Help Identify Very Suspicious Behavior

I have BitDefender Total Security 2010 installed on a Vista computer. Today I downloaded and installed Cheetah DVD burner from CNET because I wanted to try it out. Cheetah installed routinely, but when I clicked on it's desktop shortcut icon to run it for the first time, BitDefender opened and tried to reinstall itself. It then required a reboot and after rebooting. walked me through the initial setup procedure. Wot happened? Did BitDefender get hijacked? I did a deep scan and found no malware. Anyone else have a similar wierd experience like this with other applications? Any help is appreciated.

Comments

  • Alex Stanciu
    Alex Stanciu ✭✭
    edited October 2009

    Hello Abby,


    Can you tell us the download link for Cheetah DVD burner ? Also, have you tried to reinstall it to see if the same sittuation occurs ?


    Thank you .

  • Abby
    edited October 2009
    Hello Abby,


    Can you tell us the download link for Cheetah DVD burner ? Also, have you tried to reinstall it to see if the same sittuation occurs ?


    Thank you .


    Thanks for responding, Alex. The link is http://download.cnet.com/Cheetah-DVD-Burne...4-10238561.html


    Executing the newly installed Cheetah app immediately shut down BitDefender and started a reinstall as if I had executed BitDefender's install program. Then, while BitDefender was reinstalling, Cheetah popped up as it should. After rebooting and having to reconfigure BitDefender, everything seemed to work normally. Merely executing a new program shouldn't shut down BD. I scanned, tried to remove all the incidents of Cheetah in the registry and reinstalled a previous version of Cheetah I had in a zip file on my computer. Same thing happened which makes me think I am already infected. Any suggestions would be appreciated as it would take me many hours to reformat my computer. Thanks

  • Hello Abby,


    We would like you to go to the next link :http://kb.bitdefender.com/KB490 and run the Avis and the Gmer tools as described in the article . After you obtain these reports , you will need to upload them here then reply with the download links . My colleagues from the Virus Analysis team will analyze these files and we will contact you back with further instructions after the analysis is complete .


    Thank you .