Jump to content

How to remove malware


xman68
 Share

Recommended Posts

The stuff in the green box is in the System Restore, so just delete all previous restore points, and then turn it back on and create a new restore point. Instructions about how to do it are at the end of this post.

Also, I hope I don't have to point out that those files are keygens, which are used for software piracy. Tools used for piracy can also have malicious code injected in them, and they tend to be dangerous to use. They are also illegal in many countries.

Emptying the System Restore:

  1. Click on the Start button.
  2. Right-click on Computer
  3. Select Properties from the list.
  4. In the window that pops up, click on the System protection link in the menu on the left.
  5. The buttons may not be clickable for a few moments, but once you can click on them select the drive in the list near the bottom that shows protection is on (this will usually be you C: drive) and click the Configure... button.
  6. Click the button near the bottom-right that says Delete to clear all System Restore data.
  7. Once finished, click OK to close that window.
  8. Now you will want to make sure that the correct drive is selected again (usually your C: drive) and click on the Create button to create a new restore point.
  9. Fill in a name for the restore point, and click the Create button.
  10. Once it is done, you can close the windows that were opened to get to the System Restore settings.

Link to comment
Share on other sites

According to that avast! is detecting the file as a generic trojan.

Also, please note that the detection on this keygen was from BitDefender's engine, so the decision to list it was theirs and not ours (you can see in the results on VirusTotal that Emsisoft and BitDefender call it the same thing). The file is also being detected as a generic trojan, which means that it is a heuristic detection and that this particular file was not necessarily deliberately added to the database (heuristics detections can mean that a file has similar characteristics to something malicious).

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...