Solved

'Decompression Bomb' file found in anti-virus scan. What is it and what to do?

Posted on 2006-06-17
1
1,671 Views
Last Modified: 2013-12-04
Hello,
I just ran a scan using avast antivirus after deleting my restore points to rid my computer of malware that was in the restore points. The malware is gone but in the list of files that could not be scanned was something refered to as a decompression bomb. The file is in my documents and settings folder and says something about Opera and user profile in the file name. What is this and what should I do? Let me know if there is any helpful info I can provide.

Thanks, Liddy
0
Comment
Question by:Liddy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 32

Accepted Solution

by:
r-k earned 500 total points
ID: 16928352
As far as I know, a "decompression bomb" is just a file that maliciously expands to fill up your entire disk if you click on it. If you know the file name and location, just delete it and run another scan. If it is a file you consider useful, then do not delete it, sometimes such messages are false positives.

If you're unsure, post more details about the message from avast, and the exact name and location of the file.
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question