| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 58494 | 2005-06-02 10:14:00 | Virus Help Please | Lovelee (6586) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 360599 | 2005-06-02 10:14:00 | Well Ive put the networking on hold for the moment but :eek: now Ive got a virus problem .. Im looking for something to fix Qhost.gen and W32/sober.V.worm The comps running verrrrrryyyyy ssslllllloooooooooooowwwwwwwwww :o |
Lovelee (6586) | ||
| 360600 | 2005-06-02 10:19:00 | Why can't your current Antivirus program remove these viruses/trojans? | Jen (38) | ||
| 360601 | 2005-06-02 10:24:00 | Thats a good question .. Im running AVG .. updated .. but Ive just looked at the test centre and the last time it ran was 23/5/ thats cos its winter and we arnt getting out of bed till 9am .. I'll run it now. | Lovelee (6586) | ||
| 360602 | 2005-06-02 11:04:00 | Well, interesting, AVG says Its clear. I ran a pandascan and it gave me the two viruses. I usually use trend for online scans for when comp seems off colour. Ive done all the other normal housekeeping things, its very slow going to some websites, in particular a bank. Though IE has had critical probs and shut down and occasionally when Ive clicked on IE on the desktop it wont open a page. Rebooting helps, but it still loads some pages slowly. |
Lovelee (6586) | ||
| 360603 | 2005-06-02 11:09:00 | Try downloading and running The Stinger (vil.nai.com). It should detect and repair the W32/Sober if it is present. For Qhost.gen, search for the "Hosts" file on the hard drive and post back here the contents of it (open it in notepad). |
Jen (38) | ||
| 360604 | 2005-06-02 11:23:00 | symantec's removal tools (securityresponse.symantec.com) | gibler (49) | ||
| 360605 | 2005-06-02 13:02:00 | ...or maybe Trends Damage clean-up engine ... www.trendmicro.com be sure to read the [small] readme re latest pattern file etc |
KatiMike (242) | ||
| 360606 | 2005-06-02 18:51:00 | (Guess you have try this)Have you try scanning your computer using AVG under safe mode? Not sure if this advice would be a help. Cheers :) |
Renmoo (66) | ||
| 360607 | 2005-06-03 01:20:00 | Is this the Hosts file u wanted Jen ?? # Copyright (c) 1993-1999 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host 127.0.0.1 localhost Ive run stinger .. no sign of any problems .. maybe panda over reacted ?? |
Lovelee (6586) | ||
| 360608 | 2005-06-03 06:30:00 | Your host file looks normal. I was expecting a heap of website URL's entries belonging to various sites with 127.0.0.1 beside it which is what Qhost.gen does when you are infected. Try a different online scan with TrendMicro (housecall.trendmicro.com/) and McAfee (us.mcafee.com) for a third opinion. Let us know how you get on. :) |
Jen (38) | ||
| 1 2 | |||||