We definitely have the Vertimonde Vundo virus at my neighbor across the street - her machine has XP or 2000 choice of OS upon start up. I need to get all the system info - so let me know what all you need to know. I've been reading for a few days. I found article stating it was a new wave of attack with hidden files set to go off on April 1. On an XP system in debugging mode PC Tools SpyDoctor was able to identify and remove all but 1 file. A different article described that file and how it relaunches the virus upon restart. Which keeps happening.
I found you guys through reading wiki pedia articles. So I thought you seemed good. But to save time I am copying something I posted on Tech Support Guy, but no response yet, not enough time gone by: We don't have the pay version of SpyDoctor. I will wait for an experienced person before running any more things... I found CCleaner and it said to only do it with a trained person..... so I picked you guys.... thanks... A little overwhelmed and tired. I ran two tools the old purple one Vundo http://vundofix.atribune.org/
and the one in the instructions below. They said they got all files but upon restart it was the same. SpyDoctor continues to clean it back to one file so I can work on the unit. But after reading that April 1 it might report back to it's maker.... I am in a hurry to get it fixed. THANKS!!!! Gina Marlene
Virtumonde Vundo Trojan
My neighbor has the Virtumonde Vundo trojan. I've run two tools from a fix site I found. But it seems to not be working. I did research for previous answers. I appeared that the fixes were specific to each person's machine so I started my own new thread to get that help.
I know trying it on my own may have made it worse...sorry. I'm going back over there tomorrow.
They don't have a paid security software now. I used SpyDoctor first and it takes away all but the one file buried in the windows restore.
What do I need to tell you besides OS, etc? I'm going back over there tomorrow to work on it more. I left one of the tools to keep running it was taking a while. Thanks Gina
This is what I was trying, I left off the last part about switches:
Discovered: November 20, 2004
Updated: November 30, 2005 12:00:00 AM
Type: Removal Information
This tool is designed to remove the infections of the following threats:
* If you are on a network or have a full-time connection to the Internet, such as a DSL or cable modem, disconnect the computer from the network and Internet. Disable or password-protect file sharing, or set the shared files to Read Only, before reconnecting the computers to the network or to the Internet. Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.
For instructions on how to do this, refer to your Windows documentation, or the document: How to configure shared Windows folders for maximum network protection.
* If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only.
* This tool is not designed to run on Novell NetWare servers. To remove this threat from a NetWare server, first make sure that you have the current virus definitions, and then run a full system scan with the Symantec antivirus product.
How to download and run the tool
Important: You must have administrative rights to run this tool on Windows NT 4.0, Windows 2000, or Windows XP.
Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: XADM: Do Not Back Up or Scan Exchange 2000 Drive M (Article 298924).
Follow these steps to download and run the tool:
1. Download the FixVundo.exe file from: http://www.symantec.com/content/en/u...s/FixVundo.exe
2. Save the file to a convenient location, such as your Windows desktop.
3. Optional: To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.
Note: If you are sure that you are downloading this tool from the Security Response Web site, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the "Digital signature" section before proceeding with step 4.
4. Close all the running programs.
5. If you are on a network or if you have a full-time connection to the Internet, disconnect the computer from the network and the Internet.
6. If you are running Windows Me or XP, turn off System Restore. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
7. Locate the file that you just downloaded.
8. Double-click the FixVundo.exe file to start the removal tool.
9. Click Start to begin the process, and then allow the tool to run.
Note: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.
10. Restart the computer.
11. Run the removal tool again to ensure that the system is clean.
12. If you are running Windows Me/XP, then reenable System Restore.
13. If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.
14. Run LiveUpdate to make sure that you are using the most current virus definitions.
When the tool has finished running, you will see a message indicating whether the threat has infected the computer. The tool displays results similar to the following:
* Total number of the scanned files
* Number of deleted files
* Number of repaired files
* Number of terminated viral processes
* Number of fixed registry entries
What the tool does
The Removal Tool does the following:
* Terminates the associated processes
* Deletes the associated files
* Deletes the registry values added by the threat
The following switches are designed for use by network administrators: (rest of article not copied)