Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How did a new folder using my user name from other sites get there


  • Please log in to reply
1 reply to this topic

#1 texaz1956

texaz1956

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Arizona
  • Local time:04:19 AM

Posted 12 August 2017 - 04:49 PM

Hello ?

I didn't know where else to turn for help but here.  I got up one morning, turned on my Gateway PC, and noticed something new (and scary to me).  First, I often use 'Aztex'  as a login name on some sites.  What I found was a folder under  network>Gateway-PC  and when Gateway-Pc is expanded there it was  a folder named Aztex(Barbara Gateway).  Then if you expand the Aztex folder there are a lot of files that look like they came from the "C" drive program files.  I have no clue how or why it showed up. A few days after it did, I came home from running errands to find that the computer had crashed.  (I've not seen that since I got rid of W-10)

The only thing that showed up associated with the crash was 'Wondershare'  (another file I have no clue where it came from).

The only other real problem I am having has to do with Google, G+, GMail, etc.  I feel like my brain has been infected with some hideous virus!  

Does anyone have some kind of advice?

Thank you


Edited by hamluis, 12 August 2017 - 05:22 PM.
Moved from Win 7 to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,757 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:03:19 AM

Posted 14 August 2017 - 10:16 AM

Third party software being bundled in downloads has become a common practice, this is a source of extra revenue for the author of the primary software being downloaded.  Wondershare is one such third party application.


There are two methods of installing the software:

The Express method is the recommended option for installing the software.  If this method is used the embedded third party software will automatically be installed.

If you choose to use the Custom Installation (Advanced) each of the third party software will appear with a check mark already added to install the software, you must remove the check mark if you do not want this software installed.

 

 

 

Please download AdwCleaner and install it.

When AdwCleaner opens click on Scan to start the scan.

Once the search is complete a list of the pending items will be displayed.  If you see any which you do not want removed, remove the check mark next to it.

If there are no malicious programs are found you will receive a message informing you of this.  
 
Click on Clean to remove the selected items.  If you have any questions about any items in the list please copy and paste the list in your topic so we can review it.  
 
You will receive a message telling you that all programs will be closed so that the infections can be removed.  Click on OK.  The computer will be restarted to complete the cleaning process.
 
When the cleaning process is complete a log of what was removed will be presented.  Please copy and the paste this log in your topic.


As a precaution please do the following.

 

Please download Malwarebytes Anti-Malware 2.2.

1)  Double-click on mbam-setup.exe, then click on Run to install the application, follow the prompts through the installation.

2)  Malwarebytes will automatically open, click on Update Now to update to the newest definitions.

3)  Click on Settings, when Settings opens click on Detection and Protection, then under Non-Malware Protection, click on the down arrow for PUP (Potentially Unwanted Programs) detections and select Treat detections as malware.  Under Detection Options place a check in the box for Scan for rootkits

4)  Click on Scan (next to Settings), then click on Scan Now.  The scan will automatically run now.

5)  When the scan is complete the results will be displayed.  Click on Delete All.

6)  Please post the Malwarebytes log.

To find the Malwarebytes log do the following.  Copy and paste the log in your topic.

*Open Malwarebytes Anti-Malware.
*Click the Scan Tab at the top.
*Click the View detailed log link on the right.
*Click Copy to Clipboard at the bottom...come back to this thread, click Add Reply, then right-click and choose Paste.
*Alternatively, you can click Export and save the log as a .txt file on yout Desktop or another location.
*Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.





 


Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users