Infected or malware--slow startup, System Restore inoperative

Your #4 observation is possible. Also I would make sure you have the latest driver for your NIC, based on the make and model of your machine. You only want to get it from the HP website, no where else. HP site also has good troubleshooting sections for various problems.

I have a Dell Latitude D630, so I presume you mean to load it from the Dell website--I have an HP printer we've talked about, so that might be the confusion. I tried downloading some of the drivers but they wouldn't open. Could you check the site and advise? Then I'll proceed with the other suggestions. Let me know if you need my service tag number to access the driver site.
 
your right I was thinking HP, not dell. Those dell drivers are a .exe file. what happens when you click on them? You might make sure in network connections that just your wireless adapter is enabled and any other local area connection is disabled. I assume with a laptop you are wireless.

Also go to start>run and type in: services.msc under the name column look for these ;

HP LaserJet Service
RealNetworks Downloader Resolver Service
HPSIService

right click on each one and select properties. Under the service status if it says Started click the Stop button to stop the service then change startup type to disabled. If you make any changes reboot your machine and see if it helped any.
 
I couldn't download the drivers from Dell for some reason. Yes I usually just use the wireless. Should I disable all the others?
 
Okay, I disabled the other internet items and the wireless came up right away. So if I need to plug into a cable connection is that Local Area 2 or Broadband Connection? What was the HP program you had me disable? I can still print wirelessly. I think you've cracked this thing, Shelf Life. Thank you so much! Dan
 
ok. good. If you have to use a wired connection for your laptop enable the local area connection 2 and you can disable the wireless connection. I think the combination of two networks starting up slowed the process down. HPSI service is stuff thats installed with HP printer driver and starts at boot up. As long as you can print ok you can keep it disabled. All is good now?
 
I think so. I start on the screen with the user names, which my friend Barry installed during a previous Spybot session to expedite the process and get around Malware that prevented me from changing the startup items. If I stay on that for a minute or so before clicking my username things come up in a couple of minutes, faster than if I click my username immediately. To tell you the truth, it's been so long since I've had normal startup that I think this time is pretty normal for Dell computers of this vintage. Do you think removing the other usernames would make it faster, or is as good and it'll get with my computer?
 
If you are the only user of the machine then it wouldnt hurt to remove them. Will it speed boot up? Dont know really. I think you can delete them using the User Accounts in the control panel.
 
My friend who installed them said that they came up much faster than my account before, but now the other account comes up in 2:30 and mine at 2:40, so I think that's a very reasonable startup time. I believe you can consider this case closed, and another feather in your cap. Thanks so much SL. Dan
 
Glad to help. Couple things you can do:

start Adwcleaner and click the uninstall button. You can also delete the logs

DDS and Aswmbr, delete the icons/logs

rougekiller, just delete the icon/logs

Combofix:
start>run and type in conbofix /uninstall
note the space after the x and before the /

Malwarebytes: (general malware) keep and note the free version must be updated manually and a scan started manually
Malwarebytes Anti-Rootkit: (rootkits) Keep it if you want, must be updated manually and a scan started manually

That should cover it.
Some tips to help you remain malware free:

No software can think for you. Help yourself. In no special order:

1) It is essential to keep your operating system (Windows) browser (IE, FireFox, Chrome, Opera) and other software up to date to "patch" vulnerabilities that could be exploited. Visit Windows Update frequently or use the Windows auto-update feature. Staying updated is also essential for other web based applications like Java, Adobe Flash/Reader, iTunes etc. More and more third party applications are being targeted. Use the auto-update features available in most software. Not sure if you are using the latest version of software? Check their version status and get the updates here.
Check your browser for vulnerabilities.

2) Know what you are installing to your computer. Alot of software can come bundled with unwanted add-ons, like adware, toolbars and malware. More and more legitimate software is installing useless toolbars or other "offers" if not unchecked first. Do not install any files from ads, popups or random links. Do not fall for fake warnings about virus and trojans being found on your computer and you are then prompted to install software to remedy this.

3) Install and keep updated: one antivirus and two or three anti-malware applications. If not updated they will soon be worthless. If either of these frequently find malware then its time to *review your computer habits or lack of habits.*

4) Refrain from clicking on links or attachments via E-Mail, IM, IRC, Chat Rooms, Blogs or Social Networking Sites, no matter how tempting or legitimate the message may seem. See also E-mail phishing tricks.

5) Do not click on ads/pop ups or offers from websites requesting that you need to install software to your computer--*for any reason*. Use the Alt+F4 keys to close the window.

6) Don't click on offers to "scan" your computer. Install ActiveX and Java applets with care. Do you trust the website to install components?

7) Consider the use of limited (non-privileged) accounts for everyday use, rather than administrator accounts. Limited accounts can help prevent *malware from installing and lessen its potential impact.* This is exactly what user account control (UAC) in Windows Vista, Windows 7 and Windows 8 attempts to address.

Every MS remote code execution bulletin ends with this sentence: "Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights."

8) Use Windows native firewall and get a inexpensive hardware router.

9) Your browser risks. The why and how to secure your browser for safer surfing.
Consider disabling Java in your browser.

10) Warez, cracks, keygens etc are very popular for carrying malware payloads. If you look for these you will encounter malware. If you download/install files via p2p networks you will encounter malware. Do you really trust the source of the file?

More info with pictures in link below.
Happy Safe Surfing
 
Back
Top