Solved

Virus Response Lab 2009 removal

Posted on 2008-10-04
6
3,111 Views
Last Modified: 2013-11-22
I have a computer with os window 2000, that has a virus called Response lab 2009 that I need to remove from my computer. I have Tried everything that I know and have not been successful.
Is there some programs that will remove it automatically?
0
Comment
Question by:Rcorn8559
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 12

Expert Comment

by:TK-77
ID: 22642695
Malwarebytes should be able to remove that. You can download it from here:

http://www.download.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.htm

Let me know if that works.

TK
0
 
LVL 8

Expert Comment

by:sstone55423
ID: 22642696
Let's try Malware bytes on it first.  http://www.download.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html
Also run hijackthis, and attach a log for us to peruse.  http://www.download.com/Trend-Micro-HijackThis/3000-8022_4-10227353.html
 
0
 
LVL 47

Accepted Solution

by:
rpggamergirl earned 500 total points
ID: 22642726
This particular rogue "Virus Response Lab 2009" is already in Smitfraudfix database, but other scanners may remove it too.
Please download SmitfraudFix, and select Option 2. Clean (Safe mode recommended)
http://siri.geekstogo.com/SmitfraudFix.php

Please download SmitfraudFix:
http://siri.geekstogo.com/SmitfraudFix.php
Extract the content (a folder named SmitfraudFix) to your Desktop.
Next, please reboot your computer in Safe Mode by rebooting the computer,
and repeatedly tapping the F8 key as the pc starts. Choose "Safe Mode" from
the options listed.

Once in Safe Mode, open the SmitfraudFix folder again and double-click
smitfraudfix.cmd

Select option #2 - Clean by typing 2 and press "Enter" to delete infected
files.

You will be prompted : "Registry cleaning - Do you want to clean the
registry?" answer "Yes" by typing Y and press "Enter" in order to remove
the Desktop background and clean registry keys associated with the
infection.

The tool will now check if wininet.dll is infected. You may be prompted to
replace the infected file (if found); answer "Yes" by typing Y and press
"Enter".

The tool may need to restart your computer to finish the cleaning process;
if it doesn't, please restart it into Normal Windows.
A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
The report can also be found at the root of the system drive, usually at C:\rapport.txt
0
How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

 
LVL 8

Expert Comment

by:sstone55423
ID: 22644866
Just checking in -- how is it going?  Did malwarebytes remove it?  Send the hijackthis log so we can see if anything else is infecting the computer.
0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 22646495
I assume the issue is now resolved?
If you think the system is still infected, you can attach the hijackthis log and we'll see if there are other infections present.
Thanks!
0
 

Expert Comment

by:CE101
ID: 23099651
I'm glad I found this posting.
Yesterday my computer became infected with "Virus Response Lab 2009"
This is a slick-looking virus that masquerades as an anti-virus program.
As suggested above I tried Malwarebytes and it successfully removed the virus.

Gary
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Procedure syntax 5 64
making a message body variable from an oracle select statement 4 51
Behavior-based and anomalies detection for Symantec 2 44
Windows 8 recovery issue 12 52
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This video shows how to copy a database user from one database to another user DBMS_METADATA.  It also shows how to copy a user's permissions and discusses password hash differences between Oracle 10g and 11g.
This videos aims to give the viewer a basic demonstration of how a user can query current session information by using the SYS_CONTEXT function

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question