{"id":349,"date":"2011-09-20T10:34:02","date_gmt":"2011-09-20T18:34:02","guid":{"rendered":"http:\/\/systemsolver.com\/StatlerBlog\/?p=349"},"modified":"2011-09-20T10:34:02","modified_gmt":"2011-09-20T18:34:02","slug":"security-alert-virus-notes","status":"publish","type":"post","link":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/2011\/09\/20\/security-alert-virus-notes\/","title":{"rendered":"Security Alert virus notes"},"content":{"rendered":"<p>h<a href=\"ttp:\/\/www.myantispyware.com\/2010\/08\/26\/how-to-remove-fake-microsoft-security-essentials-alert\/\">ttp:\/\/www.myantispyware.com\/2010\/08\/26\/how-to-remove-fake-microsoft-security-essentials-alert\/<\/a><\/p>\n<p>=======================<\/p>\n<p>Fake Microsoft Security Essentials Alert removal instructions (using HijackThis):<\/p>\n<p>1. Download iexplore.exe (NOTE: iexplore.exe file is renamed HijackThis tool from TrendMicro).<\/p>\n<p><a href=\"http:\/\/free.antivirus.com\/hijackthis\/\">http:\/\/free.antivirus.com\/hijackthis\/<\/a><\/p>\n<p>Launch the iexplore.exe and click &#8220;Do a system scan only&#8221; button.<\/p>\n<p>If you can&#8217;t open iexplore.exe file then download explorer.scr and run it.<\/p>\n<p>&nbsp;<\/p>\n<p>2. Search for these entries in the scan results:<\/p>\n<p>O4 &#8211; HKCU\\..\\Run: [tmp] %UserProfile%\\Application Data\\hotfix.exe<\/p>\n<p>O4 &#8211; HKCU\\..\\RunOnce: [SelfdelNT] cmd \/C del &#8220;%UserProfile%\\Desktop\\antispy.exe&#8221;<\/p>\n<p>Select all these entries and click once on the &#8220;Fix checked&#8221; button. Close HijackThis tool.<\/p>\n<p>&nbsp;<\/p>\n<p>===========<\/p>\n<p>Associated Fake Microsoft Security Essentials Alert Trojan and AntiSpySafeguard Files:<\/p>\n<p>&nbsp;<\/p>\n<p>%UserProfile%\\Application Data\\PAV\\<\/p>\n<p>%UserProfile%\\Application Data\\antispy.exe<\/p>\n<p>%UserProfile%\\Application Data\\defender.exe<\/p>\n<p>%UserProfile%\\Application Data\\tmp.exe<\/p>\n<p>%UserProfile%\\Local Settings\\Temp\\kjkkklklj.bat<\/p>\n<p>&nbsp;<\/p>\n<p>File Location Notes:<\/p>\n<p>%UserProfile% refers to the current user&#8217;s profile folder. By default, this is C:\\Documents and Settings\\&lt;Current User&gt; for Windows 2000\/XP, C:\\Users\\&lt;Current User&gt; for Windows Vista\/7, and c:\\winnt\\profiles\\&lt;Current User&gt; for Windows NT.<\/p>\n<p>&nbsp;<\/p>\n<p>Associated Fake Microsoft Security Essentials Alert Trojan and AntiSpySafeguard Windows Registry Information:<\/p>\n<p>HKEY_CURRENT_USER\\Software\\PAV<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings &#8220;WarnonBadCertRecving&#8221; = &#8220;0&#8221;<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings &#8220;WarnOnPostRedirect&#8221; = &#8220;0&#8221;<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;tmp&#8221;<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce &#8220;SelfdelNT&#8221;<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon &#8220;Shell&#8221; = &#8220;%UserProfile%\\Application Data\\antispy.exe&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>===========<\/p>\n<p>I think it was just listed as C:\\Program Files\\Common Files\\PSecurityUninstall<\/p>\n<p>Doing this single step worked for me.<\/p>\n<p>However, I have also seen recommended the 3 step action below:<\/p>\n<p>Delete directories:<\/p>\n<p>C:\\Program Files\\PSecurity<\/p>\n<p>C:\\Program Files\\Common Files\\PSecurityUninstall<\/p>\n<p>C:\\Documents and Settings\\All Users\\Start Menu\\PSecurity<\/p>\n<p>==<\/p>\n<p><a href=\"http:\/\/majorgeeks.com\/UnHackMe_d4563.html\">http:\/\/majorgeeks.com\/UnHackMe_d4563.html<\/a><\/p>\n<p>=============<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.myantispyware.com\/2010\/08\/26\/how-to-remove-fake-microsoft-security-essentials-alert\/ ======================= Fake Microsoft Security Essentials Alert removal instructions (using HijackThis): 1. Download iexplore.exe (NOTE: iexplore.exe file is renamed HijackThis tool from TrendMicro). http:\/\/free.antivirus.com\/hijackthis\/ Launch the iexplore.exe and click &#8220;Do a system scan only&#8221; button. If you can&#8217;t open iexplore.exe file then download explorer.scr and run it. &nbsp; 2. Search for these entries in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-349","post","type-post","status-publish","format-standard","hentry","category-general"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/posts\/349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":0,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/posts\/349\/revisions"}],"wp:attachment":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/media?parent=349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/categories?post=349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/tags?post=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}