The first is rather complex but is pretty certain to succeed and I presume it is safe. Haven't used it but usually bleepingcomputer is very good.
The second is the standard procedure I have been using and is a bit simpler. It has worked about 10 times with no problems but 1 user reported he had to reload windows after use, another had some odd problems and one said it didn't do anything. The text file with it says you have to have internet access when you run it. It might work better in Safe Mode with Networking.
In either case you will need to adjust the procedure for your particular infection. By that I mean you will need to note the lines I gave you above and substitute them for the lines he tells you to check.
The - sign after the initial "[" just indicates a removal so it is just removing each of the keys listed.
Glad it fixed your problem.
Ron
Make sure you have System Restore running (toggle it off and On today to get rid of any bad stuff it may have retained) and then you can just go back to an earlier time if you hit a bad site. One way to make this more obvious is to check everything in your current HijackThis and Add to Ignore List then set up Hijackthis to run at boot and to show you if it finds anything new.
RKinner
2 Intern
•
5.9K Posts
0
September 7th, 2005 14:00
The following lines are from the WinFixer Bug.
Unfortunately you can't just check them and Fix Checked. They will just come back with new names.
O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\Cursors\logvb.dll
O20 - Winlogon Notify: logvb - C:\WINDOWS\Cursors\logvb.dll
I have two fixes:
http://www.bleepingcomputer.com/forums/How-to-remove-the-TrojanVundoB-Search42com-MSevents-t18610.html
IF the above line wraps and doesn't work use: http://tinyurl.com/7n5f8
and
http://tinyurl.com/72khc (See Rawe's procedure in Post#2)
The first is rather complex but is pretty certain to succeed and I presume it is safe. Haven't used it but
usually bleepingcomputer is very good.
The second is the standard procedure I have been using and is a bit simpler. It has worked about 10 times with no problems but 1 user reported
he had to reload windows after use, another had some odd problems and one said it didn't do anything.
The text file with it says you have to have internet access when you run it. It might work better in Safe Mode with Networking.
In either case you will need to adjust the procedure for your particular infection. By that I mean you will need to note the lines
I gave you above and substitute them for the lines he tells you to check.
XP only:
Make sure before you do anything that your System Restore is working and that you have a recent Restore Point.
That way if something goes wrong you have a chance to recover.
http://www.microsoft.com/windowsxp/using/helpandsupport/learnmore/systemrestore.mspx
Let me know which method you used and how it worked for you.
Ron
RKinner
2 Intern
•
5.9K Posts
0
September 7th, 2005 20:00
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B8B55274-0F9A-41E5-9067-A3539BD9E860}]
To avoid going to a bad site you might want to install IE-SpyAd and SpywareBlaster and make the other changes recommended at:.
http://www.mvps.org/winhelp2002/restricted.htm
I used to recommend Spybot's Immunize system but have recently learned it is not as good as the one at:
http://www.mvps.org/winhelp2002/hosts.htm
www.pandasoftware.com/activescan/activescan.asp?
http://housecall.trendmicro.com/
In addition to Microsoft AntiSpy
http://www.microsoft.com/athome/security/downloads/default.mspx
I like to run Spybot S&D.
http://www.safer-networking.org/en/download/index.html
Also like to run AdAware once in a while.
http://www.lavasoftusa.com/software/adaware/
vinnis
8 Posts
0
September 7th, 2005 20:00
RKinner
2 Intern
•
5.9K Posts
0
September 7th, 2005 20:00
vinnis
8 Posts
0
September 7th, 2005 20:00
vinnis
8 Posts
0
September 7th, 2005 23:00
Vinnis