Desktop\FixMytob.exe" /EXCLUDE=M:\ /LOG=c:\Mytob.txt

    Alternatively, the command line below will skip scanning the file system, but will repair the registry modifications. Then, run a regular scan of the system with proper exclusions:

    "C:\Documents and Settings\user1\Desktop\FixMytob.exe" /NOFILESCAN /LOG=c:\Mytob.txt

    Note: You can give the log file any name and save it to any location.


    Author Comment

    thanks all

    SheharyaarSaahil , That is Good Idea But It is very Deficult (more than 700 PC) ..

    imacgouf , I think that Fix tool can't work with " " >> very nice method

    -- Experts; Do you think when we install  "Microsoft Security Bulletin MS04-011 & MS03-026"
                                         will protect un-infected PCs??


    LVL 32

    Expert Comment

    "Do you think when we install  "Microsoft Security Bulletin MS04-011 & MS03-026" will protect un-infected PCs??"

    Yes, those should offer protection. But those are quite old patches. If you haven't even installed those you really are vulnerable to a lot more than just this one worm. Consider running MBSA or in some other way check what patches you might need.
    LVL 23

    Expert Comment

    by:Mohammed Hamada
    Hello kfna_it

    Try to create and run a batch file on each pc with Shehrayar's recommendation..
    Good Luck
    LVL 17

    Accepted Solution

    Yes, those *should* work in preventing new infections. But you're failing to take into account that as long as you leave the infected machines on the network, they're going to generate a ton of emails. So ideally you want to disconnect the known infected ones from the network, then clean them.

    Stick manual removal with Safe Mode... because System Restore is going to partly mess you up if you have XP machines. (You MIGHT get away with automatic removal via batch file or script if you're using all 2000 machines, but see first paragraph)
    LVL 8

    Expert Comment

    Just do the Windows Update as often as you can, there will always be some
    malicious removal tools to deal with such worms. Also Windows Update will
    help you stay up to date and avoid such bug-related worms and viruses.

    This is a kind of a basic thing when administrating such amount of machines.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now