Solved

HKTL_HIDEWIN.A Virus - How to delete

Posted on 2006-11-28
2
1,447 Views
Last Modified: 2008-01-09
I have this virus on my computer...
http://www.trendmicro.com/vinfo/grayware/ve_graywareDetails.asp?GNAME=HKTL%5FHIDEWIN%2EA
I have tried everything they say to remove but it keeps saying that it is in use and write protected. How do I get rid of this virus? I have win xp pro.
Thanks,
Rich
0
Comment
Question by:richistory
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Accepted Solution

by:
score_under earned 250 total points
ID: 18040632
http://www.microsoft.com/technet/sysinternals/FileAndDisk/pendmoves.mspx
Get PendMoves and look at the "example that deletes test.exe" on the webpage.
PendMoves and MoveFile will delete, rename or move a file at reboot time, when nothing is in use.
Just delete the file you want to delete using the program, (remember to look at the example) and reboot the computer.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Part One of the two-part Q&A series with MalwareTech.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month5 days, 7 hours left to enroll

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question