Open task manager and on the process tab find dllhost.exe, right click and hit end process (that may come back access denied to but try ir) then delete it.
try using something like "sure delete" that program somehow overrides problems like "cant delete because its locked" its just the school bully of deleters, and its free. google it, i dont remember the site.
The removal tool will remove the registry entires for you, now the files are gone you should be fine.
You need to install a firewall on your system asap to prevent further problems. Also you need the security patch from windows update however w32.welchia will probably have already applied this patch for you (it does that, how nice).
I do have a svchost.exe in that folder but there are about 8 instances of a file with the same name in task manager. How do i get rid of it or will the removel tool take care of it?
By the way, thanks for all your help.. Its been invaluble.
Regarding svchost.exe now the main process has gone this one should just be deleteable, the virus does not run it. Yes the removal tool will take care of it.
Regarding the firewall in PCC, no its not that good, very basic. I did not think much of it.
Checkout "Kerio 2.1.5". See the firewall poll and related theads in this section, have a dig around and a read
The file "C:\WINDOWS\System32\wins\svchost.exe" is deleted.
W32.Welchia.Worm has been successfully removed
from your computer!
Here is the report:
The total number of the scanned files: 110517
The number of deleted files: 1
The number of repaired files: 0
The number of viral processes terminated: 0
The number of viral services deleted: 2
The number of registry entries fixed: 0
Also Hi EP and people. I found this place again while looking through a oooollllllldddd backup. I have filled over 10TB and was looking at my collection of antiques. Any bids on the 500Mhz Win 95 fix?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.