Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

unknown stream 84098FD3


  • Please log in to reply
6 replies to this topic

#1 BlueSapphire

BlueSapphire

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:11:58 PM

Posted 09 March 2011 - 11:51 AM

Hello,

I'm on a 64-bit Windows 7 Pro computer that's only a few months old. Using Stream Armor, I've discovered an unknown stream that I can't seem to find any meaningful info on. Other computers in my office (we all got new computers at the same time) don't have this stream. Is it something I should be worried about?

Edited by BlueSapphire, 09 March 2011 - 11:51 AM.


BC AdBot (Login to Remove)

 


#2 pcrepairman

pcrepairman

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:58 AM

Posted 02 October 2011 - 06:01 AM

It is probably nothing. The stream that is being referred to is most likely a Temporary Internet Files folder. They are randomly-generated eight-character names. It is safe to delete the stream.

Mark

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:58 AM

Posted 03 October 2011 - 07:33 AM

Since you say this a work computer, have you contacted and advised your Domain Administrator, Business Manager, or IT Department?

In most work environments, the IT staff implement specific policies and procedures for the use of computer equipment and related resources. In fact, many companies will require you to read those policies and sign a statement of understanding. These official procedures are designed and implemented to provide security and certain restrictions to protect the network. This allows all users to safely use business resources with minimum risk of malware infection, illegal software, and exposure to inappropriate Internet sites or other prohibited activity. We will not assist with attempts to circumvent those policies or security measures unless the IT staff requests our assistance.

A business/government IT Department generally has established procedures in place to deal with issues and infections on client machines on the network. As such, they may not approve of employees seeking help at an online forum or outside the business office as doing so could interfere or cause problems with their removal methods.

Our forums are set up to help the home computer user deal with issues and questions relating to personal computers. Many helpers are not familiar with Servers and most of the tools we use are restricted to non-commercial use by their creators. We do not have the staff or resources to deal with numerous client machines or the complexities of network disinfection. We are not equipped to involve ourselves in any legal issues that may arise due to loss of business, financial, confidential information or loss of revenue as a result of malware infection or the disinfection process. In some instances the only option may be to reformat and reinstall the operating system which could result in loss of all data.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 BlueSapphire

BlueSapphire
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:11:58 PM

Posted 28 June 2012 - 12:59 PM

I've still got the stream, although I've deleted it a few times since first posting. It /does/ show up under C:\ProgramData\TEMP.

We don't have an IT department. We are very small, and I take care of the few computers we have (no server).

I guess it'll remain an unknown but likely benign stream.

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:58 AM

Posted 28 June 2012 - 01:28 PM

I understand and that's not a problem but I always ask first. There are many folks who try to circumvent their employers work policies by hiding infections and seeking help elsewhere in order to avoid personal responsibility. As such, I'm sure you can appreciate I was looking out for the IT folks as well by checking.

This issue will require further investigation. Many of the tools we use in this forum are not capable of detecting (repairing/removing) all malware variants so more advanced tools are needed to investigate. Before that can be done you will need to create and post a DDS log for further investigation.

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.
  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 7 there are instructions for downloading and running DDS which will create two logs.
When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the Malware Response Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. After doing this, it would be helpful if you replied back in this thread with a link to the new topic so we can closed this one.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 BlueSapphire

BlueSapphire
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:11:58 PM

Posted 06 July 2012 - 04:41 PM

I'm posting a link to a screenshot of the gmer screen, which doesn't allow me to select the options as shown in the instructions. How shall I proceed?
https://secure.flickr.com/photos/82050456@N03/

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:58 AM

Posted 06 July 2012 - 09:19 PM

If you cannot complete a step, then skip it and continue with the next.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users