Spyware apctres.dll

Posted on 2004-08-13
Last Modified: 2013-12-04
I've a spyware file that I am not able to delete! I tried going into the Recovery Console of XP, trying to delete the file apctres.dll, but it give me "access denied". Can anyone help??
I have tried using Adware and spybot, they were able to find the file as spyware, but cannot delete. It said file is shared or being used.
Question by:aptnewyork
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 65

Accepted Solution

SheharyaarSaahil earned 500 total points
ID: 11795713
Hello aptnewyork =)

take the ownership of this file and then try to delete it !!!!!

HOW TO: Take Ownership of a File or Folder in Windows XP:

HOW TO: Set, View, Change, or Remove File and Folder Permissions in Windows XP;en-us;308418
LVL 65

Expert Comment

ID: 11795726
Also u can Download HijackThis v1.98.2, run it, Save the LOG file and Post it here:

so that i can check if there are not any remainenet malware left on ur system :)
LVL 11

Expert Comment

ID: 11795867
run msconfig on your system.  Look at anything being run at startup and disable anything that is suspecious.

Once you've done that, restart the machine, take ownership of the file (if necessary), and then delete it (use safe mode if all else fails).

- Info
LVL 11

Expert Comment

ID: 11795882
Also, a good place to start might be the task manager.  See if anything out of the ordinary has been started and running in the background.  Stop that service and THEN see if you can delete the file.

- Info
LVL 65

Expert Comment

ID: 11825199
aptnewyork,,,, any progress :)

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question