Abuse Melding

Je hebt een klacht over de onderstaande posting:

29-08-2011, 05:05 door Anoniem

Maakt niet uit wij hebben er last van en local admin is aangepast. Onderstaande post net op microsoft gepost Looks like we fixt it: The virus/wrm/botnet is running in some stages. In most active stage we cleaned the virus. Sens32.dll is the engine in the virus we think. Stop thet service and disable "system event Notifier" (its using sens32.dll instead of the standerd sens.dll) Clean the registry: Delete the complete key and everyting under it (we didn't see it on servers only on xp machines: HKLM\SYSTEM\CurrentControlSet\Services\6to4 Clean teh keys under not the folders! HKLM\SYSTEM\WPA\ Change key back to normal: subkey: HKLM\SYSTEM\CurrentControlSet\Services\Sens\Parameters Adds value: "ServiceDll" With data: "<system folder>\sens.dll" Restart machine: Delete everyting underneed: c:\windows\offline web pages\ delete c:\windows\system32\sens32.dll if you cant delete sens32.dll repeat the steps. enable and start "system event Notifier" again. now we need to ...

Beschrijf je klacht (Optioneel):

captcha