W32.Imsolk.B@mm is a worm discovered to utilized victims computer to mass-mail itself and spread quickly from this technique. Normally, the worm sends the copy of the code via spam email messages with subjects ‘Here you have’ or ‘Just for you’. Contents of the message varies from documents to photos that sender asked you to open. On other instances, it may insert free download of movies and programs as a message. Links contained within the email may lead you to a malware web site when clicked.
Removable drives and mapped drives are also used as a distribution channel of W32.Imsolk.B@mm. It can copy codes into these drives without a notice. Registry entries and autorun.inf file will be added to the system to execute the worm automatically on each Windows start-up. Your anti-virus program may not be aware of the W32.Imsolk.B@mm activities dues to its technique in concealing the presence. In fact, this threat can end security process related to anti-virus and firewall, making them unresponsive.
W32.Imsolk.B@mm also downloads other malware after establishing a connection to a server. It fetches viruses or Trojans that will execute another payload. The connection may also be used by the worm to update its component making it more harmful to your system.
Lastly, W32.Imsolk.B@mm disrupts Internet browsing by replacing the original Windows Hosts file with an altered one. Any web site you try to visit will be redirected to predefined web pages. Most of the web pages provided by the worm are malicious. Next, it gathers email addresses from the infected computer and sends a copy of W32.Imsolk.B@mm.
What are the symptoms of W32.Imsolk.B@mm infection?
It will modify Windows Registry and add the following entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\”Shell” = “Explorer.exe C:\WINDOWS\csrss.exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_aVP32.ExE\”Debugger” = “csrss.exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_aVPCC.ExE\”Debugger” = “csrss.exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_aVPM.ExE\”Debugger” = “csrss.exe”
…Plus many more registry entries so that it runs when the target files are executed.
The threat will drop the following malicious files:
Special Removal Guide for W32.Imsolk.B@mm
– Download and save FixImsolkB.exe. This tool is from Symantec
– Reboot computer into Safe Mode.
– Double-click the removal tool executable file to begin.
– Click Start to begin the removal process, and then allow the tool to run. When the tool has finished running, The tool will report the results of the operation.
– Restart the computer.
– Run the removal tool again to ensure that the system is clean.
Follow these Procedures to Remove W32.Imsolk.B@mm
Removal steps on this page will help you get rid of the threat effectively using tools and virus scanners. Please make sure that you will carry out the guide in exact order.
Procedure 1: Uninstall W32.Imsolk.B@mm from Windows Control Panel
1. Begin the removal process by uninstalling the rogue program from Windows. To do this, we need to open Control Panel. Please ensure that you are logon with the Administrative privilege to access this function.
Accessing Control Panel in Windows 8 and Windows 10
- On your keyboard, Press Windows Key + X.
- Once Quick Access Menu appears on the screen, please click on Control Panel.
- Control Panel window will open. Please proceed to the next step which is uninstalling W32.Imsolk.B@mm.
How to access Control Panel in Windows XP, Windows Vista / 7
- Click on Start button that can be found on bottom left corner of the screen.
- From the list, choose Control Panel to access settings of Windows and make the needed changes.
2. To uninstall W32.Imsolk.B@mm, click on Uninstall a program under Programs Section. It will open a Program and Features window where-in you can uninstall, change, or repair installed software.
3. Look for W32.Imsolk.B@mm title or any suspicious name that was installed recently. To do this, you need to arrange the items chronologically. Click on Installed On to display recently installed programs.
4. Select W32.Imsolk.B@mm or any suspicious items and then Click on Uninstall button to remove it from Windows.
5. If it prompts for confirmation, please click OK button to proceed.
Procedure 2: Scan Computer in Safe Mode Using Installed Anti-virus Program
1. When troubleshooting a PC, one common step is to boot operating system into Safe Mode with Networking. The same approach will be used in the removal of W32.Imsolk.B@mm. Please execute instructions based on your Windows OS version.
Start Windows 8 / Windows 10 in Safe Mode with Networking
- Close all running programs on your computer because we will need to restart Windows on this procedure.
- Press and Hold Shift key on your keyboard while clicking on Restart.
- You will then be presented with Troubleshooting Options.
- Click on Troubleshoot icon.
- Then, Click on Advanced Options icon.
- Select Startup Settings icon and then, Click on Restart button.
- When Windows restarts, it will prompt to choose number from the list of options. Press the number on your keyboard that corresponds to Safe Mode with Networking, commonly number 5.
- Once in Safe Mode, please proceed to the next step which is running a virus scan on the computer.
Start in Safe Mode with Networking (Windows XP / Vista / 7 Instruction)
- Please restart the computer and just before Windows start, press F8 on your keyboard repeatedly. You will be presented with Advanced Options Menu.
- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter to proceed.
2. Once your Windows is running in Safe Mode, open your installed anti-virus programs and update it to the most recent version by automatically downloading necessary updates.
3. Thoroughly scan the computer and remove all identified threats. Do not restart or turn off the computer after the scan process. You still need to run another scan. Please follow the next procedure.
Procedure 3: Scan and remove W32.Imsolk.B@mm files with MalwareBytes Anti-Malware
To remove W32.Imsolk.B@mm, download Malwarebytes Anti-Malware. This tool is effective in getting rid of Trojans, viruses and malware.
1. After downloading, please install the program using the default settings.
2. At the end of the installation, please make sure that it will download necessary updates.
3. Once update has completed, MBAM will launch.
4. Select SCAN from the top menu. Then, click on Threat Scan (Recommended) section.
5. Click on Start Scan to thoroughly scan the computer. Remove all threats detected by this anti-malware program after the process.
Procedure 4: Run TrendMicro's Anti-Threat Toolkit (ATTK) to check and delete any remnants of W32.Imsolk.B@mm.
As an added help to remove W32.Imsolk.B@mm, you can scan the computer with Anti-Threat Toolkit. This software is provided and distributed by TrendMicro. Follow this procedure to run a scan with this tool.
1. Download the package by clicking on the button below. This will launch a new browser window that contains further details about the tool.
2. Save the file to a location on your hard drive.
3. Browse for the location of the file and double-click to run. If you are using Windows Vista or Windows 7, right-click on extracted file supportcustomizedpackage and click on Run as Administrator.
4. When program launch, it will run a command prompt to initialize, prepare components, and update the program.
5. Next it will open the graphical user interface (GUI) of Anti-Threat Toolkit.
6. Click on Scan Now. This operation will scan all W32.Imsolk.B@mm files and processes in your computer and display a list of result for possible Fake Antivirus program and malware that needs to be removed.
7. Tick all items that are detected by the program, and then click Clean. The tool will start removing W32.Imsolk.B@mm components from the computer.
8. If it asked you to restart Windows, please do so.
Protect your PC from W32.Imsolk.B@mm or Similar Attack
Turn On Safe Browsing Features
Internet Explorer - Activate SmartScreen Filter
Internet Explorer versions 8 and 9 has this feature called SmartScreen Filter. It helps detect phishing web sites and protect you from downloading malicious files online. To turn on SmartScreen Filter, follow these steps:
1. Please open Internet Explorer.
2. On top menu, select Tools (IE 9). For IE 8, please look for Safety menu.
3. Select SmartScreen Filter from the drop-down list and click on Turn on SmartScreen Filter.
4. Please restart Internet Explorer.
Google Chrome's Protection from Dangerous Sites
With Google Chrome's Dangerous Site Protection feature, you will have lesser risks browsing the web. It will display a warning when the site you are trying to visit is suspicious. To enable protection from dangerous sites, please do these steps:
1. Open Google Chrome.
2. In the address bar, type this: chrome://settings/ and then, Press Enter.
3. Once on the settings page, click on Show advanced settings... at the bottom of the page to see the rest of the Chrome setup.
4. Locate Privacy section and mark 'Protect you and your device from dangerous sites'.
5. Please restart Google Chrome. New settings keep your browser safe while surfing the web.
Mozilla Firefox - Block Attack Sites and Web Forgeries
Phishing and Malware Protection is a built-in feature on Firefox version 3 or later. It warns you when a page you are trying to visit contains phishing content or an attack site designed to drop threats on the computer. To help you keep safe while browsing the Internet using Firefox, please follow this guide:
1. Open Mozilla Firefox browser.
2. On top menu, click on Open Menu. Then select Options from the list.
3. Select Security and put a check mark on the following items:
- Warn me when sites try to install add-ons
- Block reported attack sites
- Block reported web forgeries