Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Viruses - the many that are out there

Posted on 2003-11-13
5
Medium Priority
?
2,589 Views
Last Modified: 2010-04-11

Do you know or have you ever heard of a virus that would put a file EUSEXE in the task manager?  

Tell me if that is a legitimate program and I'm just paranoid and that will be fine too.


Thanks.
0
Comment
Question by:sherilewis
  • 4
5 Comments
 
LVL 44

Accepted Solution

by:
CrazyOne earned 1000 total points
ID: 9741086
Online Scanners

 Norton Web Services  
Go to this page and click on Scan for Viruses
http://security.symantec.com/ssc/vc_about.asp?j=1&langid=us&venid=sym&plfid=22&pkj=REODSKVYRMHCGVRVRMN

It needs to download a few file so as to activate the scan so you may see a message like this.

"The Scan for Viruses uses an ActiveX program to scan your computer. The download is approximately 1.5MB and can take about 10 minutes over a 28.8 modem.

The scan can take more than 20 minutes depending on the speed of your computer and the number of files that you have. Please do not browse away from this page unless you intend to abort the scan.
 
Downloading Scan for Viruses controls. Please wait...
 
During the download, you might see one or more messages asking if it is OK to download and run these programs. Click Yes when these messages appear.
 
Note: Scan for Viruses does not scan compressed files"
======================
 Trend Micro HouseCall        
www.housecall.antivirus.com
"Trend Micro's free online virus scanner
In order to better serve our customers, we ask HouseCall users to register before scanning their computer.  By registering, you will receive virus alerts from our team of Virus Doctors. You will be able to unsubscribe when you receive your first email. You can also scan without registering"
http://housecall.antivirus.com/housecall/start_corp.asp
======================

PC Pitstop Virus Scan
Our free Web-based virus scan uses Panda Software's award-winning technology and virus list. We're checking against the "wildlist," the roughly 200 viruses that are most prevalent in the world in a given month
http://www.pcpitstop.com/antivirus/default.asp
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 9741107
From that link

from asyscokid  Date: 10/01/2003 07:26AM MDT  
I can't find anything on woohoo, and nothing useful on dwlog.  For the rest:

DkService.exe- From Executive Software's Diskeeper defragmenting utility - a replacement for Windows Disk Defragmenter. Used to schedule defragmenting on a regular basis and not required if you do so manually on a regular basis

SBMX- sbmx.exe SoundMAX MPU401 MIDI device emulator for x86 VM DOS games/apps (for Win9x only)

Promon.exe- promon.exe System Tray icon for Intel PRO series ethernet adapters giving access to the diagnostic features

ICH Synth-  eusexe.exe Sound related and can be disabled without affecting performance although advanced sound features may be sacrificed. May be related to Compaq PC's with "SoundMAX integrated Digital Audio" (Analog Devices Inc.) devices

Useful link:

http://www.pacs-portal.co.uk/startup_pages/startup_full.htm 
0
 

Author Comment

by:sherilewis
ID: 9741319
thank you so much!!  We have been overrun with viruses on the laptops that our people have out in the field.  The damage is done before it comes back to the office to get new updates.


0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 9741340
You are welcome :)
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

876 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question