Results 1 to 3 of 3

Thread: KillCmos

  1. #1
    Junior Member
    Join Date
    Sep 2004
    Posts
    1

    KillCmos

    My computer recently had a trogan find. It was called KillCmos.com. I was wondering weither it was something to be worried about? Why did it pop up on my computer? Should I be worried about it leading to something worse? Anyone who can help me please respond.

  2. #2
    Virus Name: KiLLCMOS.DeathBoy.Trojan
    Pervasiveness:
    0 of 5
    Destructiveness:
    0 of 5
    Wildness:
    0 of 5
    Type: Trojan
    Aliases: []KiLLCMOS.DeathBoy.Trojan;

    Doesnt look too bad to me !
    O.G at A.O

  3. #3
    Senior Member
    Join Date
    Mar 2005
    Posts
    400

    Exclamation

    I don't advocate the use of killcmos.com, but here is what I found on it.
    (if you need to set your CMOS to factory defaults, you will find a much safer option usually on the first page of your CMOS options)

    KILLCMOS v.1.0


    This is a rather quick revamp of the DOS KiLLCMOS Documentation.
    All is valid, just added a Win95/NT 32-bit "Shell" for KiLLCMOS.

    Depending on the version (installable w/ setup.exe , or just the basics),
    You should either run SETUP.EXE to Install or Copy all KiLLCMOS32 files
    into a directory of your choice. RUN KiLLCMOS32 to start.

    What is it?

    KillCMOS basically "resets" your computer's CMOS settings to the factory
    defaults. Works with ALL CMOS. KiLLCMOS only changes checksums & values
    that makes the motherboard CMOS revert back to factory defaults.

    ** IT DOES NOT ReProgram your CMOS like a FLASH ROM Writer does.

    ** IT DOES NOT DAMAGE Hardware. KiLLCMOS reads/writes to areas of the
    CMOS that gets written to everyday, the difference is the VALUES that
    we give it(cmos).

    Reset CMOS, Why?


    *scenerio one*
    I work in the Computer industry and often the CMOS needs to be manipulated,
    but someone has passworded the setup. "Gee", the customer says, "How'd that
    get there, We don't know anything about a PASSWORD?" This was why I wrote
    the program.
    Sometimes, Computer-wannabe-twits deliberately forget to tell
    me that they have passworded their systems, just so that I'll have to call
    and ask them for it. What dumb-asses!!, the response I used to get
    sometimes was "What?, You can't Hack it?".

    Yeah, I can hack it *******. Well, anyway. Now, my crew at work doesn't
    have to hear that **** anymore. Now, its us telling them..." BTW, you'll
    have to re-set your Password. We had to Kill it to FIX your Computer."
    *Chump*

    BTW, yes, I have AW, AMI, AMIDECODE, PASS, PASSWORD, PASSOFF, and
    they all work on MotherBoards circa 1988-1994. Haven't seen one of these
    programs crack a password for a year and a half.

    *scenerio two*
    Sometimes, a motherboard's CMOS settings will get corrupted due to a
    power-flux or just because it felt like it. The Level of corruption may
    keep you from even into the CMOS menu.


    O.K., I get it, But How does it do it?


    KiLLCMOS is a direct descendant of my first Bios Resetter, CLRCMOS.


    CLRCMOS changed one Checksum in CMOS. 64 byte .COM file that would
    work on 100% of the computers from 1987 until 1994. Around '94 ,
    More Bioses strayed from the IBM CMOS manifesto, in you will, and started
    making their CMOS larger & more proprietary. Sooo.. CLRCMOS started
    to fail in its tasks( killing CMOS/PASSWORDS). It seemed CLRCMOS would
    reset the CMOS, but still leave the PASSWORD & its "Check at setup" Bit
    intack, therefore leaving me with having to drain the battery to enter the
    CMOS.

    This is where KiLLCMOS come into play. Where CLRCMOS took a Sniper's shot
    at your computer's CMOS Checksum (1 byte), KiLLCMOS takes a Shotgun blast
    to your CMOS. KiLLCMOS changes the values in ALL KNOWN proprietary
    Checksum locations. Then, it changes (overwrites) ALL KNOWN Password
    & their accompanying Checksums.

    End Result. Computer Reboots, Says "CMOS Checksum Failure, Default
    Settings Loaded..."

    Now its time to reconfigure your motherboard to your specific hard-drives,
    floppies...etc.

    OK. I'm ready, How do I do it?

    Just execute KiLLCMOS.COM . You can run it from a floppy, or from
    Windows 3.x/Win95. I haven't tested WIN NT with it yet though.
    In Windows systems your "open session" will continue as normal. Only when
    you reboot your system, will the CMOS Checksums be recognized as "bad" &
    the CMOS reset.
    ZT3000
    Beta tester of "0"s and "1"s"

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •