Solved

malware

Posted on 2012-04-02
4
362 Views
Last Modified: 2016-10-27
rogue Killer by Tigzy. After Scan how would I know which one of checked items to delete under the register key? Can I delete all that are checked? Is there a list such as a database?
0
Comment
Question by:mc2explore
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 17

Expert Comment

by:Anuroopsundd
ID: 37796540
It's all per experience. sometime these application remove Legitimate entry also. so go through the list.
0
 
LVL 1

Accepted Solution

by:
muzzammilhussain earned 500 total points
ID: 37796559
You have to google each item if you want to know what they are.

For your peace of mind, you can take a registry backup and then delete all the checked items. Go to Start => Run => Regedit. Click on File and then Export.
0
 
LVL 15

Expert Comment

by:jerseysam
ID: 37796594
Google the items.

Alternatively take a full backup of your PC using Acronis or somehting.

Then fix all and see if it fixes everything.

If you have an issue, restore your PC from backup and try again.
0
 
LVL 14

Expert Comment

by:shahzoor
ID: 37796902
use malwarebytes
http://www.malwarebytes.org/

or Spybot Search & Destroy
http://www.safer-networking.org/en/home/index.html

Better to run it in safe mode
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question