Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

computer running really slow.. help!! ?


  • Please log in to reply
9 replies to this topic

#1 scuzzo

scuzzo

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:05:50 AM

Posted 05 August 2011 - 10:41 AM

hello all,
Vista op system, running very very slow... i suspect a virus... trojan.. or some other nasty..
about 2 days ago i noticed that my computer is running painfully slow.. and locking up on many tasks.. i have already scanned with avast, and AVG and microsoft antivirus programs... nothing found.. i believe it has circumvented the virus scans.. so now im trying scans in safe mode.. still nothing..
perhaps i have used this board a few times before with great results.. bit out of my depth here so im not quite sure what to do next...

in great need of assistance..


.. just not sure what else to do..

chris..

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 05 August 2011 - 04:14 PM

i have already scanned with avast, and AVG and microsoft antivirus programs

Are you using more than one anti-virus or did you remove one before installing another?

Using more than one anti-virus program is not advisable. Why? The primary concern with doing so is due to conflicts that can arise when they are running in real-time mode simultaneously and issues with Windows resource management. Even if one of them is disabled for use as a stand-alone scanner, it can affect the other and cause conflicts. Anti-virus software components insert themselves into the operating systems core and using more than one can cause instability, crash your computer, slow performance and waste system resources. When actively running in the background while connected to the Internet, they both may try to update their definition databases at the same time. As the programs compete for resources required to download the necessary files this often can result in sluggish system performance or unresponsive behavior.

Each anti-virus may interpret the activity of the other as suspicious behavior and there is a greater chance of them alerting you to a "False Positive". If one finds a virus or a suspicious file and then the other also finds the same, both programs will be competing over exclusive rights on dealing with that virus or suspicious file. Each anti-virus may attempt to remove the offending file and quarantine it at the same time resulting in a resource management issue as to which program gets permission to act first. If one anit-virus finds and quarantines the file before the other one does, then you encounter the problem of both wanting to scan each other's zipped or archived files and each reporting the other's quarantined contents. This can lead to a repetitive cycle of endless alerts that continually warn you that a threat has been found when that is not the case.

Anti-virus scanners use virus definitions to check for malware and these can include a fragment of the virus code which may be recognized by other anti-virus programs as the virus itself. Because of this, many anti-virus vendors encrypt their definitions so that they do not trigger a false alarm when scanned by other security programs. Other vendors do not encrypt their definitions and they can trigger false alarms when detected by the resident anti-virus. Further, dual installation is not always possible because most of the newer anti-virus programs will detect the presence of others and may insist they be removed prior to download and installation of another. If the installation does complete with another anti-virus already installed, you may encounter issues like system freezing, unresponsiveness or similar symptoms while trying to use it.

To avoid these problems, use only one anti-virus solution. Deciding which one to remove is your choice. Be aware that you may lose your subscription to that anti-virus program's virus definitions once you uninstall that software.

Anti-virus vendors recommend that you install and run only one anti-virus program at a timeYou can always supplement your anti-virus by performing an Online Virus Scan.


Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Double-click on the setup file to install, then follow these instructions for doing a Quick Scan in normal mode.
  • Don't forget to check for database definition updates through the program's interface (preferable method) before scanning.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • After completing the scan, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab .
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 scuzzo

scuzzo
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:05:50 AM

Posted 05 August 2011 - 05:08 PM

ok quietman, thankyou for the advise on the virus protection... i guess i thought if one was good.. running 2 would be twice the protection.. but now i see its just a drain on resources and causes each program problems... im not sure which one i will stick with because neither avast or AVG or Microsoft Security Essentials were able to catch virus, bug, worm ?? Trojan.. that has landed in my computer system.

seem to been stricken with in just the last 2days... but i have yet to find a scan that will expose there the awful beast is hiding.. they all come back clean..

here is the Malware Bytes log you have requested..
its disturbingly clean...

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7389

Windows 6.0.6002 Service Pack 2 (Safe Mode)
Internet Explorer 9.0.8112.16421

8/5/2011 4:26:47 PM
mbam-log-2011-08-05 (16-26-47).txt

Scan type: Quick scan
Objects scanned: 251791
Time elapsed: 4 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




thanks again for your help..

chris

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 05 August 2011 - 08:04 PM

Please download SUPERAntiSpyware Free and follow these instructions for performing a scan.

  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • Be sure to update the definitions before scanning by selecting "Check for Updates".
    If you encounter any problems while downloading the updates, manually download them from here.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
  • Click Close to exit the program.
  • Please copy and paste the Scan Log results in your next reply.
-- Some types of malware will disable security tools. If SUPERAntiSpyware will not install, please refer to these instructions for using the SUPERAntiSpyware Installer. If SUPERAntiSpyware is already installed but will not run, then follow the instructions for using RUNSAS.EXE to launch the program.


Please perform a scan with Eset Online Anti-virus Scanner.
  • If using Mozilla Firefox, you will be prompted to download and use the ESET Smart Installer. Just double-click on esetsmartinstaller_enu.exe to install.
  • Vista/Windows 7 users need to run Internet Explorer/Firefox as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.
  • Click the green Posted Image button.
  • Read the End User License Agreement and check the box:
  • Check Posted Image.
  • Click the Posted Image button.
  • Accept any security warnings from your browser and allow the download/installation of any require files.
  • Under scan settings, check Posted Image and make sure that the option Remove found threats is NOT checked.
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click the Start button.
  • ESET will install itself, download virus signature database updates, and begin scanning your computer.
  • The scan will take a while so be patient and do NOT use the computer while the scan is running. Keep all other programs and windows closed.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop as ESETScan.txt.
  • Push the Posted Image button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply. If no threats are found, there is no option to create a log.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 scuzzo

scuzzo
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:05:50 AM

Posted 05 August 2011 - 11:33 PM

ok great.. and thanks for the help again.. seems that super anti spy found Trojans.. here is the log from you last instructions to run SuperAnitSpyware..


snip>>>

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/05/2011 at 11:05 PM

Application Version : 5.0.1108

Core Rules Database Version : 7523
Trace Rules Database Version: 5335

Scan type : Complete Scan
Total Scan Time : 01:44:36

Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002)
UAC On - Administrator

Memory items scanned : 861
Memory threats detected : 0
Registry items scanned : 39962
Registry threats detected : 0
File items scanned : 70895
File threats detected : 86

Adware.Tracking Cookie
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@2o7[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@2o7[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@adbrite[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@adlegend[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@ads.intergi[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@adserver.adtechus[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@advertising[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@ar.atwola[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@ar.atwola[3].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@ar.atwola[4].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@ar.atwola[5].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@at.atwola[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@at.atwola[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@atdmt[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@atwola[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@collective-media[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@doubleclick[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@imrworldwide[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@insightexpressai[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@invitemedia[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@legolas-media[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@lucidmedia[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@media6degrees[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@mediabrandsww[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@r1-ads.ace.advertising[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@r1-ads.ace.advertising[3].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@revsci[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@ru4[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@tacoda.at.atwola[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@tacoda.at.atwola[2].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@warnerbros.112.2o7[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@yieldmanager[1].txt
C:\Users\Christopher L Karr\AppData\Roaming\Microsoft\Windows\Cookies\christopher_l_karr@yieldmanager[3].txt
.philips.112.2o7.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.2o7.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.lfstmedia.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.lfstmedia.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
oasc09.247realmedia.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.a1.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.a1.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.a1.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.a1.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.a1.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.a1.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.soundclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.soundclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.soundclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.soundclick.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.imrworldwide.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.imrworldwide.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.pointroll.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.pointroll.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.specificclick.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.collective-media.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.kontera.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
www.googleadservices.com [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ C:\USERS\CHRISTOPHER L KARR\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]

Trojan.Agent/Gen-Bot
C:\PROGRAM FILES\JZIP\UNWISE.EXE
C:\PROGRAM FILES\MAGICDISC\UNWISE.EXE
C:\PROGRAM FILES\STEINBERG\VSTPLUGINS\NOMAD FACTORY\LIQUID BUNDLE VST\UNWISE.EXE
C:\PROGRAM FILES\VUZE_REMOTE\UNWISE.EXE
C:\PROGRAM FILES\WAVES\LOGS\WAVES API COLLECTION\UNWISE.EXE
C:\PROGRAM FILES\WAVES\LOGS\WAVES GTR 3\UNWISE.EXE
C:\PROGRAM FILES\WAVES\LOGS\WAVESMERCURY\UNWISE.EXE
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\NOMAD FACTORY\LIQUID BUNDLE VST\HOW TO AUTHORIZE PC.LNK
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\NOMAD FACTORY\LIQUID BUNDLE VST\LIQUID BUNDLE USER GUIDE.LNK
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\NOMAD FACTORY\LIQUID BUNDLE VST\LIQUID UNLOCK TOOL.LNK
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\NOMAD FACTORY\LIQUID BUNDLE VST\UNINSTALL NOMAD FACTORY LIQUID BUNDLE VST V1.6.LNK
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\WAVES\UNINSTALL WAVES API COLLECTION.LNK
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\WAVES\UNINSTALL WAVES GTR 3.LNK
C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\WAVES\UNINSTALL WAVES MERCURY 5.0R1.LNK

Trojan.Agent/Gen-MSFake
C:\WINDOWS.0\SYSTEM32\MSVCRT.DLL
>end

will be running ESET and will paste results in next Posting..

thanks for the assistance..

chris

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 06 August 2011 - 07:22 AM

will be running ESET and will paste results in next Posting.

Ok.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 scuzzo

scuzzo
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:05:50 AM

Posted 06 August 2011 - 11:44 AM

here is the ESETScan.txt file you have requested.. it found 2 threats... not sure why these were not detected before...


ESETScan.txt

C:\Users\Christopher L Karr\Documents\Azureus Downloads\Nero 9.0.9.4d\Nero-9.0.9.4d.exe Win32/Toolbar.AskSBar application
C:\Users\Christopher L Karr\Downloads\The Mechanic\winzip155.exe Win32/OpenCandy application

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 06 August 2011 - 01:10 PM

The detection(s) could possibly be false positives so you should get second opinion. Go to one of the following online services that analyzes suspicious files:In the "File to upload & scan" box, browse to the location of the suspicious file(s) and submit (upload) it for scanning/analysis. If you get a message saying "File has already been analyzed", click Reanalyze file now.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 scuzzo

scuzzo
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:05:50 AM

Posted 06 August 2011 - 08:39 PM

The detection(s) could possibly be false positives so you should get second opinion. Go to one of the following online services that analyzes suspicious files:

In the "File to upload & scan" box, browse to the location of the suspicious file(s) and submit (upload) it for scanning/analysis. If you get a message saying "File has already been analyzed", click Reanalyze file now.


ok checked the flagged files,, all clean but i was not using either of those applications so i tossed them in the bin... the computer is running like a well oiled machine and stuff.. so all the bad guys have been dealt with and dispatched... this cleaning has been a success and thank you for lending me your expertise on this... all well...


thanks again man..
been of great help. :thumbup2:

chris..

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 07 August 2011 - 07:02 AM

You're welcome.

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Posted Image > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Posted Image > Run... and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista and Windows 7 users can refer to these links:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users