1. /
  2. Security Response/
  3. W32.HLLW.Lovgate.C@mm

W32.HLLW.Lovgate.C@mm - Removal

Risk Level 2: Low

Discovered:
February 24, 2003
Updated:
February 13, 2007 11:43:24 AM
Also Known As:
WORM_LOVGATE.C [Trend], Win32/Lovgate.C@mm [RAV], W32/Lovgate.c@M [McAfee], I-Worm.Supnot.c [KAV], W32/Lovgate-B [Sophos], Win32.Lovgate.C [CA]
Type:
Worm
Systems Affected:
Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP

Removal using the W32.HLLW.Lovgate Removal Tool
This is the easiest way to remove this threat. Symantec Security Response has created a W32.HLLW.Lovgate Removal Tool. Click here to obtain the tool.

Manual Removal
As an alternative to using the removal tool, you can manually remove this threat.

These instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
  1. Reverse the changes that the worm made to the registry.
  2. Remove the text that was added to the Win.ini file (Windows 95/98/Me only).
  3. Restart the computer.
  4. Update the virus definitions.
  5. Run a full system scan and delete all the files detected as W32.HLLW.Lovgate.C@mm or Backdoor.Trojan.

For specific details on each of these steps, read the following instructions.

1. Reversing the changes in the Windows registry

CAUTION: Symantec strongly recommends that you back up the registry before you make any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.
  1. Click Start, and then click Run. (The Run dialog box appears.)
  2. Type regedit

    Then click OK. (The Registry Editor opens.)
  3. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  4. In the right pane, delete the values:

    syshelp
    WinGate initialize
    Module Call initialize

  5. Navigate to the key:

    HKEY_CLASS_ROOT\txtfile\shell\open\command
  6. In the right pane, modify the (Default) value to:

    notepad.exe %1
  7. Navigate to the key:

    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
  8. In the right pane, delete the value, run
  9. Delete the key:

    HKEY_LOCAL_MACHINE\Software\KittyXP.sql
  10. Navigate to the key:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
  11. In the left pane delete the key:

    dll_reg
  12. Exit the Registry Editor.


2. Removing the text from the Windows 95/98/Me Win.ini file
If you are running Windows 95/98/Me, follow these steps:
  1. The function you perform depends on your operating system:
    • Windows 95/98: Go to step b.
    • Windows Me: If you are running Windows Me, the Windows Me file-protection process may have made a backup copy of the Win.ini file that you need to edit. If this backup copy exists, it will be in the C:\Windows\Recent folder. Symantec recommends that you delete this file before continuing with the steps in this section. To do this:
      • Start Windows Explorer.
      • Browse to and select the C:\Windows\Recent folder.
      • In the right pane, select the Win.ini file and delete it. The Win.ini file will be regenerated when you save your changes to it in step f.

  2. Click Start, and then click Run.
  3. Type the following:

    edit c:\windows\win.ini

    and then click OK (The MS-DOS Editor opens.)

    NOTE: If Windows is installed in a different location, make the appropriate path substitution.
  4. In the [windows] section of the file, look for an entry similar to:

    run=rpcsrv.exe
  5. If this line exists, select the text. Be sure that you do not select any other text, and then press Delete.
  6. Click File, and then click Save.
  7. Click File, and then click Exit.


3. Restarting the computer
Restart the computer as you normally would.

4. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
  • Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
  • Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

    The Intelligent Updater virus definitions are available here. For detailed instructions on how to download and install the Intelligent Updater virus definitions from the Symantec Security Response Web site, click here.

5. Scanning for and deleting the infected files
  1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
  2. Run a full system scan.
  3. If any files are detected as infected with W32.HLLW.Lovgate.C@mm or Backdoor.Trojan, click Delete.



Writeup By: Tony Conneff

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report, Volume 17
Symantec DeepSight Screensaver