I found it from a search for windows 7 iso. MrsD succumbed to a fake virus scam and some douchebag she phoned and allowed to connect up hosed her pc and asked for $100 for a firewall, at which point she hung up and unplugged her pc (yay). She has a coa install, and MS's official dl says her product # can't be used for the retail oem iso. So anyhoo I'm dl the iso from softlay and hoping it's not packed out with malware so I can essay a repair install. That's iffy anyway because her pc will only boot into safe mode, and from what I've read repair install only works from normal mode. :-( Anyone knows different I'd love to hear about it.
“Canadians can’t agree on what makes our country great, and one-third even hate hockey”
so I ran an SFC from a known good (purchased) installer dvd (but Pro version) from work, and it returned "Windows Resource Protection did not find any integrity violations".
Still only boots into Safe Mode. Hmph.
Gonna burn the softlay iso next and might essay a scan from that. Probly looking at the oem nuke & reinstall thingy though. :-(
“Canadians can’t agree on what makes our country great, and one-third even hate hockey”
OK, so after going through msconfig and setting it to boot normally it... booted normally. I'm guessing dickwad mcfuckface on the phone had set for safe mode and then wanted a hundred bucks to unset it.
I also disabled remote desktop connection in msconfig.
Fuck you, mcfuckface.
I may test out the softlay offering in a virtual machine at work next week. Glad I didn't have to use it.
“Canadians can’t agree on what makes our country great, and one-third even hate hockey”
A fresh softlay-sourced Windows 7 install in virtualbox passed a MS Malicious Software Removal Tool scan, so I installed Firefox (which Mrs.D uses) and opened the site she said was the last one she browsed before the attack: http://arizonamountaineeringclub.org.
Nothing happened. I suppose it's possible another malware-infected web site she had browsed earlier was the culprit.