Jump to content


  • Posts

  • Joined

  • Last visited


0 Neutral
  1. Seems to be working fine - when the computer restarted after the FRST Fix, I didn't get any AVG notice regarding the "Malsign.Generic.713" thing (actually, first thing this morning after I woke the computer up, the AVG warning didn't come up then either) Regarding the dllhost.exe problem, I haven't seen any problems with that from Task Manager or the MWB popups since the first FRST sequence yesterday. So it seems to be working great! Is it okay to run my normal AVG and MBAM scans now or do I need to remove any of the specialized tools first? Or are there any more scans/fixes I need to run? seanster p.s. you got Beer Money coming! p.p.s. although I haven't enjoyed the whole infection headache, I did really enjoy learning more about this malware protection/security stuff on the forums. I feel like I learned more about the inner workings of my PC in the last three days than in the last 3 years! Can you point me in the right direction of how I can learn more about these things? A book(s) or a website? How do you moderators/advisors get to your level of expertise in how to resolve virus issues and knowing just good general security practices? Any advice for a newbie?
  2. Got it, thanks - I was able to run the MBAR scan - the 2 requested files are attached, as well as the 2 new FRST logfiles Just a couple notes - since re-starting after the MBAR scan, no more MWB pop-ups (and no dllhost.exe *32s showing up in Task Manager) ! I did however get the 6 threats found of Malsign.Generic.712 again when AVG did it's startup scan. All were removed (i.e. "secured") as previously. Maybe that's a separate problem?? Thanks for your help! Seanster mbar-log-2014-12-31 (09-58-09).txt system-log.txt Addition.txt FRST.txt
  3. Hello Twin Headed Eagle Thanks for your reply! I downloaded the Malwarebytes Anti-Rootkit, and made it all the way to the "scan" option, but when I click scan, it says "This version of Malwarebytes Anti-Rootkit requires you to completely exit the Malwarebytes Anti-Malware application to continue." I don't have the MBAM application actively running, but I guess it may be doing something in the background (those "Malicious Website Blocked" notifications are still coming up constantly from my MBAM unless I end their process in Windows Task Manager).... Is there somewhere I can temporarily just disable it while I run the Anti-Rootkit scan? seanster
  4. One more thing - I read the "I'm infected - What do I do now?" topic, so I have run the Farbar Recovery Scan Tool, and have attached the "FRST.txt" and "Addition.txt" files below Thanks! Seanster Addition.txt FRST.txt
  5. Hello I have recently (the last couple days) been constantly getting the "Malicious Website Blocked" popups, even when no web browsers are open. As many others on here have written, the popups report different IPs, different/no domains, different ports, but are always "outbound" types, and the process is always "C:\Windows\SysWOW64\dllhost.exe", although I have now noticed a few times where it's a different file name than "dllhost.exe". I have scanned many times with MBAM Premium, with rootkits checked, but it always comes up clean. Also, my situation may be unique because I have noticed over the last couple days when I scan with AVG at startup that it finds about 7 medium threats called "Malsign.Generic.712". It always secures/removes them, then I rescan and it's clean, but then the next time when I start up and scan with AVG, I get that same virus scan result. So I may have at least a couple problems simultaneously going on here I have hesitated to just start tinkering around with some of the in-depth resolutions offered on the forums here, because (1)I am new to trying to manually extract malware/viruses, and (2) because they are for the specific person/computer, and I don't want to make things worse. Can anyone help me get this straightened out? Thank you in advance for any help! Seanster
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.