My client’s Win 10 Pro computer picked this thing up somewhere and I can’t get rid of it with Windows Defender or Malwarebytes (the paid professional version) or Spybot Search & Destroy (all updated to the latest definitions, of course). Malwarebytes and Spybot S&D won’t even detect it, crazily enough. The Microsoft help page is well, no help at all, since it assumes that Defender was able to delete the thing. I’ve done several searches and they all take me back to the afore-mentioned Microsoft page. Any suggestions would be appreciated. I haven’t seen one like this in a long time.
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
TrojanDownloader:O97M/Xdoc.YA
Home » Forums » AskWoody support » Windows » Windows 10 » Questions: Win10 » TrojanDownloader:O97M/Xdoc.YA
- This topic has 33 replies, 15 voices, and was last updated 3 years, 10 months ago by
anonymous.
AuthorTopicTravasaurus
AskWoody PlusJuly 25, 2019 at 1:36 am #1886888Viewing 18 reply threadsAuthorReplies-
Paul T
AskWoody MVP -
Travasaurus
AskWoody PlusJuly 25, 2019 at 2:55 am #1887129Hey thanks Paul, but aren’t the paid versions of Malwarebytes and Spybot Search & Destroy considered 3rd-party scanners? Malwarebytes is supposed to be the “Lexus” of ’em all, from what I understand. At this point I’m open for trying just about anything but if those other 2 “benchmark” A/V programs didn’t even detect the Trojan I’m wondering if Panda has as much horsepower as they do? All suggestions are certainly appreciated though! You never know which one might be the “silver bullet”!
-
mn–
AskWoody LoungerJuly 25, 2019 at 3:19 am #1887220Well.
It’s a Word macro.
From the “Trojan Information” attachment, seems that the “infected” location is inside a Volume Shadow Copy, which is a read-only state from a previous point in time, so the file in there cannot be directly removed or changed (changed as in the offending macro excised from the document… relevant if it has any content that needs to be kept).
So. Hopefully you’re using the shadow copies to take periodic backups and now you’ll know that this backup run has one file that contains malware, so you’ll be able to take care if you ever restore anything from that backup… You can of course drop the shadow copy once the backup run is complete, or this may happen automatically.
Could also be that other scanners aren’t scanning inside shadow copies?
-
Kirsty
ManagerJuly 25, 2019 at 3:22 am #1887231Travis, please refer to the AskWoody Lounge Rules regarding cross-posting – you failed to link your answered post on answers.microsoft.com.
1 user thanked author for this post.
-
Travasaurus
AskWoody PlusJuly 25, 2019 at 4:06 am #1887278Sorry, I wasn’t aware of that; as much as I’ve used various forums over the years I don’t think I even knew what “cross-posting” was in that respect, unless you were duplicating your posts / questions on the same general site, such as in different forums on AskWoody.com. I figured that different sites give different and unique answers. I posted on the Microsoft site as kind of an afterthought after I posted here and the guy over there only just replied to my post a short while ago, so I really hadn’t had time to link back to it, even if I’d known the rules (which I didn’t); I’m just lucky I saw it before I called it quits for the night. Also I’m not sure that his suggestion will work, so should I have done so without knowing whether it actually helped or not (aka was the “answer”)? But just to clarify, if I have a question, can I only post it on 1 site, be it AskWoody.com, Microsoft.com or whatever? That would seem to be a little limiting if that’s the case. Not trying to be argumentative, but I’ve truly never run into this situation before…
-
mn–
AskWoody LoungerJuly 25, 2019 at 5:31 am #1887709I posted on the Microsoft site as kind of an afterthought after I posted here
… hm, neither site includes timezones in the respective post timestamps, but here shows “July 25, 2019 at 1:36 am” and answers.microsoft.com shows “7/25/2019 10:38:54 AM” … both would seem to be respective server-side times … do we need a clarification of the rules on crossposting elsewhere after posting here?
Also I’m not sure that his suggestion will work, so should I have done so without knowing whether it actually helped or not (aka was the “answer”)?
I do feel kind of sceptic about ESET SysRescue being all that much better at changing contents of volume shadow copies, anyway… though it might just drop the shadow copy entirely, same way as mounting the disk on Windows XP or Server 2003 would do because those don’t support persistent shadow copies.
-
woody
Manager
-
-
Kirsty
ManagerJuly 25, 2019 at 2:33 pm #1888849But just to clarify, if I have a question, can I only post it on 1 site, be it AskWoody.com, Microsoft.com or whatever?
If you’ve already posted a similar question on a different site, please link to it so we can avoid reinventing the wheel.
The rules don’t prevent you from posting on more than one site, but as quoted, we ask you record them – linking it is a courtesy to those investing their spare time to assist you in sorting your problem
-
-
-
jabeattyauditor
AskWoody Lounger -
mn–
AskWoody LoungerJuly 25, 2019 at 8:07 am #1888105… preferably after checking that it isn’t needed for anything else, like an incomplete backup run.
Sort of reminds me of that one official document archive cdrom with a macro virus… couldn’t just get rid of it, or even keep a decontaminated copy of that file because that’d have been changing the file. (Another reason to keep archived documents as PDFs or in some other more sensible format…)
-
Travasaurus
AskWoody PlusJuly 26, 2019 at 2:54 am #1890701That could well be the ultimate solution but I’m inclined to try some other suggestions as well, just to educate myself on what works the best. As I said, I haven’t had to do any malware remediation in a long time. The A/V programs which are out today, especially when used in concert with one-another, are incredibly better than they used to be, ‘way back when.
Update: I ran some of these commands on my computer as sort of a “tutorial” to familiarize myself with it and discovered that I had shadow copies dating back to 2017. How is that possible, since I’ve reformatted my boot drive multiple times since then? I may need to more fully educate myself on all aspects of these things; I’ve always thought they were used for the immediate backup and then just kind of disappeared. If you can further enlighten me (or point me toward an article on the subject) I would greatly appreciate it. There’s (apparently) more here than meets the eye.
-
This reply was modified 5 years, 8 months ago by
Travasaurus. Reason: To add further information
-
This reply was modified 5 years, 8 months ago by
-
-
Microfix
AskWoody MVPJuly 25, 2019 at 7:45 am #1888047Also try Bleeping Computer as they have a good forum section specific to malware/trojans etc.. usually entails registering, then downloading and running a small program that generates a log/txt file to upload in your post. The assistant will guide you through the process usually through to eradication.
Here is a similar issue posted today, to give you an idea what to expect (no reply in the post as yet) See what you think and whether YOU are comfortable with this.
bearing in mind it will need to be disclosed here as a cross-post if you post over there
Windows - commercial by definition and now function... -
doriel
AskWoody LoungerJuly 25, 2019 at 9:18 am #1888356Hello,
I suggest you to execute Defender Offline Scan (it scans your computer before Windows are loaded, so it can clean infected files, that cannot be cleaned while runnig Windows). It helped me few times (off topic: with Win Pro we use Sophos, with Win Enterprise, we use simply Defender too)It should be located somewhere near:
In Windows 10, the offline scan could be run from under Windows Settings > Update & security > Windows Defender or from the Windows Defender client.
If more information needed, please refer to
Dell Latitude 3420, Intel Core i7 @ 2.8 GHz, 16GB RAM, W10 22H2 Enterprise
HAL3000, AMD Athlon 200GE @ 3,4 GHz, 8GB RAM, Fedora 29
PRUSA i3 MK3S+
-
Travasaurus
AskWoody PlusJuly 25, 2019 at 2:35 pm #1888850Hey thanks for the thought. I failed to mention that I’ve already run a couple of Windows Defender offline scans but to no effect. I’m going to try and kick it up a notch or 2 with some of the other suggestions here. I’ve got to get back out to the customer’s office first though.
-
This reply was modified 5 years, 8 months ago by
Travasaurus. Reason: Correct a typo
-
This reply was modified 5 years, 8 months ago by
-
-
b
AskWoody_MVPJuly 25, 2019 at 9:25 am #1888376Did you try Windows Defender Offline scan?
Windows Defender Offline is a scanning tool that works outside of Windows, allowing it to catch and clean infections that hide themselves when Windows is running.
https://support.microsoft.com/en-us/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malwareStart, Settings, Update & Security, Windows Security, Virus & threat protection, Scan options, Windows Defender Offline scan, Scan now
Some malicious software can be particularly difficult to remove from your device. Windows Defender Offline can help find and remove them using up-to-date threat definitions. This will restart your device and will take about 15 minutes.
(EDIT: Hadn’t seen doriel’s suggestion at time of posting. Leaving for extra quote/link/steps.)
-
This reply was modified 5 years, 8 months ago by
b.
-
This reply was modified 5 years, 8 months ago by
-
anonymous
GuestJuly 25, 2019 at 1:41 pm #1888809Questions for doriel or b, in light of mn- at 3:19 am and 8:07 am (server times). Would the Defender offline scan be more effective at removing a Word macro within a shadow copy, or would it fail for the same reasons the “online” run failed?
Do you believe this exploit is not as suspected by mn-, that it is different or more than simply a macro?
-
b
AskWoody_MVPJuly 25, 2019 at 2:18 pm #1888819Questions for doriel or b, in light of mn- at 3:19 am and 8:07 am (server times). Would the Defender offline scan be more effective at removing a Word macro within a shadow copy, or would it fail for the same reasons the “online” run failed?
Not sure, but I think an offline scan may succeed in removing a shadow copy file.
Do you believe this exploit is not as suspected by mn-, that it is different or more than simply a macro?
No.
-
Travasaurus
AskWoody Plus
-
-
anonymous
GuestJuly 25, 2019 at 3:37 pm #1889087I’m this guy => “at 1:41 pm”. My thought is: the offending macro got into the shadow copy because it was present on the system at the time the shadow copy was made.
Then Defender successfully removed the exploit from the mounted system. But the shadow copy is protected from corruption. Job more than half done. Let us now finish the task.
In keeping with suggestions by jabeattyauditor and mn– earlier today, make new backup now of cleaned system, excluding the offending shadow copy. Verify the backup satisfies all your needs. Delete (from highest elevated permissions) the bad shadow copy in total. Enter a comment into whatever log or journal you keep to track unusual events, describing this unusual event. Get on with your day.
Doing this sooner than later minimizes any data changes potentially lost between backup versions, through regular use not attributable to this exploit.
-
OscarCP
MemberJuly 25, 2019 at 4:09 pm #1889127This might or not apply to the problem, the relevant details of which I do not know well enough, but just in case I would like to suggest an alternative to using an anti virus that might (or might not) eliminate the intrusive malware:
Wouldn’t restoring the system to an earlier state with a return to a restore point created before the malware infection, take care of this? I have observed that when I had to do that a few times and for different reasons, over the years, the operation also removed some updates to the installed software (browsers, etc.) that had occurred since that old restore point was created.
A full backup with an ISO disk created at an appropriately earlier date using, for example, Macrium Reflect, might do an even more thorough job of eliminating the problem.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
-
doriel
AskWoody LoungerJuly 26, 2019 at 1:40 am #1890509Full backup should work.
If you have no full backup, you can try to run
Which should find and clear that trojan, according to this article. Which I dont believe, but its worth a try
I suggest to go disconnect from the internet before you run this.
Dell Latitude 3420, Intel Core i7 @ 2.8 GHz, 16GB RAM, W10 22H2 Enterprise
HAL3000, AMD Athlon 200GE @ 3,4 GHz, 8GB RAM, Fedora 29
PRUSA i3 MK3S+
-
-
Vincenzo
AskWoody PlusJuly 26, 2019 at 3:19 pm #1891834https://community.sophos.com/kb/en-us/114422
- From the search toolbar, type This PC.
- Right click on Local Disk C (C:) and select Properties.
- Accept any alerts from Windows UAC.
- Click the Disk Cleanup button.
- Wait for Disk cleanup to finish calculating.
- Select the More Options tab in the new window.
- Select the Clean up button for System Restore and Shadow Copies.
- Click Delete to confirm.
3 users thanked author for this post.
-
Travasaurus
AskWoody PlusJuly 26, 2019 at 4:06 pm #1891913Thanks. I’ve used the Disk Cleanup Tool 100s of times but I never even really paid any attention to the 2nd (More Options) tab. That’s kind of the “Doomsday Scenario” as far as your backups go but apparently it will zap the Shadow Copy that contains the Trojan, in this case. Sometimes the answer is right under your nose and you can’t see the Forest for the Trees…
1 user thanked author for this post.
-
-
Geo
AskWoody Plus -
Travasaurus
AskWoody PlusJuly 31, 2019 at 3:50 am #1898292Wrap-up: I tried the suggested anti-malware programs, including the Microsoft Safety Scanner and the Malwarebytes AdwCleaner (which I really didn’t have high hopes for because, as I mentioned earlier, my client is using the paid version, Malwarebytes Premium) and it didn’t even detect it (nor did Spybot Search & Destroy, for that matter). Windows Defender was the only thing that did but as noted, could not get rid of it. Oddly, using the Windows Disk Cleanup Tool / More Options didn’t touch the Shadow Copies either, even though (supposedly) it should’ve deleted them. The garden-variety Vssadmin commands didn’t even work (i.e. “delete shadows /all”). Vssadmin Commands What finally did was an obscure page that I stumbled onto that instructed me to “terminally” resize the Shadow Copies, thereby effectively deleting them. It seemed kind of counter-intuitive but it worked like a charm and the Trojan disappeared right along with the Shadow Copies, after which I verified that it had been deleted (at least as reported by Windows Defender) and then I made a fresh backup, which took about 5 hours to complete. The link to this “magic bullet” is below, in hopes that this might help somebody else in a similar situation. Many thanks to all who offered-up a number of good suggestions; your assistance was appreciated!
How To Effectively Delete A Shadow Copy
As kind of an afterthought, it might not be a bad idea to do this occasionally, just to clean-up your disk a little bit, unless there is some downside to it that I’m not aware of. If so then I’d welcome somebody to comment accordingly. Apparently Shadow Copies are darn near impossible to get rid of, based on my recent experience.
-
Alex5723
AskWoody PlusJuly 31, 2019 at 4:56 am #1898488Oddly, using the Windows Disk Cleanup Tool / More Options didn’t touch the Shadow Copies either, even though (supposedly) it should’ve deleted them.
Disk Cleanup run as Admin deletes Shadow Copies leaving only the last one. I am deleting daily Shadow copies (15 days = 20GB) twice a month (before creating full image copies).
-
This reply was modified 5 years, 8 months ago by
Alex5723.
2 users thanked author for this post.
-
This reply was modified 5 years, 8 months ago by
-
-
cmptrgy
AskWoody LoungerJuly 31, 2019 at 2:53 pm #1899467Wrap-up: I tried the suggested anti-malware programs, including the Microsoft Safety Scanner and the Malwarebytes AdwCleaner (which I really didn’t have high hopes for because, as I mentioned earlier, my client is using the paid version, Malwarebytes Premium) and it didn’t even detect it (nor did Spybot Search & Destroy, for that matter). Windows Defender was the only thing that did but as noted, could not get rid of it. Oddly, using the Windows Disk Cleanup Tool / More Options didn’t touch the Shadow Copies either, even though (supposedly) it should’ve deleted them. The garden-variety Vssadmin commands didn’t even work (i.e. “delete shadows /all”). Vssadmin Commands What finally did was an obscure page that I stumbled onto that instructed me to “terminally” resize the Shadow Copies, thereby effectively deleting them. It seemed kind of counter-intuitive but it worked like a charm and the Trojan disappeared right along with the Shadow Copies, after which I verified that it had been deleted (at least as reported by Windows Defender) and then I made a fresh backup, which took about 5 hours to complete. The link to this “magic bullet” is below, in hopes that this might help somebody else in a similar situation. Many thanks to all who offered-up a number of good suggestions; your assistance was appreciated!
How To Effectively Delete A Shadow Copy
As kind of an afterthought, it might not be a bad idea to do this occasionally, just to clean-up your disk a little bit, unless there is some downside to it that I’m not aware of. If so then I’d welcome somebody to comment accordingly. Apparently Shadow Copies are darn near impossible to get rid of, based on my recent experience.
Thank you for letting us know the solution that worked for you: it is much appreciated.
On “As kind of an afterthought, it might not be a bad idea to do this occasionally, just to clean-up your disk a little bit, unless there is some downside to it that I’m not aware of. If so then I’d welcome somebody to comment accordingly. Apparently Shadow Copies are darn near impossible to get rid of, based on my recent experience.”
— Since the computer was infected via a Volume Shadow Copy that wasn’t deletable or addressed by any Security program, that is a potential plan to keep in mind.I’d like to add that since Disk Cleanup doesn’t delete all Restore Points, I would consider the following in order to do so if that recommendation doesn’t work in a different situation.
— I just carried out the following process on the computer I’m working on.Control Panel > System > System Protection > System properties > Configure > Delete all restore points for this drive.
A following message follows reads “You will not be able to undo unwanted system changes on this drive.
— Are you sure you want to continue?
— This will delete all restore points on this drive. This might include older system image backups.”
— I selected Continue.
— The result was “The restore points were deleted successfully.” Click on Close.The following screen showed Turn on system protection bulleted.
— I decided to bullet Disable system protection instead to ensure that not only to ensure that all of the restore pointswere successfully deleted but to definitely ensure that system protection was actually disabled at this point.
— Click Apply, then OK.
— Following message reads “Are you sure you want to turn off system protection on this drive? Answer Yes.
— Following that protection settings for your drive is Off.
— Only the Configure tab is available to be selected.
— The following screen shows Disable system protection is bulleted: select Turn on system protection > Apply > OK.
— Following that protection settings for your drive is On.
— If you click on the System Restore tab, it will report “No restore points have been created on your computer’s system drive.”
— Go back and select Create. I would enter something like this “Deleted & disabled all SRP, turned SRP back on”.Unless you need to create manual restore points
“By default, System Restore automatically creates a restore point once per week and also before major events like an app or driver installation. If you want even more protection, you can force Windows to create a restore point automatically every time you start your PC.”
https://www.howtogeek.com/278388/how-to-make-windows-automatically-create-a-system-restore-point-at-startup/HP EliteBook 8540w laptop Windows 10 Pro (x64)
-
Travasaurus
AskWoody PlusJuly 31, 2019 at 3:21 pm #1899500Not bad advice, but I have generally never used System Restore Points, having never had a good experience with trying to roll-back to one after some kind of crash or malfunction. I’ve read on many “Geek sites” (perhaps even this one) that System Restore can do as much harm as good, particularly if a virus (or even some previously-undetected OS corruption) gets embedded in the restore point. My methodology of choice is an occasional System Image file, conventional backups and actual file-by-file copying to another disk (offline if at all possible, such as a USB Western Digital My Passport drive or the like, which is a hedge against ransomware) of my documents, photos, music and anything else important so that if all else fails I can simply reload Windows and restore my files. Different people have different opinions and techniques and I respect that. There’s seldom “1 correct way only” when it comes to preserving your data.
-
anonymous
GuestJuly 31, 2019 at 3:59 pm #1899524? says:
thank you for sharing your sucess in defeating the trojan. the backupchain resizing is elegant yet simple. i’m wondering if a person could boot to a live linux disk and delete the offending snapshot(s) without wrecking something? last time i looked i could view the contents of $Recycle.Bin and System Volume Information when booted to a live linux disk. anyway, congrats on your victory!
1 user thanked author for this post.
-
mn–
AskWoody LoungerJuly 31, 2019 at 5:39 pm #1899561Most likely wouldn’t work, at least not reliably and easily. NTFS shadow copies aren’t very much supported in Linux… might not work at all, should be preserved but any writes may corrupt the shadow copies as far as I know, would prefer to mount any NTFS containing shadow copies as read-only.
You can just about, barely, read the shadow copies if you work at it, and the tools to do even that are alpha-grade, as in nowhere near release quality according to their developers. (Though, being open source, are available anyway so you can try…)
See https://www.dfir.vn/2018/02/20/mounting-different-virtual-shadow-copies-at-the-same-time-on-linux/ on how to read shadow copies in Linux.
(Yes, there’s a package in Ubuntu for libvshadow-utils even if it’s alpha-grade. Not updated in 18.04 LTS, but there’s a fresher one in the “Glorious Incident Feedback Tools” untrusted PPA… or you could just follow the linked instructions and build fresh from source)
1 user thanked author for this post.
-
anonymous
GuestJuly 31, 2019 at 6:22 pm #1899588? says:
thank you for the follow up mn. nice forensics site. i saw that i had access to the sys vol and $recycle.bin windows files while booted to linux and assumed i could delete them if needed. i don’t use hibernation or backup among other options just what is needed to boot and run. win7 on 27 processes (courtesy of charles black viper sparks). only know enough to be dangerous (to windows os).
eg: to get rid of a TI 84 or 89 update program with a file (tiehdusb.sys sharing an oeminf file number) in HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\LockdownFiles, rather than changing folder permissions i used Registrar Manager 8 to do it on the fly. also used the program to delete an enum\display file that was causing problems. anyway thank you for the interesting link and taking the time to reply…
-
-
-
cmptrgy
AskWoody LoungerJuly 31, 2019 at 8:00 pm #1899712Not bad advice, but I have generally never used System Restore Points, having never had a good experience with trying to roll-back to one after some kind of crash or malfunction. I’ve read on many “Geek sites” (perhaps even this one) that System Restore can do as much harm as good, particularly if a virus (or even some previously-undetected OS corruption) gets embedded in the restore point. My methodology of choice is an occasional System Image file, conventional backups and actual file-by-file copying to another disk (offline if at all possible, such as a USB Western Digital My Passport drive or the like, which is a hedge against ransomware) of my documents, photos, music and anything else important so that if all else fails I can simply reload Windows and restore my files. Different people have different opinions and techniques and I respect that. There’s seldom “1 correct way only” when it comes to preserving your data.
We are essentially on the same page. I have read many comments about the pros & cons of using system restore but my experience has been pretty positive. That said, my main recovery method is to rely on a system image backup which I conduct on a monthly basis during the week before Patch Tuesday; which fortunately I haven’t had to recall on my main computer. I have a test computer in which I’ve had to recall a system image backup due to the experiments I do on that computer. But in the end all turns out well and thanks to your situation I have learned a few things. Most importantly I am impressed on how you stayed on track on how to solve your issue and follow-up on letting us know on how you solved your situation.
HP EliteBook 8540w laptop Windows 10 Pro (x64)
1 user thanked author for this post.
-
anonymous
GuestJune 14, 2021 at 2:36 pm #2371331@Travasaurus you are my HEROOOOOOO. Thank you for sharing the link
Viewing 18 reply threads - This topic has 33 replies, 15 voices, and was last updated 3 years, 10 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Oracle kinda-sorta tells customers it was pwned
by
Nibbled To Death By Ducks
4 hours, 56 minutes ago -
Global data centers (AI) are driving a big increase in electricity demand
by
Kathy Stevens
15 hours, 16 minutes ago -
Office apps read-only for family members
by
b
17 hours, 52 minutes ago -
Defunct domain for Microsoft account
by
CWBillow
14 hours, 44 minutes ago -
24H2??
by
CWBillow
4 hours, 55 minutes ago -
W11 23H2 April Updates threw ‘class not registered’
by
WindowsPersister
1 day, 2 hours ago -
Master patch listing for April 8th, 2025
by
Susan Bradley
2 hours, 47 minutes ago -
TotalAV safety warning popup
by
Theodore Nicholson
14 hours, 41 minutes ago -
two pages side by side land scape
by
marc
2 days, 15 hours ago -
Deleting obsolete OneNote notebooks
by
afillat
2 days, 17 hours ago -
Word/Outlook 2024 vs Dragon Professional 16
by
Kathy Stevens
1 day, 20 hours ago -
Security Essentials or Defender?
by
MalcolmP
1 day, 23 hours ago -
April 2025 updates out
by
Susan Bradley
4 hours, 23 minutes ago -
Framework to stop selling some PCs in the US due to new tariffs
by
Alex5723
1 day, 16 hours ago -
WARNING about Nvidia driver version 572.83 and 4000/5000 series cards
by
Bob99
1 day, 6 hours ago -
Creating an Index in Word 365
by
CWBillow
2 days, 9 hours ago -
Coming at Word 365 and Table of Contents
by
CWBillow
21 hours, 24 minutes ago -
Windows 11 Insider Preview Build 22635.5170 (23H2) released to BETA
by
joep517
3 days, 12 hours ago -
Has the Microsoft Account Sharing Problem Been Fixed?
by
jknauth
3 days, 16 hours ago -
W11 24H2 – Susan Bradley
by
G Pickerell
3 days, 18 hours ago -
7 tips to get the most out of Windows 11
by
Alex5723
3 days, 16 hours ago -
Using Office apps with non-Microsoft cloud services
by
Peter Deegan
3 days, 9 hours ago -
I installed Windows 11 24H2
by
Will Fastie
1 day, 15 hours ago -
NotifyIcons — Put that System tray to work!
by
Deanna McElveen
3 days, 21 hours ago -
Decisions to be made before moving to Windows 11
by
Susan Bradley
14 hours, 49 minutes ago -
Port of Seattle says ransomware breach impacts 90,000 people
by
Nibbled To Death By Ducks
4 days, 5 hours ago -
Looking for personal finance software with budgeting capabilities
by
cellsee6
3 days, 13 hours ago -
ATT/Yahoo Secure Mail Key
by
Lil88reb
3 days, 14 hours ago -
Devices with apps using sprotect.sys driver might stop responding
by
Alex5723
4 days, 22 hours ago -
Neowin – 20 times computers embarrassed themselves with public BSODs and goofups
by
EP
5 days, 7 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.