Quote:
Originally Posted by stjones1221
I thought I would post the actual information listed within the Malware quarantine tab to see if anyone knows which registry values might be able to be restored and then recover the files:
1)
Vendor: Rootkit.Agent
Category: Registry Key
Items: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\new_drv
2)
Vendor: Rootkit.Agent
Category: Registry Key
Items: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\n ew_drv
3)
Vendor: Trojan.Agent
Category: Registry Key
Items: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Run\ttool(Data: C:\WINDOWS\9129837.exe)
|
I would be curious if this works - As I had some of the same entries in MalWareBytes and restored them, and the decrypt still didn't work, and then I had opened the door to all sorts of other spyware - I untimately ran Malwarebytes again and it removed like 32 spywares.
Seems like people are moving on and all of us are stuck with thousands of lost files. Disappointing that most of the big name virus programs(And MICROSOFT) didn't do their job in stopping this virus in the first place
i'll tell you one thing - I am now running Mozilla Firefox as a browser - so much better than IE7 and none of the security vulnerabilities now.