Viking.H, a variant of Viking, is a Virus. Viking.H creates files in the Windows directory and downloads and runs a file from website: [http://www.54088.org/backup/[REMOVED]1.exe Viking.H kills processes belonging to anti-virus and security software.
Disinfection of the Viking virus-worm should be performed as follows:
Please note that because of the "Worm." detection prefix F-Secure Anti-Virus will suggest to delete infected files, but DO NOT select the "Delete" option because this worm also has a viral component and you don't want to delete all infected files instead of disinfecting them. At the same time, the worm's dropper and downloader files should be deleted from a computer to prevent re-infection. See the names of the dropper and downloader files in the Details section.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Once an infected file is executed, Viking.H will drop the following files in the Windows directory:
The .DLL component is injected into IEXPLORE.EXE. Viking.H adds the following registry entry as a part of its installation:
It creates the following text files where it writes some information related to its activities:
Viking.H is a prepending virus that searches for files starting from fixed drives from the Z: to C: drives.It infects files with the following extension:
It avoids infecting files with the following strings in its path or filename:
In order for the host file to execute, Viking.H creates a backup copy of the itself in the current directory as [filename].exe.exe and then drops and executes the original uninfected host file as [filename].exe. After which, it will now delete the uninfected host file and renames the backup file to the original filename. Viking.H is able to do this with the help of a temporary batch file created in the temporary folder as $$.bat. Viking.H sends the message "Hello, World" to the following IP address via Internet Control Message Protocol (ICMP) :
It also attempts to propagate via network shares by copying itself to the following shared folders:
- with the following accounts:
It stops the following service:
It terminates the following processes that are often related to Anti-virus products:
Viking.H attempts to download and execute files from the following site:
Note: This site is already down.