Anti Virus Software &Home Pages |
---|
Back to Web Utility
Pages
Back to the Lauderdale County Homepage To the Windows 3.x Anti-virus Files How to Deal with: Viruses online and offline FAQ for Virus and Submit a question for the FAQ "Happy99" email attachment virus info All local copies linked to here are for Win95 unless noted Download Calculator now available to figure approximate download times |
|
|||
|
|
|
|
|
|
|
|
|
*Local copy Not Available- Home Page Link |
McAfee
Anti-Virus |
||
|
|
|
|
|
|
|
|
|
|
||
|
|
|
March 98 443 KB This is the last one for version 2.x |
June 11, 1999 1817 KB |
October 23, 1999 1802 Kb |
|
||
|
||
|
Norton
Antivirus |
||
|
|
|
|
|
|
|
|
|
30 day trial version |
|
|
30 day trial version |
|
|
|
||
|
|
|
Definitions update |
|
[these are now handled with "Live Update"] |
Home Page |
||
|
|
|
for Windows 95 |
|
|
4.02 |
|
|
ThunderByte
AntiVirus |
||
|
|
|
|
|
|
F-Secure
Antivirus |
||
|
|
|
|
|
|
Windows 98 Plugin Viruses and Trojans- Windows 98 changes some of the networking abilities of Windows 95, making the configuration much simpler. On the face of it that appears to be a good thing, but it also allows for small server programs to be installed in the system allowing remote users access and user priviledges to a PC connected to the Internet. The programs listed below are supposed to clean the registry settings that allow this and are listed by the name of the plugin virus. | ||
|
|
|
|
|
|
|
This Information courtesy Symantec's website:
Description: BackOrifice.Trojan is a program or applet that may cause detrimental affects to your system and should be deleted. Additional Comments:
|
This Information courtesy
Network Associates website:
Virus Profile McAfee Online : Support : Virus Information Library
Date Added
Virus Characteristics
|
|
This Information courtesy Symantec's
website:
Description: This virus targets the Windows NT platform. It infects executable files on an infected WinNT machine as well as executable files on attached network drives. If a user with administrator privileges executes an infected program, the virus installs itself as a service called "Remote Explorer". The virus-installed service resides on the infected system as the file "IE403R.SYS" in the "\WinNT\System32\drivers" folder. On weekdays between 6AM and 3PM, the virus sets its thread priority to the lowest setting. On weekdays between 3PM and 6AM and on weekends, the virus sets its thread priority to one step above the lowest setting. Thus the virus becomes more active during "off-work" hours. This service also creates a process named TASKMGR.SYS every 10 minutes or so. The virus can infect files on attached network drive(s) over a Win-NT network provided another WinNT machine, with an identical admin-user log on to it, log on to the infected WinNT machine where the viral-service is running. When activated, the infection routine picks a directory at random on the shared drive(s) on one of the attached network drives. It proceeds to infect the EXE files in the chosen directory, and except for files with the extension .DLL or .TMP, it encrypts the remaining files in the directory. In infecting EXE files, the virus does not check if the file is Win32 or not; thus, some DOS EXE will get infected too. Since an infected EXE file is over 150K larger than the uninfected file, the infection is obvious. When infecting a Win32 EXE file (host), the virus creates a viral Win32 EXE file to replace the host. It adds the host's icon(s) into the infected file's ICON resource section, and it adds the GZIP-compressed host program into the infected file's RCDATA resource section. The infected file also carries a GZIP-compressed of PSAPI.DLL and a GZIP-compressed copy of the viral service module (IE403R.SYS) in its RCDATA resource section. The GZIP-compressed host is extracted into a temporary directory when an infected file is executed; the virus passes control to the extracted host after it runs its viral code. In the other Windows platforms, the virus does not work. In Windows 95, executing an infected file will give an error message about a missing DLL export. In Windows 98, executing an infected file will execute the host file but does not install the NT-specific viral service. Payload:
Repair Notes:
IE403R.SYS and TASKMGR.SYS need to be deleted. You can remove the "Remote Explorer" service by rebooting to DOS and deleting IE403R.SYS from DOS. IE403R.SYS is in SYSTEM32\DRIVERS subdirectory of WinNT directory. TASKMGR.SYS is in WinNT directory. You can also download the stand-alone REREMOVE tool from SARC download web site to remove the virus-installed service and to inoculate the system. Norton AntiVirus users can protect themselves from this virus by downloading
the current virus definitions either through LiveUpdate or from the following
webpage:
Write-up by: Raul Elnitiarta and Darren Chi
|
This Information courtesy Network Associates
website:
Remote Explorer This info last updated 12/30/98 Discovered at customer site on December 17, 1998.
Indications you are hosting the virus: Open up the Services applet in the NT Control Panel. If you find "Remote
Explorer" listed as a service, this system is infected.
Remote Explorer – the most outstanding characteristics is that it can move/transport itself without typical user intervention (passed on floppy, via email) and replicate. It is the first infection program that spreads on either NT Servers,
and/or NT Workstations. It does so by compressing the target executable.
Products available to users for protection against the "Remote Explorer" infection Virus signature updates are available for version 4.x , version 3.x and version 7.x engines. These signature updates DETECTION but do not clean/remove Remote Explorer. This will allow you to quarantine infected EXE and data files. The first 4.x engine products for VirusScan and NetShield NT have also just been released. Links are included to these products for reference. If you have already installed these products there is no reason to re-install. If you have not and are marshalling your network administrators to protect against this threat, we encourage you to move to this version.
|
This
page is designed and written by John
Jenkins. If there are any questions or other issues about the content,
email
me, and I will deal with it in a timely manner. If specific help is
requested an email address with an lctn.com or ecsis.net domain is required.
As with all programs on the internet, you, the downloader, assumes all
risk of file damage or viruses that these or any programs may contain that
are received over the internet. Neither CSS,
ECS,
nor the author will be responsible
for any damage done by any program received over the internet. Please note
this includes programs that are virus free but may cause problems with
other programs on your computer and programs that simply won't run right
on a particular machine.
Updated Tuesday, February 22, 2000 |