Fraud.Windows.ProtectionSuite

  • Thread starter Thread starter Dennis
  • Start date Start date
Well, I guess everyone will have it if it can't be detected and cleaned...



PA Bear [MS MVP] wrote:

> Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015

>

> Backdoor.Tidserv does a very good job in that sense, especially with the

> latest version (TDL3), which uses an advanced rootkit technology to hide

> its

> presence on a system by infecting one of the low-level kernel drivers

> and then

> covering its tracks. *While the rootkit is active there is no easy way to

> detect the infection*, [emphasis mine] and because it goes so deep into

> the kernel, most

> users cannot see anything wrong in the system...Even worse, because the

> infected

> driver is critical for system boot-up, Windows will not boot in Safe Mode

> either [after having installed MS10-015 on an infected machine].

>

> http://www.symantec.com/connect/blogs/tidserv-and-ms10-015

>

> Tdss rootkit silently owns the net

>

> Tdss rootkit 3rd variant is the last member of Tdss rootkit family that is

> quickly spreading around the world. While a number of rootkits are just

> developed as a proof of concept, this is not the case. Tdss rootkit is well

> known to antivirus companies because of its goal to get total control of

> the

> infected PCs and using them as zombies for its botnet.

>

> During these years it has always shown a team of skilled people behind

> it, who

> always applied advanced techniques often able to bypass antirootkit

> softwares.

> Actually, this last variant could be easily named as the stealthiest

> rootkit

> in the wild.

>

> This infection is bringing all together the best of MBR rootkit, the

> best of

> Rustock.C and the experience of old Tdss variants. *Result is an

> infection that

> is quickly spreading on the net and it is undetected by almost every

> security

> software and 3rd party anti rootkit software*. [emphasis mine]

>

> ...currently no antirootkit is able to bypass disk filtering

> technique used by Tdss rootkit but, even if it was possible, this rootkit

> could not be detected by file size cross check because file size of the

> original and infected files are exactly the same.

>

> http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html

>

>

> Dennis wrote:

>> EVERY anti-malware and anti-virus program says the computer is

>> clean. Stinger, McAfee, Malwarebytes, SuperAntiSpyware, and an

>> on line scan says it is clean. If they can't find it then every

>> computer will be infected eventually because it isn't detectable

>> by current means available. So at that point your info is no safer

>> than hers on that computer.

>>

>>

>> PA Bear [MS MVP] wrote:

>>> Meanwhile, your data (e.g., online banking usernames and passwords) may

>>> have been compromised and your computer may still be functioning as a

>>> malware-bot for the Bad Guys. Guess time will tell about all that, too,

>>> eh?

>>>

>>> Dennis wrote:

>>>> I guess time will tell.

>>>>

>>>> PA Bear [MS MVP] wrote:

>>>>> If you needed that fix, I wonder what else might still be wrong?...

>>>>>

>>>>> Dennis wrote:

>>>>>> The EXE File Association Fix from this site fixed the problem

>>>>>> of the icons not working. Everything is functioning now and

>>>>>> no viruses detected.

>>>>>>

>>>>>> http://www.dougknox.com/xp/file_assoc.htm

>>>>>>

>>>>>> PA Bear [MS MVP] wrote:

>>>>>>> Repost:

>>>>>>>

>>>>>>> **Chances are you will need to seek expert assistance in

>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,

>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,

>>>>>>> http://www.dslreports.com/forum/cleanup,

>>>>>>> http://www.bluetack.co.uk/forums/index.php,

>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate forums.**

>>>>>>>

>>>>>>>

>>>>>>> Dennis wrote:

>>>>>>>> Yes.

>>>>>>>>

>>>>>>>> I ran MSRT and it found nothing.

>>>>>>>>

>>>>>>>> I can't install Widows Live in Safe Mode and in regular mode

>>>>>>>> clicking the icon pops up the "Which program do you want to

>>>>>>>> use to open this" window. So I can't install it either way.

>>>>>>>> So, I finally tried Windows Update icon and it connected to

>>>>>>>> Microsoft. I put in the Url you listed and got to the Protection

>>>>>>>> Scan. It found nothing but was run in Safe Mode. I rebooted in

>>>>>>>> normal mode and still no icons open programs.

>>>>>>>>

>>>>>>>> I ran HiJack This and it found some entries in

>>>>>>>> C:\Windows\system32\drivers\etc\ that were removed. After

>>>>>>>> that Spybot did not find anything. Spybot no longer says there

>>>>>>>> were things it could not fix because it could not write to

>>>>>>>> C:\Windows\system32\drivers\etc

>>>>>>>>

>>>>>>>> So, right now in normal mode, no icons open programs. In Safe

>>>>>>>> Mode with Networking, signed in as a normal user no icons work.

>>>>>>>> But in Safe Mode with Networking signed in as Administrator,

>>>>>>>> all the icons open the programs as they should except IE and OE.

>>>>>>>> MalwareBytes, SuperAntiSpyware, and Spybot all update and run

>>>>>>>> but find nothing IF ran in Safe Mode as Administrator..

>>>>>>>>

>>>>>>>>

>>>>>>>>

>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>

>>>>>>>>> Have you completed Steps #1, #2, and #3? [yes/no]

>>>>>>>>>

>>>>>>>>> Dennis wrote:

>>>>>>>>>> This is the current situation. No programs find any viruses now.

>>>>>>>>>> But in regular mode no desk top icons work. McAfee updated but

>>>>>>>>>> won't run if you click the icon. It pops a window asking what

>>>>>>>>>> program you want to use to run it as does everything else.

>>>>>>>>>> The start menu works but if you click any programs they do not

>>>>>>>>>> run. But in safe mode, all the desk top icons work if I use

>>>>>>>>>> the "Administrator" user but not if I use the regular user name

>>>>>>>>>> to log in. Using her normal user name to log in, the desk top

>>>>>>>>>> icons don't work in regular mode or safe mode.

>>>>>>>>>>

>>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>> [TYPO CORRECTED]

>>>>>>>>>>>

>>>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>>>> ...I'll

>>>>>>>>>>>>> try downloading these two programs and installing them via the

>>>>>>>>>>>>> USB memory stick.

>>>>>>>>>>>>

>>>>>>>>>>>> Don't! Use a CD or DVD to transfer the files to the infected

>>>>>>>>>>>> machine.

>>>>>>>>>>>>

>>>>>>>>>>>> 1. Unless it's a brand-new, never-been-used flash drive, it

>>>>>>>>>>>> [COULD] be

>>>>>>>>>>>> infected and/or the source of your infection!

>>>>>>>>>>>>

>>>>>>>>>>>> 2. Inserting the flash drive into the infected computer may

>>>>>>>>>>>> end up

>>>>>>>>>>>> infecting

>>>>>>>>>>>> the flash drive (which could then transfer the infection to

>>>>>>>>>>>> another

>>>>>>>>>>>> computer).

>>>>>>>>>>>>

>>>>>>>>>>>>

>>>>>>>>>>>> Dennis wrote:

>>>>>>>>>>>>> Malwarebytes, SuperAntiSpyware, and Spybot were updated and

>>>>>>>>>>>>> ran

>>>>>>>>>>>>> regularly. McAffee is installed and set for automatic updates.

>>>>>>>>>>>>> Windows is set for automatic updates and SP3 is installed.

>>>>>>>>>>>>> I'll

>>>>>>>>>>>>> try downloading these two programs and installing them via the

>>>>>>>>>>>>> USB memory stick. So far that works yet.

>>>>>>>>>>>>>

>>>>>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>>>>> NB: If you had no anti-virus application installed or the

>>>>>>>>>>>>>> subscription

>>>>>>>>>>>>>> had expired *when the machine first got infected* and/or your

>>>>>>>>>>>>>> subscription has since expired and/or the machine's not been

>>>>>>>>>>>>>> kept

>>>>>>>>>>>>>> fully-patched at Windows Update, don't waste your time with

>>>>>>>>>>>>>> any of

>>>>>>>>>>>>>> the

>>>>>>>>>>>>>> below: Format & reinstall Windows. A Repair Install will NOT

>>>>>>>>>>>>>> help!

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> Microsoft PCSafety provides home users (only) with no-charge

>>>>>>>>>>>>>> support

>>>>>>>>>>>>>> in

>>>>>>>>>>>>>> dealing with malware infections such as viruses, spyware

>>>>>>>>>>>>>> (including

>>>>>>>>>>>>>> unwanted software), and adware.

>>>>>>>>>>>>>> https://support.microsoft.com/oas/default.aspx?&prid=7552&st=1

>>>>>>>>>>>>>>

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> Also available via the Consumer Security Support home page:

>>>>>>>>>>>>>> https://consumersecuritysupport.microsoft.com/

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> Otherwise...

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> 1. See if you can download/run the MSRT manually:

>>>>>>>>>>>>>> http://www.microsoft.com/security/malwareremove/default.mspx

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> NB: Run the FULL scan, not the QUICK scan! You may need to

>>>>>>>>>>>>>> download

>>>>>>>>>>>>>> the

>>>>>>>>>>>>>> MSRT on a non-infected machine, then transfer MRT.EXE to the

>>>>>>>>>>>>>> infected

>>>>>>>>>>>>>> machine and rename it to SCAN.EXE before running it.

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> 2a. WinXP => Run the Windows Live Safety Center's

>>>>>>>>>>>>>> 'Protection'

>>>>>>>>>>>>>> scan

>>>>>>>>>>>>>> (only!) in Safe Mode with Networking, if need be:

>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/howsafe.htm

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> 2b. Vista or Win7=> Run this scan instead:

>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/whatsnew.htm

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> 3. Now run a thorough check for hijackware, including posting

>>>>>>>>>>>>>> requested

>>>>>>>>>>>>>> logs in an appropriate forum, not here. DO NOT SKIP THIS

>>>>>>>>>>>>>> STEP!!

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> Checking for/Help with Hijackware:

>>>>>>>>>>>>>> . http://mvps.org/winhelp2002/unwanted.htm

>>>>>>>>>>>>>> . http://inetexplorer.mvps.org/tshoot.html

>>>>>>>>>>>>>> . http://www.mvps.org/sramesh2k/Malware_Defence.htm

>>>>>>>>>>>>>> .

>>>>>>>>>>>>>> http://www.elephantboycomputers.com/page2.html#Removing_Malware

>>>>>>>>>>>>>>

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> **Chances are you will need to seek expert assistance in

>>>>>>>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,

>>>>>>>>>>>>>>

>>>>>>>>>>>>>>

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,

>>>>>>>>>>>>>> http://www.dslreports.com/forum/cleanup,

>>>>>>>>>>>>>> http://www.bluetack.co.uk/forums/index.php,

>>>>>>>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate

>>>>>>>>>>>>>> forums.**

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> If these procedures look too complex - and there is no

>>>>>>>>>>>>>> shame in

>>>>>>>>>>>>>> admitting this isn't your cup of tea - take the machine to a

>>>>>>>>>>>>>> local,

>>>>>>>>>>>>>> reputable and independent (i.e., not BigBoxStoreUSA or Geek

>>>>>>>>>>>>>> Squad)

>>>>>>>>>>>>>> computer repair shop.


>
 
Nope, just those running lousy AV & AS apps (e.g., AVG; McAfee; Norton;

STUPIDAntiSpyware) and/or those participating in P2P File Sharing and/or

those who just can't resist clicking on "See the nekkid lady!" links.



Dennis wrote:

> Well, I guess everyone will have it if it can't be detected and cleaned...

>

> PA Bear [MS MVP] wrote:

>> Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015

>>

>> Backdoor.Tidserv does a very good job in that sense, especially with the

>> latest version (TDL3), which uses an advanced rootkit technology to hide

>> its

>> presence on a system by infecting one of the low-level kernel drivers

>> and then

>> covering its tracks. *While the rootkit is active there is no easy way to

>> detect the infection*, [emphasis mine] and because it goes so deep into

>> the kernel, most

>> users cannot see anything wrong in the system...Even worse, because the

>> infected

>> driver is critical for system boot-up, Windows will not boot in Safe Mode

>> either [after having installed MS10-015 on an infected machine].

>>

>> http://www.symantec.com/connect/blogs/tidserv-and-ms10-015

>>

>> Tdss rootkit silently owns the net

>>

>> Tdss rootkit 3rd variant is the last member of Tdss rootkit family that

>> is

>> quickly spreading around the world. While a number of rootkits are just

>> developed as a proof of concept, this is not the case. Tdss rootkit is

>> well

>> known to antivirus companies because of its goal to get total control of

>> the

>> infected PCs and using them as zombies for its botnet.

>>

>> During these years it has always shown a team of skilled people behind

>> it, who

>> always applied advanced techniques often able to bypass antirootkit

>> softwares.

>> Actually, this last variant could be easily named as the stealthiest

>> rootkit

>> in the wild.

>>

>> This infection is bringing all together the best of MBR rootkit, the

>> best of

>> Rustock.C and the experience of old Tdss variants. *Result is an

>> infection that

>> is quickly spreading on the net and it is undetected by almost every

>> security

>> software and 3rd party anti rootkit software*. [emphasis mine]

>>

>> ...currently no antirootkit is able to bypass disk filtering

>> technique used by Tdss rootkit but, even if it was possible, this rootkit

>> could not be detected by file size cross check because file size of the

>> original and infected files are exactly the same.

>>

>> http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html

>>

>>

>> Dennis wrote:

>>> EVERY anti-malware and anti-virus program says the computer is

>>> clean. Stinger, McAfee, Malwarebytes, SuperAntiSpyware, and an

>>> on line scan says it is clean. If they can't find it then every

>>> computer will be infected eventually because it isn't detectable

>>> by current means available. So at that point your info is no safer

>>> than hers on that computer.

>>>

>>>

>>> PA Bear [MS MVP] wrote:

>>>> Meanwhile, your data (e.g., online banking usernames and passwords) may

>>>> have been compromised and your computer may still be functioning as a

>>>> malware-bot for the Bad Guys. Guess time will tell about all that,

>>>> too,

>>>> eh?

>>>>

>>>> Dennis wrote:

>>>>> I guess time will tell.

>>>>>

>>>>> PA Bear [MS MVP] wrote:

>>>>>> If you needed that fix, I wonder what else might still be wrong?...

>>>>>>

>>>>>> Dennis wrote:

>>>>>>> The EXE File Association Fix from this site fixed the problem

>>>>>>> of the icons not working. Everything is functioning now and

>>>>>>> no viruses detected.

>>>>>>>

>>>>>>> http://www.dougknox.com/xp/file_assoc.htm

>>>>>>>

>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>> Repost:

>>>>>>>>

>>>>>>>> **Chances are you will need to seek expert assistance in

>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,

>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,

>>>>>>>> http://www.dslreports.com/forum/cleanup,

>>>>>>>> http://www.bluetack.co.uk/forums/index.php,

>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate forums.**

>>>>>>>>

>>>>>>>>

>>>>>>>> Dennis wrote:

>>>>>>>>> Yes.

>>>>>>>>>

>>>>>>>>> I ran MSRT and it found nothing.

>>>>>>>>>

>>>>>>>>> I can't install Widows Live in Safe Mode and in regular mode

>>>>>>>>> clicking the icon pops up the "Which program do you want to

>>>>>>>>> use to open this" window. So I can't install it either way.

>>>>>>>>> So, I finally tried Windows Update icon and it connected to

>>>>>>>>> Microsoft. I put in the Url you listed and got to the Protection

>>>>>>>>> Scan. It found nothing but was run in Safe Mode. I rebooted in

>>>>>>>>> normal mode and still no icons open programs.

>>>>>>>>>

>>>>>>>>> I ran HiJack This and it found some entries in

>>>>>>>>> C:\Windows\system32\drivers\etc\ that were removed. After

>>>>>>>>> that Spybot did not find anything. Spybot no longer says there

>>>>>>>>> were things it could not fix because it could not write to

>>>>>>>>> C:\Windows\system32\drivers\etc

>>>>>>>>>

>>>>>>>>> So, right now in normal mode, no icons open programs. In Safe

>>>>>>>>> Mode with Networking, signed in as a normal user no icons work.

>>>>>>>>> But in Safe Mode with Networking signed in as Administrator,

>>>>>>>>> all the icons open the programs as they should except IE and OE.

>>>>>>>>> MalwareBytes, SuperAntiSpyware, and Spybot all update and run

>>>>>>>>> but find nothing IF ran in Safe Mode as Administrator..

>>>>>>>>>

>>>>>>>>>

>>>>>>>>>

>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>

>>>>>>>>>> Have you completed Steps #1, #2, and #3? [yes/no]

>>>>>>>>>>

>>>>>>>>>> Dennis wrote:

>>>>>>>>>>> This is the current situation. No programs find any viruses now.

>>>>>>>>>>> But in regular mode no desk top icons work. McAfee updated but

>>>>>>>>>>> won't run if you click the icon. It pops a window asking what

>>>>>>>>>>> program you want to use to run it as does everything else.

>>>>>>>>>>> The start menu works but if you click any programs they do not

>>>>>>>>>>> run. But in safe mode, all the desk top icons work if I use

>>>>>>>>>>> the "Administrator" user but not if I use the regular user name

>>>>>>>>>>> to log in. Using her normal user name to log in, the desk top

>>>>>>>>>>> icons don't work in regular mode or safe mode.

>>>>>>>>>>>

>>>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>>> [TYPO CORRECTED]

>>>>>>>>>>>>

>>>>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>>>>> ...I'll

>>>>>>>>>>>>>> try downloading these two programs and installing them via

>>>>>>>>>>>>>> the

>>>>>>>>>>>>>> USB memory stick.

>>>>>>>>>>>>>

>>>>>>>>>>>>> Don't! Use a CD or DVD to transfer the files to the infected

>>>>>>>>>>>>> machine.

>>>>>>>>>>>>>

>>>>>>>>>>>>> 1. Unless it's a brand-new, never-been-used flash drive, it

>>>>>>>>>>>>> [COULD] be

>>>>>>>>>>>>> infected and/or the source of your infection!

>>>>>>>>>>>>>

>>>>>>>>>>>>> 2. Inserting the flash drive into the infected computer may

>>>>>>>>>>>>> end up

>>>>>>>>>>>>> infecting

>>>>>>>>>>>>> the flash drive (which could then transfer the infection to

>>>>>>>>>>>>> another

>>>>>>>>>>>>> computer).

>>>>>>>>>>>>>

>>>>>>>>>>>>>

>>>>>>>>>>>>> Dennis wrote:

>>>>>>>>>>>>>> Malwarebytes, SuperAntiSpyware, and Spybot were updated and

>>>>>>>>>>>>>> ran

>>>>>>>>>>>>>> regularly. McAffee is installed and set for automatic

>>>>>>>>>>>>>> updates.

>>>>>>>>>>>>>> Windows is set for automatic updates and SP3 is installed.

>>>>>>>>>>>>>> I'll

>>>>>>>>>>>>>> try downloading these two programs and installing them via

>>>>>>>>>>>>>> the

>>>>>>>>>>>>>> USB memory stick. So far that works yet.

>>>>>>>>>>>>>>

>>>>>>>>>>>>>> PA Bear [MS MVP] wrote:

>>>>>>>>>>>>>>> NB: If you had no anti-virus application installed or the

>>>>>>>>>>>>>>> subscription

>>>>>>>>>>>>>>> had expired *when the machine first got infected* and/or

>>>>>>>>>>>>>>> your

>>>>>>>>>>>>>>> subscription has since expired and/or the machine's not been

>>>>>>>>>>>>>>> kept

>>>>>>>>>>>>>>> fully-patched at Windows Update, don't waste your time with

>>>>>>>>>>>>>>> any of

>>>>>>>>>>>>>>> the

>>>>>>>>>>>>>>> below: Format & reinstall Windows. A Repair Install will

>>>>>>>>>>>>>>> NOT

>>>>>>>>>>>>>>> help!

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> Microsoft PCSafety provides home users (only) with no-charge

>>>>>>>>>>>>>>> support

>>>>>>>>>>>>>>> in

>>>>>>>>>>>>>>> dealing with malware infections such as viruses, spyware

>>>>>>>>>>>>>>> (including

>>>>>>>>>>>>>>> unwanted software), and adware.

>>>>>>>>>>>>>>> https://support.microsoft.com/oas/default.aspx?&prid=7552&st=1

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> Also available via the Consumer Security Support home page:

>>>>>>>>>>>>>>> https://consumersecuritysupport.microsoft.com/

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> Otherwise...

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> 1. See if you can download/run the MSRT manually:

>>>>>>>>>>>>>>> http://www.microsoft.com/security/malwareremove/default.mspx

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> NB: Run the FULL scan, not the QUICK scan! You may need to

>>>>>>>>>>>>>>> download

>>>>>>>>>>>>>>> the

>>>>>>>>>>>>>>> MSRT on a non-infected machine, then transfer MRT.EXE to the

>>>>>>>>>>>>>>> infected

>>>>>>>>>>>>>>> machine and rename it to SCAN.EXE before running it.

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> 2a. WinXP => Run the Windows Live Safety Center's

>>>>>>>>>>>>>>> 'Protection'

>>>>>>>>>>>>>>> scan

>>>>>>>>>>>>>>> (only!) in Safe Mode with Networking, if need be:

>>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/howsafe.htm

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> 2b. Vista or Win7=> Run this scan instead:

>>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/whatsnew.htm

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> 3. Now run a thorough check for hijackware, including

>>>>>>>>>>>>>>> posting

>>>>>>>>>>>>>>> requested

>>>>>>>>>>>>>>> logs in an appropriate forum, not here. DO NOT SKIP THIS

>>>>>>>>>>>>>>> STEP!!

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> Checking for/Help with Hijackware:

>>>>>>>>>>>>>>> . http://mvps.org/winhelp2002/unwanted.htm

>>>>>>>>>>>>>>> . http://inetexplorer.mvps.org/tshoot.html

>>>>>>>>>>>>>>> . http://www.mvps.org/sramesh2k/Malware_Defence.htm

>>>>>>>>>>>>>>> .

>>>>>>>>>>>>>>> http://www.elephantboycomputers.com/page2.html#Removing_Malware

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> **Chances are you will need to seek expert assistance in

>>>>>>>>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,

>>>>>>>>>>>>>>> http://www.dslreports.com/forum/cleanup,

>>>>>>>>>>>>>>> http://www.bluetack.co.uk/forums/index.php,

>>>>>>>>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate

>>>>>>>>>>>>>>> forums.**

>>>>>>>>>>>>>>>

>>>>>>>>>>>>>>> If these procedures look too complex - and there is no

>>>>>>>>>>>>>>> shame in

>>>>>>>>>>>>>>> admitting this isn't your cup of tea - take the machine to a

>>>>>>>>>>>>>>> local,

>>>>>>>>>>>>>>> reputable and independent (i.e., not BigBoxStoreUSA or Geek

>>>>>>>>>>>>>>> Squad)

>>>>>>>>>>>>>>> computer repair shop.
 
Back
Top