Would appreciate guidance on removing Cekar.A virus from Windows 2003 DC

Posted on 2007-08-08
Last Modified: 2013-11-22
I run AVG 7.5 Enterprise anti-virus on a Windows 2003 domain controller that doubles as a file server.  It picked up Cekar.A virus which infected all the .exe files on this server.  I have run AVG which has quarintined all the files but is not healing them.  I have not been able to locate a removal tool.  If anyone knows a safe method to remove Cekar.A...your guidance would be greatly apprecitated.  
Question by:NetAdminGuy
    LVL 7

    Accepted Solution

    There is no removal tool for the W32/Cekar-A virus.

    I highly recommend you contact Grisoft's Technical Support by using the following link.

    Make sure when contacting them to include version information for your Operating System, AVG version and license number.  To find those details, follow the instructions from the following link.

    They will give instructions on what can be done to clean your system using their product.
    LVL 3

    Author Comment

    Wasnt the way I'd hoped to go about it but this got the job done.  There wasnt a fix...server restore underway.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    Suggested Solutions

    Title # Comments Views Activity
    Hardening Windows 10 to prevent Cryptolocker incident ? 16 158
    .Code New Varient 5 66
    Locky virus 9 60
    Yet another Ransome ware 13 104
    As more computers now shipped with 64-bit version of Windows, more users are now using this Operating System.  So it's important to be aware how some 32-bit diagnostic tool works on these systems, so we know what to expect when analyzing the logs an…
    OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
    This video discusses moving either the default database or any database to a new volume.
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now