Improve company productivity with a Business Account.Sign Up

x
?
Solved

i have the following virus what i can do to remove it?

Posted on 2012-03-20
3
Medium Priority
?
492 Views
Last Modified: 2013-11-22
see print screen

thanks
Gvilbis
virus-on-my-screen.JPG
0
Comment
Question by:gvilbis
3 Comments
 
LVL 10

Accepted Solution

by:
c_a_n_o_n earned 668 total points
ID: 37744275
Microsoft Security Essentials has already quarantined the virus.  You look like you are okay.  You can also try a free Malwarebytes to scan your PC and clean whatever that may be there.  But according to that screen, you look like you are alright.
0
 
LVL 17

Assisted Solution

by:pjam
pjam earned 668 total points
ID: 37744364
I agree with Canon.  a full scan by an updates MSE would also be nioce.  Not sure (Quick Scan is sufficient)
Malwarebytes is awesome, the Pro version even better. enough said.
0
 
LVL 38

Assisted Solution

by:younghv
younghv earned 664 total points
ID: 37744383
I am a huge fan of Malwarebytes, but I don't think it is safe to rely on it to scan/remove a Virut variant.

It is hard to know what stage of deployment the malware was in when it was trapped by MSE.

The variants of "Virut" have been extremely difficult to remove.

At the very least you should use an application developed to target them - try this:
http://support.kaspersky.com/faq/?qid=208280756
**************

If you decide to run Malwarebytes (as recommended above) run one of the rogue process stoppers before hand.

Details on "RogueKiller" here:
Rogue-Killer-What-a-great-name
Stop-the-Bleeding-First-Aid-for-Malware

In addition to using "RogueKiller", you can also try "TheKiller"
Download TheKiller to your Desktop
http://maliprog.geekstogo.com/explorer.exe

Note that TheKiller is renamed as explorer.exe
Run it by double click
Press OK button after program finish
Do not restart your system after this step, but immediately run the next scan: MalwareBytes, TDSSKiller, ComboFix
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

606 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question