473,414 Members | 1,843 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,414 software developers and data experts.

Spyware/Adware Took Over Everything

My computer was attacked by spyware and adware, After it was supposedly cleaned up of all these, all of my MS apps disappeared. All of the folders are there, but they all say empty. I tried re-instaling Word and it said it couldn't install it until I found DATA1.MS and that's apparently gone as well. How could this happen. My trash can icon has even disappeared. Help!
Sep 4 '07 #1
2 1741
bartonc
6,596 Expert 4TB
My computer was attacked by spyware and adware, After it was supposedly cleaned up of all these, all of my MS apps disappeared. All of the folders are there, but they all say empty. I tried re-instaling Word and it said it couldn't install it until I found DATA1.MS and that's apparently gone as well. How could this happen. My trash can icon has even disappeared. Help!
Hmmm... It makes me wonder what method you used to "clean up of all these". Perhaps you used a "Recovery CD"?
Also, please tell us versions for your OS and Office installation.
Do you have the CD, or are you trying to run an installer that is on your hard disk?
Any thing else that you can think of that may shed light on your situation...
Sep 4 '07 #2
oddjob
7
jsundberg .... what has happened in the last week since you posted your first message? Did you manage to fix your troubles?

If not please post again and give us an update on what is wrong.

If you can also post a HijackThis log it would help us to see what the problem might be.

To post a HJT log do this ....

Go here ….

http://www.trendsecure.com/portal/en...?page=download

Click on “Download HijackThis Executable” ….

Click “Accept” on the Terms ….

From the menu click on "Do a system scan and save a logfile".

DO NOT choose to upload the scan report to Trend Micro.

Copy and paste the HJT logfile to this thread. More specific removal instructions will follow for any malware revealed.


OJ
Sep 11 '07 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

11
by: msnews | last post by:
Hi, All i really want to make a program that protect my system like Ad-aware or Spybot.. socalled Spyware.. but i don't know about developing these program. how can i have to do? could...
10
by: freddy | last post by:
I would like to know how to write a spyware program.
3
by: vighnesh | last post by:
Hai All Can anybody please tell me what are the standard registry locations that are affected by Virus's , Spyware and Adware Programs. Thanks in advance Regards Vighneswar
0
by: UJ | last post by:
SonicWall seems to be treating as Spyware. Has anybody seen WebServices being treated as SpyWare from SpyWare Detection programs? If so, is there anyway around it? TIA - Jeff.
1
by: irfan200x | last post by:
Does Any Body Have The Key and User name of Adware removal 8.0.1 Please give me the key and user or some one have a Adware Removal 8.0.1 Full Software then send to me to this id thak you bye
6
by: wjack459 | last post by:
gm hope you having a great day or night :):):) anyway i keep getting a "alert" ===== TypeError: getElement ID has no properies and it keep popping up...
0
by: yuxuy501 | last post by:
Noadware.net - Spyware/Adware Remover http://zoneweb.freeweb7.com/noadware.html
4
by: pavanip | last post by:
Hi friends, I am developing one application like Anti spyware.how to get those spyware dlls present in our registry or our system.And what is adware,Trojans, Malware, Keylogger.how to find...
11
by: amin85 | last post by:
Hello, How can I write a formless application to view images? Thanks
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.