Kindly be advised we cannot cancel subscriptions or issue refunds on the forum.
You may cancel your Bitdefender subscription from Bitdefender Central or by contacting Customer Support at: https://www.bitdefender.com/consumer/support/help/

Thank you for your understanding.

Cd-MaN

Kommentare

  • The signature in question has been deactivated and the detection should not occur after you update your signature definition files. Best regards.
  • The attached file is of size zero. Please re-attach the file. Best regards.
  • The attached file is of size zero. Please re-attach the file. Best regards.
  • The file is not detected currently by BD. Proably it was a false positive, but was removed in the mean time. Please update your signature files. Best regards.
  • Hello First of all I see that you have McAfee installed, so maybe it is better if you try the McAfee support (even if we would add detection for the samples, it wouldn't help you because you are not using BitDefender). The suspicius files are; C:\WINDOWS\system32\pdqhohix.dll C:\WINDOWS\system32\blyglqvx.dll…
  • Detection will be available as Trojan.Downloader.VB.FCF after the next update. Best regards.
  • Detection will be available as Trojan.Vundo.GL after the next update. Best regards.
  • Files signed as: Trojan.Dialer.DML Trojan.Downloader.Agent.RNI Trojan.Vundo.EPZ Detection will be available after the next update. Best regards.
  • The file is not currently detected. This was probably a false positive which was in the meantime eliminated. Please update the signatures of you BitDefender installation. If the problem persists, please let us know. Best regards.
  • Signed as Worm.Wholam.A. Detection will be available after the next update. Best regards.
  • Semnat ca Trojan.Zlob.GZ. Toate cele bune.
  • Hello. Please specify exactly the filename about which BitDefender alerts you. Also, take care because your DNS server settings have been altered (which puts you at risk of Phising attacks). Unless you've altered them knowingly, you should reset them. Best regards.
  • The infected "files" are emails which contain links to sites hosting exploits. What you should do (very carefully): - deactivate BD realtime protection - go into your inbox and delete all these emails (by pressing shift+del, not with del) - rightclick on your inbox and select "compact" - reactivate BD Best regards
  • Hello. Judging by the detection name, that doesn't seem to be something detected by BitDefender. Please scan your computer with BitDefender and post the scanlog here. Best regards.
    in W32@uog@pk Kommentar von Cd-MaN Mai 2008
  • See the following forum topic for information: http://forum.bitdefender.com/index.php?showtopic=3575 Best regards.
  • Also, it is possible that some of the web pages you visit are infected. Does it immediately appear after you start IE? Or do you have to navigate to some page for it to appear? If it is the first case, please send me a PM with the address of your home page, otherwise send me (in a PM) the address of the page you navigate…
  • Hello. Please use this forum only for "malware talk", that is to discuss files which should/should not be detected. Best regards. PS. There are a few such sites out there.
  • Sorry for replying in English, but my German is bit rusty . The correct (clean) svchost.exe is located in C:\windows\system32 (usually). So the file "C:\Program Files\Internet Explorer\svchost.exe" is infected (and uses this name to mislead people). BitDefender can't remove it because it's running. You can try scanning…
  • The file is already detected (and should have been detected on your machine also, so please check your settings) as "BehavesLike:Win32.Malware". After the next update it will be detected as Trojan.PWS.OnLineGames.SQN.
  • False positive, detection should be after the next update. Sorry for any inconvenience caused. Best regards.
  • These files (although originally legitimate MS dll's) have been modified by the given malware (they contain extra code injected by the malware). They should be restored from the original Windows install CD. Best regards.
    in Trojan Kommentar von Cd-MaN März 2008
  • These files (although originally legitimate MS dll's) have been modified by the given malware (they contain extra code injected by the malware). They should be restored from the original Windows install CD. Best regards.
  • Files are already detected as Trojan.Vundo.DYY / Adware.Virtumonde.AHO / Trojan.Vundo.DYZ / Trojan.Vundo.DWB except for "PnkBstrA.exe", which is clean. Let BitDefender delete the infected files or see the following topic: http://forum.bitdefender.com/index.php?showtopic=1054 Best regards.
  • Pentru a reactiva Task Manager-ul posti sa folosesti urmatoarea comanda: REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f
  • Suspicious files (please archive them in a password-protected - preferably using the password "infected" - zip file and attach them to a post on the forum so that we can take a look at them): C:\WINDOWS\system32\dllChache\Empty.jpg C:\WINDOWS\system32\dllChache\Blank.doc C:\WINDOWS\system32\dllChache\Zero.txt…
  • As in the duplicate thread: one file already detected as Backdoor.VB.BMS, the other is damaged. Best regards.
  • One file is already detected as "Backdoor.VB.BMS". The other file is damaged. Best regards.
  • If the deep scan doesn't pick up anything, then most probably yes. Generally speaking when e-mails are found to be infected you can do the following: - Deactivate the real-time protection - Browse to the folder the e-mails were found it (do not open them!) - Delete the e-mails (you can find them by subject) - "Compact" the…
    in I Need Help Kommentar von Cd-MaN Februar 2008
  • File is clean (it is a malware-removal tool). Best regards.
  • Hello. First of all I'm sorry that you had these problems. About the Outlook express issue you should probably contact the live support (I'm just a virus researcher). With regards to the Vundo infection: the Vundo family is a continuously changing target (ie there are many, many versions out there). When dealing with such…
Default Avatar