5360 (packed with FSG)
(Win32.Msblast.A, W32.Blaster.Worm (NAV), W32/Blaster-B (Sophos))
Not available for the moment.
There are two ways in order to remove Win32.Msblast.B:
- Using BitDefender Professional/Standard Edition v7.x
- Download and install the patch released by Microsoft Windows DCOM RPC vulnerability (the 32 bit version);
- If you haven’t installed BitDefender click here to download an evaluation version;
- Make sure that you have the latest updates using BitDefender Live!;
- Make the following changes in the windows registry:
Note: Please make sure to modify only the specified values. It is also recommended to backup the windows registry before proceeding with these changes. For more information on backing the registry please read the FAQ.
a. Select Run... from Start, then type regedit and press Enter;
b. Delete the value "Microsoft Inet Xp.." in the registry key:
- Reboot the computer;
- Perform a full scan of your system (selecting, from the Action tab, the option Prompt user for action). Choose to delete all the files infected with Win32.Msblast.B (delete the %SYSTEM%\teekids.exe file).
Now you computer is clean from Win32.Msblast.B.
- Also, you can use the second removal procedure: using the free removal tool for this particular virus that BitDefender Virus Analyze Team has released.
Important: You will have to close all applications before running the tool (including the antivirus shields) and to restart the computer afterwards. Additionally you'll have to manually delete the infected files located in archives and the infected messages from your mail client.
The BitDefender Antimsblast-EN.exe tool does the following:
- it detects all the known Win32.Msblast versions;
- it kills the process from memory;
- it deletes the files infected with Win32.Msblast;
- it repairs the Windows registry.
Now, your computer is clean from Win32.Msblast.
Mircea Ciubotariu BitDefender Virus Researcher
It is exactly the same as Win32.Msblast.A, except it has some strings changed, namely:
Spreading file is %SYSTEM%\\teekids.exe (e.g. C:\Windows\System32)
Target registry key is:
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Inet Xp..]
Unused strings are now:
“Microsoft can s*** my left t****!”
“Bill Gates can s*** my right t****! And All Antivirus Makers Can S*** My Big Fat C***”