I now have another virus. Thanks to some fellow anandtech members, I got rid of the LSA SHELL virus. Now I have another one.........How do I get rid of the W32.HLLW.Gaobot.gen virus?Windows is all updated as well as norton. Help please.
Its pretty old. try to get the special patch that fixes it. Although when i had norton that did nothing. I switched to macfee and it fixed it in 2 seconds after installation.
well i clean it off manually.
the systems i've seen it infect have this process/file running
called explored.exe (yours might be different, theres different variants of this thing)
boot into safe mode then
i just run regedit and find all instances of that and delete those keys.
then search hard drive for all instances of it and delete
then search for your hosts file and delete all the ones the virus added. usually only 127.0.0.1 localhost should be in there.
then depending on the nature of your network the following might be necessary to keep the virus from coming back in.
change your user account passwords to something not so simple.
disable any file sharing folders
reboot and its gone.
assuming your windows is patched up it shouldn't come back.
you can hit ctrl-alt-del
to get to the taskmanager.
see what processes are running and see whats taking up the cpu time.
how do u know u have the virus? does norton tell you which file is infected? thats probably what file u need to delete.
in regedit. press ctrl-f4 and type in that file name. when it stops delete the entry it finds (theres usually a single entry in
local_computer>software>microsoft>windows>currentversion>run
and
local_computer>software>microsoft>windows>currentversion>runservices
then theres services it creates usually in something like
local_computer>system>controlset001>Mpr
you should delete the Mpr folder.
press f3 until it can't find anymore of that file you're searching for.
for regular files just go to the start menu and use search
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.