XP Antispyware firewall alert- virus

Posted on 2010-11-19
Medium Priority
Last Modified: 2013-11-22

whenever i try to go to the internet explorer, it gives me this banner that says 'XP Antispyware firewall alert' and won't let me do anything unless i subscripe to their software to remove it.  Ofcourse I am not going to be held hostage over this.

But I am stuck.  I cannot figure out how to get rid of this.  Can someone give me any ideas.  Is there a way to remove the IE and then reinstall it.  Because i think it is sitting in the IE.

Thanks for any suggestions.
Question by:joygomez
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

ID: 34174843
I am not completely familiar with this piece of malware, but I frequently find that running Hijack This can help remove the offending program to allow you to run a full virus scan, and eliminate the infection.



Accepted Solution

dvast8n earned 2000 total points
ID: 34174847
Your computer has been infected with malware. Here's a good tutorial on how to remove it.


You'll need to download malware removal tool called Malwarebytes at www.malwarebytes.org


Expert Comment

ID: 34174880
Only problem is that he may not be able to use the browser to get to the download sites you guys are recommending.

First thing would probably be to try to boot in safe mode (hit F8) during the bootup process and then when the OS asks you how to boot up, boot up in safe mode with networking.  You might be able to open up internet explorer then without the dang pop-up showing up.

Then you can go and download malwarebytes.

If that doesn't work, use another computer to get the app and using a USB key, copy the program to the key and copy it to your infected computer and run it from there (if you don't know how to copy stuff over shares).

- Yves
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

LVL 66

Expert Comment

ID: 34178754
This is a method I use that works on every Rogue that I have seen, removing it by hand......

start>run>"%userprofile%\Local Settings"

Is there a randomly named folder, with some .exe files in it? If you enable the Details View, sort the column and look at the most recent ones. There should NOT be any recent .exe files in the "%userprofile%\Local Settings" folder. The viral files will have the most recent "Date Modified", prolly on or before the time of infection.

If so, right click the File>Properties>Security>Advanced Button>Uncheck "Inherit Permissions>Select "Copy" in the pop up box, >Clock OK, and in the users section at the top, remove all but your logged in user and SYSTEM. Set "Deny, Full Control" rights on the file.

Reboot, and then go back, your Task Manager should work, Regedit, DOS etc..... Go back into the file properties, and grant yourself Full control, then delete the file......

This can work to get you back in a working state, and then you can followup with your malware scans.

With that said, the key sometimes, is that if you cannot get to Explorer to perform this operation on the file, you need to kill the task. From another machine on your network,, you can use PSexec to stop the process (randomlynamed.exe), and then all the warnings on screen, app blockers etc. are gone.....

DL PSExec here......

From the other machine.....
<PATH TO >psexec \\infectedPCName tasklist

Then when you get the one you want to kill....

From the other machine again.....

<PATH TO >psexec \\infectedPCName taskkill /f /im randomlynamed.exe

Then you can proceed to remove the threats via explorer at the above locations.
LVL 30

Expert Comment

by:Sudeep Sharma
ID: 34192768
To clean and to check if you system is clean do following:

Run malwarebytes in Safe Mode with Networking and update it before running a full system scan:

Then try HitManpro to make sure anything which might be left behind is clean:


If issue is not resolved by these tools try TDSSKiller:

Tutorial on TDSSKiller:

or you could also try FixTDSS.exe from Symantec


If this does not resolve your issue then try Combofix:

Download Combofix

Tutorial on how to use combofix:

Post logs here for further analysis.


Author Closing Comment

ID: 34192803
thanks.  it worked.

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to provide information to successfully install the MS SQL client tools for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technology…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question