Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Not sure if Infected


  • Please log in to reply
7 replies to this topic

#1 Cheesezilla

Cheesezilla

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:04:54 PM

Posted 22 July 2011 - 11:56 PM

Hey guys,

Recently today my WoW account was hacked and its got me a little paranoid. I still can't figure out how they got a hold of my account information.

I use a program called Keepass to generate a random password for my WoW account which they either somehow got a hold of or phoned technical support and somehow answered my City of birth question in order to get a password reset.

Like i said, its got me a little paranoid and i don't know whether the hackers have some sort of software on my PC or whether it was just dumb luck they managed gain access to my account.

Regardless of how they gained access, i would like to make sure that my rig is clean but im not sure where to start.

I have noticed higher than normal levels of packets sent rather then recived lately and im wondering if there is some sort or keylogging thing on my PC and its sending information to them still.

Any help would be greatly appreachiated in determining if I am infected with something or not.

Thanks,

Cheesezilla :D

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:54 PM

Posted 23 July 2011 - 11:25 AM

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Cheesezilla

Cheesezilla
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:04:54 PM

Posted 23 July 2011 - 11:57 AM

Thanks for the reply :)

Results of screen317's Security Check version 0.99.7
Windows 7 (UAC is disabled!)
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 26
Out of date Java installed!
Mozilla Thunderbird (5.0.) Thunderbird Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Windows Defender MSMpEng.exe
Microsoft Security Essentials msseces.exe
Microsoft Security Client Antimalware MsMpEng.exe
Microsoft Security Client Antimalware NisSrv.exe
``````````End of Log````````````




Results of screen317's Security Check version 0.99.7
Windows 7 (UAC is disabled!)
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 26
Out of date Java installed!
Mozilla Thunderbird (5.0.) Thunderbird Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Windows Defender MSMpEng.exe
Microsoft Security Essentials msseces.exe
Microsoft Security Client Antimalware MsMpEng.exe
Microsoft Security Client Antimalware NisSrv.exe
``````````End of Log````````````



Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7195

Windows 6.1.7601 Service Pack 1
Internet Explorer 9.0.8112.16421

7/23/2011 12:44:48 PM
mbam-log-2011-07-23 (12-44-48).txt

Scan type: Quick scan
Objects scanned: 163688
Time elapsed: 1 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


GMER came back with nothing and the log file had nothing in it. Is it supposed to be like that?

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:54 PM

Posted 23 July 2011 - 12:01 PM

Yes, if it didn't find any changes.
I still need MiniToolbox log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 Cheesezilla

Cheesezilla
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:04:54 PM

Posted 23 July 2011 - 12:06 PM

Sorry, thought i added it to the text document i made.


MiniToolBox by Farbar
Ran by Dylan (administrator) on 23-07-2011 at 13:06:26
Windows 7 Ultimate Service Pack 1 (X64)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================



========================= IP Configuration: ================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled
set subinterface interface=?E subinterface=wireless_0 mtu=1492


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : Dylan-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Wireless LAN adapter Wireless Network Connection 2:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Virtual WiFi Miniport Adapter
Physical Address. . . . . . . . . : 00-0F-66-70-43-25
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Broadcom 802.11g Network Adapter
Physical Address. . . . . . . . . : 00-0F-66-70-43-25
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::f0da:7275:fca7:a247%10(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.119(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Friday, July 22, 2011 11:16:22 PM
Lease Expires . . . . . . . . . . : Sunday, July 24, 2011 12:56:37 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 184553318
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-15-50-CD-64-00-0F-66-70-43-25
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.{9E28348C-CC4F-43BA-9E75-3060B6683D71}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Teredo Tunneling Pseudo-Interface:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:c47:32f6:bdb1:957c(Preferred)
Link-local IPv6 Address . . . . . : fe80::c47:32f6:bdb1:957c%13(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled
Server: Downstairs
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.226.81
74.125.226.82
74.125.226.83
74.125.226.84
74.125.226.80


Pinging google.com [74.125.226.80] with 32 bytes of data:
Reply from 74.125.226.80: bytes=32 time=14ms TTL=58
Reply from 74.125.226.80: bytes=32 time=16ms TTL=58

Ping statistics for 74.125.226.80:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 14ms, Maximum = 16ms, Average = 15ms
Server: Downstairs
Address: 192.168.1.1

Name: yahoo.com
Addresses: 72.30.2.43
98.137.149.56
209.191.122.70
67.195.160.76
69.147.125.65


Pinging yahoo.com [69.147.125.65] with 32 bytes of data:
Reply from 69.147.125.65: bytes=32 time=36ms TTL=54
Reply from 69.147.125.65: bytes=32 time=46ms TTL=54

Ping statistics for 69.147.125.65:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 36ms, Maximum = 46ms, Average = 41ms

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
12...00 0f 66 70 43 25 ......Microsoft Virtual WiFi Miniport Adapter
10...00 0f 66 70 43 25 ......Broadcom 802.11g Network Adapter
1...........................Software Loopback Interface 1
14...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.119 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.119 281
192.168.1.119 255.255.255.255 On-link 192.168.1.119 281
192.168.1.255 255.255.255.255 On-link 192.168.1.119 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.119 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.119 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
13 58 ::/0 On-link
1 306 ::1/128 On-link
13 58 2001::/32 On-link
13 306 2001:0:4137:9e76:c47:32f6:bdb1:957c/128
On-link
10 281 fe80::/64 On-link
13 306 fe80::/64 On-link
13 306 fe80::c47:32f6:bdb1:957c/128
On-link
10 281 fe80::f0da:7275:fca7:a247/128
On-link
1 306 ff00::/8 On-link
13 306 ff00::/8 On-link
10 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/23/2011 00:52:42 PM) (Source: Application Error) (User: )
Description: Faulting application name: Explorer.EXE, version: 6.1.7601.17567, time stamp: 0x4d672ee4
Faulting module name: DUI70.dll, version: 6.1.7600.16385, time stamp: 0x4a5bdf25
Exception code: 0xc0000005
Fault offset: 0x0000000000013844
Faulting process id: 0x6d8
Faulting application start time: 0xExplorer.EXE0
Faulting application path: Explorer.EXE1
Faulting module path: Explorer.EXE2
Report Id: Explorer.EXE3

Error: (07/23/2011 00:02:48 AM) (Source: Customer Experience Improvement Program) (User: )
Description: 80004005

Error: (07/22/2011 08:25:11 AM) (Source: Customer Experience Improvement Program) (User: )
Description: 80004005

Error: (07/21/2011 10:17:06 AM) (Source: Customer Experience Improvement Program) (User: )
Description: 80004005

Error: (07/21/2011 09:37:17 AM) (Source: Customer Experience Improvement Program) (User: )
Description: 80004005

Error: (07/20/2011 04:18:52 PM) (Source: Chrome) (User: Dylan)Dylan
Description: Chrome has encountered a fatal error.
ver=12.0.742.122;is_machine=0;minidump=C:\Users\Dylan\AppData\Local\Google\CrashReports\a047418e-4008-403f-a60b-8b44ad04dfea.dmp

Error: (07/20/2011 03:45:26 PM) (Source: Customer Experience Improvement Program) (User: )
Description: 80004005

Error: (07/20/2011 02:58:23 PM) (Source: Customer Experience Improvement Program) (User: )
Description: 80004005

Error: (07/20/2011 02:14:46 PM) (Source: html) (User: Dylan)Dylan
Description: html has encountered a fatal error.
ver=chrome-extension://gighmmpiobklfepjocnamgkkbiglidom/background.;is_machine=0;minidump=C:\Users\Dylan\AppData\Local\Google\CrashReports\5e78884e-b2e1-4047-9f76-7f4f253051ad.dmp

Error: (07/20/2011 01:12:07 PM) (Source: Application Error) (User: )
Description: Faulting application name: svchost.exe_SysMain, version: 6.1.7600.16385, time stamp: 0x4a5bc3c1
Faulting module name: sysmain.dll, version: 6.1.7601.17514, time stamp: 0x4ce7c9db
Exception code: 0xc0000005
Fault offset: 0x0000000000017ef1
Faulting process id: 0xe2c
Faulting application start time: 0xsvchost.exe_SysMain0
Faulting application path: svchost.exe_SysMain1
Faulting module path: svchost.exe_SysMain2
Report Id: svchost.exe_SysMain3


System errors:
=============
Error: (07/22/2011 11:17:22 PM) (Source: DCOM) (User: SYSTEM)
Description: application-specificLocalLaunch{C97FCC79-E628-407D-AE68-A06AD6D8B4D1}{344ED43D-D086-4961-86A6-1106F4ACAD9B}NT AUTHORITYSYSTEMS-1-5-18LocalHost (Using LRPC)

Error: (07/22/2011 11:11:31 PM) (Source: Microsoft Antimalware) (User: )
Description: %NT AUTHORITY60 has encountered an error trying to update signatures.

New Signature Version:

Previous Signature Version: 1.109.66.0

Update Source: %NT AUTHORITY59

Update Stage: 3.0.8107.00

Source Path: 3.0.8107.01

Signature Type: %NT AUTHORITY602

Update Type: %NT AUTHORITY604

User: NT AUTHORITY\SYSTEM

Current Engine Version: %NT AUTHORITY605

Previous Engine Version: %NT AUTHORITY606

Error code: %NT AUTHORITY607

Error description: %NT AUTHORITY608

Error: (07/22/2011 11:11:31 PM) (Source: DCOM) (User: )
Description: 1084wuauserv{E60687F7-01A1-40AA-86AC-DB1CBF673334}

Error: (07/22/2011 11:02:26 PM) (Source: Service Control Manager) (User: )
Description: The PnP-X IP Bus Enumerator service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1068

Error: (07/22/2011 11:00:37 PM) (Source: Service Control Manager) (User: )
Description: The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error:
%%1068

Error: (07/22/2011 11:00:37 PM) (Source: Service Control Manager) (User: )
Description: The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error:
%%1068

Error: (07/22/2011 11:00:37 PM) (Source: Service Control Manager) (User: )
Description: The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error:
%%1068

Error: (07/22/2011 11:00:37 PM) (Source: Service Control Manager) (User: )
Description: The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error:
%%1068

Error: (07/22/2011 11:00:37 PM) (Source: Service Control Manager) (User: )
Description: The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error:
%%1068

Error: (07/22/2011 11:00:37 PM) (Source: Service Control Manager) (User: )
Description: The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error:
%%1068


Microsoft Office Sessions:
=========================
Error: (07/23/2011 00:52:42 PM) (Source: Application Error)(User: )
Description: Explorer.EXE6.1.7601.175674d672ee4DUI70.dll6.1.7600.163854a5bdf25c000000500000000000138446d801cc48e6e50c2de4C:\Windows\Explorer.EXEC:\Windows\system32\DUI70.dll2e3a6ebf-b54c-11e0-adee-dae53e4dea88

Error: (07/23/2011 00:02:48 AM) (Source: Customer Experience Improvement Program)(User: )
Description: 80004005

Error: (07/22/2011 08:25:11 AM) (Source: Customer Experience Improvement Program)(User: )
Description: 80004005

Error: (07/21/2011 10:17:06 AM) (Source: Customer Experience Improvement Program)(User: )
Description: 80004005

Error: (07/21/2011 09:37:17 AM) (Source: Customer Experience Improvement Program)(User: )
Description: 80004005

Error: (07/20/2011 04:18:52 PM) (Source: Chrome)(User: Dylan)Dylan
Description: Chrome has encountered a fatal error.
ver=12.0.742.122;is_machine=0;minidump=C:\Users\Dylan\AppData\Local\Google\CrashReports\a047418e-4008-403f-a60b-8b44ad04dfea.dmp

Error: (07/20/2011 03:45:26 PM) (Source: Customer Experience Improvement Program)(User: )
Description: 80004005

Error: (07/20/2011 02:58:23 PM) (Source: Customer Experience Improvement Program)(User: )
Description: 80004005

Error: (07/20/2011 02:14:46 PM) (Source: html)(User: Dylan)Dylan
Description: html has encountered a fatal error.
ver=chrome-extension://gighmmpiobklfepjocnamgkkbiglidom/background.;is_machine=0;minidump=C:\Users\Dylan\AppData\Local\Google\CrashReports\5e78884e-b2e1-4047-9f76-7f4f253051ad.dmp

Error: (07/20/2011 01:12:07 PM) (Source: Application Error)(User: )
Description: svchost.exe_SysMain6.1.7600.163854a5bc3c1sysmain.dll6.1.7601.175144ce7c9dbc00000050000000000017ef1e2c01cc46f381c40008C:\Windows\system32\svchost.exec:\windows\system32\sysmain.dll6508dd83-b2f3-11e0-a670-813656d61c8e


========================= Memory info: ===================================

Percentage of memory in use: 26%
Total physical RAM: 8174.76 MB
Available physical RAM: 6007.79 MB
Total Pagefile: 16347.71 MB
Available Pagefile: 13697.9 MB
Total Virtual: 4095.88 MB
Available Virtual: 3954.9 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:100.01 GB) (Free:55.85 GB) NTFS
3 Drive f: (Backup) (Fixed) (Total:149.05 GB) (Free:135.14 GB) NTFS
4 Drive g: () (Fixed) (Total:1092.11 GB) (Free:951.4 GB) NTFS

========================= Users: ========================================

User accounts for \\DYLAN-PC

Administrator Dylan Guest


== End of log ==

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:54 PM

Posted 23 July 2011 - 12:11 PM

All looks clean to me.

Basically speaking, any online account can be hacked from the outside not necessarily involving your computer.

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 Cheesezilla

Cheesezilla
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:04:54 PM

Posted 23 July 2011 - 03:12 PM

Hey Broni,

I ran the Temp File cleaner as well as the ESET Online scanner.

ESET didn't turn up anything.

Thanks for your help. Much appreciated :)

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:54 PM

Posted 23 July 2011 - 04:13 PM

You should be good to go :)

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users