And have ran Ccleaner, got KeyScambler for a while now, so should be good without needing to re-changing passwords again and I don't have any restore points as the service itself is disabled. Didn't need to do step 3 because it says I don't need to if the above programs ran fine. So yeah, I've re-scanned with KIS 2016, Malwarebytes Anti-Malware, SUPERAntiSpyware and even Spybot Search and Destroy.and followed this guide here: means I've done TDSSKiller, another but quicker scan of Malwarebytes(as before I ran a *complete* scan over a threat scan and this guide points to a threat scan on the newer malwarebytes version) and Hitman Pro. So must have been a file I downloaded recently or something or maybe from a previous session that is has become dormant until now(not that I doubt the help of the malware removal specialist that helped me - you did great! Perhaps it was just being dormant and hiding itself? idk.maybe I shouldn't have pointed back to this.).and no this time I haven't been looking at trainers. which might explain why KillingFloor.exe is deleting itself presumably because it *failed* to do its job so it deletes itself to make sure I won't notice.but obviously will since I go on that often.and the fact that KIS 2016 popped up many times regarding this fact but will only pop up if it themselves deleted/quarantined it and NOT the file delete itself or from some other means:
They've been acting rather weird since Windows 10 was released.It would appear I have somehow got infected with Trojan Win32 Dynamer!dtc according to this program's scan(though the program itself doesn't tell me WHICH file it is that's infected with this malware.silly Microsoft scanner.): Not entirely sure what the deal is, but my inner "Mickey Spellane" is saying Microsoft's got some 'splaining to do. I don't use torrents, I don't do Dark Web, the worst I do is freelance graphic design. All scans come back clean, especially after taking out a Zeus-like Trojan last October.
It couldn't upload a Chrome install EXE file to Scan Cloud, and listed AM_Delta_Patch_1.169.568.0.exe - which also failed to upload to Scan Cloud.
I'm mentioning all of this, because I just turned on my laptop and ran HitmanPro's full scan like usual. There's very little documentation or removal guides regarding Poweserre.D, other than Microsoft listing it as a "Severe, widespread trojan deployment" and "extremely difficult to remove." All attempts to remove trojan have failed, even when detected. Microsoft states that users with this issue are using pirated or unregistered copies in my case this is impossible, as I bought my laptop from a store in January 2014 with this copy of Windows 8/8.1, and the issue began in August 2016. There's a lot of tutorials on removing "Activate Windows" virus, none have success. Again, removal failed when I shut down my laptop and turned it back on a few hours later. I just unleashed a Normandy-style removal attempt yesterday, courtesy of help from BleepingComputer.
HitmanPro and HitmanPro.Alert don't find them, and neither does MBAM, ESET, Norton, or Kaspersky. RogueKiller also triggers Windows Defender's ability to detect Behavior:Win32/Poweserre.D, causing RogueKiller to malfunction. During attempts to remove virus, watermark disappears upon first-install scan with RogueKiller and Zemana after reboot, watermark reappears and both programs malfunction. I've been trying to completely remove the "Activate Windows" (Tech Support Scam) virus from my laptop since last August, with no luck so far.