Partyflock
 
Forumonderwerp · 611746
heb een of ander virus in me computer! en nou doet me MSN het niet meer :( Er stonden opeens in elke map open envelopjes :S

w32\nimda@mm. Zo heet het virus.

Zijn er andere manieren zo'n virus te verwijderen? Of moet ik nou weer zo'n McAfee-geval gaan kopen??
Nortan Antivirus 2003 kopen :D

McAfee-geval
:kots: das pas een kut programma
 
M@r;)ke mag ik jouw virus worden :bloos: (K)
ach, is toch allemaal hetzelfde! maar die kutdingen zijn vet duur toch?

2 :bier: : haha! Je weet niet waar je aan begint! :D
Virusprogramma's en andere app's zijn allemaal gratis hoor...;)
ok, thanx. Moet eerst ergens een installatie cd vandaan toveren :D
Je hebt het welbekende "I love you" virus,
tsssh, niet zomaar elk mailtje wat je binnenkrijgt openen meid! ;)

Je kunt wel een virusprogramma installeren,
maar het is toch al te laat je systeem is al besmet :/

Maar goed, brandt alles wat je lief is op cd,
je mp3-collectie, word-bestanden, foto's etc..
En daarna kun je het beste je harde schijf formatteren en windows opnieuw installeren.

Het is namelijk een hardnekkig virus, je kunt die bestanden wel telkens in quarantine zetten of verwijderen met een virusprogramma,
maar die envelopjes blijven en blijven komen :/

Sterkte (y);)
Je kunt wel een virusprogramma installeren,
maar het is toch al te laat je systeem is al besmet


Vandaar online scannen.
help niet deze virus zijn kut gewoon je HD formatteren zoals vibo zei
laatste aanpassing
http://www.aacc.nl/virus/alerts/20010920_W32Nimda@MM.html

http://www.gmctips.be/computer/virussen/nimda.html

http://www.webwereld.nl/nieuws/8598.phtml
 
Virus is ook gewoon pas een jaar oud ofzo ....

Sommige mensen schijnen een virusscanner te hebben, en dat ding ook nog up2date te houden. Schijnt te helpen... :S
2 vibo: ik heb 1800 uur muziek op me computer staan, dat brand je niet ff snel op cd. :S

Ik heb nu die norton 2003, maar die kan ik niet installeren!! :@

Die online scan zegt dat ik ook nog w32.opaserv.h.worm, w32.opaserv.k.worm en w32.opaserv.g.worm heb.

En ik open nooit alle emails. En ik gebruik ook nooit outlook!
en dat free trail-gedoe stopt met downloaden met 99%, en nog 1 seconde te gaan! :S
 
http://vil.nai.com/vil/content/v_99729.htm


Virus Name Risk Assessment
W32/Opaserv.worm Corporate User : Low-Profiled
Home User : Low-Profiled




Virus Information
Discovery Date: 09/28/2002
Origin: Unknown
Length: 28,672 bytes
Type: Virus
SubType: Internet Worm
Minimum DAT:
Release Date: 4226
09/30/2002
Minimum Engine: 4.1.60
Description Added: 09/30/2002
Description Modified: 03/06/2003 9:46 AM 🇵🇹

Description Menu
Virus Characteristics
Symptoms
Method Of Infection
Removal Instructions
Variants / Aliases
Rate This page
Print This Page
Email This Page
Legend




Virus Characteristics
--- Update March 06, 2003 ---
Several new variants appeared recently (.s-.v). They were all proactively detected. Please check the list of variants. Reporting of variant letters for new variants goes into 4252 DAT update (currently caught as "W32/Opaserv.worm.gen").
---


--- Update January 16, 2003 ---
Several new variants appeared recently (.n-.r). They were all proactively detected. Reporting of variant letters for these new variants was included in 4243 DAT update. Please check the list of variants.
---


--- Update December 23, 2002 ---
Detection for another variant (W32/Opaserv.worm.m) has been added. See W32/Opaserv.worm.m description for details.
---

--- Update November 10, 2002 ---
Another new variant was discovered recently - INSTIT.BAT 21,504 bytes in size.
---

--- Update October 29, 2002 ---
A new variant was discovered recently - MARCO!.SCR 12,080 bytes in size. Detection is included in the 4231 DAT files.
---

--- Update October 23, 2002 ---
Two new variants were discovered - both are 28,672 bytes in size and are not packed. One is detected since 4226 DATs but another requires the 4231 DATs.
---

--- Update October 21, 2002 ---
Two new variants were discovered - both are 24,064 bytes in size and both are now UPX-packed. They were released by a Brasilian virus-writing group "AlevirusSCS". The first variant installs itself as %WinDir%\BRASIL.PIF, the second as %WinDir%\BRASIL.EXE. These variants are encrypted (beneath UPX) and use a different selfrecognition mutex "Brasil31415". They may drop a file "c:\put.ini". For updates these variants use the website "www.n3t.com.br". Detection of these variants is included in the 4230 DATs.
---


--- Update October 4, 2002 ---
Multiple variants of this worm are now known. At the time of writing, all are detected by the 4226 DATs (released 09/30/2002).
---

--- Update October 1, 2002 ---
The risk assessment of this threat was updated to Low-Profiled due to media attention.
---

This worm contains errors, which prevent it from replicating on many WindowsNT/2K/XP systems.
The worm attempts to spread over network shares by copying itself to the WINDOWS directory of remotely accessible machines as SCRSVR.EXE, utilising a WIN.INI run key to load the worm at startup.

Local Infection

When run on the victim machine, the worm copies itself as %WinDir%\ScrSvr.exe. To avoid being run twice the worm creates a mutex "ScrSvr31415" (if such mutex already exists the worm process exits). The following Registry key is set to hook system startup:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
"ScrSvr" = %WinDir%\ScrSvr.exe

The worm attempts to access a remote URL (unavailable at the time of writing). Strings within the worm suggest that it is capable of downloading updates from this site.

Remote Infection

Significant NetBIOS traffic (UDP) is caused by this worm. One of the early indications of this worms activity was the increase in port 137 hits on firewalls. This traffic is caused by the worm issuing WINS queries across contiguous IP ranges. The spreading mechanism observed in testing is outlined below:

the worm issues WINS query (to retrieve NetBIOS name).
the worm then tries to establish a NetBIOS session to the remote machine.
if successful the worm attempts to spread via connecting to \\%machinename%\C using SMB (Server Message Block) commands (ie. requiring open 'C' share on remote machine). This worm can infect password-protected shares if the security patch is not installed.
Please Note: if this patch is installed, but the share is not password protected, the worm will still spread to the machine.

In spreading, the worm attempts to copy itself to \Windows\ScrSvr.exe on the remote machine.
A Run key is added to WIN.INI on the remote machine, to run the worm at startup. For example:

Run= 'C:\WINDOWS\SCRSVR.EXE'


The worm attempts to spread to all machines on the local subnet in the above manner, (working through the subnet increasing the last octet of the IP address for each WINS query).

Subsequently, in testing the worm was observed to follow the above mechanism for machines in the IP range A.B.(C+1).0 to A.B.(C+1).255 (where A.B.C.x is the local subnet).


Following that, the mechanism was repeated continually, with an apparently random starting IP address (for example 16.13.145.5 -> 16.13.145.255). Once the final octet is incremented to 255, a new initial starting IP is queried.


Top of Page

Symptoms
Presence of any of the following:
%WinDir%\ScrSvr.exe
C:\SCRSDAT.IN, C:\SCRSDAT.OUT (local infection)
C:\TMP.INI (when machine remotely infected)
Existence of either of the following Registry keys:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
"ScrSvr" = %WinDir%\ScrSvr.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
"ScrSvrOld" = (filename executed, if not %WinDir%\ScrSvr.exe)
Considerable port 137 traffic (UDP) originating from infected machine(s).


Top of Page

Method Of Infection
This worm spreads via network shares.

Top of Page

Removal Instructions
Security Patch for 'Share Level Password' Vulnerability (MS00-072)
To protect against reinfection by W32/Opaserv.worm (and similar such network aware viruses) ensure you obtain and install this patch from Microsoft. It is relevant to the following operating systems:

Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98 Second Edition
Microsoft Windows ME
To read more information concerning the exploit and download the relevant patch, click here.

It is also recommend that Win9x/ME users unbind File and Print Sharing from the TCP/IP protocol.
On Windows 9x/ME, right click on Network Neighborhood on the Desktop and select properties
Select the TCP/IP protocol component that is bound to your network adapter (ie. TCP/IP -> 3Com Ethernet Adapter, or TCP/IP -> Dial-Up Adapter)
Press the "Properties" button
Select the "Bindings" tab
Uncheck "File and Print Sharing for Microsoft Networks" if it is checked
Click "OK" and "OK" again, reboot when prompted.
All Users:
Use current engine and DAT files for detection. Delete any file which contains this detection.
Note: The virus alters the WIN.INI file on remote systems after it copies itself to that system. Therefore, VirusScan may detect and remove the virus before the WIN.INI change occurs. In the scenario users may see an error message that the file SCRSVR.EXE (or other file names) cannot be found when starting Windows. To fix this, follow these steps:

Click START - RUN
Type WIN.INI and hit ENTER
Locate the run= line and remove the necessary filename after the = sign
(ie. C:\WINDOWS\SYSTEM\SCRSVR.EXE)
Click FILE - EXIT and select YES when prompted to save your changes
Additional Windows ME/XP removal considerations



Top of Page

Variants
Name Type Sub Type Differences
W32/Opaserv.worm.c Virus Internet Worm minor differences only
W32/Opaserv.worm.b Virus Internet Worm minor differences only
W32/Opaserv.worm.d Virus Internet Worm minor differences only
W32/Opaserv.worm.e Virus Internet Worm Filename: BRASIL.PIF (may be 24,064 bytes)
Requires 4230 DATs (or higher)
W32/Opaserv.worm.f Virus Internet Worm Filename: BRASIL.EXE (may be 24,064 bytes)
Requires 4230 DATs (or higher)
W32/Opaserv.worm.g Virus Internet Worm Filename: ALEVIR.EXE (28,672 or 32,256 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.h Virus Internet Worm Filename: MQBKUP.EXE (28,931 bytes)
Requires 4241 DATs (or higher)
W32/Opaserv.worm.i Virus Internet Worm Filename: MARCO!.SCR (12,800 or 39,424-40,963 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.k Virus Internet Worm Filename: INSTIT.BAT (21,504 bytes)
Requires 4233 DATs (or higher)
W32/Opaserv.worm.j Virus Internet Worm Filename: SCRSVR.EXE (45,056 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.l Virus Internet Worm Filename: PUTA!!.EXE (29,065 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.n Virus Internet Worm Filename: MSTASK.EXE (20,480 bytes)
Requires 4240 DATs (or higher)
W32/Opaserv.worm.o Virus Internet Worm Filename: SRV32.EXE (18,432 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.p Virus Internet Worm Filename: BRASIL.EXE (47,616 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.q Virus Internet Worm Filename: SRV32.EXE (18,432 bytes)
Requires 4231 DATs (or higher)
W32/Opaserv.worm.r Virus Internet Worm Filename: MQBKUP.EXE (17,408 bytes)
Requires 4241 DATs (or higher)
W32/Opaserv.worm-m Virus Internet Worm Please see W32/Opaserv.worm.m description.
W32/Opaserv.worm.s Virus Internet Worm Filename: SRV32.EXE (18,432 bytes)
Requires 4242 DATs (or higher)
W32/Opaserv.worm.t Virus Internet Worm Filename: SRV32.EXE (18,432 bytes)
Requires 4242 DATs (or higher)
W32/Opaserv.worm.u Virus Internet Worm Filename: SRV32.EXE (18,432 bytes)
Requires 4244 DATs (or higher)
W32/Opaserv.worm.v Virus Internet Worm Filename: SRV32.EXE (18,432 bytes)
Requires 4242 DATs (or higher)

Top of Page

Aliases
Name
BackDoor-ALB
Backdoor.Opasoft
Bck/Opasoft (Panda)
W32.Opaserv.Worm (Symantec)
W95/Scrup.worm
Worm.Win32.Opasoft (AVP)
WORM_OPASOFT (Trend)
laatste aanpassing
ja, ik kan het allemaal wel verwijderen, maar ten eerste komt het steeds terug. En ten tweede kan ik nog steeds niks installeren! Dus ook geen Norton! Ik krijg bij alles was ik installeer: internal error 2894.
Euhhhh... ja, durf duidelijke taal te vragen :D

Je kunt trouwens ook je mp3-files overzetten op een andere harde schijf,
misschien dat je er even eentje van iemand kan lenen,
dat werkt wel een stuk sneller als op cd's branden inderdaad :)

Maar af en toe je systeem opschonen kan nooit kwaad,
wordt alles ook weer sneller van :)
Ik krijg bij alles was ik installeer: internal error 2894.


Dat is een voor mij onbekende foutmelding,
volgens mij staat het los van het virus en is je besturingssysteem ondertussen ook al aangetast :(
ja, ik heb een laptop, maar hoe zet ik dat over dan?

Ik heb op de site van microsoft gekeken. En daar was het wel een bekende melding. En het kwam door Nimda stond er. Maar er stond niet bij hoe je dat dan moest oplossen. :S
 
http://vil.nai.com/vil/content/v_99209.htm

Heb je de patch van Microsoft al geinstalleerd ? Lees onderstaande maar weer ff door, de oplossing althans, er wordt een patch in vernoemd die je moet installeren.

Virus Name Risk Assessment
W32/Nimda.gen@MM Corporate User : Medium
Home User : Medium




Virus Information
Discovery Date: 09/18/2001
Origin: Unknown
Length: 57344
Type: Virus
SubType: Internet Worm
Minimum DAT:
Release Date: 4159
09/18/2001
Minimum Engine: 4.1.60
Description Added: 09/18/2001
Description Modified: 05/02/2003 12:15 PM 🇵🇹

Description Menu
Virus Characteristics
Symptoms
Method Of Infection
Removal Instructions
Variants / Aliases
Rate This page
Print This Page
Email This Page
Legend




Virus Characteristics
--- Update November 09, 2001 ---
A new variant was recently discovered (some call it Nimda.G) which functions the same as the .D and .E variant. The 4163-4169 DATs detect this as a variant of W32/Nimda@MM.
--- Update October 29, 2001 ---
A new variant was discovered today (some call it Nimda.D while others refer to it as Nimda.E) which functions much the same as the original version. The 4162 DATs (or greater) detect this variant as W32/Nimda.a@MM.

--- Update October 26, 2001 ---
The risk assessment was lowed to Medium due to a reduction in prevalence.

--- Update October 12, 2001 ---
A new variant was discovered today which functions much the same as the original version. Detection is included in the current DAT release. This variant is considered to be a LOW risk.
--- Update October 5, 2001 ---
A new variant was discovered today which functions much the same as the original version. However this variant is packed with a PE packer and the filenames README.EXE and README.EML are replaced with PUTA!!.SCR and PUTA!!.EML respectively. Detection for this new variant is included the 4165 DAT release. This variant is considered to be a LOW risk.

This threat can infect all unprotected users of Win9x/NT/2000/ME.

Its main goal is simply to spread over the Internet and Intranet, infecting as many users as possible and creating so much traffic that networks are virtually unusable.

All users running Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2), are advised to install this patch for the Incorrect MIME Header Can Cause IE to Execute E-mail Attachment vulnerability.

All IIS administrators (and Win2K users who may not know they are running IIS), who have not already done so, should also install this patch (August 15, 2001 Cumulative Patch for IIS)


This worm virus infects using several methods including: mass-mailing, network share propagation, the Microsoft Web Folder Transversal vulnerability (also used by W32/CodeBlue), and a Microsoft incorrect MIME Header vulnerability. It also attempts to create network shares, and utilize the backdoor created by the W32/CodeRed.c worm

The email subject line varies, message body is blank, and attachment name varies (most often README.EXE) and may use the icon for an Internet Explorer HTML document.

The most significant methods of propagation are as follows:


The email messages created by the worm specify a content-type of audio/x-wav and contain an executable attachment type. Thus when a message is accessed, the attachment can be executed without the user's knowledge. Simply viewing the page in Microsoft Outlook or Microsoft Outlook Express using the preview pane can infect you. Other mail clients can still receive these email messages, but double-clicking the attachment would be required to execute the virus.

When infecting, it appends .ASP, .HTM, and .HTML documents, and files named INDEX, MAIN, and DEFAULT, with javascript code which contains instructions to open a new browser window containing the infectious email message itself (taken from the dropped file README.EML). Thus when this infected web page is accessed (locally or remotely) the machine viewing the page is infected. In other words, simply visiting a web site that is compromised can infect your computer.

When infecting, it creates network shares for each local drive as %$ (where % = the drive letter that is being shared). On Win9x/ME system this is configured as a full share with no password. On WinNT/2K system the user GUEST is given permission to the share and added to the group ADMINISTRATORS as well as GUESTS. A reboot is required in order for these shares to get created. When the virus finds an open share, it copies itself to each folder on the drive in .EML format as described later on in this description. This can include the START UP folder.

The worm scans IP addresses looking for IIS servers to infect via the Web Folder Transversal vulnerability by sending a malformed GET request. This causes vulnerable machines to initiate a TFTP session to download ADMIN.DLL from the machine which sent the request. Once downloaded the remote system is instructed to execute the DLL which infects that machine. In the event that the TFTP session fails to connect, multiple files (TFTP*) are created in the WINDOWS TEMP directory. These files are simply copies of the worm. It also tries to use the backdoor created by W32/CodeRed.c to infect.

.EXE files are prepended with the worm code.

Email addresses are gathered by extracting the email addresses from MAPI messages in Microsoft Outlook and Microsoft Outlook Express, as well as from HTM and HMTL documents. The worm then sends itself to these addresses with either no subject line or a subject line containing a partial registry key path.
Once infected, your system is used to seek out others to infect over the web. As this creates a lot of port scanning, this can cause a network traffic jam.

It may copy itself to the WINDOWS SYSTEM directory as LOAD.EXE and create a SYSTEM.INI entry to load itself at startup:
Shell=explorer.exe load.exe -dontrunold

Additional information:

- A MIME encoded version of the worm is created in each folder on the system (often as README.EML or DESKTOP.EML, can also be .NWS files). This can create a lot of files and in some cases even fill up a hard disk.
- The WININIT.INI file may be used to delete specific worm files upon reboot:
NUL=C:\WINDOWS\TEMP\MEP52b0.TMP.exe
- Registry key values are created/changed to hide files:


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\HideFileExt
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\Hidden
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\ShowSuperHidden

- A registry key branch is deleted to remove share security under WinNT/2K
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
lanmanserver\Shares\Security

- The worm saves a copy of itself to C:\, D:\, and E:\ as ADMIN.DLL
Note: a valid ADMIN.DLL does exist and is part of the Microsoft FrontPage Server Extentsions functionality

- Filenames for the worm include: ADMIN.DLL, LOAD.EXE, MMC.EXE, README.EXE, RICHED20.DLL, MEP*.TMP.EXE

Note: applications which utilize the rich text format, such as Microsoft Word and Wordpad, call this RICHED20.DLL file. As such, the worm is executed when a dependant program is run. There is typically a valid RICHED20.DLL file in the WINDOWS SYSTEM directory, but this is overwritten by the virus. Additionally, the virus may also save itself as RICHED20.DLL in directories which contain .DOC files when infecting via network shares. This will result in that infected .DLL being called when a machine accesses that .DOC file.

Note: MMC.EXE is the name for the Microsoft Management Console application. It has been reported that the worm can in fact overwrite this file.

The virus contains the string : Concept Virus 🇨🇻 V.5, Copyright (C) 2001 R.P.China


Top of Page

Symptoms
Presence of the files C:\ADMIN.DLL, D:\ADMIN.DLL, and E:\ADMIN.DLL
Presence of many .EML files with the same name (typically README.EML or DESKTOP.EML)
Surprisingly open network shares


Top of Page

Method Of Infection
This threat exploits various Microsoft vulnerabilities. It is contractible via web browsing, reading an email message, or simply running the IIS web server.
W32/Nimda@MM has been reported to sleep for 10 days between calling its mass-mailing routine.


Top of Page

Removal Instructions
Removing this threat requires patching vulnerable systems, disabling network shares, and using the latest DAT files. It can not be removed manually.
Infected systems must:

apply the patches below
close any network shares prior to cleaning
exit any running applications
Stop a running IIS server
Scan and clean each drive
Restore the RICHED20.DLL and MMC.EXE files if they were overwritten by the virus and deleted by the scanner.
Failure to take these actions may result in reinfection.

Applying patches

All users running Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2), are advised to install this Microsoft patch for the Incorrect MIME Header Can Cause IE to Execute E-mail Attachment vulnerability.

All IIS administrators (and Win2K users who may not know they are running IIS), who haven't already done so, should also install this Microsoft patch (August 15, 2001 Cumulative Patch for IIS)

Scanning/Removal

In cases where users with VirusScan and Netshield 4.5, or 4.51 have altered the "default extension list/program files extension list" the following package is required to scan files with extensions greater than 3 characters, and is required for complete detection of this threat where the extension list has been customized.
EXTFIX1.EXE patch . Please review the README.TXT file first.

As always, AVERT recommends that users configure VirusScan to scan all files. If this is not an option in your environment, the default extension list ("Program files" or "Default files") should be used.

Additionally Win9x users should remove the text: load.exe -dontrunold from the SYSTEM.INI file.

Stand Alone Removal Tool

Please note Virusscan and Netshield products will detect and remove the virus and the associated files the virus affects. It will NOT remove the network shares or the guest account created by W32/Nimda@MM.

Users that would like to have these changes removed automatically can use the AVERT NimdaScan (current version 2.0) program located on the AVERT Tools Page. Please follow the instructions in the README.TXT when using the program.

Additional Windows ME Info:
NOTE: Windows ME utilizes a backup utility that backs up selected files automatically to the C:\_Restore folder. This means that an infected file could be stored there as a backup file, and VirusScan will be unable to delete these files. These instructions explain how to remove the infected files from the C:\_Restore folder.

Disabling the Restore Utility

1. Right click the My Computer icon on the Desktop.
2. Click on the Performance Tab.
3. Click on the File System button.
4. Click on the Troubleshooting Tab.
5. Put a check mark next to "Disable System Restore".
6. Click the Apply button.
7. Click the Close button.
8. Click the Close button again.
9. You will be prompted to restart the computer. Click Yes.
NOTE: The Restore Utility will now be disabled.
10. Restart the computer in Safe Mode.
11. Run a scan with VirusScan to delete all infected files, or browse the the file's located in the C:\_Restore folder and remove the file's.
12. After removing the desired files, restart the computer normally.
NOTE: To re-enable the Restore Utility, follow steps 1-9 and on step 5 remove the check mark next to "Disable System Res



Top of Page

Variants
Name Type Sub Type Differences
W32/Nimda.b@MM Virus Internet Worm This variant is packed with a PE packer and the filenames README.EXE and README.EML are replaced with PUTA!!.SCR and PUTA!!.EML respectively.
W32/Nimda.d@MM Virus Internet Worm This variant uses different filenames.
README.EXE is now SAMPLE.EXE
MMC.EXE is now CSRSS.EXE
ADMIN.DLL is now HTTPODBC.DLL

W32/Nimda.e@MM Virus Internet Worm Functionally the same as the D variant; minor differences only.
W32/Nimda.f@MM Virus Internet Worm Functionally the same as the D variant; minor differences only.
W32/Nimda.g@MM Virus Internet Worm Functionally the same as the D variant; minor differences only.

Top of Page

Aliases
Name
I-Worm.Nimda (AVP)
I-Worm.Nimda.E (AVP)
Nimda (F-Secure)
Nimda.c (F-Secure)
Nimda.d (F-Secure)
Nimda.e (F-Secure)
W32.Nimda.A@mm (NAV)
W32.Nimda.C@mm (NAV)
W32.Nimda.D@mm (NAV)
W32.Nimda.E@mm (NAV)
W32/Minda@MM
W32/Nimda-C (Sophos)
W32/Nimda.a@MM
W32/Nimda.eml
W32/Nimda.htm
W32/Nimda@MM
Win32.Nimda.A@mm (AVX)
Win32.Nimda.E 🇨🇦
patch had ik al gedaan.

en dat riched20.dll enzo. Hoe kan ik dat dan weer herstellen?
Ik geef het op.....morgen ga ik naar de MyCom! :/
Met de windows-cd ;P
Lukt het nou nog steeds niet lievurt????????


Als me fiets het deed, was ik langs komen fietsen