The best anti-virus programs have earned a reputation as applications can effectively remove a variety of infections that can plague your computer. On the other hand, "win32.autoit" is a virus that has acquired the reputation of a very nasty malware that thrives in an environment where there is little protection from viruses. This application has the characteristics of a worm and a virus, and varies in size from 220 kb 275 kb. He came into the spotlight in late November 2006 and was a disadvantage, even though the most effective anti-spyware ever built.
The extent of the damage caused by the virus is relatively small compared to other PC threats such as Trojan. The virus affects the computer system itself because two hard disk, including its subfolders, and even removable media. It takes the form of a window "PE.EXE" file and is usually installed with UPX. Many of the symptoms can be indicators of viral infection system.
The first symptom means that the files will be a folder on the computer screen. Threat replicates in Windows executable files and root files are writable drives up forever. They usually create a new folder called Folder.exe. It also creates a number of files, the following names: % Windows% / RVHOST.EXE, % SystemRoot% / RVHOST.EXE. Both of these are duplicates. The virus then goes and copies its executable file to the Windows and root directories.
The virus then add a shortcut to the executable file to the registry, so that the worm can be run whenever Windows is started. This makes it possible to automatically launch the infection reboot. Folders that are stored in the root directory and the virus replicated in each case, the external expansion chassis "Exe".
The registry keys that are added a virus to prevent the launch Task Manager or the application to modify the registry so that the virus will stop working and start automatically. It also prevents certain tasks related to Antivirus detection and removal of viruses.
"Win32 Autoit" virus has occurred in some countries, such as India. There have been hundreds of reports on the impact the virus entered the computer systems of the questions still surround the mechanism of transmission of the virus.
The most common way the virus spreads to download files from the Internet division of suspicious sites and external storage media such as memory sticks and other external media.
The worm may be present in the computer system only if the user is strictly complying with the following measures. The worm can be removed by introducing a "Taskila / IM RVHOST.exe" from the command prompt. It can also be removed by removing the original file, which is made of the worm.