System 32 ssqopnn.dll threat

Discussion in 'NOD32 version 2 Forum' started by wiztr, Oct 1, 2007.

Thread Status:
Not open for further replies.
  1. wiztr

    wiztr Registered Member

    Joined:
    Oct 1, 2007
    Posts:
    2
    Dear someone,

    PLEASE HELP ME!

    this threat (System 32 ssqopnn.dll) keeps popping up on my nod32 and when i try to delete it it pops right back up a few seconds later. I even tried to delete it manually and it didn't work. Please help me.
     
  2. ASpace

    ASpace Guest

    Hello and welcome to Wilders!

    Write down what module finds this as a threat (AMON or IMON) and the path to the file (e.g. C:\Windows\system32\bla-bla-bla.dll)
     
  3. TonyKlein

    TonyKlein Security Expert

    Joined:
    Feb 9, 2002
    Posts:
    4,361
    Location:
    The Netherlands
    It's a dll which implements a Vundo aka Virtumonde adware BHO (browser plugin)

    There are dedicated tools to deal with this infection, which can be a pain to remove, and by far the best thing to do is post a HijackThis log at one of the boards specializing in malware removal so that the analysts can have a look at your configuration.

    Here's an excellent one that isn't quite as busy as the "big names": http://www.bleepingcomputer.com/forums/index.php?
     
  4. wiztr

    wiztr Registered Member

    Joined:
    Oct 1, 2007
    Posts:
    2
    Thanks for your help. here's the info i got from hijack this....

    ~Log removed.~
     
    Last edited by a moderator: Oct 1, 2007
  5. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,926
    Location:
    Texas
    wiztr,

    Post your log at the link above your post. We no longer process logs here.

    Wilders no longer analyzes hijack logs per this announcement.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.