Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need Help Removing W32trojan.aypp


  • Please log in to reply
10 replies to this topic

#1 VeryAnnoyed

VeryAnnoyed

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:24 PM

Posted 06 August 2007 - 12:07 PM

My computer seems to be infected with a virus that i cant remove even after numerous virus scans and spyware scans they keep popping up. I have never caught virus before so I am unaware on how to remove them. All i know is the name of the viruses which are as follows:

w32/trojan.AYPP
w32/trajan.APDD
w32/downldr2.ALUX
w32/downldr.AHOQ

PLEASE HELP I DONT KNOW WHERE TO START.

BC AdBot (Login to Remove)

 


#2 oldf@rt

oldf@rt

  • Members
  • 2,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Avondale, Arizona USA
  • Local time:08:24 PM

Posted 06 August 2007 - 12:29 PM

Please download VundoFix.exe to your desktop
  • Double-click VundoFix.exe to run it.
  • Click the Scan for Vundo button.
  • Once it's done scanning, click the Remove Vundo button.
  • You will receive a prompt asking if you want to remove the files, click YES
  • Once you click yes, your desktop will go blank as it starts removing Vundo.
  • When completed, it will prompt that it will reboot your computer, click OK.
  • Please post the contents of C:\vundofix.txt
Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears upon rebooting.

Edited by oldf@rt, 06 August 2007 - 12:35 PM.

The name says it all -- 59 and holding permanently

**WARNING** Links I provide might cause brain damage

#3 VeryAnnoyed

VeryAnnoyed
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:24 PM

Posted 06 August 2007 - 02:14 PM

thank you. This is what was on file vundofix.txt:


VundoFix V6.5.6

Checking Java version...

Java version is 1.4.2.3
Old versions of java are exploitable and should be removed.

Scan started at 2:55:23 PM 8/6/2007

Listing files found while scanning....

C:\windows\system32\hggdayx.dll
C:\WINDOWS\system32\mnnmp.bak1
C:\WINDOWS\system32\mnnmp.bak2
C:\WINDOWS\system32\mnnmp.ini
C:\WINDOWS\system32\mnnmp.ini2
C:\WINDOWS\system32\mnnmp.tmp
C:\WINDOWS\system32\pmnnm.dll

Beginning removal...

Attempting to delete C:\windows\system32\hggdayx.dll
C:\windows\system32\hggdayx.dll Could not be deleted.

Attempting to delete C:\WINDOWS\system32\mnnmp.bak1
C:\WINDOWS\system32\mnnmp.bak1 Has been deleted!

Attempting to delete C:\WINDOWS\system32\mnnmp.bak2
C:\WINDOWS\system32\mnnmp.bak2 Has been deleted!

Attempting to delete C:\WINDOWS\system32\mnnmp.ini
C:\WINDOWS\system32\mnnmp.ini Has been deleted!

Attempting to delete C:\WINDOWS\system32\mnnmp.ini2
C:\WINDOWS\system32\mnnmp.ini2 Has been deleted!

Attempting to delete C:\WINDOWS\system32\mnnmp.tmp
C:\WINDOWS\system32\mnnmp.tmp Has been deleted!

Attempting to delete C:\WINDOWS\system32\pmnnm.dll
C:\WINDOWS\system32\pmnnm.dll Has been deleted!

Performing Repairs to the registry.
Done!

VundoFix V6.5.6

Checking Java version...

Java version is 1.4.2.3
Old versions of java are exploitable and should be removed.

Scan started at 3:04:03 PM 8/6/2007

Listing files found while scanning....

C:\windows\system32\hggdayx.dll

Beginning removal...

Attempting to delete C:\windows\system32\hggdayx.dll
C:\windows\system32\hggdayx.dll Has been deleted!

Performing Repairs to the registry.
Done!

#4 oldf@rt

oldf@rt

  • Members
  • 2,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Avondale, Arizona USA
  • Local time:08:24 PM

Posted 06 August 2007 - 02:33 PM

Looking good so far, there will be a few more things to do on this machine: Please run a BitDefender Online Scan
  • Click I Agree to agree to the EULA.
  • Allow the ActiveX control to install when prompted.
  • Click Click here to scan to begin the scan.
  • Please refrain from using the computer until the scan is finished. This might take a while to run, but it is important that nothing else is running while you scan.
  • When the scan is finished, click on Click here to export the scan results.
  • Save the report to your desktop so you can post it in your next reply.
Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. A malicious site could render Java content under older, vulnerable versions of Sun's software if the user has not removed them. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) 6 Update 2 and save it to your desktop.
  • Scroll down to where it says "Java Runtime Environment (JRE) 6u2...allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Read the License Agreement and then check the box that says: "Accept License Agreement".
  • The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u2-windows-i586-p.exe to install the newest version.

The name says it all -- 59 and holding permanently

**WARNING** Links I provide might cause brain damage

#5 VeryAnnoyed

VeryAnnoyed
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:24 PM

Posted 06 August 2007 - 02:41 PM

I have an up to date esoft agent that checks viruses and spyware. can I run that instead?

#6 oldf@rt

oldf@rt

  • Members
  • 2,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Avondale, Arizona USA
  • Local time:08:24 PM

Posted 06 August 2007 - 02:43 PM

I would prefer that you dont, it could not fix the vundo problem, which is why I am recommending those two scans.
The name says it all -- 59 and holding permanently

**WARNING** Links I provide might cause brain damage

#7 VeryAnnoyed

VeryAnnoyed
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:24 PM

Posted 06 August 2007 - 02:51 PM

i recieved a message saying that this website is not authorized to host this activeX control, and it would not let me run the scan.

#8 oldf@rt

oldf@rt

  • Members
  • 2,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Avondale, Arizona USA
  • Local time:08:24 PM

Posted 06 August 2007 - 03:02 PM

Keep goingahead with the Superantispyware. Ill be back, and get a fix for bitdefender.

Edited by oldf@rt, 06 August 2007 - 03:03 PM.

The name says it all -- 59 and holding permanently

**WARNING** Links I provide might cause brain damage

#9 oldf@rt

oldf@rt

  • Members
  • 2,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Avondale, Arizona USA
  • Local time:08:24 PM

Posted 06 August 2007 - 04:34 PM

For bit defender, add the web site to your trusted list.
  • Click Tools
  • Internet Options
  • the Security Tab
  • the top Trusted sites check mark
  • the sites button
  • copy the bitdefender link
  • paste it into the top box
  • follow directions given
  • click ok

The name says it all -- 59 and holding permanently

**WARNING** Links I provide might cause brain damage

#10 VeryAnnoyed

VeryAnnoyed
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:24 PM

Posted 06 August 2007 - 04:39 PM

JAVA is now installed....

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/06/2007 at 05:04 PM

Application Version : 3.9.1008

Core Rules Database Version : 3279
Trace Rules Database Version: 1290

Scan type : Complete Scan
Total Scan Time : 00:39:11

Memory items scanned : 611
Memory threats detected : 1
Registry items scanned : 5608
Registry threats detected : 43
File items scanned : 33388
File threats detected : 61

MyWay Search Assistant Computers
C:\PROGRAM FILES\MYWAYSA\SRCHASDE\1.BIN\DESRCAS.DLL
C:\PROGRAM FILES\MYWAYSA\SRCHASDE\1.BIN\DESRCAS.DLL
HKLM\Software\Classes\CLSID\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}\InprocServer32
HKCR\CLSID\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}\InprocServer32#ThreadingModel
HKCR\CLSID\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}\Programmable
HKLM\Software\Classes\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\Control
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\InprocServer32
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\InprocServer32#ThreadingModel
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\MiscStatus
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\MiscStatus\1
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\ProgID
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\Programmable
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\TypeLib
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\Version
HKCR\CLSID\{4D25F924-B9FE-4682-BF72-8AB8210D6D75}\VersionIndependentProgID
HKLM\Software\Classes\CLSID\{4D25F926-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F926-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F926-B9FE-4682-BF72-8AB8210D6D75}
HKCR\CLSID\{4D25F926-B9FE-4682-BF72-8AB8210D6D75}\InprocServer32
HKCR\CLSID\{4D25F926-B9FE-4682-BF72-8AB8210D6D75}\InprocServer32#ThreadingModel
HKCR\CLSID\{4D25F926-B9FE-4682-BF72-8AB8210D6D75}\Programmable
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D25F921-B9FE-4682-BF72-8AB8210D6D75}
HKU\S-1-5-21-2707248185-2349455944-2400655864-1006\Software\Microsoft\Internet Explorer\URLSearchHooks#{4D25F926-B9FE-4682-BF72-8AB8210D6D75}

Trojan.Downloader-CREW
HKLM\Software\Classes\CLSID\{34AAB738-B02F-4B00-A8E9-E35FE9FF4883}
HKCR\CLSID\{34AAB738-B02F-4B00-A8E9-E35FE9FF4883}
HKCR\CLSID\{34AAB738-B02F-4B00-A8E9-E35FE9FF4883}\InprocServer32
HKCR\CLSID\{34AAB738-B02F-4B00-A8E9-E35FE9FF4883}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\VALIQCBU.DLL
C:\WINDOWS\SYSTEM32\HHWRMLRD.DLL

Trojan.WinFixer
HKLM\Software\Classes\CLSID\{3676123E-2BEA-424E-A00D-851676F5E861}
HKCR\CLSID\{3676123E-2BEA-424E-A00D-851676F5E861}
HKCR\CLSID\{3676123E-2BEA-424E-A00D-851676F5E861}\InprocServer32
HKCR\CLSID\{3676123E-2BEA-424E-A00D-851676F5E861}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\PMNNM.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3676123E-2BEA-424E-A00D-851676F5E861}

Unclassified.Unknown Origin
HKLM\Software\Classes\CLSID\{CF46BFB3-2ACC-441b-B82B-36B9562C7FF1}
HKCR\CLSID\{CF46BFB3-2ACC-441B-B82B-36B9562C7FF1}
HKCR\CLSID\{CF46BFB3-2ACC-441B-B82B-36B9562C7FF1}\InprocServer32
HKCR\CLSID\{CF46BFB3-2ACC-441B-B82B-36B9562C7FF1}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\FMDVFMQT.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CF46BFB3-2ACC-441b-B82B-36B9562C7FF1}
HKCR\CLSID\{CF46BFB3-2ACC-441B-B82B-36B9562C7FF1}

Adware.Vundo Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{868865EC-0295-4C7D-B25D-9F65314145E9}
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP558\A0062077.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP560\A0063077.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP560\A0063078.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP565\A0064252.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP565\A0064253.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP565\A0064254.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP565\A0064255.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP566\A0064434.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP567\A0064747.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP570\A0066754.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP570\A0066755.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067157.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067158.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067159.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067160.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067161.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067162.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067163.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067164.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067165.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ads.adbrite[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ad.yieldmanager[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@hitbox[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adserver.easyad[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adecn[4].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@statse.webtrendslive[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@atwola[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ad.scanmedios[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@stats1.reliablestats[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adbrite[3].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adbrite[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@mediaplex[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ad.bannerconnect[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@www.stopzilla[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ar.atwola[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@server.iad.liveperson[3].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ad.directanetworks[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ehg-ifilm.hitbox[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@2o7[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@mediatraffic[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@server.iad.liveperson[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@weborama[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@tacoda[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@revsci[3].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ads3.blastro[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adinterax[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@www.googleadservices[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@ehg-verizon.hitbox[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@www.googleadservices[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adecn[1].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@adecn[2].txt
C:\Documents and Settings\Wrap-N-Pack\Cookies\wrap-n-pack@revsci[2].txt

Adware.ClickSpring/Yazzle
C:\PROGRAM FILES\COMMON FILES\YAZZLE1549OINUNINSTALLER.EXE

Trojan.Downloader-PoolSV
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP580\A0067229.EXE

Trojan.Downloader-Gen/Blah
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP589\A0068496.DLL
C:\VUNDOFIX BACKUPS\HGGDAYX.DLL.BAD


I will work on the bit defender tomorrow. Thanks for all your help so far.

#11 oldf@rt

oldf@rt

  • Members
  • 2,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Avondale, Arizona USA
  • Local time:08:24 PM

Posted 06 August 2007 - 05:52 PM

Looking better, so far. BTW, what is your operating system?

AND, there are going to be a few more things to do.

It looks like vundo got into your system restore, so I will give you the fix for that later on. From what I can find, esoft does not appear to be an antivirus/antispyware application. just a firewall/mail scanner. I will be doing more research on this product, and let you know what I find. If bitdefender still does not work on your machine, please try Trend Micro Housecall. Make sure to use the Java housecall kernel.
The name says it all -- 59 and holding permanently

**WARNING** Links I provide might cause brain damage




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users