Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need Help


  • Please log in to reply
3 replies to this topic

#1 galt

galt

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:04:12 AM

Posted 10 September 2008 - 05:43 PM

Hello,

I seek your help in resolving an issue with a very slow computer. I have had the same programs running for over 2-3 years and never had an issue with speed or performance. About 2 weeks ago I started noticing this issue and it is getting worst by the day.


I have done many things to resolve this - uninstalls of not used progs; clean-up of all files; I have a scheduled De-Frag; ran utilities like Stinger, McAfee (is installed), PC Tools, AdAware, Windows defender etc... but no difference.

I also suspect the PC may be hacked; One fine day, while I was working, and all of a sudden, I heard some music in a different language (than English) and Key strokes... and the key strokes stopped after about a minute or so...

Kindly guide me of the next step - since I would like to (at the least) protect my data.

TG

BC AdBot (Login to Remove)

 


#2 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:05:12 AM

Posted 10 September 2008 - 07:40 PM

Hi galt,

Let's see if MalwareBytes can detect anything. If not, we will pursue the slow computer track.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Reagardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#3 galt

galt
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:04:12 AM

Posted 11 September 2008 - 08:33 AM

Hello Rigel,

Thanks for your reply. I have done as directed and here are the results before removal:


Malwarebytes' Anti-Malware 1.28
Database version: 1138
Windows 5.1.2600 Service Pack 3

9/11/2008 9:32:38 AM
mbam-log-2008-09-11 (09-32-38).txt

Scan type: Quick Scan
Objects scanned: 52596
Time elapsed: 4 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{a26503fe-b3b8-4910-a9dc-9cbd25c6b8d6} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)
=====

Here are the results after Removal

Malwarebytes' Anti-Malware 1.28
Database version: 1138
Windows 5.1.2600 Service Pack 3

9/11/2008 10:12:25 AM
mbam-log-2008-09-11 (10-12-25).txt

Scan type: Quick Scan
Objects scanned: 52476
Time elapsed: 5 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
=========

I have re-booted the computer twice thereafter; no change in the speed.

As mentioned in my first email, I also suspect there is a Hacker who controls many things on this PC
since while I was shutting off my browser, McAfee and Windows Defender came up with Registry Change warnings...

I appreciate your help so far and seek your help to get this issue resolved.
Thanks once again!!

TG

Edited by galt, 11 September 2008 - 09:18 AM.


#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,289 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 11 September 2008 - 09:48 AM

Are you finding any suspicious processes in Task Manager? When you experience or encounter strange behavior, always check for new, unknown or suspicious processes that may be running on your system.

Anytime you come across a suspicious file or one that you do not recognize, search the name using Google or the following links:
BC's File Database
BC's Startup Programs Database
ProcessLibrary.com
ThreatExpert Malware Search
File Research Center

Most of the processes in Task Manager will be legitimate as shown in these links.
List of common system processes found in XP's Task Manager
Common Processes found in XP's Task Manager
How To Determine what Services are running in Windows XP

Determining whether a file is malware or a legitimate process sometimes depends on the location (path) it is running from. One of the ways that malware tries to hide is to give itself the same name as a critical system file. However, it then places itself in a different location on your computer. A file's properties may give a clue to identifying it. Right-click on the file, Properties and examine the General and Version tabs.

If you cannot find any information, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to jotti's virusscan or virustotal.com. In the "File to upload & scan" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
-- Then post back with the results of the file analysis.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users