Hey! I don't know if this is a hoax or not but I did find the file when I checked and I got rid of it. Good Luck!!! > Edward J Zender wrote: > > > Hey, everybody! > > A friend sent me this message to let me know that I may have > a virus passed along through my address book. I found the virus even though I have virus scan. It lies dormant for 14 days and then kills your hard Drive. Here's how to stop it. If you've got it, send this to everyone in your address book!!! > > Remove it by the following steps: > 1. Go to start - then to "find" or "search" > (depends on your computer) > 2. In the "search for files or folders" type > sulfnbk.exe - this is the virus. > 3. In the "look in" make sure that you are looking in > the C drive > 4. Hit the "search" button (or find) > 5. If this file shows up (it's an ugly black icon that > will have the > name sulfnbk.exe) DO NOT OPEN IT! > 6. RIGHT click on the file - go down to delete and Left > click. > 7. It will ask if you want to send it to the recycle > bin, say yes. > 8. Go to your desktop (where all of your icons are) and > double click > on the Recycle Bin. > 9. Right click on "sulfnbk.exe" and delete it again - or > empty > the recycle bin. > > Last - if you find it, send this e-mail to everyone in > your address book!! > That is how it is transferred. > > If you have itAm sorry, but it was passed on to me, I hope it > wasn't passed to you......EM & RPF
http://www.symantec.com/avcenter/venc/data/sulfnbk.exe.warning.html SULFNBK.EXE Warning Reported on: April 17, 2001 Last Updated on: December 13, 2001 at 04:37:44 PM PST Printer-friendly version Tell a Friend Symantec Security Response encourages you to ignore any messages regarding this hoax. It is harmless and is intended only to cause unwarranted concern. Type: Hoax Description: The following hoax email was first reported in Brazil. The original email is in Portuguese; it is followed by several other versions. CAUTIONS: This particular email message is a hoax. The file that is mentioned in the hoax, however, Sulfnbk.exe, is a Microsoft Windows utility that is used to restore long file names, and like any .exe file, it can be infected by a virus that targets .exe files. The virus/worm W32.Magistr.24876@mm can arrive as an attachment named Sulfnbk.exe. The Sulfnbk.exe file used by Windows is located in the C:\Windows\Command folder. If the file is located in any other folder, or arrives as an attachment to a email message, then it is possible that the file is infected. In this case, if a scan with the latest virus definitions and with NAV set to scan all files does not detect the file as being infected, quarantine and submit the file to SARC for analysis by following the instructions in the document How to submit a file to SARC using Scan and Deliver. If you have deleted the Sulfnbk.exe file from the C:\Windows\Command folder and want to know how to restore the file, see the How to restore the Sulfnbk.exe file section at the end of this document. English versions Version 1 Do you believe that a friend of mine sent me an alert and the procedure that we have to follow for the possible infection of SULFNBK.EXE. And I had checked, just to make sure. An then... the file was there, hidden even of McAfee and Norton, maybe waiting something to start work. Well, see bellow the procedure that I followed step by step, and I found the file: 1. Start/Find Folders. Type the file name: SULFNBK.EXE 2. If it find, open Windows Explorer, browse into the folder where the file is and delete it. Do not click with left button on the file and do not open it. 3. Just delete it 4. Mine was on Windows/Command 5. The virus from the person who gave the alert was on Windows/Config Yes, Norton and McAfee do not detect it. We do not know if it makes some damage on the machine, but I think that anybody will not want to test it to know, will it? Folks, this is not fun, I deleted it from my computer. And my definitions are updated. Do the same, ok? Version 2 This one has additional text stating that the virus will activate on June 1st. It was brought to my attention yesterday that a virus is in circulation via email. I looked for it and to my surprise I found it on mine. .. Please follow the directions and remove it from yours TODAY!!!!!!! No Virus software can detect it. It will become active on June 1, 2001. It might be too late by then. It wipes out all files and folders on the hard drive. This virus travels thru E-mail and migrates to the 'C:\windows\command' folder. The bad part is: You need to contact everyone you have sent ANY E-mail to in the past few months. Many major companies have found this virus on their computers. Please help your friends !!!!!!!! DO NOT RELY ON YOUR ANTI-VIRUS SOFTWARE. McAFEE and NORTON CANNOT DETECT IT BECAUSE IT DOES NOT BECOME A VIRUS UNTIL JUNE 1ST. WHATEVER YOU DO, DO NOT OPEN THE FILE!!! How to restore the Sulfnbk.exe file If you have deleted this file, restoration is optional. Sulfnbk.exe is a Microsoft Windows utility that is used to restore long file names. It is not needed for normal system operation. If you want to restore it, there is more than one way to do this. See the information that follows. NOTE: The instructions in this document are provided for your convenience. The extraction of Windows files uses Microsoft programs and commands. Symantec does not provide warranty support for or assistance with Microsoft products. If you have any questions, please see your Windows documentation or contact Microsoft. Windows Me If you are using Windows Me, you can restore the file using the System Configuration Utility. 1. Click Start and then click Run. 2. Type msconfig and then press Enter. 3. Click Extract Files. The "Extract one file from installation disk" dialog box appears. 4. In the "Specify the system file you would like to restore" box, type the following, and then click Start: c:\windows\command\sulfnbk.exe NOTE: If you installed Windows to a different location, make the appropriate substitution. The Extract File dialog box appears. 5. Next to the "Restore from" box, click Browse, and browse to the location of the Windows installation files. If they were copied to the hard drive, this is, by default, C:\Windows\Options\Install. You can also insert the Windows installation CD in the CD-ROM drive and browse to that location. 6. Click OK and follow the prompts. Windows 98 If you are using Windows 98, you can restore the file using the System File Checker. 1. Click Start and then click Run. 2. Type sfc and then press Enter. 3. Click "Extract one file from installation disk." 4. In the "Specify the system file you would like to restore" box, type the following, and then click Start: c:\windows\command\sulfnbk.exe NOTE: If you installed Windows to a different location, make the appropriate substitution. The Extract File dialog box appears. 5. Next to the "Restore from" box click Browse, and browse to the location of the Windows installation files. If they were copied to the hard drive, this is, by default, C:\Windows\Options\Cabs. You can also insert the Windows installation CD in the CD-ROM drive and browse to that location. 6. Click OK and follow the prompts. Windows 95 (or alternative method for Windows 98/Me) If you are using Windows 95, you need to use the extract command. This can also be used on Windows 98/Me. 1. Click Start, point to Find or Search, and then click Files or Folders. 2. Make sure that "Look in" is set to (C:) and that Include subfolders is checked. 3. In the "Named" or "Search for..." box, type: precopy1 4. Click Find Now or Search Now. If it does not exist on the hard drive, then insert the Windows installation CD and repeat the search on that drive. 5. When you find the file, write down the location of Precopy1, for example, C:\Windows\Options\Cabs. This is your Source Path. 6. The general form of the Extract command is: extract <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command So if the source path is C:\Windows\Options\Cabs, then the Extract command becomes: extract c:\windows\options\cabs\precopy1.cab sulfnbk.exe /L c:\windows\command NOTE: If you installed Windows to a different location, make the appropriate substitution. 7. Click Start and then click Run. 8. Type the following, making the appropriate substitutions as previously noted extract <Source Path>\precopy1.cab sulfnbk.exe /L c:\windows\command 9. Click OK. -----Original Message----- From: Joan M Ross [mailto:joross@socal.rr.com] Sent: Monday, December 17, 2001 12:44 PM To: BOSTON-L@rootsweb.com Subject: [BOSTON] [Fwd: virus] Hey! I don't know if this is a hoax or not but I did find the file when I checked and I got rid of it. Good Luck!!! > Edward J Zender wrote: > > > Hey, everybody! > > A friend sent me this message to let me know that I may have > a virus passed along through my address book. I found the virus even though I have virus scan. It lies dormant for 14 days and then kills your hard Drive. Here's how to stop it. If you've got it, send this to everyone in your address book!!! > > Remove it by the following steps: > 1. Go to start - then to "find" or "search" > (depends on your computer) > 2. In the "search for files or folders" type > sulfnbk.exe - this is the virus. > 3. In the "look in" make sure that you are looking in > the C drive > 4. Hit the "search" button (or find) > 5. If this file shows up (it's an ugly black icon that > will have the > name sulfnbk.exe) DO NOT OPEN IT! > 6. RIGHT click on the file - go down to delete and Left > click. > 7. It will ask if you want to send it to the recycle > bin, say yes. > 8. Go to your desktop (where all of your icons are) and > double click > on the Recycle Bin. > 9. Right click on "sulfnbk.exe" and delete it again - or > empty > the recycle bin. > > Last - if you find it, send this e-mail to everyone in > your address book!! > That is how it is transferred. > > If you have itAm sorry, but it was passed on to me, I hope it > wasn't passed to you......EM & RPF ==== BOSTON Mailing List ==== Boston's Freedom Trail: http://www.ci.boston.ma.us/freedomtrail/bostoncommon.asp ============================== To join Ancestry.com and access our 1.2 billion online genealogy records, go to: http://www.ancestry.com/rd/redir.asp?targetid=571&sourceid=1237