1. Symantec/
  2. Security Response/
  3. W32.HLLW.Lovgate.H@mm

W32.HLLW.Lovgate.H@mm - Removal

Risk Level 2: Low

Discovered:
May 11, 2003
Updated:
February 13, 2007 12:01:15 PM
Also Known As:
PE_LOVGATE.K [Trend], W32/Lovgate.k@MM [McAfee], I-Worm.LovGate.h [KAV], Win32.Lovgate.I [CA], Win32.Lovgate.K [CA]
Type:
Worm
Systems Affected:
Windows

Removal using the W32.HLLW.Lovgate Removal Tool
Symantec Security Response has created a removal tool to clean infections of W32.Lovgate.H@mm.This is the easiest way to remove this threat.

These instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
  1. Reverse the changes that the worm made to the registry.
  2. Remove the text from the Win.ini file (Windows 95, 98, and ME only).
  3. Restart the computer.
  4. Update the virus definitions.
  5. Run a full system scan and delete all the files detected as W32.HLLW.Lovgate.H@mm or Infostealer, and then repair those detected as W32.HLLW.Lovgate.G.

For specific details on each of these steps, read the following instructions.

1. Reversing the changes in the Windows registry

CAUTION: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.

Copying Regedit.exe to Regedit.com and editing the registry

Because the worm modified the registry so that you cannot run the .exe files, first make a copy of the Registry Editor as a file with the .com extension, and then run the file.
  1. Do one of the following, depending on the version of Windows you are running:
    • Windows 95/98 users:
      1. Click Start.
      2. Point to Programs.
      3. Click the MS-DOS Prompt. (A DOS window opens at the C:\Windows prompt.) Proceed to step b of this section.
    • Windows Me users:
      1. Click Start.
      2. Point to Programs.
      3. Point to Accessories.
      4. Click the MS-DOS Prompt. (A DOS window opens at the C:\Windows prompt.) Proceed to step b of this section.
    • Windows NT/2000 users:
      1. Click Start, and then click Run.
      2. Type command, and then press Enter. (A DOS window opens.)
      3. Type cd \winnt, and then press Enter.
      4. Go to step b of this section.
    • Windows XP users:
      1. Click Start, and then click Run.
      2. Type command, and then press Enter. (A DOS window opens.)
      3. Type the following:

        cd\
        cd \win
        dows

        Press Enter after typing each one.
      4. Proceed to step b of this section.

  2. Type copy regedit.exe regedit.com

    and then press Enter.

  3. Type start regedit.com

    and then press Enter. (The Registry Editor opens in front of the DOS window.)

    After you finish editing the registry, exit the Registry Editor, and then exit the DOS window as well.

  4. Before continuing, Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. For instructions, read the document, "How to make a backup of the Windows registry."

  5. Navigate to and select the key:

    HKEY_LOCAL_MACHINE\Software\Classes\exefile\shell\open\command

    NOTE: The HKEY_LOCAL_MACHINE\Software\Classes key contains many subkey entries that refer to other file extensions. One of these file extensions is .exe. Changing this extension can prevent any files ending with a .exe extension from running. Make sure that you completely browse through this path until you reach the \command subkey.

    Modify the HKEY_LOCAL_MACHINE\Software\Classes\exefile\shell\open\command subkey, shown in the following figure:

    <<=== NOTE: Modify this key.

  6. In the right pane, double-click the (Default) value.

  7. Delete the current value data, and then type:

    "%1" %*

    That is, type the characters: quote-percent-one-quote-space-percent-asterisk.

    NOTES
    • Under Windows 95/98/Me/NT, the Registry Editor automatically encloses the value within quotation marks. When you click OK, the (Default) value should look exactly like this:

      ""%1" %*"  
    • Under Windows 2000/XP, the additional quotation marks will not appear. When you click OK, the (Default) value should look exactly like this:

      "%1" %*
    • Make sure that you completely delete all the value data in the command key before typing the correct data. If you leave a space at the beginning of the entry, any attempt to run the program files will result in the error message "Windows cannot find .exe." If this occurs, restart the entire process from the beginning of this document and make sure that you completely remove the current value data.

  8. Navigate to the key:

    HKEY_CLASSES_ROOT\txtfile\shell\open\command

  9. In the right pane, modify the default value to:

    notepad.exe %1

  10. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  11. In the right pane, delete the values:

    "Program in Windows %system%\iexplore.exe
    "Remote Procedure Call Locator"="rundll32.exe reg678.dll ondll_reg"
    "WinGate initialize"="%system%\WinGate.exe -remoteshell
    "
    "winhelp"="%system%\winhelp.exe"

  12. Navigate to the key:

    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows

  13. In the right pane, delete the value: run

  14. Exit the Registry Editor.


2. Removing the text from the Windows 95/98/Me Win.ini file

Note for Windows Me users only: Due to the file-protection process in Windows Me, a backup copy of Win.ini exists in the C:\Windows\Recent folder. Symantec recommends that you delete this file before continuing with the steps in this section. To do this using Windows Explorer, go to C:\Windows\Recent, select the Win.ini file in the right pane, and delete it. The Win.ini file will be recreated in C:\Windows\Recent when you save your changes to Win.ini in C:\Windows.
  1. Click Start, and then click Run.

  2. Type the following:

    edit c:\windows\win.ini

    And then click OK. (The MS-DOS Editor opens.)

    NOTE: If Windows is installed in a different location, make the appropriate path substitution.

  3. In the [windows] section of the file, look for an entry similar to:

    run=rpcsrv.exe

  4. If this line exists, highlight the text. Be sure that you do not select any other text, and then press Delete.

  5. Click File, and then click Save.

  6. Click File, and then click Exit.


3. Restarting the computer
Restart as you normally would.

4. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
  • Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
  • Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

    The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.

5. Scanning for and deleting the infected files
  1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
  2. Run a full system scan.
  3. If any files are detected as infected with W32.HLLW.Lovgate.H@mm, click Delete.
  4. If any files are detected as infected with W32.HLLW.Lovgate.G, click Repair.


Writeup By: Yana Liu

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube