W32.Kiman Removal Tool icon

W32.Kiman Removal Tool 1.1.0

No Screenshot
Downloads :
Total: 15  |  
Product Version :
1.1.0
Producer :
License type :
Freeware
Size :
163.84 Kb
Category :
March 28, 2012, 17:30
User Rating : (UNRATED)
OS Supported :
Windows 7
Windows Vista
Windows2003
WinXP
Windows2000

W32.Kiman Removal Tool Information

Publisher's Description:

This tool is designed to remove infections of W32.Kiman.A and W32.Kiman.B

Important:
If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

For instructions on how to do this, refer to your Windows documentation, or the document: How to configure shared Windows folders for maximum network protection.

If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only.
This tool is not designed to run on Novell NetWare servers. To remove this threat from a NetWare server, first make sure that you have the current virus definitions, and then run a full system scan with the Symantec antivirus product.


How to download and run the tool

Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.

Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: XADM: Do Not Back Up or Scan Exchange 2000 Drive M (Article 298924).

Follow these steps to download and run the tool:
Download the FxKiman.exe file from: http://securityresponse.symantec.com/avcenter/FixKiman.exe.
Save the file to a convenient location, such as your Windows desktop.
Optional: To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.

Note: If you are sure that you are downloading this tool from the Security Response Web site, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the "Digital signature" section before proceeding with step 4.

Close all the running programs.
If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
If you are running Windows Me or XP, turn off System Restore. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
How to disable or enable Windows Me System Restore
How to turn off or turn on Windows XP System Restore


Locate the file that you just downloaded.
Double-click the FxKiman.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.

NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.

Restart the computer.
Run the removal tool again to ensure that the system is clean.
If you are running Windows Me/XP, then reenable System Restore.
If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.
Run LiveUpdate to make sure that you are using the most current virus definitions.

When the tool has finished running, you will see a message indicating whether the threat has infected the computer. The tool displays results similar to the following:
Total number of the scanned files
Number of deleted files
Number of repaired files
Number of terminated viral processes
Number of fixed registry entries

What the tool does

The Removal Tool does the following:
Terminates the associated processes
Deletes the associated files
Deletes the registry values added by the threat


Switches

The following switches are designed for use by network administrators:
Switch Description
/HELP, /H, /? Displays the help message.
/NOFIXREG Disables the registry repair (We do not recommend using this switch).
/SILENT, /S Enables the silent mode.
/LOG=[PATH NAME] Creates a log file where [PATH NAME] is the location in which to store the tool's output. By default, this switch creates the log file, FxKiman.log, in the same folder from which the removal tool was executed.
/MAPPED Scans the mapped network drives. (We do not recommend using this switch. See the following Note.)
/START Forces the tool to immediately start scanning.
/EXCLUDE=[PATH] Excludes the specified [PATH] from scanning. (We do not recommend using this switch. See the following Note.)
/NOCANCEL Disables the cancel feature of the removal tool.
/NOFILESCAN Prevents the scanning of the file system.


Important: Using the /MAPPED switch does not ensure the complete removal of the virus on the remote computer, because:
The scanning of mapped drives scans only the mapped folders. This may not include all the folders on the remote computer, which can lead to missed detections.
If a viral file is detected on the mapped drive, the removal will fail if a program on the remote computer uses this file.

Therefore, you should run the tool on every computer.

The /EXCLUDE switch will only work with one path, not multiple. An alternative is the /NOFILESCAN switch followed by a manual scan with AntiVirus. This will let the tool alter the registry. Then, scan the computer with AntiVirus with current virus definitions. With these steps, you should be able to clean the file system.

The following is an example command line that can be used to exclude a single drive:

"C:\Documents and Settings\user1\Desktop\FxKiman.exe" /EXCLUDE=M:\ /LOG=c:\FxKiman.txt

Alternatively, the command line below will skip scanning the file system, but will repair the registry modifications. Then, run a regular scan of the system with proper exclusions:

"C:\Documents and Settings\user1\Desktop\FxKiman.exe" /NOFILESCAN /LOG=c:\FxKiman.txt

Note: You can give the log file any name and save it to any location.



Digital signature
For security purposes, the removal tool is digitally signed. Symantec recommends that you use only copies of the removal tool that have been directly downloaded from the Symantec Security Response Web site.

If you are not sure, or are a network administrator and need to authenticate files before deployment, you should check the authenticity of the digital signature.

Follow these steps:
Go to http://www.wmsoftware.com/free.htm.
Download and save the Chktrust.exe file to the same folder in which you saved the removal tool.

Note: Most of the following steps are done at a command prompt. If you downloaded the removal tool to the Windows desktop, it will be easier if you first move the tool to the root of the C drive. Then save the Chktrust.exe file to the root of C as well.

(Step 3 to assume that both the removal tool and Chktrust.exe are in the root of the C drive.)


Click Start > Run.
Type one of the following:
Windows 95/98/Me:

command


Windows NT/2000/XP:

cmd


Click OK.
In the command window, type the following, pressing Enter after typing each line:

cdcd downloads
chktrust -i FxKiman.exe


You should see one of the following messages, depending on your operating system:

Windows XP SP2:
The Trust Validation Utility window will appear.

Under Publisher, click the Symantec Corporation link. The Digital Signature Details appears.
Verify the contents of the following fields to ensure that the tool is authentic:

Name: Symantec Corporation
Signing Time: 2/2/2006 09:58:00 AM

All other operating systems:
You should see the following message:

Do you want to install and run "W32.Kiman Removal Tool" signed on Wednesday, February 8, 2006 07:33:51 AM PST and distributed by Symantec Corporation?

Notes:
The date and time in the digital signature above are based on Pacific time. They will be adjusted your computer's time zone and Regional Options settings.
If you are using Daylight Saving time, the displayed time will be exactly one hour earlier.
If this dialog box does not appear, there are two possible reasons:
The tool is not from Symantec: Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec Web site, you should not run it.
The tool is from Symantec and is legitimate: However, your operating system was previously instructed to always trust content from Symantec. For information on this and on how to view the confirmation dialog again, read the document: How to restore the Publisher Authenticity confirmation dialog box.


Click Yes or Run to close the dialog box.
Type exit, and then press Enter. (This will close the MS-DOS session.)

User reviews

User rating

Your rating:  
Users rating: (0 votes)
 
 
 
 
 
0/5
0/5

Add a Review



(It will not be displayed. Is only for contacting you)
(from the image)
Image Code

!!! Fields marked with * are required !

W32.Kiman Removal Tool 100% CLEAN Certification

100% Clean Award for W32.Kiman Removal Tool
RoSoftDownload.com team has tested W32.Kiman Removal Tool against viruses, spyware, adware, trojan, backdoors and was found to be 100% clean of any form of malware..
Our editors will test this application periodically to assure that it remains clean.
Click the link below to view the entire antivirus report.


Complete antivirus report

Latest Others
Software

Auto Hide IP 5.5.9.8 icon

Auto Hide IP 5.5.9.8

Hide your real IP to protect your privacy automatically on the
October 11, 2016, 12:14 | Size: 2.32 MB
Free Hide IP 4.1.4.6 icon

Free Hide IP 4.1.4.6

Hide your real IP address to protect your privacy for FREE with
October 11, 2016, 12:12 | Size: 2.24 MB
CleverControl Employee Monitoring 10.2 icon

CleverControl Employee Monitoring 10.2

Free cloud based employee monitoring software for remote PC activity
September 15, 2016, 15:28 | Size: 17.99 MB
FoneEraser 1.0.26 icon

FoneEraser 1.0.26

Completely and permanently erase all files, folders or settings
July 25, 2016, 20:42 | Size: 17715 MB
Real Hide IP 4.4.8.8 icon

Real Hide IP 4.4.8.8

Hide your IP to protect your privacy on the Internet with the
August 14, 2015, 04:39 | Size: 2.31 MB
Platinum Hide IP 3.4.5.8 icon

Platinum Hide IP 3.4.5.8

Hide your real IP address and give you platinum online privacy
August 12, 2015, 01:26 | Size: 2.24 MB
Hide IP Easy 5.4.4.2 icon

Hide IP Easy 5.4.4.2

Hide your real IP address and protect your privacy easily.
August 11, 2015, 04:20 | Size: 2.21 MB
Super Hide IP 3.4.9.8 icon

Super Hide IP 3.4.9.8

Hide your real IP and give you super privacy protection on the
July 24, 2015, 03:57 | Size: 2.36 MB
1AVMonitor 1.8.6.00 icon

1AVMonitor 1.8.6.00

Remotely Monitor your Webcam, Desktop, Microphone, or Phone-Line!
December 12, 2013, 03:09 | Size: 4.6 MB
Robot Benri 3.6.21 icon

Robot Benri 3.6.21

Detects intruders in your room, with the help of Web cameras,
August 29, 2013, 09:49 | Size: 13.69 MB

Most Downloaded
Others
Software

Real Hide IP icon

Real Hide IP

735 downloads
Hide your IP to protect your privacy on the Internet with the
Super Hide IP icon

Super Hide IP

678 downloads
Hide your real IP and give you super privacy protection on the
BCWipe icon

BCWipe

659 downloads
Makes impossible the restore of deleted files by someone else.
Family Keylogger Pro icon

Family Keylogger Pro

628 downloads
Monitor the activities of your family members on the internet.
Product Key Explorer icon

Product Key Explorer

606 downloads
Retrieves product keys for several programs that are installed
Clipboard Assistant icon

Clipboard Assistant

479 downloads
Make your text operations easier using Clipboard Assistant
Xleaner icon

Xleaner

454 downloads
Clear Internet and Windows garbage from your hard disk drive.
Platinum Hide IP icon

Platinum Hide IP

448 downloads
Hide your real IP address and give you platinum online privacy
Facebook Password Recovery icon

Facebook Password Recovery

412 downloads
Retrieves Facebook stored password of the most popular webbrowsers
Hide IP Easy icon

Hide IP Easy

410 downloads
Hide your real IP address and protect your privacy easily.

Last week
Others
top downloads

Real Hide IP icon

Real Hide IP

31 downloads
Hide your IP to protect your privacy on the Internet with the
Windows Vulnerability Scanner icon

Windows Vulnerability Scanner

18 downloads
Windows Vulnerability Scanner checks your system for Windows
Super Hide IP icon

Super Hide IP

9 downloads
Hide your real IP and give you super privacy protection on the
iSpy icon

iSpy

7 downloads
Use webcams and microphones to detect and record movement or
Contact | Privacy Policy
Copyright © 2008 - 2017 - All rights reserved.  
RoSoftDownload.com logo