Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Reward Amazon Plaguing Me


  • Please log in to reply
10 replies to this topic

#1 creekbreed

creekbreed

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 14 July 2007 - 11:52 AM

Hello!
I am being plaqued by RewardAmazon.com popups, there were more popups, but I have ran Spybot, AdAware, cleaned my temp files, scanned with Bit Defender, ran Stinger, and have windows firewall activated. I would appreciate help with what else I need to do. Following is my HiJackThis log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:17:30 AM, on 7/14/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\DOCUME~1\USER\APPLIC~1\CROSOF~1\nslookup.exe
C:\WINDOWS\SYSTEM32\?ssembly\s?oolsv.exe
C:\AutoUp\Autoup.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Canon\DIAS\CnxDIAS.exe
C:\CCWIN\dbsrvr.exe
C:\Program Files\RealVNC\VNC4\WinVNC4.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Common Files\Softwin\BitDefender Communicator\xcommsvr.exe
C:\Program Files\Softwin\BitDefender10\bdagent.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\Common Files\Softwin\BitDefender Update Service\livesrv.exe
C:\Program Files\Common Files\Softwin\BitDefender Scan Server\bdss.exe
C:\Program Files\Softwin\BitDefender10\vsserv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {144F19F5-A11B-AEEE-1C16-8C8DB853829F} - C:\WINDOWS\system32\scthz.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: (no name) - {938A8A03-A938-4019-B764-03FF8D167D79} - C:\WINDOWS\system32\lspllfir.dll (file missing)
O2 - BHO: (no name) - {9C51407F-10FE-4D4D-93B0-6A19BB6F865C} - C:\WINDOWS\system32\awvvs.dll (file missing)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Salestart] "C:\Program Files\Common Files\WinAntiSpyware 2007\WAS7Mon.exe"
O4 - HKLM\..\Run: [riuiboiA] C:\WINDOWS\riuiboiA.exe
O4 - HKLM\..\Run: [g4356cbvy63] C:\WINDOWS\g4356cbvy63
O4 - HKLM\..\Run: [BDMCon] "C:\Program Files\Softwin\BitDefender10\bdmcon.exe" /reg
O4 - HKLM\..\Run: [BDAgent] "C:\Program Files\Softwin\BitDefender10\bdagent.exe"
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Aida] "C:\DOCUME~1\USER\APPLIC~1\CROSOF~1\nslookup.exe" -vt yazb
O4 - HKCU\..\Run: [Nbk] C:\WINDOWS\SYSTEM32\?ssembly\s?oolsv.exe
O4 - Startup: Autoup.lnk = C:\AutoUp\Autoup.exe
O4 - Startup: TA_Start.lnk = C:\WINDOWS\TISKY009.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {B020B534-4AA2-4B99-BD6D-5F6EE286DF5C} - http://a248.e.akamai.net/f/248/5462/2h/www...ol/SymDlBrg.cab
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/web_...aploader_v6.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{97C8D1F9-3003-4BDF-A36F-7860B6780F75}: NameServer = 192.168.1.1
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: BitDefender Scan Server (bdss) - Unknown owner - C:\Program Files\Common Files\Softwin\BitDefender Scan Server\bdss.exe
O23 - Service: Canon Driver Information Assist Service - CANON INC. - C:\Program Files\Canon\DIAS\CnxDIAS.exe
O23 - Service: DBISAM Database Server - DBSRVR (DBSRVR) - Elevate Software - C:\CCWIN\dbsrvr.exe
O23 - Service: BitDefender Desktop Update Service (LIVESRV) - SOFTWIN S.R.L. - C:\Program Files\Common Files\Softwin\BitDefender Update Service\livesrv.exe
O23 - Service: Net Agent - Unknown owner - C:\WINDOWS\dls0523pmw.exe (file missing)
O23 - Service: BitDefender Virus Shield (VSSERV) - SOFTWIN S.R.L. - C:\Program Files\Softwin\BitDefender10\vsserv.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - RealVNC Ltd. - C:\Program Files\RealVNC\VNC4\WinVNC4.exe
O23 - Service: BitDefender Communicator (XCOMM) - SOFTWIN S.R.L - C:\Program Files\Common Files\Softwin\BitDefender Communicator\xcommsvr.exe

--
End of file - 6199 bytes


Thanks in advance for any assistance you can offer.

BC AdBot (Login to Remove)

 


m

#2 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 14 July 2007 - 01:13 PM

Welcome to the BleepingComputer HijackThis Logs and Analysis forum creekbreed :thumbsup:
My name is Richie and i'll be helping you to fix your problems.

Copy and paste the following bold blue text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: fix.bat to your desktop.
Then double click on the fix.bat file on your desktopPosted Image
You'll see a black screen flash,thats normal.

@echo off
sc stop Net Agent
sc delete Net Agent

Restart your pc.

----------------------------------------

Please download VundoFix.exe to your desktop.
Double-click VundoFix.exe to run it.
When VundoFix re-opens,click the "Scan for Vundo" button.
Once it's done scanning,click the "Remove Vundo" button.
You will receive a prompt asking if you want to remove the files, click "YES".
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed,it will prompt that it will reboot your computer,click "OK".
Post the contents of C:\vundofix.txt into your next reply.

Note:
It is possible that VundoFix encountered a file it could not remove.
In this case,VundoFix will run on reboot,simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.

----------------------------------------

Please download Combofix and save to your desktop:
Note:
It is important that it is saved directly to your desktop

Close any open browsers.
Double click on combofix.exe and follow the prompts.
When it's finished it will produce a log.
Post the entire contents of C:\ComboFix.txt into your next reply.
Note:
Do not mouseclick combofix's window while it's running.
That may cause the program to freeze/hang.


Also post a new Hijackthis log.
Posted Image
Posted Image

#3 creekbreed

creekbreed
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 14 July 2007 - 03:21 PM

Hi Richie-
I did as you instructed and now I get 'page cannot be displayed' everytime I try to open a window. I am typing this from a different computer.......

#4 creekbreed

creekbreed
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 14 July 2007 - 03:33 PM

ahhh.I am able to open windows now...
did the fix.bat, restarted, ran VundoFix-


VundoFix V6.5.4

Checking Java version...

Scan started at 11:48:12 AM 7/13/2007

Listing files found while scanning....

C:\windows\system32\awtssqp.dll
C:\WINDOWS\system32\awvvs.dll
C:\WINDOWS\system32\giwgfadm.ini
C:\WINDOWS\system32\mdafgwig.dll
C:\WINDOWS\system32\svvwa.bak1
C:\WINDOWS\system32\svvwa.bak2
C:\WINDOWS\system32\svvwa.ini

Beginning removal...

Attempting to delete C:\windows\system32\awtssqp.dll
C:\windows\system32\awtssqp.dll Has been deleted!

Attempting to delete C:\WINDOWS\system32\awvvs.dll
C:\WINDOWS\system32\awvvs.dll Has been deleted!

Attempting to delete C:\WINDOWS\system32\giwgfadm.ini
C:\WINDOWS\system32\giwgfadm.ini Has been deleted!

Attempting to delete C:\WINDOWS\system32\svvwa.bak1
C:\WINDOWS\system32\svvwa.bak1 Has been deleted!

Attempting to delete C:\WINDOWS\system32\svvwa.bak2
C:\WINDOWS\system32\svvwa.bak2 Has been deleted!

Attempting to delete C:\WINDOWS\system32\svvwa.ini
C:\WINDOWS\system32\svvwa.ini Has been deleted!

Performing Repairs to the registry.
Done!

VundoFix V6.5.4

Checking Java version...

Scan started at 1:32:23 PM 7/13/2007

Listing files found while scanning....

No infected files were found.


VundoFix V6.5.4

Checking Java version...

Scan started at 1:34:28 PM 7/13/2007

Listing files found while scanning....

No infected files were found.


VundoFix V6.5.4

Checking Java version...

Scan started at 2:10:15 PM 7/14/2007

Listing files found while scanning....

No infected files were found.


Beginning removal...

VundoFix V6.5.4

Checking Java version...

Scan started at 2:15:27 PM 7/14/2007

Listing files found while scanning....

No infected files were found.


Beginning removal...



ran Comboofix-


"USER" - 2007-07-14 15:03:50 - ComboFix 07-07-14.6 - Service Pack 2 NTFS


((((((((((((((((((((((((( Files Created from 2007-06-14 to 2007-07-14 )))))))))))))))))))))))))))))))


2007-07-14 14:18 51,200 --a------ C:\WINDOWS\nircmd.exe
2007-07-14 13:46 <DIR> d-------- C:\WINDOWS\SYSTEM32\LogFiles
2007-07-14 11:17 <DIR> d-------- C:\Program Files\Trend Micro
2007-07-14 09:36 <DIR> d-------- C:\Program Files\Lavasoft
2007-07-14 09:36 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2007-07-14 09:36 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft
2007-07-14 09:03 81,984 --a------ C:\WINDOWS\SYSTEM32\bdod.bin
2007-07-14 08:59 <DIR> d-------- C:\DOCUME~1\USER\APPLIC~1\Bitdefender
2007-07-14 08:58 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\BitDefender
2007-07-13 11:59 164 --a------ C:\install.dat
2007-07-13 11:48 <DIR> d-------- C:\VundoFix Backups
2007-07-13 10:19 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
2007-07-12 21:11 <DIR> d-------- C:\WINDOWS\SYSTEM32\b02FdUe
2007-07-12 19:17 224,654 --a------ C:\WINDOWS\qmgym0578.exe
2007-07-12 19:04 <DIR> d-------- C:\DOCUME~1\USER\DoctorWeb
2007-07-12 13:09 1,016,352 -r-hs---- C:\WINDOWS\riuiboiA.exe
2007-07-12 13:09 <DIR> d-------- C:\WINDOWS\SYSTEM32\driver
2007-07-12 13:09 <DIR> d-------- C:\WINDOWS\SYSTEM32\b10FdUe
2007-07-12 13:09 <DIR> d-------- C:\Temp\brr
2007-07-12 13:09 <DIR> d-------- C:\Temp\0c2
2007-06-28 17:18 <DIR> d-------- C:\DOCUME~1\USER\APPLIC~1\Yahoo!
2007-06-28 17:16 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Yahoo!
2007-06-28 16:37 89,360 --a------ C:\WINDOWS\SYSTEM32\VB5DB.DLL
2007-06-28 16:37 56,320 --------- C:\WINDOWS\SYSTEM32\WANGCMN.DLL
2007-06-28 16:37 334,848 --------- C:\WINDOWS\SYSTEM32\OIDIS400.DLL
2007-06-28 16:37 17,920 --------- C:\WINDOWS\SYSTEM32\OIADM400.DLL
2007-06-28 16:37 137,728 --------- C:\WINDOWS\SYSTEM32\OIGFS400.DLL
2007-06-28 16:37 11,776 --------- C:\WINDOWS\SYSTEM32\AWDENC32.DLL
2007-06-28 16:37 104,960 --------- C:\WINDOWS\SYSTEM32\OIFIL400.DLL
2007-06-28 16:37 <DIR> d-------- C:\Program Files\Mag-Tek
2007-06-28 16:32 <DIR> d-------- C:\DOCUME~1\USER\WINDOWS
2007-06-28 16:32 <DIR> d-------- C:\AutoUp
2007-06-28 16:31 <DIR> d-------- C:\CCWIN
2007-06-26 18:56 <DIR> d-------- C:\Program Files\Common Files\ODBC
2007-06-26 17:39 <DIR> d-------- C:\Program Files\RealVNC
2007-06-23 13:08 <DIR> d-------- C:\DOCUME~1\USER\APPLIC~1\Help


(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

2007-07-14 14:57:31 -------- d-----w C:\DOCUME~1\USER\APPLIC~1\Lavasoft
2007-07-14 00:54:56 -------- d-----w C:\Program Files\microsoft frontpage
2007-07-13 15:52:18 -------- d-----w C:\Program Files\Common Files\InstallShield
2007-07-09 14:02:26 -------- d-----w C:\Program Files\Yahoo!
2007-06-28 22:37:39 -------- d--h--w C:\Program Files\InstallShield Installation Information
2007-06-26 23:45:18 -------- d-----w C:\Program Files\Symantec
2007-06-26 23:45:18 -------- d-----w C:\Program Files\Common Files\Symantec Shared
2007-06-26 23:45:17 -------- d-----w C:\DOCUME~1\USER\APPLIC~1\Symantec
2007-06-26 23:33:50 -------- d-----w C:\Program Files\Common Files\Motive
2007-06-04 21:18:48 9,344 ----a-w C:\WINDOWS\system32\drivers\NSDriver.sys
2007-06-04 21:17:02 8,320 ----a-w C:\WINDOWS\system32\drivers\AWRTRD.sys
2007-06-04 21:14:56 6,272 ----a-w C:\WINDOWS\system32\drivers\AWRTPD.sys
2007-05-16 15:12:02 683,520 ----a-w C:\WINDOWS\system32\inetcomm.dll
2007-04-25 14:21:15 144,896 ----a-w C:\WINDOWS\system32\schannel.dll
2007-04-18 16:12:23 2,854,400 ----a-w C:\WINDOWS\system32\msi.dll
2007-04-17 04:47:36 33,624 ----a-w C:\WINDOWS\system32\wups.dll
2007-04-17 04:45:54 1,710,936 ----a-w C:\WINDOWS\system32\wuaueng.dll
2007-04-17 04:45:48 549,720 ----a-w C:\WINDOWS\system32\wuapi.dll
2007-04-17 04:45:42 325,976 ----a-w C:\WINDOWS\system32\wucltui.dll
2007-04-17 04:45:36 203,096 ----a-w C:\WINDOWS\system32\wuweb.dll
2007-04-17 04:45:28 92,504 ----a-w C:\WINDOWS\system32\cdm.dll
2007-04-17 04:45:20 53,080 ----a-w C:\WINDOWS\system32\wuauclt.exe
2007-04-17 04:45:20 43,352 ----a-w C:\WINDOWS\system32\wups2.dll


((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))


*Note* empty entries & legit default entries are not shown

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}]
2006-10-22 23:08 62080 --a------ C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{144F19F5-A11B-AEEE-1C16-8C8DB853829F}]
C:\WINDOWS\system32\scthz.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{53707962-6F74-2D53-2644-206D7942484F}]
2005-05-31 01:04 853672 --a------ C:\PROGRA~1\SPYBOT~1\SDHelper.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{549B5CA7-4A86-11D7-A4DF-000874180BB3}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897}]
2006-10-31 14:33 198136 --a------ C:\Program Files\Yahoo!\Common\yiesrvc.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9C51407F-10FE-4D4D-93B0-6A19BB6F865C}]
C:\WINDOWS\system32\awvvs.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{FDD3B846-8D59-4ffb-8758-209B6AD74ACC}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2007-06-11 18:16]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 10:24]
"Nbk"="C:\WINDOWS\SYSTEM32\?ssembly\s?oolsv.exe" []

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"appinit_dlls"=sockspy.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\aawservice]

*Newly Created Service* - CATCHME

**************************************************************************

catchme 0.3.915 W2K/XP/Vista - rootkit detector by Gmer, http://www.gmer.net
Rootkit scan 2007-07-14 15:05:38
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Completion time: 2007-07-14 15:07:05
C:\ComboFix-quarantined-files.txt ... 2007-07-14 15:06
C:\ComboFix2.txt ... 2007-07-14 14:58

--- E O F ---




NEW hijack log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:28:40 PM, on 7/14/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Messenger\msmsgs.exe
C:\AutoUp\Autoup.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\Canon\DIAS\CnxDIAS.exe
C:\CCWIN\dbsrvr.exe
C:\Program Files\RealVNC\VNC4\WinVNC4.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {144F19F5-A11B-AEEE-1C16-8C8DB853829F} - C:\WINDOWS\system32\scthz.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: (no name) - {9C51407F-10FE-4D4D-93B0-6A19BB6F865C} - C:\WINDOWS\system32\awvvs.dll (file missing)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Nbk] C:\WINDOWS\SYSTEM32\?ssembly\s?oolsv.exe
O4 - Startup: Autoup.lnk = C:\AutoUp\Autoup.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {B020B534-4AA2-4B99-BD6D-5F6EE286DF5C} - http://a248.e.akamai.net/f/248/5462/2h/www...ol/SymDlBrg.cab
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/web_...aploader_v6.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{97C8D1F9-3003-4BDF-A36F-7860B6780F75}: NameServer = 192.168.1.1
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Canon Driver Information Assist Service - CANON INC. - C:\Program Files\Canon\DIAS\CnxDIAS.exe
O23 - Service: DBISAM Database Server - DBSRVR (DBSRVR) - Elevate Software - C:\CCWIN\dbsrvr.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - RealVNC Ltd. - C:\Program Files\RealVNC\VNC4\WinVNC4.exe

--
End of file - 3901 bytes


I had to uninstall Bit Defender in order to open windows again. I am ready to do whatever is next. Thanks!

#5 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 14 July 2007 - 03:36 PM

Hmm,strange,try this:
Click on Start/Run,type CMD then press Ok.
At the Command Prompt copy and paste the following command.then press Enter
NETSH WINSOCK RESET
Then type EXIT then press Enter
Restart your pc,let me know whats happening now.
Posted Image
Posted Image

#6 creekbreed

creekbreed
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 14 July 2007 - 03:52 PM

OK, did that-everything seems to be working fine now-no popups so far either.

#7 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 14 July 2007 - 03:53 PM

Please download the OTMoveIt by OldTimer:
http://download.bleepingcomputer.com/oldtimer/OTMoveIt.exe

Save it to your desktop.
Please double-click OTMoveIt.exe to run it.
Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

C:\WINDOWS\SYSTEM32\b02FdUe
C:\WINDOWS\qmgym0578.exe
C:\WINDOWS\riuiboiA.exe
C:\WINDOWS\SYSTEM32\b10FdUe
C:\Temp\brr
C:\Temp\0c2


Return to OTMoveIt, right click on the "Paste List of Files/Folders to be moved" window and choose Paste.
Click the red Moveit! button.
Close OTMoveIt

If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process.
If you are asked to reboot the machine choose Yes.

-------------------------------------------

Download\install 'SuperAntiSpyware Home Edition Free Version' from here:
http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE

Launch SuperAntiSpyware and click on 'Check for updates'.
Once the updates have been installed,exit SuperAntiSpyware.

Have Hijack This fix the following by placing a check in the appropriate boxes and selecting 'Fix checked'.
Make sure all browser and all Windows Explorer windows are closed before fixing:
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: (no name) - {144F19F5-A11B-AEEE-1C16-8C8DB853829F} - C:\WINDOWS\system32\scthz.dll (file missing)
O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
O2 - BHO: (no name) - {9C51407F-10FE-4D4D-93B0-6A19BB6F865C} - C:\WINDOWS\system32\awvvs.dll (file missing)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKCU\..\Run: [Nbk] C:\WINDOWS\SYSTEM32\?ssembly\s?oolsv.exe
O16 - DPF: {B020B534-4AA2-4B99-BD6D-5F6EE286DF5C} - http://a248.e.akamai.net/f/248/5462/2h/www...ol/SymDlBrg.cab

Exit Hijackthis.

Start SuperAntiSpyware.
On the main screen click on 'Scan your computer'.
Check: 'Perform Complete Scan'.
Click 'Next' to start the scan.

Superantispyware will now scan your computer,when it's finished it will list all/any infections found.
Make sure everything found has a checkmark next to it,then press 'Next'.
Click on 'Finish' when you've done.

It's possible that the program will ask you to reboot in order to delete some files.

Obtain the SuperAntiSpyware log as follows:
Click on 'Preferences'.
Click on the 'Statistics/Logs' tab.
Under 'Scanner Logs' double click on 'SuperAntiSpyware Scan Log'.
It will then open in your default text editor,such as Notepad.
Copy and paste the contents of that report into your next reply.
Also post a new Hijackthis log,let me know how your pc is running now.

Posted Image
Posted Image

#8 creekbreed

creekbreed
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 14 July 2007 - 04:45 PM

I'm back with the two logs-

SuperAntiSpyware Log;

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/14/2007 at 04:39 PM

Application Version : 3.9.1008

Core Rules Database Version : 3269
Trace Rules Database Version: 1280

Scan type : Complete Scan
Total Scan Time : 00:29:44

Memory items scanned : 302
Memory threats detected : 0
Registry items scanned : 5099
Registry threats detected : 1
File items scanned : 37264
File threats detected : 65

Adware.Tracking Cookie
C:\Documents and Settings\USER\Cookies\user@redorbit[1].txt
C:\Documents and Settings\USER\Cookies\user@publishers.clickbooth[2].txt
C:\Documents and Settings\USER\Cookies\user@indextools[2].txt
C:\Documents and Settings\USER\Cookies\user@adbrite[2].txt
C:\Documents and Settings\USER\Cookies\user@fastclick[1].txt
C:\Documents and Settings\USER\Cookies\user@hitstats[1].txt
C:\Documents and Settings\USER\Cookies\user@www.burstbeacon[1].txt
C:\Documents and Settings\USER\Cookies\user@exitexchange[1].txt
C:\Documents and Settings\USER\Cookies\user@trafficmp[1].txt
C:\Documents and Settings\USER\Cookies\user@www.burstnet[1].txt
C:\Documents and Settings\USER\Cookies\user@image.masterstats[1].txt
C:\Documents and Settings\USER\Cookies\user@2o7[2].txt
C:\Documents and Settings\USER\Cookies\user@clicksor[1].txt
C:\Documents and Settings\USER\Cookies\user@count.exitexchange[2].txt
C:\Documents and Settings\USER\Cookies\user@blockbuster.112.2o7[1].txt
C:\Documents and Settings\USER\Cookies\user@1069273153[1].txt
C:\Documents and Settings\USER\Cookies\user@ads.adbrite[1].txt
C:\Documents and Settings\USER\Cookies\user@count1.exitexchange[2].txt
C:\Documents and Settings\USER\Cookies\user@perf.overture[1].txt
C:\Documents and Settings\USER\Cookies\user@anat.tacoda[1].txt
C:\Documents and Settings\USER\Cookies\user@tribalfusion[2].txt
C:\Documents and Settings\USER\Cookies\user@adopt.specificclick[1].txt
C:\Documents and Settings\USER\Cookies\user@revsci[1].txt
C:\Documents and Settings\USER\Cookies\user@proadultlive[2].txt
C:\Documents and Settings\USER\Cookies\user@burstnet[2].txt
C:\Documents and Settings\USER\Cookies\user@questionmarket[2].txt
C:\Documents and Settings\USER\Cookies\user@67.15.239[2].txt
C:\Documents and Settings\USER\Cookies\user@www.epilot[1].txt
C:\Documents and Settings\USER\Cookies\user@atdmt[2].txt
C:\Documents and Settings\USER\Cookies\user@realmedia[2].txt
C:\Documents and Settings\USER\Cookies\user@67.15.239[1].txt
C:\Documents and Settings\USER\Cookies\user@www.advertyz[1].txt
C:\Documents and Settings\USER\Cookies\user@ads.realtechnetwork[2].txt
C:\Documents and Settings\USER\Cookies\user@tacoda[1].txt
C:\Documents and Settings\USER\Cookies\user@findwhat[1].txt
C:\Documents and Settings\USER\Cookies\user@anad.tacoda[2].txt
C:\Documents and Settings\USER\Cookies\user@ads.pointroll[1].txt
C:\Documents and Settings\USER\Cookies\user@traffic-tracker[1].txt
C:\Documents and Settings\USER\Cookies\user@adsrevenue[1].txt
C:\Documents and Settings\USER\Cookies\user@67.15.239[3].txt
C:\Documents and Settings\USER\Cookies\user@rotator.adjuggler[1].txt
C:\Documents and Settings\USER\Cookies\user@specificclick[2].txt
C:\Documents and Settings\USER\Cookies\user@localsrv[2].txt
C:\Documents and Settings\USER\Cookies\user@ad[1].txt
C:\Documents and Settings\USER\Cookies\user@www.popunderserver[1].txt
C:\Documents and Settings\USER\Cookies\user@adserver.easyad[2].txt
C:\Documents and Settings\USER\Cookies\user@cpvfeed[1].txt
C:\Documents and Settings\USER\Cookies\user@advertising[1].txt
C:\Documents and Settings\USER\Cookies\user@zedo[2].txt
C:\Documents and Settings\USER\Cookies\user@winantispyware[2].txt

Trojan.WinBo32/Enhance
HKU\S-1-5-21-1809052790-3055693892-3666283417-1007\Software\System\sysuid

Adware.ClickSpring/Outer Info Network
C:\Documents and Settings\USER\Start Menu\Programs\Outerinfo\Terms.lnk
C:\Documents and Settings\USER\Start Menu\Programs\Outerinfo\Uninstall.lnk
C:\Documents and Settings\USER\Start Menu\Programs\Outerinfo

Adware.ClickSpring-Variant
C:\QOOBOX\QUARANTINE\C\DOCUME~1\USER\APPLIC~1\CROSOF~1\NSLOOKUP.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1073\A0033837.EXE

Adware.ClickSpring/Yazzle
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\POOLSV\YAZZLEBUNDLE-1549.EXE.VIR

Adware.Mirar/NetNucleus
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\WINNB58.DLL.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1073\A0033843.DLL

Trojan.Unknown Origin
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\WNSINTI32.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1073\A0033836.EXE

Trojan.Downloader-Gen/HitItQuitIt
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1069\A0032442.DLL

Trojan.Downloader-Gen/Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1073\A0033788.EXE

Adware.ClickSpring/Resident
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1074\A0033925.DLL

Adware.ClickSpring
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP1074\A0033926.EXE

Trojan.Downloader-Gen/Blah
C:\VUNDOFIX BACKUPS\AWTSSQP.DLL.BAD




HiJack Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:44:21 PM, on 7/14/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\AutoUp\Autoup.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\Canon\DIAS\CnxDIAS.exe
C:\CCWIN\dbsrvr.exe
C:\Program Files\RealVNC\VNC4\WinVNC4.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Startup: Autoup.lnk = C:\AutoUp\Autoup.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office10\EXCEL.EXE/3000
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/web_...aploader_v6.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{97C8D1F9-3003-4BDF-A36F-7860B6780F75}: NameServer = 192.168.1.1
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Canon Driver Information Assist Service - CANON INC. - C:\Program Files\Canon\DIAS\CnxDIAS.exe
O23 - Service: DBISAM Database Server - DBSRVR (DBSRVR) - Elevate Software - C:\CCWIN\dbsrvr.exe
O23 - Service: VNC Server Version 4 (WinVNC4) - RealVNC Ltd. - C:\Program Files\RealVNC\VNC4\WinVNC4.exe

--
End of file - 3539 bytes


Looking better?

by the way, I forgot to add that everything seems to be running fine now...

#9 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 14 July 2007 - 04:58 PM

*NOTE*
Don't forget to reinstall BitDefender because of course you've now no virus protection installed at the moment.

------------------------------------------

Have Hijack This fix the following by placing a check in the appropriate boxes and selecting 'Fix checked'.
Make sure all browser and all Windows Explorer windows are closed before fixing:
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
------------------------------------------

Your log is clean :thumbsup:
If all's ok,please do the following:

Find and delete:
fix.bat
VundoFix.exe
Combofix.exe
OTMoveIt

C:\VUNDOFIX BACKUPS
C:\QOOBOX
C:\_OTMoveIt

Download ATF Cleaner by Atribune:
http://www.atribune.org/ccount/click.php?id=1

Double-click ATF-Cleaner.exe to run the program.
Click 'Select All' found at the bottom of the list.
Click the 'Empty Selected' button.

If you use Firefox browser, do this also:
Click Firefox at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

If you use Opera browser,do this also:
Click Opera at the top and choose 'Select All' from the list.
Click the 'Empty Selected' button.
NOTE:
If you would like to keep your saved passwords,please click 'No' at the prompt.

Click 'Exit' on the Main menu to close the program.

------------------------------------------

Click on Start/All Programs/Accessories/System Tools/System Restore.
In the 'System Restore' window,click on the 'Create a Restore Point' button,then click 'Next'.
In the window that appears,enter a description\name for the Restore Point,then click on 'Create',wait,then click 'Close'.
The date and time will be created automatically.

Next click on Start/All Programs/Accessories/System Tools/Disk Cleanup.
The 'Select Drive' box will appear,click on Ok.
The 'Disk Cleanup for [C:]' box will appear,click on the 'More Options' tab.
At the bottom in the 'System Restore' window,click on the 'Clean up...' button.
A box will pop up 'Are you sure you want to delete all but the most recent restore point?',click on 'Yes'.
Click on 'Yes' at 'Are you sure you want to perform these actions?'.
Now wait until 'Disk Cleanup' finishes and the box disappears.

Read through the information found here,to help you prevent any possible future infections.
'How to prevent Malware' by miekiemoes:
http://users.telenet.be/bluepatchy/miekiem...prevention.html

Edited by RichieUK, 14 July 2007 - 05:29 PM.

Posted Image
Posted Image

#10 creekbreed

creekbreed
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 14 July 2007 - 05:46 PM

hey Richie, I will be away till Monday morning now, but as soon as I get back, I will do as you have instructed and let you know how it goes. I didn't want you to be looking for a reply tonite. I really appreciate the help-thank you so much. I will post an update here on Monday morning. In the meantime, have a nice weekend!

#11 RichieUK

RichieUK

    Malware Assassin


  • Malware Response Team
  • 13,614 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 14 July 2007 - 05:51 PM

Ok creekbreed,thanks for the update,have a great weekend too :thumbsup:
Posted Image
Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users