my comp has been infected by pekriz 4029 virus
the problem is whatever antivirus program i download the exe file performs an illegal operation
how do i get it out of my system
Download EXEfix08.com, EXEfix08.reg, and EXEfix08.inf to your desktop. Try running the .com file first. Now see if you can run the fix tool for the virus that I assume you downloaded to try and remove it. If the EXEfix08.com file won't run then try the .reg or .inf version. For those right click on them and select install from the menu.
This virus does not work like sircam, so fixing the registry for exe or com files won't work. It has replaced the system file KERNEL32.DLL and so you really need a boot disk that can remove the virus. Take a look at
ure right downloading the files didnt work
i managed to download mcafee's virusscan but the exe files are not working
is it possible to get rid of the virus manually ???????
ive tried to download six different anti-virus softwares but either they cannot be installed or theyre not installed properly
The key point of any fix is to boot to real dos from a boot disk prepared by a noninfected computer (or the boot disk you had made before the infection.) Then, begin any cleaning operation thereafter.
The reason is that the virus is memory-resident. Anything done from the gui will be uneffective.
thanx but have already tried that
the problem is when i try to unzip it it says bad disk or file transfer error
ive just discovered another virus -W32/Hybris.gen@MM
some one pls help
no anti virus software works
Maybe am over-emphasizing. With whatever fix, it should be boot directly to dos / bootup to command prompt directly from _bootdisk_, not from c: with bootmenu selection.
Can you boot to Dos from the hard disk (hit F8 and choose command prompt only) and then run the krisfix.exe file? Otherwise try copying the file KERNEL32.DLL from another computer with the same operating system and copy it across in dos mode. I don't know if it will work, but it's worth a try.
Although booting from a floppy would be the cleanest, wouldn't this mean that the hard disk was not recognised? The fix you found actually scans the disk to fix it so I think it would have to be run from dos mode at bootup. Please correct me if I'm wrong
Your question gets me thinking as well. But, I would to start with consider practically all files on the harddisk unsafe until proven otherwise, although there is no explicit mentioning on command.com as a candidate of being infected. But, the scope of the virus at work is broad. I find the following article useful :
As to the recognition of C: at least, I don't think there would be a problem, do you? If there is other mapped or subst drives depending on the definitions in autoexec.bat, that would pose problem. But, we won't need but to call upon the partitions recognizable by their default letters. So, there should be no problem as far as the cleaning operation is concerned.
One thing truyt has to do is to locate if there is a file WINDOWS\SYSTEM\KRIZED.TT6 in his system and inspect wininit.bak which stores the trace of the virus' work to infect kernel32.dll. If the presence of the file is confirmed, he/she is on the right track.
How about sticking in the emergency bootup disk, boot up and then switch to c drive, rename the windows folder to something else then do a normal installation of windows...then install a virus checker and kill off the virus in the renamed folder...reboot with the emergency bootup disk and delete the new windows folder and finally rename the original back again..? Men are from earth. Women are from earth. Deal with it.
This is an instance where a non-gui virus scan like F-Prot is essential. As we often get info from articles of symantec, mcafee,... however, they are useful and free, they are by nature biased. So a viable alternative is to boot to dos and run F-Prot.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.