Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

myhoroscopepro.com hijacks search engine


  • Please log in to reply

#16
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,107 posts

Chrissy,

 

Go to Settings > Network and Internet > Data usage

 

Under Overview, you'll see the total data usage from the last 30 days for Wi-Fi and Ethernet connections. Click the Usage details link to view network data usage for all your applications installed on your computer.

 

Take a screenshot of what you get. It will give us an idea of the applications that use the most data.


  • 0

Advertisements


#17
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts
 

  • 0

#18
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts

Please see attached...


  • 0

#19
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts

It's not letting me attach the screenshot.

 

It says...

 

chrome.exe      4.37GB

system              1.85GB

firefox               938MB

updater.exe      211MB

 

And the rest are under 200MB


  • 0

#20
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts

Hi Dr M

 

Are you still there ?


  • 0

#21
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,107 posts

Hi, Chrissy.

 

I am so sorry for the late reply. I have been sick.

 

The results you have provided about data usage for the last 30 days are completely normal. I don't see something concerning. 


  • 0

#22
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts

Hi Dr M

 

But when I go into my Telstra account, it shows that the actual data used is 19GB for April.

 

This doesn't correspond with the data report above, showing about 7GB for the past 30 days.

 

It seems that Telstra is charging me for 19GB, when only around 7GB has been used.

 

Would this be a Telstra issue ?


  • 0

#23
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,107 posts

Hi, Chrissy. 
 
I don't know why this happens. 
 
My recommendation is:
 
1. Open a new topic at the Networking Forum here: https://www.geekstog.../11-networking/
    Describe the issue, telling that the computer is malware free. Hopefully, some other colleague whose area of knowledge covers this subject will reply.
 
2. Contact Telstra.

 

======================================
 
Since the computer is clean, as I already claimed...

The following tool will remove the tools we used as well as reset system restore points:

Download KpRm by kernel-panik and save it to your desktop.

  • Right-click kprm_(version).exe and select Run as Administrator.
  • Read and accept the disclaimer.
  • When the tool opens, ensure all boxes under Actions are checked.
  • Under Delete Quarantines select Delete Now, then click Run.
  • Once complete, click OK.
  • A log will open in Notepad titled kprm-(date).txt.
  • Please copy and paste its contents in your next reply.

Note: If there is a warning about this tool, go on to download it, since it is a false/positive. Choose More info and continue from there.


  • 0

#24
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts

Ok thank you


  • 0

#25
Chrissy26

Chrissy26

    Member

  • Topic Starter
  • Member
  • PipPip
  • 18 posts
# Run at 23/04/2024 11:45:26 AM
# KpRm (Kernel-panik) version 2.17.0
# Run by user from C:\Users\user\Downloads
# Computer Name: WINDOWS-QSS2PM6
# OS: Windows 10 X64 (19045) (10.0.19045.4291) 
# Number of passes: 1
 
- Checked options -
 
    ~ Registry Backup
    ~ Delete Tools
    ~ Restore System Settings
    ~ UAC Restore
    ~ Delete Restore Points
    ~ Create Restore Point
    ~ Delete Quarantines
 
- Create Registry Backup -
 
   ~ [OK] Hive C:\WINDOWS\System32\config\SOFTWARE backed up
   ~ [OK] Hive C:\Users\user\NTUSER.dat backed up
 
     [OK] Registry Backup: C:\KPRM\backup\2024-04-23-11-45-26
 
- Delete Tools -
 
 
  ## AdwCleaner
     [OK] C:\Users\user\Desktop\adwcleaner(1).exe deleted
     [OK] C:\Users\user\Desktop\AdwCleaner.exe deleted
     [OK] C:\Users\user\Downloads\adwcleaner(1).exe deleted
     [OK] C:\AdwCleaner deleted
 
  ## FRST
     [OK] C:\Users\user\Desktop\Fixlog.txt deleted
     [OK] C:\Users\user\Desktop\FRST-OlderVersion deleted
     [OK] C:\Users\user\Desktop\FRST64.exe deleted
     [OK] C:\Users\user\Desktop\08.04.2024\Addition.txt deleted
     [OK] C:\Users\user\Desktop\08.04.2024\FRST.txt deleted
     [OK] C:\Users\user\Downloads\Addition.txt deleted
     [OK] C:\Users\user\Downloads\Fixlog.txt deleted
     [OK] C:\Users\user\Downloads\FRST.exe deleted
     [OK] C:\Users\user\Downloads\FRST.txt deleted
     [OK] C:\Users\user\Downloads\FRST64.exe deleted
     [OK] C:\Users\user\Downloads\Shortcut.txt deleted
     [OK] C:\FRST deleted
 
  ## Malwarebytes (log)
     [OK] C:\Users\user\Desktop\Malwarebytes Scan Report 2024-04-06 161906.txt deleted
     [OK] C:\Users\user\Desktop\12.04.24\Malwarebytes Scan Report 2024-04-11 231848.txt deleted
     [OK] C:\Users\user\Desktop\07.04.2024\Malwarebytes Scan Report 2024-04-06 151918.txt deleted
     [OK] C:\Users\user\Downloads\Malwarebytes Scan Report 2024-04-06 161906.txt deleted
 
- Restore System Settings -
 
     [OK] Reset WinSock
     [OK] FLUSHDNS
     [OK] Hide Hidden file.
     [OK] Show Extensions for known file types
     [OK] Hide protected operating system files
 
- Restore UAC -
 
     [OK] Set EnableLUA with default (1) value
     [OK] Set ConsentPromptBehaviorAdmin with default (5) value
     [OK] Set ConsentPromptBehaviorUser with default (3) value
     [OK] Set EnableInstallerDetection with default (0) value
     [OK] Set EnableSecureUIAPaths with default (1) value
     [OK] Set EnableUIADesktopToggle with default (0) value
     [OK] Set EnableVirtualization with default (1) value
     [OK] Set FilterAdministratorToken with default (0) value
     [OK] Set PromptOnSecureDesktop with default (1) value
     [OK] Set ValidateAdminCodeSignatures with default (0) value
 
- Clear Restore Points -
 
   ~ [OK] RP named Scheduled Checkpoint created at 04/05/2024 11:51:16 deleted
   ~ [OK] RP named Scheduled Checkpoint created at 04/14/2024 10:43:00 deleted
   ~ [OK] RP named Windows Modules Installer created at 04/17/2024 07:53:49 deleted
   ~ [OK] RP named Windows Modules Installer created at 04/18/2024 07:48:20 deleted
   ~ [OK] RP named Windows Modules Installer created at 04/18/2024 07:52:31 deleted
     [OK] All system restore points have been successfully deleted
 
- Create Restore Point -
 
     [OK] System Restore Point created
 
- Display System Restore Point -
 
   ~ [I] RP named KpRm created at 04/23/2024 01:45:46
 
-- KPRM finished in 44.43s --

  • 0

Advertisements


#26
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,107 posts

Chrissy,

 

I'll be watching your topic here.

 

Since I'm going to close this topic, and now your computer is clean, here are some final tips about your computer's security from now on:

Some of the following, are from Klein's (2005) article, So how did I get infected in the first place. Since then, the article has been reproduced or linked to in dozens of locations. As a result, many malware experts have continued updating it, to include current operating systems and software program information. My source is Security Garden, and I marked for you the following:

1. Keep your Windows updated!
It is important always to keep current with the latest security fixes from Microsoft. This can patch many of the security holes through which attackers can infect your computer.

2. Update 3rd Party Software Programs
Third Party software programs have long been targets for malware creators. It has been stated that "Adobe’s Reader and Flash and all versions of Java are together responsible for a total of 66 percent of the vulnerabilities in Windows systems exploited by malware.'' It's important to keep everything updated.

3. Update the browsers you use
Many malware infections install themselves by exploiting security holes in the Internet browser that you use. So... Keep them updated.

4. Be careful about what you download and what you open!

  • Many "freeware" programs come with an enormous amount of bundled spyware that will slow down your system, spawn pop-up advertisements, or just plain crash your browser or even Windows itself. Watch for pre-checked options such as toolbars that are not essential to the operation of the installed software.
  • Peer-to-peer (P2P) programs like Kazaa, BearShare, Imesh, Warez P2P, and others, allow the creation of a network enabling people to connect with other users and upload or download material in a fast efficient manner. BUT even if the P2P software you are using is "clean", a large percentage of the files served on the P2P network are likely to be infected.
  • Cracked or pirated programs are not only illegal, but also can make your computer a malware target. Have this in mind.
  • Do not open any files without being certain of what they are!

5. Avoid questionable web sites!
Visit web sites that are trustworthy and reputable. Many disreputable sites will attempt to install malware on your system through "drive-by" exploits just by visiting the site in your browser. Lyrics sites, free software sites (especially ones that target young children), cracked software sites, and pornography sites are some of the worst offenders. Also, never give out personal information of any sort online or click "OK" to a pop-up unless it is signed by a reputable company and you know what it is.

6. Registry cleaners/driver boosters/system optimizers
I do not recommend registry cleaners, system optimizers, driver boosters and the like. It is your computer and certainly your choice. However, please consider that modifying registry keys incorrectly can cause Windows instability, or make Windows unbootable. With registry cleaner and system optimization software programs, the potential is ever present to cause more problems than they claim to fix. Do note, however, that Microsoft does not support the use of registry cleaners. See Microsoft support policy for the use of registry cleaning utilities.

7. PC means personal computer!
Don't give access to your computer to friends or family who appear to be clueless about what they are doing.

8. Back-up your work!
Make back-ups of your personal files frequently. You never know when you'll have to reformat and start from scratch. You can always reformat and reinstall programs, but you cannot replace your data if you haven't made backups.

9. Must-Have Software
An anti-virus and an anti-spyware program is a necessity for the security of your computer. Be sure that you keep them updated, and that real time protection is enabled. You have now Kaspersky. Together with Malwarebytes, if you run it occasionally, depending on how often you use your computer, can keep you safe.

Happy safe computing. ZZZQehw.gif


I'm glad I was able to help you.


  • 0






Similar Topics

10 user(s) are reading this topic

0 members, 10 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP