Jump to content

larssonsbarn

Members
  • Posts

    8
  • Joined

  • Last visited

Reputation

0 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Thank you greatly. I'm never ever buying any other anti-virus than MB. Whatever they're paying you I hope it's enough. Is it possible that you could explained to me what you did? How come the malware wasn't detected at first and that the FRST-program could find it eventually? I read through the files as we were going along but couldn't catch were the malware was located etc. There's also the question of the second /C:/roaming file called bjhwfca that turned up after the first FRST fixlist fix. This is me trying to better understand how all this works. Once again, thank you sincerely!
  2. https://drive.google.com/file/d/1lp_GBnDC8Yf9Ma6WidSCWE2M3FwIccZD/view?usp=sharing Here's the link to the quarantine file. Attached is the second fixlog.txt file. Fixlog.txt
  3. @JSntgRvr I'm sorry to double-post but holy (explicative) the fixlist made everything so much faster. Starting up I only used 11% ram (on a 32G ram system), compared to before it, when I was using just under 30%. Waiting for a response on the meaning of the log-texts, but must say that I haven't noticed the pop-up window or cmd prompt /C:/roaming issues since running the fixlist. Many, many thanks
  4. Addition.txtFRST.txt Thank you for your assistance @JSntgRvr. Here are the results of the FRST-scan
  5. An earlier and discontinued post described a problem where there was obvious malware intervention during normal computer usage, especially during scans, opening a command prompt to an invisible /C:/roaming pathway that can not be located manually (including hidden items). I wrote a reply to the discontinued post, which goes as follows: "For the sake of complete transparency: My friends and I started a project (purely artistic) over the summer for which I needed a program I couldn't afford, so I pirated it, planning to buy it once my economic situation had stabilized later on. I thought I was safe because I had malwarebytes and mcafee up (I have however come to the conclusion that McAfee is virtually useless, as it missed malware that malwarebytes picked up on.). I have since deleted the illegal software from my computer. Just as OP, I ran a scan, deleted malware (one of which had registry value) and the suspicious program but have kept on having the command prompt with the same pathway come up, especially during scans, where the cmd action slows down significantly. Last night, I managed to capture a screenshot. The only difference seems to be that instead of "vcwatav" [the end path for the earlier poster], it's called "vfgedri" for me." I removed the malicious software through the malwarebytes service, but have kept on having general usage issues since. There have been no detections since. At random intervals, whenever I'm using a program, whether it be my main web browser or another program I see flashes of a window opening, akin to the issue described in the post linked below. Furthermore, there's an odd blinking of the desktop icons and the taskbar whenever I'm using any one application, which causes minimization if the application in question is in fullscreen mode. I'm running on a 2021 Lenovo Legion 5 Pro Laptop, so the decrease in performance is rather notable ever since the suspected virus took hold. All of this is clearly a consequence of my own gullibility, but I'm in desperate need of help, this laptop being my only computer for the foreseeable future and having no funds to fix it any other way. I've attached the logs of the first (and only) positive malwarebytes scans, as well as printscreens of two instances of the cmd prompt arising during MB-scans, one of which I managed to capture during the writing of this post (the one named with a date). malware_malwarebytes1.txt malware_malwarebytes2.txt
  6. Having the exact same issue, I reckoned I should write here rather than create a new post. For the sake of complete transparency: My friends and I started a project (purely artistic) over the summer for which I needed a program I couldn't afford, so I pirated it, planning to buy it once my economic situation had stabilized later on. I thought I was safe because I had malwarebytes and mcafee up. (I have however come to the conclusion that McAfee is virtually useless, as it missed malware that malwarebytes picked up on.). Just as OP, I ran a scan, deleted malware (trojans and the like; one of which had regestry value) as well as the suspicious program but have kept on having the command prompt with the same pathway come up, especially during scans, where the cmd action slows down significantly. Last night, I managed to capture a screenshot. The only difference seems to be that instead of "vcwatav", it's called "vfgedri" for me. Other than that, all scans show up clean, even when done in safe mode and with the inclusion of rootkits. I also ran the adwcleaner, which quarantined a few PuPs, but to no greater effect on the main issue. Another divergence from OP’s situation is that I do notice a performance drop, which is especially noticable as I own an almost entirely new Lenovo Legion 5 Pro (2021) laptop. If anyone here can help me out, please, please do. I poured all of my savings and some into this computer and now I fear I’ve screwed it up beyond repair.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.