W32.Bofra@mm Removal Tool

Download Removal Tool|Printer Friendly Page

Discovered: November 17, 2004
Updated: December 05, 2005 12:00:00 AM
Type: Removal Information

Symantec Security Response has developed a removal tool to clean the following infections:

  • W32.Bofra.A@mm (renamed from W32.Mydoom.AI@mm)
  • W32.Bofra.B@mm (renamed from W32.Mydoom.AJ@mm)
  • W32.Bofra.C@mm (renamed from W32.Mydoom.AK@mm)
  • W32.Bofra.D@mm (renamed from W32.Mydoom.AH@mm)

Note: This tool was previously released as a W32.Mydoom@mm removal tool. It has been renamed to accommodate the name changes to the W32.Bofra@mm family of threats.

What the tool does

The W32.Bofra@mm Removal Tool does the following:
  • Terminates W32.Bofra@mm viral processes.
  • Terminates the viral thread running under Explorer.exe.
  • Deletes W32.Bofra@mm files.
  • Reverses the changes made to the registry by W32.Bofra@mm.

Available command-line switches for this tool

Switch Description
  • /HELP, /H, /? Displays the help message.
  • /NOFIXREG Disables the registry repair (We do not recommend using this switch).
  • /SILENT, /S Enables the silent mode.
  • /LOG=[PATH NAME] Creates a log file where [PATH NAME] is the location in which to store the tool's output. By default, this switch creates the log file, FixBofra.log, in the same folder from which the removal tool was executed.
  • /MAPPED Scans the mapped network drives (We do not recommend using this switch. See the following Note).
  • /START Forces the tool to immediately start scanning.
  • /EXCLUDE=[PATH] Excludes the specified [PATH] from scanning (We do not recommend using this switch. See the following Note).
  • /NOFILESCAN Prevents scanning of the file system.

Symantec Security Response strongly recommends that you not use the /NOFIXREG switch when running this removal tool for the first time. If the removal tool is run using this switch, you will not be able to remove the registry keys associated with this worm by running the tool again.

Using the /MAPPED switch does not ensure the complete removal of the virus on remote computers, because:

The scanning of mapped drives scans only the mapped folders. This may not include all the folders on the remote computer, which can lead to missed detections.
If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file.

Therefore, you should run the tool on every computer.

The /EXCLUDE switch will only work with one path, not multiple paths. An alternative is the /NOFILESCAN switch, which will allow the tool to alter the registry. Then, scan the computer with your antivirus product, using the current virus definitions. These steps should clean the file system.

The following is an example command line that can be used to exclude a single drive:

>"C:\Documents and Settings\user1\Desktop\FixBofra.exe " /EXCLUDE=M:\ /LOG=c:\FixBofra.txt

where the greater than symbol (>) is not part of the path.

Alternatively, the command line below will skip scanning the file system, but will repair the modifications to the registry. You should then run a regular scan of the system with proper exclusions:

>"C:\Documents and Settings\user1\Desktop\FixBofra.exe " /NOFILESCAN /LOG=c:\FixBofra.txt

The name of the log file can be whatever you choose. The name listed is for the sole purpose of this example.

Obtaining and running the tool

Note: You must have administrative rights to run this tool on Windows NT/2000/XP.

WARNING: For network administrators. If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line with the Exclude switch.

Download the FixBofra.exe file from: http://www.symantec.com/content/en/us/global/removal_tool/threat_writeups/FixBofra.exe
Save the file to a convenient location, such as your downloads folder or the Windows desktop, or removable media known to be uninfected.
To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.
Close all the running programs before running the tool.
If you are on a network, or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
If you are running Windows Me or XP, then disable System Restore. Refer to the "System Restore option in Windows Me/XP" section later in this writeup for further details.

Caution: If you are running Windows Me/XP, we strongly recommend that you do not skip this step.

Double-click the FixBofra.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.
Restart the computer.
Run the removal tool again to ensure that the system is clean.
If you are running Windows Me/XP, then re-enable System Restore.
If you are using Active Desktop, you may need to restore it.
Run LiveUpdate to make sure that you are using the most current virus definitions.

When the tool has finished running, you will see a message indicating whether W32.Bofra@mm infected the computer. In the case of a removal of the worm, the program displays the following results:

  • Total number of scanned files
  • Number of deleted files
  • Number of repaired files
  • Number of terminated viral processes
  • Number of fixed registry entries

Digital signature
FixBofra.exe is digitally signed. Symantec recommends that you use only copies of FixBofra.exe, which have been directly downloaded from the Symantec Security Response Web site. To check the authenticity of the digital signature, follow these steps:
Go to http://www.wmsoftware.com/free.htm.
Download and save the chktrust.exe file to the same folder in which you saved FixBofra.exe (for example, C:\Downloads).
Depending on your operating system, do one of the following:

Click Start, point to Programs, and then click MS-DOS Prompt.
Click Start, point to Programs, click Accessories, and then click Command Prompt.

Change to the folder in which FixBofra.exe and Chktrust.exe are stored, and then type:

chktrust -i FixBofra.exe.

For example, if you saved the file to the C:\Downloads folder, you would enter the following commands:

cdcd downloads
chktrust -i FixBofra.exe

Press Enter after typing each command. If the digital signature is valid, you will see the following:

Do you want to install and run "W32.Bofra@mm Removal Tool" signed on November 17, 2004; 08:09:19 (PDT) and distributed by Symantec Corporation?

The date and time displayed in this dialog box will be adjusted to your time zone, if your computer is not set to the Pacific time zone.
If you are using Daylight Saving time, the displayed time will be exactly one hour earlier.

If this dialog box does not appear, there are two possible reasons:

  • The tool is not from Symantec: Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec Web site, you should not run it.
  • The tool is from Symantec and is legitimate: However, your operating system was previously instructed to always trust content from Symantec. For instructions on how to see this dialog box again, please refer to the section entitled: Restore the Publisher authenticity confirmation message

Click Yes to close the dialog box.
Type exit, and then press Enter. (This will close the MS-DOS session.)

System Restore option in Windows Me/XP
Users of Windows Me and Windows XP should temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.

Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file onto your computer, even after you have cleaned the infected files from all the other locations.

Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.

Restore the Publisher authenticity confirmation message
  1. Click Start > Run.
  2. Type the following text:
    control inetcpl.cpl
  3. Click OK.
  4. On the Content tab, click Publishers.
  5. On the Trusted Publishers tab, click Symantec Corporation and then click Remove.
  6. Click OK, and then OK again. This removes Symantec as a Trusted Publisher and you will again see the Publisher authenticity confirmation dialog box when you run Chktrust.exe against a VeriSign digitally signed file from Symantec.