I do not believe any of the above quote. The Trojan was never installed on my PC and it didn't bring any...Trojans work in tandem with other scumware usually so even though you may have caught the Trojan and removed it doesn't mean you stopped whatever it brought in with it.
I'm doing a rootkit scan at the moment. What your saying is this Trojan was just setting there on my PC; and WD just now, while I'm setting on this forum decided to find it, warn me, and then stop this Trojan. You say no reason to assume it came from here and then you say it can lay anywhere at any site. I'm totally confused. I haven't been to any other site. Are you saying my PC could get infected and WD may wait a week to inform me that I'm infected. I have some real cheap bridges for sale! How many do you want??
Thanks for your help, but this is the first time I have ever heard these things and I have been on more help forums than the law allows.
I will post the rootkit scan and MBAM. Are there any more scans I should run??
Why did you blame a rootkit and was your first choice to run??
I do not believe any of the above quote. The Trojan was never installed on my PC and it didn't bring any thing in with it. I'm not the least bit worried about any thing and I don't feel violated. I feel very confident with the layered protection I have installed on my PC. I will admit I got a little worried when certain members led me to believe this Trojan was already on my PC and ready to start showing it's nasty head.Trojans work in tandem with other scumware usually so even though you may have caught the Trojan and removed it doesn't mean you stopped whatever it brought in with it.
Hi @matterny I value all help replies. I have a 500GB hard drive. I'm using 40GB the last time I looked. WD was not updating definitions.How much stuff is on your hard drive? If you have a lot, and WD updates its definitions, or several other possibilities, real-time may just detect the virus at a random time, this forum being slightly more likely than others.
Modern real time scanning scans everything incoming and also uses a small amount of processing power to scan everything you have on your hard drive(s).
Will do my friend! Thanks! I'm thinking about taking some time off from this forum and do some serious thinking.Off Topic reply. Watch it's path carefully, Gary.
Thanks @Neemobeer A wee bit over this old country boys head, but I did understand a little bit of your replyMost AV suites are real-time. What that means is they install one or more kernel-mode drivers to intercept interactions to other parts of the kernel. They will have a filesystem filter driver that sits over the filesystem driver and a network filter driver. All user mode applications will call either into the .NET framework or can call into Windows API's such as User32.dll, Kernal32.dll, GDI.dll etc. These all interface to the kernel through ntdll.dll and then into kernel mode. Some malware will hook directly into ntdll.dll or use their own kernel mode drivers to bypass AV.