You'll need to elaborate a bit before we can help you/provide advice/instructions; how did you create the snapshot (e.g. which software, are you using a Virtual Machine, etc.)?
Once you've managed to use your snapshot if you are still experiencing suspicious/strange activity on your system then you can post your log in the Malware Removal Area and get an opinion from a certified malware removal expert (who can then write a script to clean your system if the logs imply towards an infection): Malware Removal Assistance