1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

[Infected computer - unable to download DDS or quarantine]

Discussion in 'Malware and Virus Removal Archive' started by FACE, 2009/04/15.

  1. 2009/04/15
    FACE

    FACE Inactive Thread Starter

    Joined:
    2009/04/12
    Messages:
    7
    Likes Received:
    0
    Although I'm of intermediate level computer experience, I have somewhat of a problem acclamating to new situations...and so, am finding it a bit confusing where to post - especially since it seems like I have somewhat of a compound problem (??)

    For example, I tried to download the recommended DDS tool in WindowsBBS Malware Removal forum; but as I tried to access each of the three "mirrors" (what's a "mirror ", anyway?), I've encountered a problem (page will not load, page not available, etc). Where would I post a question regarding what to do?

    It's obvious that my system is infected...but I'm wondering if the Google sites I'm going to are infected as well...or is the "smart" virus in my computer detecting key words, sensing that I'm looking for a solution, and thus allowing the virus to rear it's ugly head each time I search? Where would I post to ask about that?

    Even when I plugged our own "WindowsBBS" into Google search (to get here quickly), I apparently activated a Trojan Horse... for those interested, here is the info which avast! anti-virus program generated:

    File name: C:\Documents and Settings\Compaq_Administrator\Local Settings\Temporary Internet Files\Content.IE5\YOL3903N\flist000[1].js
    Malware name: JS:FakeAV-G [Trj]
    Malware type: Trojan Horse
    VPS version: 090319-0, 03/19/2009

    ...When I tried to "Move to chest" (within the avast! anti-virus pop-up), I got a message saying:

    avast!:
    The process cannot access the file because it is being used by another process
    Cannot process "C:\Documents and Settings\Compaq_Administrator\Local Settings\Temporary Internet Files\Content.IE5\YOL3903N\flist000[1].js" file


    ...I had even tried closing all windows, and still could not move the file into the chest.

    Where would something like that get posted?

    And one final point...I have never posted a log (I've seen them generated at the end of virus scans); in general, where do we find all these requested logs I see flying about in WindowsBBS?

    Take your time...my computer isn't going anywhere (it IS somewhat useable currently...but I suppose my anti-virus/spyware/and malware programs will only hold this off for so long...) :(

    And if it helps to know, a computer savvy friend burned me a disk of the Semantac (?) free program for (hopefully) getting rid of Conficker...

    Thanx!

    FACE :)
     
    FACE,
    #1
  2. 2009/04/15
    wildfire

    wildfire Getting Old

    Joined:
    2008/04/21
    Messages:
    4,649
    Likes Received:
    124
    Post in the malware forum and explain the situation, (wait a while though a staff member will probably move this thread there for you).

    By the way a mirror is basically another website on another server hosting the same software, if one goes offline or is unreachable for any reason the other is available as an alternative.
     

  3. to hide this advert.

  4. 2009/04/15
    FACE

    FACE Inactive Thread Starter

    Joined:
    2009/04/12
    Messages:
    7
    Likes Received:
    0
    Thanx!

    FACE
     
    FACE,
    #3
  5. 2009/04/15
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    Moved to the Malware & Virus Removal forum with title edit.
     
  6. 2009/04/15
    FACE

    FACE Inactive Thread Starter

    Joined:
    2009/04/12
    Messages:
    7
    Likes Received:
    0
    And thank YOU!
     
    FACE,
    #5

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.