Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win 8.1 Internet explorer Hijack Search Protector PlurPush


  • Please log in to reply
9 replies to this topic

#1 mlisowski

mlisowski

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:05 AM

Posted 26 March 2014 - 07:40 AM

Hello,
 
I Have a HP Envy running win 8.1.  Security software Mcaffe livesafe. I am not 100% sure how these got on my machine.  I think they may have been hidden in the VLC meadia player download. 
 
How do I remove.
 
Step so far:
1) I unistalled both of these from the add remove programs
2) I went to manage add-ons > toolbars and extension removed PlurPush 
3) manage add-ons > search providers removed SearchProtector
5) replaced the home page
4) Ran Anti-virus
 
However, It still directs me to the conduit homepage.

Edit: Moved topic from Windows 8 to the more appropriate forum.~ Animal

BC AdBot (Login to Remove)

 


#2 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,714 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:05 PM

Posted 26 March 2014 - 12:35 PM

I'm under the impression you are using Internet Explorer.

 

In the upper right corner of the IE home page click on Tools.

 

Click on Manage add-ons, then click on Search providers and remove Conduit.

 

Please run the following.

 

Please download AdwCleaner and run it.
 
An image like the one below will open, click on Scan.
 
adwcleaner11_zps48314883.png
 
Once the search is complete a list of the pending items will be displayed.  If you see any which you do not want removed, remove the check mark next to it.  
 
Click on Clean to remove the selected items.  
 
You will receive a message telling you that all programs will be close so that the infections can be removed.  Click on Ok.
 
When cleaning process is complete a log of what was removed will be presented.  Please copy and the paste this log in your next post.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#3 mlisowski

mlisowski
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:05 AM

Posted 26 March 2014 - 08:15 PM

Hello before I let AdwCleaner run the clean could you review the entries and let me know what they are

like appID I think has something to do with ITunes but I'm not sure about the others

 

# AdwCleaner v3.022 - Report created 26/03/2014 at 21:10:28
# Updated 13/03/2014 by Xplode
# Operating System : Windows 8.1  (64 bits)
# Username : Mike - HOME_PC
# Running from : C:\Users\Mike\Documents\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****

***** [ Files / Folders ] *****

File Found : C:\END
File Found : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Search.lnk
Folder Found C:\Program Files (x86)\File Type Helper

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Found : HKCU\Software\SearchProtectINT
Key Found : [x64] HKCU\Software\SearchProtectINT
Key Found : HKLM\SOFTWARE\Classes\AppID\{0A18A436-2A7A-49F3-A488-30538A2F6323}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
Key Found : HKLM\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.16518

*************************

AdwCleaner[R0].txt - [1193 octets] - [26/03/2014 20:09:40]
AdwCleaner[R1].txt - [1105 octets] - [26/03/2014 21:10:28]



#4 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,714 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:05 PM

Posted 27 March 2014 - 11:35 AM

Clean all of those, they are not part of Windows.

 

Please download Malwarebytes Anti-Malware.
 
1)  Double-click on mbam-setup.exe, then click on Run to install the application, follow the prompts through the installation.
 
2)  When the installation has finished, make sure you leave both of these checked:
 
    Update Malwarebytes' Anti-Malware
 
    Launch Malwarebytes' Anti-Malware
 
Then click on Finish.
 
3)  MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. 
 
4)  Click on perform Quick Scan, then click on the Scan button.
 
If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
 
5)  The scan will now begin, this may take some time to complete so please be patient.
 
6)  When the scan is finished click on Show Results to display all objects found.
 
7)  Click OK to close the message box and continue with the removal process.
 
8)  Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
 
Make sure that every item shown in the results has a check mark in the box next to it, then click on Remove Selected.
 
9)  When removal is completed, a log will open in Notepad.
 
This log is automatically saved and can be viewed by clicking the Logs tab in MBAM.Copy and paste the contents of the log in your next post, then exit MBAM.
 
Important:  If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Reagardless if prompted to restart the computer or not, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
 
Please copy the Malwarebytes log and paste it in your next post.
 
To locate this file right click on the Start orb and choose Open Windows Explorer, then click on C: drive.
 
When the C: drive opens click on the following:  ProgramData, Malwarebytes, Malwarebytes' Anti-Malware, Logs.  
 
If there is more than one log, choose the log with the date that you ran scan that I requested.
 
 
If there are a large number of items found you can go into Settings and click on Scanner Settings to change the setting in Action for potentially unwanted programs (PUP) to Show in results list and check for removal.
 
Malwarebytessettings_zpsb9b50638.png

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#5 mlisowski

mlisowski
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:05 AM

Posted 03 April 2014 - 06:54 PM

Hello I ran AdwCleaner.  As per instructions next I downloaded the Malwarebytes and ran the scan as instructed.  I did not see a remove it had a quarantine folder.  In addition, it had two logs a daily protection log and a scan log both are posted below

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Error, 4/3/2014 7:24:53 PM, SYSTEM, HOME_PC, Protection, IsLicensed, 13,
Protection, 4/3/2014 7:24:53 PM, SYSTEM, HOME_PC, Protection, Malware Protection, Stopping,
Protection, 4/3/2014 7:24:53 PM, SYSTEM, HOME_PC, Protection, Malware Protection, Stopped,
Protection, 4/3/2014 7:24:57 PM, SYSTEM, HOME_PC, Protection, Malware Protection, Starting,
Protection, 4/3/2014 7:24:57 PM, SYSTEM, HOME_PC, Protection, Malware Protection, Started,
Protection, 4/3/2014 7:24:57 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Starting,
Protection, 4/3/2014 7:24:57 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Started,
Update, 4/3/2014 7:25:38 PM, SYSTEM, HOME_PC, Manual, Rootkit Database, 2014.2.20.1, 2014.3.27.1,
Update, 4/3/2014 7:26:05 PM, SYSTEM, HOME_PC, Manual, Malware Database, 2014.3.4.9, 2014.4.3.10,
Protection, 4/3/2014 7:26:06 PM, SYSTEM, HOME_PC, Protection, Refresh, Starting,
Protection, 4/3/2014 7:26:06 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Stopping,
Protection, 4/3/2014 7:26:07 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Stopped,
Protection, 4/3/2014 7:26:09 PM, SYSTEM, HOME_PC, Protection, Refresh, Success,
Protection, 4/3/2014 7:26:09 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Starting,
Protection, 4/3/2014 7:26:09 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Started,
Detection, 4/3/2014 7:36:36 PM, SYSTEM, HOME_PC, Protection, Malware Protection, File, PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFree_x64.dll, Quarantine, [c72fb1741c5feb4b7ee2f96adc258977]
Protection, 4/3/2014 7:41:16 PM, SYSTEM, HOME_PC, Protection, Malware Protection, Starting,
Protection, 4/3/2014 7:41:16 PM, SYSTEM, HOME_PC, Protection, Malware Protection, Started,
Protection, 4/3/2014 7:41:16 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Starting,
Protection, 4/3/2014 7:41:27 PM, SYSTEM, HOME_PC, Protection, Malicious Website Protection, Started,

(end)

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 4/3/2014
Scan Time: 7:39:09 PM
Logfile: scan_log.txt
Administrator: Yes

Version: 2.00.0.1000
Malware Database: v2014.04.03.10
Rootkit Database: v2014.03.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Disabled

OS: Windows 8.1
CPU: x64
File System: NTFS
User: Mike

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 337978
Time Elapsed: 12 min, 53 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled

Processes: 1
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFreeUpdt.exe, 2176, Delete-on-Reboot, [e115c65f86f5b482d988dfcb54afa759]

Modules: 2
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFree.dll, Delete-on-Reboot, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFree.dll, Delete-on-Reboot, [579fad78d5a640f65f014d16679aa957],

Registry Keys: 24
PUP.Optional.FreeFileConverter.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ConvertFilesforFreeUpdt, Quarantined, [e115c65f86f5b482d988dfcb54afa759],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{59A062A1-5ECA-4a1a-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{22B58425-A384-436c-A334-BB9255664D10}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{951F4658-6461-46AD-AB13-F73E7FCBE6DB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{951F4658-6461-46AD-AB13-F73E7FCBE6DB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{22B58425-A384-436c-A334-BB9255664D10}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\CLASSES\ConvertFilesforFree.1, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\CLASSES\ConvertFilesforFree, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\ConvertFilesforFree, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\ConvertFilesforFree.1, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\CLASSES\CLSID\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\CLASSES\CLSID\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}\INPROCSERVER32, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKU\S-1-5-21-4249996332-1622787085-128542896-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKU\S-1-5-21-4249996332-1622787085-128542896-1005-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKU\S-1-5-21-4249996332-1622787085-128542896-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKU\S-1-5-21-4249996332-1622787085-128542896-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKU\S-1-5-21-4249996332-1622787085-128542896-1005-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, HKU\S-1-5-21-4249996332-1622787085-128542896-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB}, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\TYPELIB\{03771AEF-400D-4A13-B712-25878EC4A3F5}, Quarantined, [14e2e3420873013546fc579ced16ab55],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{03771AEF-400D-4A13-B712-25878EC4A3F5}, Quarantined, [14e2e3420873013546fc579ced16ab55],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\Convert Files for Free, Quarantined, [896d25002f4cba7c111b19466d95936d],
PUP.Optional.FreeFileConverter.A, HKLM\SOFTWARE\WOW6432NODE\ZUPDATER\ConvertFilesforFreeUpdt.exe, Quarantined, [71854bda740765d183abfb64ae548e72],

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 1
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free, Delete-on-Reboot, [896d25002f4cba7c111b19466d95936d],

Files: 12
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFreeUpdt.exe, Delete-on-Reboot, [e115c65f86f5b482d988dfcb54afa759],
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFree.dll, Delete-on-Reboot, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\ConvertFilesforFree_x64.dll, Quarantined, [579fad78d5a640f65f014d16679aa957],
PUP.Optional.OutBrowse, C:\Users\Mike\AppData\Local\Temp\InSetup1394989924.exe, Quarantined, [14e2e3420873013546fc579ced16ab55],
PUP.Optional.Conduit.A, C:\Users\Mike\AppData\Local\Temp\SearchProtectINT.exe, Quarantined, [698d43e2b0cb95a105eef71df9084db3],
PUP.Optional.SearchProtect.A, C:\Users\Mike\AppData\Local\Temp\nsm83D2.exe, Quarantined, [3cbad1545c1ff83ee6e180a1778a56aa],
PUP.Optional.SearchProtect.A, C:\Users\Mike\AppData\Local\Temp\nstB1DB.exe, Quarantined, [bb3b1114f784e650bc0bdf425fa230d0],
PUP.Optional.SearchProtect.A, C:\Users\Mike\AppData\Local\Temp\nswD41A.exe, Quarantined, [787e46df9be00a2c1fa834ed2dd4649c],
PUP.Optional.Conduit.A, C:\Users\Mike\AppData\Local\Temp\nsl8452\SpSetup.exe, Quarantined, [f105cf5688f3b581b205ea2c0100a060],
PUP.Optional.Outbrowse, C:\Users\Mike\Downloads\Installer.exe, Quarantined, [688e39ecdaa1d85e5ae86d3c53b0ac54],
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\install.ico, Quarantined, [896d25002f4cba7c111b19466d95936d],
PUP.Optional.FreeFileConverter.A, C:\Program Files (x86)\Convert Files for Free\uninstall.exe, Quarantined, [896d25002f4cba7c111b19466d95936d],

Physical Sectors: 0
(No malicious items detected)

(end)



#6 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,714 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:05 PM

Posted 05 April 2014 - 09:19 AM

My apologies for not getting back sooner, adventures beyond my control have taken a good portion of my time away.

 

Please download Hitman Pro
 
Click on HitmanPro.exe (for 32-bit versions of Windows) or HitmanPro_x64.exe (for 64-bit versions of Windows).  Toward the bottom of the window you will be asked to agree with the terms of the use of Hitman Pro, click on I agree, then click on Next to install Hitman Pro.
 
HM1_zpsde93e28a.png 
 
You will be asked "Would you like to store a copy of Hitman Pro program file on this computer"?  Click on No, then click on Next.  
 
hm2_zps372cdca5.png
 
Hitman Pro will now start to scan your computer.  Click on Next when the scan is finished. 
 
hm3_zps9689b301.png
 
When it is finished you will see a list of the malware found.  At the bottom of the page you will see Save Log, then click on Next to remove the malware.  If you have a window opens which states "No threats found" click on Close.
 
hm4_zpsaf0c967c.png
 
If the window below opens click on Activate free license, this will allow access the the Next button needed to close the program. 
 
hmlast_zpsa9c68c49.png
 
 
To open the log right click on Computer (for Windows 8 type Computer in the Search box, then click on Computer under Apps), click on C: drive, click on Windows, scroll down to Logs and click on that, click on the CBS log with the date you ran the scan.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#7 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,714 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:05 PM

Posted 05 April 2014 - 09:22 AM

What browser/s are you using?


Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#8 mlisowski

mlisowski
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:05 AM

Posted 06 April 2014 - 02:22 PM

To answer your last question first I am using Internet explorer version 11

 

 

Second below is the scan log for HitmanPro

HitmanPro 3.7.9.216
www.hitmanpro.com
   Computer name . . . . : HOME_PC
   Windows . . . . . . . : 6.3.0.9600.X64/8
   User name . . . . . . : Home_PC\Mike
   UAC . . . . . . . . . : Enabled
   License . . . . . . . : Free
   Scan date . . . . . . : 2014-04-06 15:13:22
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 2m 52s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No
   Threats . . . . . . . : 0
   Traces  . . . . . . . : 1
   Objects scanned . . . : 2,087,394
   Files scanned . . . . : 51,928
   Remnants scanned  . . : 425,992 files / 1,609,474 keys
Cookies _____________________________________________________________________
   C:\Users\Mike\AppData\Local\Microsoft\Windows\INetCookies\XG5YX0MG.txt


#9 mlisowski

mlisowski
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:05 AM

Posted 11 April 2014 - 07:23 AM

Hello Arachibutyrophobia,

 

The computer is acting fine I just wanted to confirm if any further action is required see last post for log from HitmanPro.



#10 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,714 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:05 PM

Posted 11 April 2014 - 10:03 AM

Let's leave is be and monitor its performance for a while.

 

Happy Computing. :thumbup2:

 

dc3


Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users