2 Intern

 • 

5.9K Posts

September 7th, 2005 14:00

The following lines are from the WinFixer Bug. 
Unfortunately you can't just check them and Fix Checked.  They will just come back with new names.

O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\Cursors\logvb.dll
O20 - Winlogon Notify: logvb - C:\WINDOWS\Cursors\logvb.dll


I have two fixes:
 
http://www.bleepingcomputer.com/forums/How-to-remove-the-TrojanVundoB-Search42com-MSevents-t18610.html

IF the above line wraps and doesn't work use:  http://tinyurl.com/7n5f8

and

http://tinyurl.com/72khc  (See Rawe's procedure in Post#2)


The first is rather complex but is pretty certain to succeed and I presume it is safe.  Haven't used it but
usually bleepingcomputer is very good.

The second is the standard procedure I have been using and is a bit simpler.  It has worked about 10 times with no problems but 1 user reported
he had to reload windows after use, another had some odd problems and one said it didn't do anything.
The text file with it says you have to have internet access when you run it.  It might work better in Safe Mode with Networking.

In either case you will need to adjust the procedure for your particular infection.  By that I mean you will need to note the lines
I gave you above and substitute them for the lines he tells you to check.

XP only:

Make sure before you do anything that your System Restore is working and that you have a recent Restore Point. 
That way if something goes wrong you have a chance to recover.
http://www.microsoft.com/windowsxp/using/helpandsupport/learnmore/systemrestore.mspx

Let me know which method you used and how it worked for you.

Ron

 

2 Intern

 • 

5.9K Posts

September 7th, 2005 20:00

IF you rightclick on it and select Open With Notepad it will show you:

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B8B55274-0F9A-41E5-9067-A3539BD9E860}]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{44240BB5-BD7D-4D49-A1AA-8AB0F3D3CB44}]
[-HKEY_CLASSES_ROOT\CLSID\{581F22DA-7202-4F21-AEF3-114787156016}]
[-HKEY_CLASSES_ROOT\CLSID\{B8B55274-0F9A-41E5-9067-A3539BD9E860}]
[-HKEY_CLASSES_ROOT\CLSID\{44240BB5-BD7D-4D49-A1AA-8AB0F3D3CB44}]
[-HKEY_CLASSES_ROOT\MSEvents.MSEvents]
[-HKEY_CLASSES_ROOT\MSEvents.MSEvents.1]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MSEvents.MSEvents]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MSEvents.MSEvents.1]
 
The - sign after the initial "[" just indicates a removal so it is just removing each of the keys listed.
 
Glad it fixed your problem.
 
Ron
 
Make sure you have System Restore running (toggle it off and On today to get rid of any bad stuff it may have retained) and then you can just go back to an earlier time if you hit a bad site.  One way to make this more obvious is to check everything in your current HijackThis and Add to Ignore List then set up Hijackthis to run at boot and to show you if it finds anything new.
http://www.microsoft.com/windowsxp/using/helpandsupport/learnmore/systemrestore.mspx
 
To avoid going to a bad site you might want to install IE-SpyAd and SpywareBlaster and make the other changes recommended at:.
http://www.mvps.org/winhelp2002/restricted.htm
I used to recommend Spybot's Immunize system but have recently learned it is not as good as the one at:
http://www.mvps.org/winhelp2002/hosts.htm
Never hurts to do one of the free on line scans from Panda or Trend.  They take a while but are pretty good.
www.pandasoftware.com/activescan/activescan.asp?
http://housecall.trendmicro.com/
In addition to Microsoft AntiSpy
http://www.microsoft.com/athome/security/downloads/default.mspx
I like to run Spybot S&D. 
http://www.safer-networking.org/en/download/index.html
Also like to run AdAware once in a while. 
http://www.lavasoftusa.com/software/adaware/


 

8 Posts

September 7th, 2005 20:00

Out of curiosity, what does the registry fix (fixvundo.reg) do in my machine.
 
Thanks,
Vinnis

2 Intern

 • 

5.9K Posts

September 7th, 2005 20:00

The second option has been replaced today by a new program.
 
See:
 
 
The paths the program asks you for would be:
 
C:\WINDOWS\Cursors\logvb.dll
and
 
C:\WINDOWS\Cursors\bvgol.*
 
This one now automatically checks and Fix Checkeds the entries in HijackTHis for you.
 
Ron
 

8 Posts

September 7th, 2005 20:00

Hi Ron,
I used the first method and it just worked fine. I was desparate to get rid of them. Now I see very less hard disk and network activity on my machine.
 
Thanks you have a nice day.
Vinnis
 

8 Posts

September 7th, 2005 23:00

Thanks Ron,

Vinnis
No Events found!

Top