ipchain wrote: » I would start by looking at this post: ISC Diary | Problem with Microsoft Antivirus regarding malware from google website If you are indeed infected with Malware, check this other post out: Found Exploit:JS/Blacole now computer virtually unusable - Page 2. When analyzing Malware I would normally look at how the computer is behaving, but I would do it in a controlled environment without access to the internet. I would then give the piece of malware what it desires and see how it behaves.For example, if it is attempting to contact wyz dot net I would modify my hosts file and point it to my own machine. I would then start apache and look at its behavior again...this is called 'behavioral analysis', but you can also try to reverse engineer the executable if you have it. Process Explorer and Process Monitor are very useful tools when analyzing Malware. Let us know how it goes...