![]() I flashed the BIOS on each hard drive, and with all network adapters deactivated, I then installed Win7 Ultimate onto the 'clean' hard drives with the same Win7 genuine advantage disc. ![]() They're idiots (and that's really being diplomatic).įrustrated and out of ideas, with one hard drive destroyed (admitted possibly by frustrated uninstalls of hidden non-plug&play drivers I did en masse one day), I purchased a new hard drive and low-level formatted (dban) my laptop's hard drive. They've accused me of imagining it all, and advised me to quickly report it to the "Cyber Police". They receive the evidence I send them, then claim they didn't. Microsoft tech support are either hilariously incompetent or just simply vile. or the tens of thousands of Errors/Warnings being logged.ĬomboFix and RKill result in BSODs pretty much every time: Service C:\Windows\servicing\TrustedInstaller.exe (*** hidden *** ) TrustedInstaller <- ROOTKIT !!! They have pronounced my systems clean on the basis of a Malwarebytes clean scan (which has said everything is fine, on every scan from the start), ignoring the fact that Gmer's first ever scan result was unaddressed. ESET was even worse, running through Full scans saying everything was fine, whilst Firewall rules were being added to let in the hacker-world-at-large.įorum 'experts' have proved painfully slow, utterly clueless, surprisingly dull and creepily pathetic, in their nauseating refusal to address pointed queries and their shameful willingness to simply declare anything they don't understand is 'fine', whilst they ignore detected rootkits which haven't been cleaned on my system but simply no longer show on scans. ![]() I formatted using the Win7 Ultimate genuine discs and installed Trend Micro Titanium, which was immediately patched and I had similar problems getting rid of that to try other AV 'solutions'. There were also a lot of listed Permissions for User S-1-21-xxx (long hash code) etc, on almost every executable file. To start with, Trusted Installer had become the owner for most of them, and I was unable to reclaim ownership as Administrator as Trusted Installer had also taken over Audit and Special Permissions for my C: drive as Creator Owner. Trying to manually delete files, I noticed most of my desktop's applications had strange permissions added. I noticed a Windows Service for MS Security Essentials but I could not Stop or Disable it as everything was greyed out. I uninstalled oBit's software fine, but MS Security Essentials was impossible to get rid of. I had been running MS Security Essentials and iObit 360 and both were running through full scans saying everything was peachy. The same thing happened with most AV 'solutions' and malware scan utilities. exe file was deleted immediately upon install. I tried d/l'ing Revo Uninstaller and the. I tried to uninstall / delete but unable to. Messages would pop up saying I didn't have permissions and to contact my Administrator (I am always logged in as Administrator). The first peculiar thing I noticed was some applications on my desktop refusing to run when I double-clicked on them. Upon noticing how fast my laptop was running after the Dell scum left, I formatted my desktop and another laptop's hard drives, and installed Win7 from a flash drive I created on the Dell. Dell are refusing to comment aside from offering to refund my laptop's purchase price. It presented 3 weeks ago a day after a Dell service technician replaced my laptop hard drive with a brand new one, and then installed non-existent firmware on it. Hi, the symptoms of the malware are extensive and varied.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |