Home > General > Trojan.Win32.Monder.195584

Trojan.Win32.Monder.195584

Trojan.Win32.Monder.195584 This is a discussion on Trojan.Win32.Monder.195584 within the Resolved HJT Threads forums, part of the Tech Support Forum category. Adware.4Shared.297409 Adware.4Shared.4669710 Adware.Addlyrics.3006464.B Adware.Adload.129832 Adware.Adload.506592.B Adware.Adpeak.269583 Adware.Adpeak.562666 Adware.Agent.1248264.BA Adware.Agent.1562632.H Adware.Agent.1741312 Adware.Agent.177488.F Adware.Agent.22528.R Adware.Agent.2420736.W Adware.Agent.2428824.AR Adware.Agent.287432 Adware.Agent.366936.AMS Adware.Agent.484352.E Adware.Agent.5111872 Adware.Agent.5243904 Adware.Agent.537952 Adware.Agent.547984 Adware.Agent.547984.A Adware.Agent.547984.B Adware.Agent.581312 Adware.Agent.585172 Adware.Agent.659268 Adware.Agent.659880 Adware.Agent.667304 Adware.Agent.667875 Adware.Agent.668704 Adware.Agent.705928 Cam Virtual: system32\DRIVERS\livecamv.sys (manual start) Reliable Multicast Protocol driver: \??\C:\WINDOWS\system32\drivers\RMCast.sys (manual start) Remote Procedure Call (RPC) Locator: %SystemRoot%\system32\locator.exe (manual start) Remote Procedure Call (RPC): %SystemRoot%\system32\svchost -k rpcss (autostart) QoS RSVP: %SystemRoot%\system32\rsvp.exe More Search Options [X] My Assistant Loading. http://relite.org/general/win32-trojan-rxe.php

Click Continue at the disclaimer screen. Site Message (Message will auto close in 2 seconds) Welcome Guest ( Log In | Register ) Kaspersky Lab Forum>English User Forum>Virus-related issues Trojan.Win32.monder.gen, Can't scan in safe mode - DOWNLOAD NOW Most Popular Malware'.aesir File Extension' RansomwareCerber [email protected] Ransomware'[email protected]' RansomwareRansomware.FBI MoneypakRevetonNginx VirusKovter RansomwareDNS ChangerRandom Audio Ads VirusGoogle Redirect Virus Top TrojansHackTool:Win32/Keygen New Malware Havoc RansomwareVBRansom RansomwareLambdaLocker RansomwareHakunaMatata RansomwareKaandsona RansomwareMarlboro RansomwareEvil I was able to fix this after a couple of tries. http://www.techsupportforum.com/forums/f100/trojan-win32-monder-195584-a-289571.html

Currently Beta Testing: N/A Trying to get into graduate schoolCurrent job:pm me for info blackraven View Member Profile 28.06.2008 14:31 Post #3 Newbie Group: Members Posts: 6 Joined: 25.06.2008 hi, ACAD.Bursted.2258 Backdoor.Win32.Hupigon.369165 Backdoor.Win32.IRCBot.41984.N I-Worm.Win32.VB.53248.C INF.Autorun.529 INF.Autorun.84 Trojan.Win32.Agent.24576.AJ Trojan.Win32.Banbra.172038 Trojan.Win32.Banker.271872.C Trojan.Win32.Banker.333360 Trojan.Win32.Delf.16384 Trojan.Win32.Downloader.112928 Trojan.Win32.Downloader.115712.H Trojan.Win32.Downloader.117248.D Trojan.Win32.Downloader.154624 Trojan.Win32.Downloader.156672.C Trojan.Win32.Downloader.157126 Trojan.Win32.Downloader.157184.K Trojan.Win32.Downloader.160066 Trojan.Win32.Downloader.161792.B Trojan.Win32.Downloader.163328.D Trojan.Win32.Downloader.164867 Trojan.Win32.Downloader.16896.BT Trojan.Win32.Downloader.16896.BU Trojan.Win32.Downloader.172538 Trojan.Win32.Downloader.174014 Trojan.Win32.Downloader.174718.B Trojan.Win32.Downloader.17920.BN Trojan.Win32.Downloader.17920.BO Trojan.Win32.Downloader.180224.L Trojan.Win32.Downloader.186032 Backdoor.Win32.A.DarkKomet.5349376.A Backdoor.Win32.A.Iroffer.743913 Backdoor.Win32.A.Poison.7451561 Backdoor.Win32.A.Swrort.58368 Backdoor.Win32.A.ZAccess.183296.AN Backdoor.Win32.A.ZAccess.183296.AO Backdoor.Win32.Agent.105984.H Backdoor.Win32.Agent.108032.K Backdoor.Win32.Agent.29103 Backdoor.Win32.Agent.319488.D Backdoor.Win32.Agent.742912.G Backdoor.Win32.S.Agent.107520.AA Backdoor.Win32.S.Agent.144896.X Backdoor.Win32.S.Simda.770048 BAT.S.Agent.2810 Dropper.A.Agent.3552936 Dropper.A.Autoit.1371585 Dropper.A.Autoit.406719 Dropper.A.Autoit.429527 Dropper.A.Autoit.711359 Dropper.A.Injector.154112.EQ Dropper.A.Injector.195584.AS Dropper.A.Injector.219648.BQ Dropper.A.Injector.351957 Dropper.A.Injector.388886 Dropper.A.Injector.602112.S Dropper.A.Injector.684108.KG Dropper.A.Injector.932118 Dropper.Agent.305664.H Dropper.Agent.316416 Dropper.PSWIGames.24112

Double click on RSIT.exe to run RSIT. Posts: 5,264 OS: XP Hello and welcome to TSF Apologises for the delay getting to your log. Vundo is often distributed as a DLL file and installed on an affected machine as a Browser Helper Object (BHO) without a user's consent. Options blackraven View Member Profile 25.06.2008 03:53 Post #1 Newbie Group: Members Posts: 6 Joined: 25.06.2008 Hey all,I got this (i think it came in a Codemasters GRID demo) Trojan.win32.monder.gen detected

Backdoor.Win32.Z.Agent.174080.C Backdoor.Win32.Z.Alicia.256000 Backdoor.Win32.Z.Delf.84408 Backdoor.Win32.Z.Hupigon.374272.B Backdoor.Win32.Z.Hupigon.586752.A Backdoor.Win32.Z.Hupigon.711403 Backdoor.Win32.Z.Hupigon.737573 Backdoor.Win32.Z.Torr.105472 BIN.S.Autorun.136505 JS.S.Downloader.153291 JS.S.Downloader.154671 JS.S.Downloader.4674.A JS.S.Downloader.85638 LNK.S.Agent.1144 LNK.S.Agent.549.D Trojan.Win32.Agent.1042608 Trojan.Win32.Agent.147968.AD Trojan.Win32.Agent.159744.CI Trojan.Win32.Agent.31744.CU Trojan.Win32.Agent.360448.AU Trojan.Win32.Agent.376716 Trojan.Win32.Agent.4096.BD Trojan.Win32.Agent.411648.N Trojan.Win32.Agent.420696.A Trojan.Win32.Agent.545280.E Trojan.Win32.Agent.649728.C Trojan.Win32.Agent.797184.A Trojan.Win32.Agent.978944.H Trojan.Win32.R.Agent.362194 Trojan.Win32.R.Agent.576512 Trojan.Win32.S.Agent.184320.ALA Please post the contents of both log.txt (< Windows 7 64-bit, 500gb HD, 4gb ram, Nvidia GeForce GT 425M, i5-480M (in use)FF: current; KIS/KAV and PURE Tester since Kaspersky 6 with real computer (always).

What to do now Manual removal is not recommended for this threat. When I originally got infected it changed my wallpaper to a blue background with some warning that I have a virus. Trojan:Win32/Vundo.gen!H is a component of Win32/Vundo - a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files. The function to detect(repair) 12 type(s) of spywares has been added.

Licensed to: Kaspersky Lab Sign in AccountManage my profileView sample submissionsHelpMalware Protection CenterSearchMenuSearch Malware Protection Center Search Microsoft.com Search the Web AccountAccountManage my profileView sample submissionsHelpHomeSecurity softwareGet Microsoft softwareDownloadCompare our softwareMicrosoft also run this scriptCODEbeginSetAVZGuardStatus(True);SearchRootkit(true, true); DelBHO('{C5E046A3-B2C2-49FB-869D-300C6DF1BC09}'); DelBHO('{57A52E74-004C-464B-96CC-4DFE5366EA02}'); QuarantineFile('C:\WINDOWS\system32\wvUmliJa.dll',''); QuarantineFile('C:\WINDOWS\system32\ljJBssQJ.dll',''); DeleteFile('C:\WINDOWS\system32\wvUmliJa.dll'); DeleteFile('C:\WINDOWS\system32\ljJBssQJ.dll');BC_ImportDeletedList;ExecuteSysClean;BC_Activate;RebootWindows(true);end. « Next Oldest · Virus-related issues · Next Newest » Forum Home Search Help English User Forum |-- At the moment there are 2:c:\DOCUME-1\Neil\LOCALS-1\Temp\lhowggpj.dllC:\Documents and Settings\Neil\Local Settings\Temporary Internet Files\Content.IE5\D2VWMGP5\kb654117[1]3 more have been put in "back-up" by Kasperskyc:\documents and settings\neil\local settings\temp\odunmeku.dllc:\documents and settings\neil\local settings\temp\lhowggpj.dllC:\Documents and Settings\Neil\Local Settings\Temporary Internet Files\Content.IE5\IJ4EPV2O\kb654117[1]And 1 Windows 7 32-bit Ultimate (not in use). 2.

Backdoor.Win32.Agent.118788 Backdoor.Win32.Agent.126974 Backdoor.Win32.Agent.155648.D Backdoor.Win32.Agent.163844 Backdoor.Win32.Agent.18437 Backdoor.Win32.Agent.199168.D Backdoor.Win32.Agent.23215 Backdoor.Win32.Agent.240128.B Backdoor.Win32.Agent.249856.K Backdoor.Win32.Agent.29695 Backdoor.Win32.Agent.304128 Backdoor.Win32.Agent.31232.H Backdoor.Win32.Agent.367104 Backdoor.Win32.Agent.396800.J Backdoor.Win32.Agent.399872.K Backdoor.Win32.Agent.400384.L Backdoor.Win32.Agent.401920.F Backdoor.Win32.Agent.402432.E Backdoor.Win32.Agent.402432.F Backdoor.Win32.Agent.405504.C Backdoor.Win32.Agent.49152.K Backdoor.Win32.Agent.49152.L Backdoor.Win32.Agent.49152.M Backdoor.Win32.Agent.50688.E Backdoor.Win32.Agent.601600 Backdoor.Win32.Agent.601600.B Backdoor.Win32.Agent.65536.K Backdoor.Win32.Agent.90624.D Backdoor.Win32.Agobot.507904 Backdoor.Win32.Bancodor.457728.B Backdoor.Win32.Beastdoor.73227 navigate to this website Tech Support Forum Security Center Virus/Trojan/Spyware Help General Computer Security Computer Security News Microsoft Support BSOD, Crashes And Hangs Windows 10 Support Windows 8, 8.1 Support Windows 7, Vista Support Windows blackraven View Member Profile 29.06.2008 07:03 Post #9 Newbie Group: Members Posts: 6 Joined: 25.06.2008 thanks luciani let the computer restart (took bout 40mins but all good now) used the computer Engine version Details 4853787 2013.09.23.01 Updated-Viruses(169 types), Spywares(12 types), Malicious programs(0 types) 1.

The following 0 functions to detect(repair) types of malicious codes are added. Engine version Details 2628 2008.09.04.01 Updated-Viruses(459 types), Spywares(0 types), Malicious programs(0 types) 1. So I was hoping someone could tell me, after running Kaspersky, CCleaner is there anything else I can do?Thanks v much,JP Shinigami View Member Profile 25.06.2008 04:19 Post #2 Advanced http://relite.org/general/packed-win-32-monder-gen.php The function to detect(repair) 169 type(s) of viruses has been added.

Adware.Agent.107363 Adware.Agent.107364 Adware.Agent.107499 Adware.Agent.125576.A Adware.Agent.135646 Adware.Agent.734744 Adware.Agent.781165 Adware.Agent.792603 Adware.ArchSMS.11230626 Adware.ArchSMS.2565120.RW Adware.ArchSMS.3366220 Adware.KorAd.155648.L HOME > Security Info > Engine Update status No. Vundo is often distributed as a DLL file and installed on an affected machine as a Browser Helper Object (BHO) without a user's consent. So I'm going to install OSSIM and teach myself how to do this.

Engine version Details 2543 2008.07.15.00 Updated-Viruses(68 types), Spywares(0 types), Malicious programs(0 types) 1.

Engine version Details 4857889 2016.09.02.04 Updated-Viruses(968 types), Spywares(1,103 types), Malicious programs(0 types) 1. Prevention Take these steps to help prevent infection on your computer. I've also noticed that in the C:\RECYCLER folder I occasionally get a new directory with a bunch of files that I suspect are part of the problem. The following 67 functions to detect(repair) types of malicious codes are added.

The following 459 functions to detect(repair) types of malicious codes are added. Use Microsoft Security Essentials or another up-to-date scanning and removal tool to detect and remove this threat and other unwanted software from your computer. I was very hopeful at first but I have become disillusioned. 10-01-2008, 05:25 AM #4 TheBruce1 Security Team Analyst Join Date: Oct 2006 Location: Dùn Èideann,Scotland. click site This family uses advanced defensive and stealth techniques to escape detection and to hinder removal.

Top Threat behavior Trojan:Win32/Vundo.gen!H is a component of Win32/Vundo - a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files. I am willing to take the training. Once it has finished, two logs will open. Group: Gold beta testers Posts: 56947 Joined: 28.01.2006 From: Timisoara, Romania Please run this scriptCODEbeginSetAVZGuardStatus(True);SearchRootkit(true, true); DelBHO('{57A52E74-004C-464B-96CC-4DFE5366EA02}'); DelBHO('{1C57C41D-B52A-40BD-923F-D8D28082E764}'); QuarantineFile('ljJBssQJ.dll',''); QuarantineFile('C:\WINDOWS\system32\wvUmliJa.dll',''); QuarantineFile('C:\WINDOWS\system32\ljJBssQJ.dll',''); QuarantineFile('C:\WINDOWS\system32\emwwcdtw.dll',''); DeleteFile('C:\WINDOWS\system32\wvUmliJa.dll'); DeleteFile('C:\WINDOWS\system32\ljJBssQJ.dll'); DeleteFile('C:\WINDOWS\system32\emwwcdtw.dll'); DeleteFile('ljJBssQJ.dll');BC_ImportDeletedList;BC_Activate;ExecuteSysClean;RebootWindows(true);end.http://forum.kaspersky.com/index.php?showt...st&p=678368 blackraven View Member Profile

Finally, because I have a wireless Logitech Mouse and Keyboard I can't load the BIOS or press any buttons to launch safe mode while the computer is booting up. For more information on Microsoft security products, see http://www.microsoft.com/protect/products/computer/default.mspx. Group: Gold beta testers Posts: 56947 Joined: 28.01.2006 From: Timisoara, Romania helloplease post an avz log: http://forum.kaspersky.com/index.php?showt...st&p=678326 blackraven View Member Profile 28.06.2008 14:51 Post #5 Newbie Group: Members Posts: 6 The following 0 functions to detect(repair) types of malicious codes are added.

This post has been edited by blackraven: 28.06.2008 14:34 Attached File(s) SUPERAntiSpyware_Scan_Log___06_28_2008___19_53_48.log ( 1,28K ) Number of downloads: 6 Lucian Bara View Member Profile 28.06.2008 14:34 Post #4 Are Please Wait... I realize that this is a volunteer site. Password Site Map Posting Help Register Rules Today's Posts Search Site Map Home Forum Rules Members List Contact Us Community Links Pictures & Albums Members List Search Forums Show Threads

C:\Explorer.exe: not present C:\WINDOWS\Explorer\Explorer.exe: not present C:\WINDOWS\System\Explorer.exe: not present C:\WINDOWS\System32\Explorer.exe: not present C:\WINDOWS\Command\Explorer.exe: not present C:\WINDOWS\Fonts\Explorer.exe: not present -------------------------------------------------- Checking for superhidden extensions: .lnk: HIDDEN! (arrow overlay: yes) .pif: HIDDEN! (arrow