| klwk.com utility for virus fighting
| |
In this section you will find recommendations how to fight malicious programs which cannot be disinfected by Kaspersky Lab's products. In order to disinfect/remove malicious programs you may have to modify the system registry or use an additional utility. If you failed to find the necessary information or you find these recommendations too complicated or inadequate, please send a request to the Technical Support service via the [You must be registered and logged in to see this link.].klwk.com utility for virus fighting
| ID Article: 55 | Other languages: [You must be registered and logged in to see this link.]
| 1 005 |
2010 Apr 03 23:35 |
[You must be registered and logged in to see this link.] |
While fighting Trojan-Dropper.Win32.Agent.ztu utility klwk.com replaces current network settings on recommended by your internet provider. If replace fails klwk.com installs OpenDNS resources ([You must be registered and logged in to see this link.]) as DNS servers. Sometimes installation of the above mentioned network settings may cause difficulties in the work of the network connection. In such cases Kaspersky Lab's experts recommend contacting your Internet provider in order to get and install your initial network settings. Some malicious programs prevent Antivirus package from functional mode work when installed and more often they simply block it. To fight such problems Kaspersky Lab introduces klwk.com utility. If your computer has been infected by some of the viruses that klwk.com utility can fight to help the Antivirus package full functional work you should do the following
Download [You must be registered and logged in to see this link.] utility from (it is recommended to save the executable utility file either in a special folder or on a separate media type) Unpack klwk.zip in the folder where you saved the archive file Start the executable klwk.com file without any parameters: utility will do memory scanning and will terminate the viruses processes Wait the scanning process to finalize
Start the executable klwk.com file with /s: key and the utility will do the hard disc scanning and files deletion that are supposed for atomized start by system launching and contain the malicious code Wait the scanning process to finalize
Note: list of klwk.com utility additional parameters you may need while working with the program is available [You must be registered and logged in to see this link.].
Note: you should remember that utility is supposed to fight the active copies of theses malicious programs the list of which is given below. If the infected object is e.g, in the post data base then Kaspersky Lab product will detect and delete the object itself.
Note: if you local network has been infected then before you cure the computer switch it off the net, cure it with klwk.com utility and only after that switch it on back.
[You must be registered and logged in to see this link.]
- I-Worm.Zafi.b
- I-Worm.Bagle.at,au,cx-dw
- Virus.Win32.Implinker.a
- Not-a-virus.AdWare.Visiter
- Trojan.Win32.Krotten
- Email-Worm.Win32.Brontok.n
- Backdoor.Win32.Allaple.a
- Trojan-Spy.Win32.Goldun.mg
- Email-Worm.Win32.Warezov
- Virus.Win32.VB.he
- IM-Worm.Win32.Sohanad.as
- P2P-Worm.Win32.Malas.b
- Virus.Win32.AutoRun.acw
- Worm.Win32.VB.jn
- Trojan.Win32.KillAV.nj
- Worm.Win32.AutoRun.cby
- Trojan.Win32.Agent.aec
- Trojan-Downloader.Win32.Todon.an
- Trojan-Downloader.Win32.Losabel.ap
- Worm.Win32.AutoRun.czz,daa,dhq,dfx
- Net-Worm.Win32.Rovud.a-c
- Trojan.Win32.ConnectionServices.x-aa
- Worm.Win32.AutoRun.dtx
- Worm.Win32.AutoRun.hr
- Backdoor.Win32.Agent.lad
- not-a-virus:FraudTool.Win32.UltimateDefender.cm
- Trojan-Downloader.Win32.Agent.wbu
- Backdoor.Win32.Small.cyb
- not-a-virus:FraudTool.Win32.XPSecurityCenter.c
- not-a-virus:Downloader.Win32.VistaAntivirus.a
- not-a-virus:FraudTool.Win32.UltimateAntivirus.an
- not-a-virus:FraudTool.Win32.UltimateAntivirus.ap
- Trojan-Spy.Win32.Zbot.dlh
- Trojan-Downloader.Win32.Small.abpz
- Rootkit.Win32.Ressdt.br
- Worm.Win32.AutoRun.lsf
- Worm.Win32.AutoRun.epo
- Worm.Win32.AutoRun.enw
- Backdoor.Win32.UltimateDefender.a
- Worm.Win32.AutoRun.pwi
- Worm.Win32.AutoRun.pfh
- Worm.Win32.AutoRun.qhk
- Worm.Win32.AutoRun.ouu
- Worm.Win32.AutoRun.bnb
- Worm.Win32.AutoRun.ll
- AdWare.Win32.Cinmus.sxy
- Trojan.Win32.Autoit.eo
- Worm.Win32.AutoRun.sct
- Worm.Win32.AutoRun.qkn
- not-a-virus:AdWare.Win32.Cinmus.wsu
- Trojan-Ransom.Win32.Taras.a
- Trojan-Dropper.Win32.Agent.ztu
- Trojan-Downloader.Win32.Agent.Apnd
- Worm.Win32.Autorun.qpa
- Net-Worm.Win32.Kido.j
- Worm.Win32.Autorun.dcw
- Trojan.Win32.Feedel.gen
- Trojan.Win32.Pakes.mak
- Net-Worm.Win32.Kido.r
- Net-Worm.Win32.Kido.t
- Worm.VBS.Autorun.cq
- Worm.Win32.Pinit.ac
- Worm.Win32.Pinit.ae
- Worm.Win32.Pinit.af
- Worm.Win32.Pinit.gen
- Net-Worm.Win32.Kido.bw
- Net-Worm.Win32.Kido.db
- Net-Worm.Win32.Kido.fk
- Net-Worm.Win32.Kido.fx
- Net-Worm.Win32.Kido.fo
- Net-Worm.Win32.Kido.s
- Net-Worm.Win32.Kido.dh
- Net-Worm.Win32.Kido.ee
- Net-Worm.Win32.Kido.gh
- Net-Worm.Win32.Kido.fa
- Net-Worm.Win32.Kido.gy
- Net-Worm.Win32.Kido.ca
- Net-Worm.Win32.Kido.by
- Net-Worm.Win32.Kido.if
- Net-Worm.Win32.Kido.eo
- Net-Worm.Win32.Kido.bx
- Net-Worm.Win32.Kido.bh
- Net-Worm.Win32.Kido.bg
- Net-Worm.Win32.Kido.ha
- Net-Worm.Win32.Kido.hr
- Net-Worm.Win32.Kido.da
- Net-Worm.Win32.Kido.dz
- Net-Worm.Win32.Kido.cg
- Net-Worm.Win32.Kido.eg
- Net-Worm.Win32.Kido.eq
- Net-Worm.Win32.Kido.bz
- Net-Worm.Win32.Kido.do
- Net-Worm.Win32.Kido.fw
- Net-Worm.Win32.Kido.du
- Net-Worm.Win32.Kido.cv
- Net-Worm.Win32.Kido.dv
- Net-Worm.Win32.Kido.dq
- Net-Worm.Win32.Kido.ed
- Net-Worm.Win32.Kido.em
- Net-Worm.Win32.Kido.bo
- Net-Worm.Win32.Kido.bk
- Net-Worm.Win32.Kido.bm
- Net-Worm.Win32.Kido.cs
- Net-Worm.Win32.Kido.ia
- Net-Worm.Win32.Kido.gg
- Worm.Win32.FlyStudio.bh
For decrypting the files encrypted by GpCode.ai please specify the key for decryption using /gpcode_key option. The key for decryption can be found in the readme.txt file. Please be VERY attentive when using this utility for mass decryption. Before running utility using /s mode check that your decryption key matches the one that was used when your files were encrypted. To do this, please make a copy of one of the encrypted file and run klwk.com /gpcode_key /gpcode_single . After decryption, check the file contents. If it is ok, you can use this key for mass decryption. If not, DO NOT RUN THIS UTILITY! It can damage your files by decrypting with the wrong key. |
|
Admin- Chủ Tịch Se S2T
- Con Giáp :
Tuổi giáp Trung Hoa :
Tổng số bài gửi : 1481
Điểm Se S2T : 88055
Sinh Nhật : 03/11/1990
Tham gia ngày : 27/08/2009
Tuổi : 33
Đến từ : Äồng Há»›i City
Sở thích : Máy tÃnh, Soft, AV....
Tính hài hước : Bình thÆ°á»ng
Huy chương
Sức mạnh:
(100/100)
Điểm SeS2T:
(50/50)
-
Share this post on:
Similar topics Similar topics
Permissions in this forum:
Bạn
không có quyền trả lời bài viết