Make your own free website on Tripod.com

Home

Virus Info | Firewall | W32.Blaster.Worm | W32.Welchia.Worm | W32.Sobig.F@mm | INDEX | DEMO'S | Other Links | Driver Updates | Mohaa HELP Page | SPEED TEST | Mohaa Patches | MOHAA Links | MOH console | MAP LIST | Mohaa OBJ Maps 1 | Mohaa OBJ Maps 2 | Mohaa SP Maps | Mohaa DM Maps | Mohaa DM Maps 2 | Mohaa Map Packs | Spearhead Patches & No CD Cracks | Spearhead Maps & Links | Spearhead Maps | MoH Breakthrough | Pacific Assault | MOHAA Civil War | Mohaa junglewarfare | Mohaa AssaultOnIraq | MOHAA 1936! | Mohaa Swat Mod | Mohaa Operation Marketgarden | Mohaa Map making | Call of Duty | NOLF | NOLF MAPS | NOLF HELP Page | Operation Flashpoint | Operation Flashpoint 2 | RogueSpear | GHOST RECON | Ravin Shield | RogueSpear info | American's Army | Battlefield 1942 | BF 1942 Expansion Pack | BF 1942 Expansion Pack | Battlefield Vietnam | BF-1942 Maps | Wolfenstein | Wolfenstein Map II | Computer INFO | Ram INFO | add your link here | Gamespy Info | Upcoming Games | Screen Shots
ONLINE GAMES 8
W32.Welchia.Worm

Enter subhead content here

Virus: W32.Welchia.Worm

A w32.Blaster worm virus variant was spotted for the first time early this morning (19/08/03).

This virus uses the same vulnerability (see second link below) as the Blaster worm but also contains code to exploit an earlier vulnerability (see third link below).

A user who has installed all of the Microsoft Critical updates in line with the 2003 security bulletins will not be affected by the Virus   

If either of the updates has not been applied they must both be installed.

Please follow the advise on Microsoft's web site to ensure these files are present on the PC.

If your computer becomes infected with the virus Please follow the steps below: (Even if you don't have the virus, follow the links to the Microsoft Patches and apply them to secure against future infection)

1.       Start PC and log on to Internet

2.       If you get the message "Windows Will be Shutdown in 60 seconds"

Click START then click RUN and then type in the RUN box "shutdown -a" (without the quotes) and click OK  

This should stop the countdown.

Next you need to remove the virus - See Link below 

The important thing is to get the patch from Microsoft or you will keep on getting the virus. - See the links below:

Click herefor the Symantec removal tool 

Click here For the Microsoft patch (Bulletin MS03-026) 

Click here For The Microsoft patch (Bulletin MS03-007) 

W32.Welchia.Worm Removal Tool

Discovered on: August 18, 2003
Last Updated on: August 19, 2003 02:58:49 PM GDT

Symantec Security Response has developed a removal tool to clean infections of W32.Welchia.Worm.

What the tool does

The W32.Welchia.Worm Removal Tool does the following:

  1. Terminates the W32.Welchia.Worm viral processes.
  2. Deletes the W32.Welchia.Worm files.
  3. Deletes the registry values that W32.Welchia.Worm added.
  4. Deletes the services created by W32.Welchia.Worm.

Available command-line switches for this tool


Switch

Description

/HELP, /H, /?

Displays the help message.

/NOFIXREG

Disables the registry repair. (We do not recommend using this switch).

/SILENT, /S

Enables the silent mode.

/LOG=<path name>

Creates a log file where <path name> is the location in which to store the tool's output. By default, this switch creates the log file, FixWelch.log, in the same folder from which the removal tool was executed.

/MAPPED

Scans the mapped network drives. (We do not recommend using this switch. See the following Note.)

/START

Forces the tool to immediately start scanning.

/EXCLUDE=<path>

Excludes the specified <path> from scanning. (We do not recommend using this switch.)

Note: Using the /MAPPED switch does not ensure the complete removal of the virus on the remote computer, because:
  • The scanning of mapped drives scans only the mapped folders. This may not include all the folders on the remote computer, which can to lead to missed detections.
  • If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file.

Therefore, you should run the tool on every computer.

Obtaining and running the tool

Note
: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.
  1. Download the FixWelch.exe file from: http://www.symantec.com/avcenter/FixWelch.exe.
  2. Save the file to a convenient location, such as your downloads folder or the Windows desktop (or removable media known to be uninfected).
  3. To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.
  4. If you are running Windows Me or XP, then disable System Restore. Refer to the "System Restore option in Windows Me/XP" section later in this writeup for further details.

    Caution
    : If you are running Windows Me/XP, we strongly recommend that you do not skip this step.

  5. Double-click the FixWelch.exe file to start the removal tool.
  6. Click Start to begin the process, and then allow the tool to run.
  7. Restart the computer.
  8. Run the removal tool again to ensure that the system is clean.
  9. If you are running Windows Me/XP, then re-enable System Restore.
  10. Run LiveUpdate to make sure that you are using the most current virus definitions.

Note: The removal procedure may not be successful if Windows Me/XP System Restore is not disabled as previously directed, because Windows prevents System Restore from being modified by outside programs.

When the tool has finished running, you will see a message indicating whether W32.Welchia.Worm infected the computer. In the case of a removal of the worm, the program displays the following results:
  • Total number of the scanned files.
  • Number of deleted files.
  • Number of terminated viral processes.
  • Number of fixed registry entries.

Digital signature

FixWelch.exe is digitally signed. Symantec recommends that you only use copies of FixWelch.exe, which have been directly downloaded from the Symantec Security Response Web site. To check the authenticity of the digital signature, follow these steps:
  1. Go to http://www.wmsoftware.com/free.htm.
  2. Download and save the chktrust.exe file to the same folder in which you saved FixWelch.exe (for example, C:\Downloads).
  3. Depending on your operating system, do one of the following:
    • Click Start, point to Programs, and then click MS-DOS Prompt.
    • Click Start, point to Programs, click Accessories, and then click Command Prompt.

  4. Change to the folder in which FixWelch.exe and Chktrust.exe are stored, and then type: chktrust -i FixWelch.exe.

    For example, if you saved the file to the C:\Downloads folder, you would enter the following commands:

    cd\
    cd downloads
    chktrust -i FixWelch.exe


    Press Enter after typing each command. If the digital signature is valid, you will see the following:

    "Do you want to install and run "W32.Welchia Removal Tool" signed on 8/19/2003 14:26 PM GMT and distributed by Symantec Corporation?"

    Note
    • The date and time displayed in this dialog box will be adjusted to your time zone, if your computer is not set to the Pacific time zone.
    • If you are using Daylight Saving time, the time displayed will be exactly one hour earlier.
    • If this dialog box does not appear, there are two possible reasons:
      • The tool is not from Symantec: Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec Web site, you should not run it.
      • The tool is from Symantec and is legitimate: However, your operating system was previously instructed to always trust content from Symantec. For information on this and on how to view the confirmation dialog again, read the document, "How to restore the Publisher Authenticity confirmation dialog box."

  5. Click Yes to close the dialog box.
  6. Type exit, and then press Enter. (This will close the MS-DOS session.)

System Restore option in Windows Me/XP
Users of Windows Me and Windows XP should temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a computer becomes infected with a virus, worm, or Trojan, it is possible that System Restore backed up the virus, worm, or Trojan on the computer.

Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential to restore an infected file onto your computer even after you have cleaned the infected files from all the other locations.

Also, in some cases, online scanners may detect a threat in the System Restore folder even though you scanned your computer with an antivirus program and did not find any infected files.

For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, "Anti-Virus Tools Cannot Clean Infected Files in the _Restore Folder," Article ID: Q263455.

Revision History:

  • August 19, 2003. Posted version 1.0.1.

Enter supporting content here