Following are the keys typically targeted:
• HKEY_CLASSES_ROOT\exefile\shell\open\command
• HKEY_CLASSES_ROOT\comfile\shell\open\command
• HKEY_CLASSES_ROOT\batfile\shell\open\command
• HKEY_CLASSES_ROOT\piffile\shell\open\command
• HKEY_CLASSES_ROOT\htafile\shell\open\command
• HKEY_CLASSES_ROOT\htfile\shell\open\command
The default value for each of these should be "%1" %*. If malware has registered itself as the handler, the value would appear similar to the following:
where
When manually attempting removal of a virus, worm, Trojan or other malware that has registered itself as the handler in this manner, you must correct the registry value before you attempt to delete the copy of the malware. Otherwise, when you reboot your system you will not have a valid handler for these file types and the system will not load Windows.
See Also
printer technical support
windows vista sp2 : increases in free disk
Quick access to programs in control panel
Fizzer Worm Targets Email, KaZaA Users
How To Enable / Disable File Sharing in Windows XP
No comments:
Post a Comment