grenneam

Members
  • Content count

    6
  • Joined

  • Last visited

About grenneam

  • Rank
    New Member

Contact Methods

  • ICQ
    0
  1. Wow! I've just been told by "Blizzard Tech Support" that a problem I had was "most probably" caused because my account had been compromised because of a Keylogger running on one my PCs. How would a "Legitimate Keylogger" find it's way into my PC. The only people with physical access to the PCs are myself and my wife (and she needs help using email and facebook). I think what they said is a bunch of Bullhockey and an effort to promote sales of their Authentication device. I am at this moment running a full scall of Malware bytes on both of the possible PC's in question. But I was really curious about the "Legitimate Keylogger" comment. Also my wife has her own PC and it's not one I use at all. Lastly, If MBAM doesn't report all keyloggers - can you reccommend a program that does? I just want to be safe that I'm not being monitored by any sleazeball because I do a lot of banking from my PC. Thanks and by the way MBAM has finished on the PC I use for Gaming and it came up clean.
  2. Ok. Thanks for the quick response.
  3. Hi guys; I run Mbam about twice a month and my PC has checked clean for some time now. However after the most recent update I got a HIT on a program file I've been using for at least a couple of years now. So I think it's a Falsey. Here is the Log from the Deep Scan that I ran using the /developer option. Hope it's everything you might need - If not send me an email and I'll try and supply whatever is needed. I'm also attaching a Zipped copy of the File for any analysis you might care to do. If the file is NOT a false positive please let me know. Thanks ! Grenneam ONE LAST THING!!! ------> THANKS FOR A WONDERFUL PROGRAM Malwarebytes' Anti-Malware 1.45 www.malwarebytes.org Database version: 3930 Windows 5.1.2600 Service Pack 3 Internet Explorer 7.0.5730.13 4/9/2010 2:43:02 PM mbam-log-2010-04-09 (14-43-02).txt Scan type: Full scan (C:\|) Objects scanned: 160041 Time elapsed: 46 minute(s), 44 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 1 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: C:\Documents and Settings\Jerry\desktop\Misc Stuff\Jump Drive Consolidation\Red Mark\SendMail.exe (Spyware.Passwords) -> No action taken. [bDB6D169F950D866401B66F22960EE4B] SendMail.zip
  4. I noticed another entry on this program - but didn't see a resolution so I thought I'd pop it in again. I'm pretty sure I got this file when I signed up for a WebEx presentation. My Boss has it on his PC too - and he does WebEx hookups as well. I looked on the net and it appears that the general consensus is that the file is not a threat but does exhibit threat opportunities. Attached is my Malwarebytes log and a Snapshot .JPG of the properties for the program. Hope everybody there has a Happy, Healthy, and Prosperous New Year!!! mbam_log_2009_01_02__13_58_14_.txt mbam_log_2009_01_02__13_58_14_.txt
  5. I've used crossloop in the past, for remote connection, and found it very useful in helping friends with non-viral computer difficulties. It's saved me a good deal of time and gas money ( especially when the prices were thru the roof ). As far as charges for the service - I've never used those..
  6. I just wanted to say THANK YOU to you guys. Over the past couple of weeks you've saved me an immense amount of work!! Your product is exceptional and I truly appreciate your efforts. I hope everyone there has a wonderful and Merry Christmas. Thanks again..