Video Screencast Help

HELP Trojan Fake Av has attacked can someone please help me

Created: 01 Dec 2011 | 1 comment

Ok I have the trojan fake av virus on my computer an I am trying to get rid of it. Can someone please help me with this. I have looked at task manager and found no files that I can see are related to this virus. I can not access the internet an all of my programs are not showing up. All I get is a blank screne.

I can not even access my jump drive to install ATV to run. PLEASE HELP ASAP

Thanks a bundle

Ms. J

Discussion Filed Under:

Comments 1 CommentJump to latest comment

Thomas K's picture

Can you tell us what Symantec AV product and version you are running?

If you are running a Symantec product, I would start with downloading the latest Rapid Release definitions.

Next, boot into safe mode and running a Disk Cleanup (right-click the C drive, Properties, Disk Cleanup) - that will delete all the files that are in these temporary locations, as well as IE's temporary files, etc. Perform a full system scan in safe mode.
If that fails to detect and remove the threats, there are some useful tools that are provided by Symantec for help with finding those hard to detect threats.

1. The Power Eraser Tool eliminates deeply embedded and difficult to remove threats that traditional virus scanning doesn't always detect.

2. The SERT (Symantec Endpoint Recovery Tool) is useful in situations where computers are too heavily infected for the Symantec Endpoint Protection client installed upon them to clean effectively.

3. The Load point Analysis Tool generates a detailed report of the programs loaded on your system. It is helpful in listing common loadpoints where threats can live.

Rapid Release Virus Definitions

Power Eraser tool

How To Use the Symantec Endpoint Recovery Tool with the Latest Virus Definitions –

Support Tool with Power Eraser Tool included
How to use the Load Point Analysis within the Symantec Support Tool to help locate suspicious files
If you are unable to remove the threat(s) from your systems, please submit the suspected files to Symantec or ThreatExpert for analysis. New signatures will be created and included in future definition sets for detection.

Let me know how this issue goes for you.