User Tools

Site Tools


software:virus

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
software:virus [2015/11/02 00:27] superwizardsoftware:virus [2016/10/24 17:53] – [webpage Screeshot chrome extension] superwizard
Line 25: Line 25:
      display: block;      display: block;
      font-size: 1.7em;      font-size: 1.7em;
-     margin-top: 0.83em+     margin-top: 0.79em
-     margin-bottom: 0.83em;+     margin-bottom: 0.79em;
      margin-left: 0;      margin-left: 0;
      margin-right: 0;      margin-right: 0;
Line 32: Line 32:
    }    }
 h3 { font-weight: bold;  h3 { font-weight: bold; 
 +     color: #900;
      font-size: 92%;       font-size: 92%; 
      line-height: 1.5em;      line-height: 1.5em;
      display: block;      display: block;
      font-size: 1.45em;      font-size: 1.45em;
-     margin-top: 1em+     margin-top: 0.92em
-     margin-bottom: 1em;+     margin-bottom: 0.92em;
      margin-left: 0;      margin-left: 0;
      margin-right: 0;      margin-right: 0;
Line 45: Line 46:
      /* font-size: 144%;  */      /* font-size: 144%;  */
      font-weight: bold;       font-weight: bold; 
 +     color: #900;
      margin: 8px;      margin: 8px;
      display: block;      display: block;
      font-size: 1.25em;      font-size: 1.25em;
-     margin-top: 1.33em+     margin-top: 1.07em
-     margin-bottom: 1.33em;+     margin-bottom: 1.07em;
      margin-left: 0;      margin-left: 0;
      margin-right: 0;      margin-right: 0;
Line 56: Line 58:
  
 h5 {  h5 { 
-    display: block; +     color: #900; 
-    font-size: 1.1em; +     display: block; 
-    margin-top: 1.67em+     font-size: 1.1em; 
-    margin-bottom: 1.67em+     margin-top: 1.22em
-    margin-left: 0; +     margin-bottom: 1.22em
-    margin-right: 0; +     margin-left: 0; 
-    font-weight: bold;+     margin-right: 0; 
 +     font-weight: bold;
 } }
  
 h6 {  h6 { 
-    display: block; +     color: #900; 
-    font-size: 1.0em; +     display: block; 
-    margin-top: 2.33em+     font-size: 1.0em; 
-    margin-bottom: 2.33em+     margin-top: 1.34em
-    margin-left: 0; +     margin-bottom: 1.34em
-    margin-right: 0; +     margin-left: 0; 
-    font-weight: bold;+     margin-right: 0; 
 +     font-weight: bold;
 } }
  
 </style> </style>
 </html> </html>
-====== steps-to-take-when-you-discover-malware ======+====== updating insecure programs ======
  
-From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/+From: http://www.flexerasoftware.com/enterprise/products/software-vulnerability-management/personal-software-inspector/ 
 + 
 +<code> 
 +Personal Software Inspector is a free computer security solution that identifies  
 +vulnerabilities in applications on your private PC. Vulnerable programs can leave  
 +your PC open to attacks, against which your antivirus solution may not be effective.  
 +Simply put, it scans software on your system and identifies programs in need of security  
 +updates to safeguard your PC against cybercriminals. It then supplies your computer with  
 +the necessary software security updates to keep it safe. 
 +</code>
  
-From: http://support.mozilla.org/en-US/questions/955005 
  
 ===== steps-to-take-when-you-discover-malware ===== ===== steps-to-take-when-you-discover-malware =====
- 
-From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/ 
- 
-From: http://support.mozilla.org/en-US/questions/955005 
- 
-==== steps-to-take-when-you-discover-malware ==== 
- 
-From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/ 
- 
-From: http://support.mozilla.org/en-US/questions/955005 
- 
-=== steps-to-take-when-you-discover-malware === 
- 
-From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/ 
- 
-From: http://support.mozilla.org/en-US/questions/955005 
- 
-== steps-to-take-when-you-discover-malware == 
  
 From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/ From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/
Line 112: Line 106:
  
  
-====== Removal Programs ======+===== Removal Programs =====
  
  
-=== Make sure that you update each program to get the latest version of their databases before doing a scan. ===+== Make sure that you update each program to get the latest version of their databases before doing a scan. ==
  
  
Line 155: Line 149:
 From: http://www.eset.com/us/online-scanner-popup/ From: http://www.eset.com/us/online-scanner-popup/
 From: "Checklist by Eset" [[http://kb.eset.com/esetkb/index?page=content&id=SOLN2921]] From: "Checklist by Eset" [[http://kb.eset.com/esetkb/index?page=content&id=SOLN2921]]
 +
 +== HouseCall by Trend Micro ==
 +
 +From: http://housecall.trendmicro.com/
 +
 +<code>
 +Custom Scan lets you specify which folders to scan
 +Quick Scan reduces software scan times to a few minutes
 +Stand-alone eliminates compatibility issues associated with browser-activated scanners
 +Smart Scan delivers the latest antivirus protection while reducing download times
 +</code>
  
 == Kasperky Free Security Scan: == == Kasperky Free Security Scan: ==
Line 185: Line 190:
 == ComboFix == == ComboFix ==
 From: [[http://www.bleepingcomputer.com/download/combofix/]] From: [[http://www.bleepingcomputer.com/download/combofix/]]
 +
 +== Trend Micro™ Ransomware Screen Unlocker Tool ==
 +
 +From: https://esupport.trendmicro.com/en-us/home/pages/technical-support/1105975.aspx
 +
 +<code>
 +Ransomware Screen Unlocker Tool is designed to eliminate Lock Screen ransomware from your 
 +infected PC in two different scenarios:
 +
 +    Scenario 1: Lock Screen ransomware is blocking “normal mode”, but “safe mode” with 
 +    networking is still accessible.
 +    Scenario 2: Lock Screen ransomware is blocking both “normal mode” and “safe mode” 
 +    with networking.
 +</code>
 +
 +== HouseCall for Home Networks ==
 +
 +From: http://housecall.trendmicro.com/us/secure-home-networks/
 +
 +<code>
 +HouseCall for Home Networks scans all your home network devices to identify potential risks and offer advice on how to eliminate them.
 +</code>
  
 == See also: == == See also: ==
Line 193: Line 220:
  
 From: "MalwareTips" http://malwaretips.com/blogs/pup-optional-mindspark-removal/#malwarebytes From: "MalwareTips" http://malwaretips.com/blogs/pup-optional-mindspark-removal/#malwarebytes
-====== ShouldIRemoveit ======+ 
 +===== ShouldIRemoveit =====
  
 From: http://www.shouldiremoveit.com/index.aspx From: http://www.shouldiremoveit.com/index.aspx
Line 206: Line 234:
     to determine what should not be installed.     to determine what should not be installed.
  
-====== toolbarcleaner not a recommeded piece of software ======+===== toolbarcleaner not a recommeded piece of software =====
  
 From: http://toolbarcleaner.com/?src=4792&gclid=CJ_pnaiO0rwCFcXm7AodNBMACg From: http://toolbarcleaner.com/?src=4792&gclid=CJ_pnaiO0rwCFcXm7AodNBMACg
Line 214: Line 242:
  
  
-====== Malware-Removal/Uninstall Malware "Antivirus-2009" ======+===== Malware-Removal/Uninstall Malware "Antivirus-2009" =====
  
 [[http://www.malwarebytes.org/|Download First:>Malwarebytes Anti-Malware:]] [[http://www.malwarebytes.org/|Download First:>Malwarebytes Anti-Malware:]]
Line 220: Line 248:
 [[http://www.superantispyware.com/|Then try:>Super Anti-Spyware:]] [[http://www.superantispyware.com/|Then try:>Super Anti-Spyware:]]
  
 +===== webpage Screeshot chrome extension =====
  
-====== Removal of Search conduit ======+ 
 +From: http://blog.rankun.org/2016/01/15/webpage-screenshot/ 
 + 
 +Also: http://www.telerik.com/fiddler 
 + 
 +Fiddler - Debug traffic from PC, Mac or Linux systems and mobile devices 
 + 
 +<code> 
 +ckibcdccnfeookdmbahgiakhnjcddpki 
 + 
 +C:\Users\bubba\AppData\Local\Google\Chrome\User Data\Default\Extensions 
 +ckibcdccnfeookdmbahgiakhnjcddpki 
 + 
 +C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Local Storage 
 +  chrome-extension_ckibcdccnfeookdmbahgiakhnjcddpki_0.localstorage 
 +  chrome-extension_ckibcdccnfeookdmbahgiakhnjcddpki_0.localstorage-journal 
 + 
 +Instead of deleting this time I made read only and mangled the localstorage database 
 +</code> 
 +===== List of Browser Extensions that are Spying on you (Chrome and Firefox) - HTG ===== 
 + 
 + 
 +From: https://malwaretips.com/threads/list-of-browser-extensions-that-are-spying-on-you-chrome-and-firefox-htg.22459/ 
 + 
 +<code> 
 + 
 +</code> 
 +===== Removal of Search conduit =====
  
 Installed as "Search Protect" Installed as "Search Protect"
Line 229: Line 285:
 AdwCleaner cleaned it AdwCleaner cleaned it
  
-===== Rootkit Scanners =====+===== Removal of zepto  ===== 
 + 
 +zepto virus 
 + 
 +From: http://www.virusresearch.org/zepto-file-extension-virus-removal/ 
 + 
 +From: http://malwarefixes.com/remove-zepto-ransomware-zepto-files/ 
 + 
 +Decrypt (try locky): https://decrypter.emsisoft.com/ 
 + 
 +From: https://malwaretips.com/blogs/remove-zepto-virus/ 
 + 
 +1. Shadow Explorer: http://www.shadowexplorer.com/downloads.html 
 + 
 +2. deletes the original: see recovery software in malwaretips or handy recovery 
 + 
 + 
 +==== Rootkit Scanners ====
  
 [[http://www.bleepingcomputer.com/download/tdsskiller/]] [[http://www.bleepingcomputer.com/download/tdsskiller/]]
Line 237: Line 310:
 [[http://www.mcafee.com/us/downloads/free-tools/rootkitremover.aspx]] [[http://www.mcafee.com/us/downloads/free-tools/rootkitremover.aspx]]
  
-===== Malwarebytes =====+==== Malwarebytes ====
  
 [[http://download.bleepingcomputer.com/malwarebytes/mbam-setup.exe|Download Tool Needed for this: Malwarebytes' Anti-Malware]]  [[http://download.bleepingcomputer.com/malwarebytes/mbam-setup.exe|Download Tool Needed for this: Malwarebytes' Anti-Malware]] 
  
  
-===== Other Info =====+==== Other Info ====
  
 [[http://www.bestdissertation.com/services/thesis.html|thesis papers]] [[http://www.bestdissertation.com/services/thesis.html|thesis papers]]
Line 249: Line 322:
  
  
-====== McAfee Free Tools ======+===== McAfee Free Tools =====
  
 http://www.mcafee.com/us/downloads/free-tools/ http://www.mcafee.com/us/downloads/free-tools/
Line 255: Line 328:
 RootKiller: http://www.mcafee.com/us/downloads/free-tools/how-to-use-rootkitremover.aspx RootKiller: http://www.mcafee.com/us/downloads/free-tools/how-to-use-rootkitremover.aspx
  
-====== Look For ======+===== Look For =====
  
 From: http://community.spiceworks.com/topic/277234-network-hit-with-sexy-exe-porn-exe-secret-exe-password-exe-etc?page=4 From: http://community.spiceworks.com/topic/277234-network-hit-with-sexy-exe-porn-exe-secret-exe-password-exe-etc?page=4
Line 261: Line 334:
 Characteristics: Characteristics:
 In the local users %Username% root, a file called 'Google.exe' and 'Runme.exe' will be present, along with another EXE file with a random name In the local users %Username% root, a file called 'Google.exe' and 'Runme.exe' will be present, along with another EXE file with a random name
-====== Remove Mac Shield ======+ 
 +===== Remove Mac Shield =====
  
 http://www.bleepingcomputer.com/virus-removal/remove-mac-shield http://www.bleepingcomputer.com/virus-removal/remove-mac-shield
 (http://download.bleepingcomputer.com/mac-rogue-remover-tool/mac-rogue-remover.zip) (http://download.bleepingcomputer.com/mac-rogue-remover-tool/mac-rogue-remover.zip)
  
-====== Mac AntiVirus ======+===== Mac AntiVirus =====
  
 http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-edition.aspx http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-edition.aspx
Line 275: Line 349:
    To remove user specific preferences simply delete "com.pctools.iAntiVirus.plist" from ~/Library/Preferences.     To remove user specific preferences simply delete "com.pctools.iAntiVirus.plist" from ~/Library/Preferences. 
  
-====== myantispyware.com free-programs ======+===== myantispyware.com free-programs =====
  
 http://www.myantispyware.com/free-programs/ http://www.myantispyware.com/free-programs/
  
-====== Microsoft Security Bulletin MS08-067 ======+===== Microsoft Security Bulletin MS08-067 =====
  
 http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
  
-====== avg removal =====+===== avg removal =====
  
 http://www.avg.com/us-en/download-tools http://www.avg.com/us-en/download-tools
  
  
-====== Administrator and User Passwords in Windows XP ======+===== Administrator and User Passwords in Windows XP =====
  
  
Line 297: Line 370:
  
  
-====== Information about vulnerabilities associated with the settings of installed applications and the operating system. ====== +===== Information about vulnerabilities associated with the settings of installed applications and the operating system. ======
  
  
software/virus.txt · Last modified: 2020/12/16 05:12 by superwizard