As a result, both the Firedaemon.exe and Sud.exe files are installed on the computer as well as the Os2srv.exe and Mmtask.exe files, which along with the Sud.exe and Index.exe files are run as services.
To resolve this behavior, you must perform a parallel install of Windows NT 4.0 or Windows 2000 and/or make the following changes by using the Windows 2000 Recovery Console.
The Newgina.dll file is specified under the following registry key when you access the original software hive from a parallel install:
Gina.dll = Newgina.dll
Original Gina.dll = Msgina.dll (or Awgina.dll)
- From the parallel install or in the Recovery Console, rename the Newgina.dll file to "Newgina.old".
- Rename the original Gina file, for example, the Msgina.dll file to "Newgina.dll". This renaming enables the original Gina file to be loaded under the name "Newgina.dll" which is specified in the registry.
If you cannot locate the Newgina.dll file in Windows Explorer, you can delete or replace the newgina.dll value in GinaDLL (REG_SZ) with msgina.dll (or awgina.dll) under the following registry key:
You must also disable and delete the services that are associated with the virus as well as the files that are installed in the C:\Winnt\System32\Os2\New folder.
The Dl.bat file in the InetPub\Scripts folder must also be deleted.
This hidden folder contains the following files: Firedaemon.exe, Dir.txt, Login.txt, Remscan.txt, Sud.exe, and Sud.bak.
NOTE: The following processes may also be running on your computer: Sud.exe, Firedaemon.exe, Mmtask.exe, and Os2serv.exe. If you attempt to end a task on any of these processes, you may receive an "Access is denied" error message. In Task Manager, these processes are listed in all capital letters.
In addition, the Msgina.dll (or Awgina.dll) file is replaced with the Newgina.dll file.
The Newgina.dll file captures password information when someone logs on to the computer.
The passwords that are captured are then stored in a .tmp file in the root of drive C. A new File Transfer Protocol (FTP) server is also installed called "UServ". These files and folders must also be deleted.
For additional information about a security fix for Microsoft Internet Information Server (IIS) to block this type of virus, click the article number below to view the article in the Microsoft Knowledge Base:
Article ID: 294728 - Last Review: Mar 2, 2012 - Revision: 1