• All new members please introduce your self here and welcome to the board:
    http://www.professionalmuscle.com/forums/showthread.php?t=259
Buy Needles And Syringes With No Prescription
M4B Store Banner
intex
Riptropin Store banner
Generation X Bodybuilding Forum
Buy Needles And Syringes With No Prescription
Buy Needles And Syringes With No Prescription
Mysupps Store Banner
IP Gear Store Banner
PM-Ace-Labs
Ganabol Store Banner
Spend $100 and get bonus needles free at sterile syringes
Professional Muscle Store open now
sunrise2
PHARMAHGH1
kinglab
ganabol2
Professional Muscle Store open now
over 5000 supplements on sale at professional muscle store
boslabs1
granabolic1
napsgear-210x65
monster210x65
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
DeFiant
UGFREAK-banner-PM
STADAPM
yms-GIF-210x65-SB
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
wuhan2
dpharma
marathon
zzsttmy
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
azteca
crewguru
advertise1x
advertise1x
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store

W32.Blaster.Worm

John bench

New member
Registered
Joined
Jul 19, 2002
Messages
202
W32.Blaster.Worm exploits the DCOM RPC vulnerability. This is described in Microsoft Security Bulletin MS03-026, and a patch is available there. You must download and install the patch. In many cases, you will need to do this before continuing with the removal instructions. If you are not able to remove the infection or prevent re-infection using the following instructions, first download and install the patch.

Additional information, and an alternate site from which to download the Microsoft patch is available in the Microsoft article What You Should Know About the Blaster Worm and Its Variants.

Because of the way the worm works, it may be difficult to connect to the Internet to obtain the patch, definitions, or removal tool before the worm shuts down the computer. It has been reported that, for users of Windows XP, activating the Windows XP firewall may allow you to download and install the patch, obtain virus definitions, and run the removal tool. This may also work with other firewalls, although this has not been confirmed.

--------------------------------------------------------------------------------

What the tool does
The W32.Blaster.Worm Removal Tool does the following:
Terminates the W32.Blaster.Worm, W32.Blaster.B.Worm, and W32.Blaster.C.Worm viral processes.
Deletes the W32.Blaster.Worm, W32.Blaster.B.Worm, and W32.Blaster.C.Worm files.
Deletes the dropped files.
Deletes the registry values that have been added.

Command-line switches available with this tool

Switch

Description

/HELP, /H, /?
Displays the help message.

/NOFIXREG
Disables registry repair. (We do not recommend using this switch.)

/SILENT, /S
Enables silent mode.

/LOG=<path name>
Creates a log file where <path name> is the location in which to store the tool's output. By default, this switch creates the log file, FixBlast.log, in the same folder from which the removal tool was executed.

/MAPPED
Scans the mapped network drives. (We do not recommend using this switch. Refer to the following Notes.)

/START
Forces the tool to immediately start scanning.

/EXCLUDE=<path>
Excludes the specified <path> from scanning. (We do not recommend using this switch.)


--------------------------------------------------------------------------------
Note: Using the /MAPPED switch does not ensure the complete removal of the virus on the remote computer, because:
Scanning the mapped drives scans the mapped folders only. This action may not include all the folders on the remote computer, leading to missed detections.
If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file.

For these reasons, run the tool on every computer.

--------------------------------------------------------------------------------

Restoring Internet connectivity and preventing the computer from shutting down
In many cases, on both Windows 2000 and XP, changing the settings for the Remote Call Procedure (RPC) service may allow you to connect to the Internet to obtain downloads, and will stop the computer from shutting down.

Click Start > Run. (The Run dialog box appears.)
Type:

SERVICES.MSC /S

in the open line, and then click OK. (The Services window opens.)


In the right pane, locate the Remote Procedure Call (RPC) service.



--------------------------------------------------------------------------------
CAUTION: A service named Remote Procedure Call (RPC) Locator exists. Do not confuse the two.
--------------------------------------------------------------------------------



Right-click the Remote Procedure Call (RPC) service, and then click Properties.
Click the Recovery tab.
Using the drop-down lists, change First failure, Second failure, and Subsequent failures to "Restart the Service."
Click Apply, and then click OK.


--------------------------------------------------------------------------------
CAUTION: Make sure that you change these settings back once you have removed the worm.
--------------------------------------------------------------------------------


Obtaining and running the tool

--------------------------------------------------------------------------------
Note: You need administrative rights to run this tool on Windows 2000 or Windows XP.
--------------------------------------------------------------------------------

Download the FixBlast.exe file from:

http://securityresponse.symantec.co...er/FixBlast.exe



Save the file to a convenient location, such as your downloads folder or the Windows Desktop (or removable media that is known to be uninfected, if possible).
To check the authenticity of the digital signature, refer to the section, "Digital signature."
Close all the running programs before running the tool.
If you are running Windows XP, then disable System Restore. Refer to the section, "System Restore option in Windows Me/XP," for additional details.


--------------------------------------------------------------------------------
CAUTION: If you are running Windows XP, we strongly recommend that you do not skip this step. The removal procedure may be unsuccessful if Windows XP System Restore is not disabled, because Windows prevents outside programs from modifying System Restore.
--------------------------------------------------------------------------------


Double-click the FixBlast.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.


--------------------------------------------------------------------------------
Note: If, when running the tool, you see a message that the tool was not able to remove one or more files, run the tool in Safe mode. Shut down the computer, turn off the power, and wait 30 seconds. Restart the computer in Safe mode and then run the tool again. All the Windows 32-bit operating systems, except Windows NT, can be restarted in Safe mode. For instructions, read the document "How to start the computer in Safe Mode."
--------------------------------------------------------------------------------


Restart the computer.
Run the removal tool again to ensure that the system is clean.
If you are running Windows XP, then re-enable System Restore.
Run LiveUpdate to make sure that you are using the most current virus definitions.

When the tool has finished running, you will see a message indicating whether W32.Blaster.Worm infected the computer. In the case of a worm removal, the program displays the following results:
Total number of the scanned files
Number of deleted files
Number of terminated viral processes
Number of fixed registry entries

Digital signature
FixBlast.exe is digitally signed. Symantec recommends that you only use copies of FixBlast.exe that have been directly downloaded from the Symantec Security Response Web site. To check the authenticity of the digital signature, follow these steps:
Go to http://www.wmsoftware.com/free.htm.
Download and save the Chktrust.exe file to the same folder in which you saved FixBlast.exe (for example, C:\Downloads).
Depending on your operating system, do one of the following:
Click Start, point to Programs, and then click MS-DOS Prompt.
Click Start, point to Programs, click Accessories, and then click Command Prompt.


Change to the folder in which FixBlast.exe and Chktrust.exe are stored, and then type:

chktrust -i FixBlast.exe

For example, if you saved the file to the C:\Downloads folder, you would enter the following commands:

cd\
cd downloads
chktrust -i FixBlast.exe

Press Enter after typing each command. If the digital signature is valid, you will see the following:

Do you want to install and run "W32.Blaster.Worm Removal Tool" signed on 8/14/2003 08:52 AM and distributed by Symantec Corporation?


Notes:
The date and time displayed in this dialog box will be adjusted to your time zone if your computer is not set to the Pacific time zone.
If you are using Daylight Saving time, the displayed time will be exactly one hour earlier.
If this dialog box does not appear, there are two possible reasons:
The tool is not from Symantec. Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec Web site, do not run it.
The tool is from Symantec and is legitimate, however, your operating system was previously instructed to always trust content from Symantec. For information on this and on how to view the confirmation dialog again, read the document "How to restore the Publisher Authenticity confirmation dialog box."


Click Yes to close the dialog box.
Type Exit, and then press Enter. This will close the MS-DOS session.

System Restore option in Windows XP
Users of Windows XP should temporarily turn off System Restore. Windows XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.

Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.

Also, in some cases, online scanners may detect a threat in the System Restore folder even though you scanned your computer with an antivirus program and did not find any infected files.

For instructions on how to turn off System Restore, read your Windows documentation, or the article "How to turn off or turn on Windows XP System Restore."


How to run the tool from a floppy disk
Insert the floppy disk, which contains the FixBlast.exe file, in the floppy disk drive.
Click Start, and then click Run.
Type the following:

a:\FixBlast.exe

and then click OK:

Note: There are no spaces in the command, a:\FixBlast.exe.


Click Start to begin the process, and then allow the tool to run.
If you are using Windows Me, re-enable System Restore.



Revision History:


August 14, 2003: Posted version 1.0.4 with added support for W32.Blaster.C.Worm.
August 13, 2003: Posted version 1.0.2 with added support for W32.Blaster.B.Worm.


__________________
 
Let me tell you

As a network admin/tech support this virus was no fun, hit all of our win2000 machines. Fairly easy to fix, but caugh us off guard for sure.
 
Windows 98

If you use older versions of windows, you couldn't get this virus could you?
 
Re: Windows 98

mike man said:
If you use older versions of windows, you couldn't get this virus could you?
I believe it only affected computers with the NT-based operating systems like Windows 2000 and XP.

I have Win2000 but run the ZoneAlarm Pro firewall and didn't get it. My understanding is that you cannot get these worms if you operate through a firewall.

xcel
 

Staff online

  • K1
    Blue-Eyed Devil

Forum statistics

Total page views
575,838,191
Threads
138,424
Messages
2,857,005
Members
161,423
Latest member
Asap1124
NapsGear
HGH Power Store email banner
yourdailyvitamins
Prowrist straps store banner
yourrawmaterials
FLASHING-BOTTOM-BANNER-210x131
raws
Savage Labs Store email
Syntherol Site Enhancing Oil Synthol
aqpharma
yms-GIF-210x131-Banne-B
hulabs
ezgif-com-resize-2-1
MA Research Chem store banner
MA Supps Store Banner
volartek
Keytech banner
musclechem
Godbullraw-bottom-banner
Injection Instructions for beginners
YMS-210x131-V02
3
thc
YMS-210x131-V02
Back
Top