Microsoft Safety Scanner - Free online tool for PC health and safety
A nice little tool from Microsoft that scans for and removes Malware, apparently in its initlal run it found 5% infected in the wild mostly through java (big suprise).
New malware scanner finds 5% of Windows PCs infected - Computerworld
If it is anywhere near as good as MSE it should be good and as its prepackaged (63MB expires 10 days after download - as defs are out of date) and should hopefully run under the radar of a whole bunch of the task killers.
Could be useful.
Thanks for this... just used this to have a go at son's laptop overnight and remove Java exploits not traced by MSE/MBAM/A squared. It's running much faster so hopefully, got everything now. I shall give the other machines in the house a once-over tonight!
I think the one thing I find annoying is when any anti malware / anti virus tools find items in the system volume information ( presumably the system restore directory ) it prompts and states it requires a reboot to remove the said items, you then run a second scan and it still finds the same items in the same directory and I understand its down to permissions as the system account is the only one by default on the directory that has full access rights but then
1. how did they get there if only the system has access rights yet when you want to remove it you cant
2. How come they havent taken this into consideration for the anti malware tools so that it adds the currently logged on user to have full access rights, remove the infected items and then remove the user from the same list so that it goes back to default or something along those lines so that they can at least remove the infected items instead of requesting a reboot and no changes are made leading the user(s) to a false pre-tense that the viruses will be removed when they are not.
I often run these things in Safe Mode which appears to be more effective when it comes to both detection and removal.
@mac_shinobi - The other thing that can cause stuff like this is a rootkit which are really nasty business and many have payloads that stuff the machine with comparitivly harmless malware along with their real payload. By stuffing the machine with so much distracting confettii it makes it very difficult to trace an/or remove the actual root infection. To be frank, if your machine gets rootkitted you need to reinstall it from scrath with at least a full format because you simply can't trust it anymore. Rootkits are tricky and incidious.
As elsiegee40 says, safe mode it a good solution, the other is booting from a live CD like UBCD for Win and running it from that which is likely to get a very large ammount of the stuff out as all the protected system stuff is no longer protected at all and can be propperly cleaned.
Back when I dealt with more viruses by cleaning them rather than just running over the whole machine with a new image I used to have a USB key with UBCD4Win which I could then just add in portable AV/Rootkit/Malware scanners onto it and update them often. The trick is to get one with a read-only switch to protect it from infection itself which are quite hard to come by now.
There are currently 1 users browsing this thread. (0 members and 1 guests)