[Last Call] Learn how to a build a cloud-first strategyRegister Now


XP Antispyware firewall alert- virus

Posted on 2010-11-19
Medium Priority
Last Modified: 2013-11-22

whenever i try to go to the internet explorer, it gives me this banner that says 'XP Antispyware firewall alert' and won't let me do anything unless i subscripe to their software to remove it.  Ofcourse I am not going to be held hostage over this.

But I am stuck.  I cannot figure out how to get rid of this.  Can someone give me any ideas.  Is there a way to remove the IE and then reinstall it.  Because i think it is sitting in the IE.

Thanks for any suggestions.
Question by:joygomez

Expert Comment

ID: 34174843
I am not completely familiar with this piece of malware, but I frequently find that running Hijack This can help remove the offending program to allow you to run a full virus scan, and eliminate the infection.



Accepted Solution

dvast8n earned 2000 total points
ID: 34174847
Your computer has been infected with malware. Here's a good tutorial on how to remove it.


You'll need to download malware removal tool called Malwarebytes at www.malwarebytes.org


Expert Comment

ID: 34174880
Only problem is that he may not be able to use the browser to get to the download sites you guys are recommending.

First thing would probably be to try to boot in safe mode (hit F8) during the bootup process and then when the OS asks you how to boot up, boot up in safe mode with networking.  You might be able to open up internet explorer then without the dang pop-up showing up.

Then you can go and download malwarebytes.

If that doesn't work, use another computer to get the app and using a USB key, copy the program to the key and copy it to your infected computer and run it from there (if you don't know how to copy stuff over shares).

- Yves
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

LVL 66

Expert Comment

ID: 34178754
This is a method I use that works on every Rogue that I have seen, removing it by hand......

start>run>"%userprofile%\Local Settings"

Is there a randomly named folder, with some .exe files in it? If you enable the Details View, sort the column and look at the most recent ones. There should NOT be any recent .exe files in the "%userprofile%\Local Settings" folder. The viral files will have the most recent "Date Modified", prolly on or before the time of infection.

If so, right click the File>Properties>Security>Advanced Button>Uncheck "Inherit Permissions>Select "Copy" in the pop up box, >Clock OK, and in the users section at the top, remove all but your logged in user and SYSTEM. Set "Deny, Full Control" rights on the file.

Reboot, and then go back, your Task Manager should work, Regedit, DOS etc..... Go back into the file properties, and grant yourself Full control, then delete the file......

This can work to get you back in a working state, and then you can followup with your malware scans.

With that said, the key sometimes, is that if you cannot get to Explorer to perform this operation on the file, you need to kill the task. From another machine on your network,, you can use PSexec to stop the process (randomlynamed.exe), and then all the warnings on screen, app blockers etc. are gone.....

DL PSExec here......

From the other machine.....
<PATH TO >psexec \\infectedPCName tasklist

Then when you get the one you want to kill....

From the other machine again.....

<PATH TO >psexec \\infectedPCName taskkill /f /im randomlynamed.exe

Then you can proceed to remove the threats via explorer at the above locations.
LVL 30

Expert Comment

by:Sudeep Sharma
ID: 34192768
To clean and to check if you system is clean do following:

Run malwarebytes in Safe Mode with Networking and update it before running a full system scan:

Then try HitManpro to make sure anything which might be left behind is clean:


If issue is not resolved by these tools try TDSSKiller:

Tutorial on TDSSKiller:

or you could also try FixTDSS.exe from Symantec


If this does not resolve your issue then try Combofix:

Download Combofix

Tutorial on how to use combofix:

Post logs here for further analysis.


Author Closing Comment

ID: 34192803
thanks.  it worked.

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain how to manually move a SEP client to a different client group by performing steps on the client-side. These steps may prove particularly useful because they allow the client to move after it has alrea…
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question