New
#1
Trojan.Agent/Gen-FakeAlert
Within the past few days my computer has been freezing which is something that has never happened before. The only solution to the issue was to reboot. Today I decided to do some virus scans. I used avast, then malwarebytes, then superantispyware. Only superantispyware turned up any results. Here's the log it produced:
The thing that caught my attention was obviously the result at the bottom. As you can see this is from a folder which was generated when I extracted Asus' AI Suite II. This is the first time I've run scans within 13-14 days and withing that 13-14 day period I have updates this software. At first I thought this was a false positive since AI Suite II is trusted software, but I can see why it might be a legitimate threat since my computer has been freezing recently. I have removed the threat using superantispyware and I can no longer find the folder that the file was hiding in. Do you think this was a legitimate threat that I should be concerned about?SUPERAntiSpyware Scan Log
SUPERAntiSpyware | Remove Malware | Remove Spyware - AntiMalware, AntiSpyware, AntiAdware!
Generated 06/20/2013 at 11:13 PM
Application Version : 5.6.1020
Core Rules Database Version : 10549
Trace Rules Database Version: 8361
Scan type : Complete Scan
Total Scan Time : 00:46:58
Operating System Information
Windows 7 Home Premium 64-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User
Memory items scanned : 585
Memory threats detected : 0
Registry items scanned : 77076
Registry threats detected : 0
File items scanned : 117142
File threats detected : 26
Adware.Tracking Cookie
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\GLG0GQ0I.txt [ /ru4.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\DZ5SBAO8.txt [ /advertising.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\M6V4YSHW.txt [ /apmebf.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\PQR60DPT.txt [ /specificclick.net ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\JQ021N6Z.txt [ /ad.yieldmanager.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\DVWC5FT6.txt [ /atdmt.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\00S4DABN.txt [ /at.atwola.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\5OHAND8T.txt [ /bs.serving-sys.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\6KWD7MDK.txt [ /imrworldwide.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\5ZLW2PBV.txt [ /questionmarket.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\2R1TBZ2O.txt [ /invitemedia.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\RO8ZEXH9.txt [ /insightexpressai.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\0M01F476.txt [ /a1.interclick.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\JYEDONKC.txt [ /burstnet.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\22YCPXRJ.txt [ /fastclick.net ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\D804ZI2M.txt [ /ads.pointroll.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\O9VVP291.txt [ /doubleclick.net ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\SWF5GGLD.txt [ /casalemedia.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\XZH3D6RH.txt [ /mediaplex.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\LUUJV17K.txt [ /pointroll.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\OXVECQP8.txt [ /tribalfusion.com ]
D:\Users\Robert\AppData\Roaming\Microsoft\Windows\Cookies\O1LXQCWI.txt [ /interclick.com ]
accounts.google.com [ D:\USERS\ROBERT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\DJVFV4GO.DEFAULT\COOKIES.SQLITE ]
accounts.google.com [ D:\USERS\ROBERT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\DJVFV4GO.DEFAULT\COOKIES.SQLITE ]
accounts.google.com [ D:\USERS\ROBERT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\DJVFV4GO.DEFAULT\COOKIES.SQLITE ]
Trojan.Agent/Gen-FakeAlert[Local]
D:\USERS\ROBERT\APPDATA\LOCAL\TEMP\RAR$EXA0.063\AISUITE_II_V20101_SA_Z77_XPWIN7_8\MYLOGO\APPSETUP\PE UPDATER\COMPAL\32\AFUWIN.EXE