Solved

malware

Posted on 2012-04-02
4
358 Views
Last Modified: 2016-10-27
rogue Killer by Tigzy. After Scan how would I know which one of checked items to delete under the register key? Can I delete all that are checked? Is there a list such as a database?
0
Comment
Question by:mc2explore
4 Comments
 
LVL 17

Expert Comment

by:Anuroopsundd
ID: 37796540
It's all per experience. sometime these application remove Legitimate entry also. so go through the list.
0
 
LVL 1

Accepted Solution

by:
muzzammilhussain earned 500 total points
ID: 37796559
You have to google each item if you want to know what they are.

For your peace of mind, you can take a registry backup and then delete all the checked items. Go to Start => Run => Regedit. Click on File and then Export.
0
 
LVL 15

Expert Comment

by:jerseysam
ID: 37796594
Google the items.

Alternatively take a full backup of your PC using Acronis or somehting.

Then fix all and see if it fixes everything.

If you have an issue, restore your PC from backup and try again.
0
 
LVL 14

Expert Comment

by:shahzoor
ID: 37796902
use malwarebytes
http://www.malwarebytes.org/

or Spybot Search & Destroy
http://www.safer-networking.org/en/home/index.html

Better to run it in safe mode
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question