Could you please tell me why sunbelt and webwasher also suspected virus
Sunbelt said it was suspicious because it used a generic detection for potential threats that are deemed suspicious through heuristics. Webwasher apparently did the same. AVG also uses Heuristics.Heuristic analysis
is the ability of an anti-virus progtam to detect new viruses before the vendor can get samples and update the program's defintions for detection. Heuristics uses non-specific detection methods to find new or unknown malware which allows the anti-virus to detect and stop if before doing any harm to your system. The techniques involves inspecting the code in a file to see if it contains virus-like characteristics. If the number of these characteristics/instructions exceeds a pre-defined threshold, the file is flagged as a possible virus
to using heuristics is that there is always a potential risk
for a "False Positive
" when the heuristic analysis flags a file as suspicious
that contains no malware. Reducing the detection sensitivity will minimize the risk but then that increases the possibility for new malware to infect your system.
If you want to post a hijackthis log, please read and follow all instructions
in the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log
". You may have performed some of these steps already. If you can't perform a step, then skip and continue with the next. In step #9 there are instructions for downloading HijackThis and creating a log. (This is a self-extracting version which will automatically install HJT in the proper location.
When you have done that, post your log
in the HijackThis Logs and Malware Removal
forum, NOT here
, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.
Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. Please include the top portion of the HijackThis log that lists version information
. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.
Edited by quietman7, 17 September 2007 - 09:27 AM.