[Dshield] Yaha question

D.P. Farner jeremiah at onlinebusinesspages.com
Wed Nov 27 17:30:50 GMT 2002


I am sending you the fix page from symantec. If you are on a lan system or are connected to remote computers, they all have to be cleaned. Read symantec's instructions slowly.



       
     











             

            © 1995-2002 Symantec Corporation.
            All rights reserved.
            Legal Notices
            Privacy Policy

           
      W32.Yaha Removal Tool
                              Discovered on: July 3, 2002 
                              Last Updated on: July 24, 2002 03:23:13 PM PDT 

                         
                                  


                        What the tool does
                        The W32.Yaha.E at mm/W32.Yaha.F at mm Removal Tool does the following: 

                          1. It terminates all the viral W32.Yaha.E at mm and W32.Yaha.F at mm processes.
                          2. It deletes the viral W32.Yaha.E at mm and W32.Yaha.F at mm files.
                          3. It fixes the registry entry altered by the worm.

                        Command-line switches available with this tool



                              Switch 

                              Description 

                              /HELP, /H, /? 
                              Displays the help message. 

                              /NOFIXREG 
                              Disables registry repair (the use of this switch is not recommended). 

                              /SILENT, /S 
                              Enables silent mode. 

                              /LOG=<path name> 
                              Creates a log file where <path name> is the location in which to store the tool's output. By default, this switch creates the log file FixYaha.log in the same folder from which the removal tool was executed. 

                              /MAPPED 
                              Scans mapped network drives (the use of this switch is not recommended--see notes). 

                              /START 
                              Forces the tool to start scanning immediately. 

                              /EXCLUDE=<path> 
                              Excludes the specified <path> from scanning (the use of this switch is not recommended). 


                        NOTE: The use of the /MAPPED switch does not ensure the complete removal of the virus on the remote computer because: 
                          a.. The scanning of mapped drives scans only the folders that are mapped. This might not include all folders on the remote computer, and this can to lead to missed detections. 
                          b.. If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer is using this file. 

                        For these reasons, you should run the tool on every computer.

                        To obtain and run the tool

                        NOTE: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.

                          1. Download the FixYaha.com file from:

                          http://securityresponse.symantec.com/avcenter/FixYaha.com

                          2. Save the file to a convenient location, such as your downloads folder or the Windows desktop (or removable media that is known to be uninfected, if possible).
                          3. To check the authenticity of the digital signature, refer to the section The digital signature.
                          4. Close all running programs before running the tool.
                          5. If you are on a network or you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
                          6. If you are running Windows Me or XP, then disable System Restore. Please refer to the section System Restore option in Windows Me/XP for additional details.

                          CAUTION: If you are running Windows Me/XP, we strongly recommend that you do not skip this step.

                          7. Double-click the FixYaha.com file to start the removal tool.
                          8. Click Start to begin the process, and then allow the tool to run.
                          9. Restart the computer.
                          10. Run the removal tool again to ensure that the system is clean.
                          11. If you are running Windows Me/XP, then re-enable System Restore.
                          12. Run LiveUpdate to make sure that you are using the most current virus definitions.

                        NOTE: The removal procedure might be unsuccessful if Windows Me/XP System Restore is not disabled as previously directed because Windows prevents System Restore from being modified by outside programs. Because of this, the removal tool might fail.

                        When the tool has finished running, you will see a message indicating whether the computer was infected by W32.Yaha.E at mm/W32.Yaha.F at mm. In the case of a removal of the worm, the program displays the following results: 
                          a.. The total number of the scanned files. 
                          b.. The number of deleted files. 
                          c.. The number of viral processes terminated. 
                          d.. The number of registry entries fixed.

                        The digital signature
                        FixYaha.com is digitally signed. Symantec recommends that you only use copies of FixYaha.com that have been downloaded directly from the Symantec Security Response download site. To check the authenticity of the digital signature, follow these steps: 
                          1. Go to http://www.wmsoftware.com/free.htm
                          2. Download and save the chktrust.exe file to the same folder where you saved FixYaha.com (for example, C:\Downloads).
                          3. Depending on your operating system, do one of the following: 
                            a.. Click Start, point to Programs, and click MS-DOS Prompt. 
                            b.. Click Start, point to Programs, click Accessories, and then click Command Prompt.
                          4. Change to the folder where FixYaha.com and Chktrust.exe are stored, and then type:

                          chktrust -i FixYaha.com

                          For example, if you saved the file to the C:\Downloads folder, you would enter the following commands:

                          cd\
                          cd downloads
                          chktrust -i FixYaha.com

                          Press Enter after typing each command. If the digital signature is valid, you will see the following:

                          Do you want to install and run "W32.Yaha Fix Tool" signed on 07/03/2002 1:26 PM and distributed by Symantec Corporation.

                          NOTES: 
                              a.. The date and time that are displayed in this dialog box will be adjusted to your time zone if your computer is not set to the Pacific time zone. 
                              b.. If you are using Daylight Saving time, the time that is displayed will be exactly one hour earlier. 
                              c.. If this dialog box does not appear, there are two possible reasons: 
                                a.. The tool is not from Symantec. Unless you are sure that the tool is legitimate, and that you downloaded it from the legitimate Symantec Web site, you should not run it. 
                                b.. The tool is from Symantec, and is legitimate. However, your operating system was previously instructed to always trust content from Symantec. For information on this, and how to view the confirmation dialog again, read the document How to restore the Publisher Authenticity confirmation dialog box.
                          5. Click Yes to close the dialog box.
                          6. Type exit and then press Enter. This will close the MS-DOS session.

                        System Restore option in Windows Me/XP
                        Windows Me and Windows XP users should temporarily turn off System Restore. This feature, which is enabled by default, is used by Windows Me/XP to restore files on your computer in case they become damaged. When a computer is infected with a virus, worm, or Trojan, it is possible that the virus, worm, or Trojan could be backed up by System Restore. By default, Windows prevents System Restore from being modified by outside programs. As a result, there is the possibility that you could accidentally restore an infected file, or that on-line scanners would detect the threat in that location. For instructions on how to turn off System Restore, read your Windows documentation or one of the following articles: 
                          a.. How to disable or enable Windows Me System Restore. 
                          b.. How to disable or enable Windows XP System Restore.

                        For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article Anti-Virus Tools Cannot Clean Infected Files in the _Restore Folder, Article ID: Q263455.

                        How to run the tool from a floppy disk 
                          1. Insert the floppy disk that contains the FixYaha.com file in the floppy disk drive.
                          2. Click Start and then click Run.
                          3. Type the following and then click OK:

                          a:\fixyaha.com

                          NOTES: 
                              a.. There are no spaces in the command a:\fixyaha.com. 
                              b.. If you are using Windows Me, and the System Restore remains enabled, you will see a warning message. You can choose to run the removal tool with the System Restore option enabled or exit the removal tool.
                          4. Click Start to begin the process, and then allow the tool to run.
                          5. If you are using Windows Me, then reenable System Restore.



                         


                        Write-up by: Serghei Sevcenco 

                       
                 
           
     


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 43 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 4325 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0001.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1870 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0002.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1082 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0003.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1776 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0004.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 678 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0005.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1862 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0006.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1825 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0007.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 2060 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0008.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1621 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0009.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1781 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0010.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 49 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0011.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 4307 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0012.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 1590 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0013.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 503 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0014.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 504 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0015.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 52 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20021127/5aa00db0/attachment-0016.gif


More information about the list mailing list