Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware Protector 2008


  • Please log in to reply
29 replies to this topic

#1 klmnumbers

klmnumbers

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 22 June 2008 - 05:21 PM

Hi,

I've been reading through these forums for a couple of days trying to figure out some more options for myself.

I appear to be yet another victim of Malware Protector 2008; I've read up quite a bit on-line and have followed most of the automatic removal instructions;

I've restarted in safe mode, run SmitFraudFix, let it do it's thing and emptied out my temp folder.
I've also tried Malwarebyte's Anti-Malware,
Spybot Search & Destroy,
and AVG.

When I remove the files in Safe mode, it appears that my computer is clean. The second I restart in normal mode, the program reasserts itself.

It has changed my clock to read in military time, and has made my desktop a blue screen with a warning that have Spyware which must be removed; Also, occasionally a window named "BluScreen Screen Save Configure" pops up and reads:
Sysinterals; with an option to check "Fake disk activity".

I've bee attempting to get rid of this for two days now, so any help would be much appreciated.

BC AdBot (Login to Remove)

 


m

#2 samuel3

samuel3

  • Members
  • 2,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:25 AM

Posted 22 June 2008 - 05:48 PM

Hello, Klmnumbers.

Download Ad-ware this may find it, update it then go into safemode then scan with it: heres the link: Ad-ware

If Ad-ware doesnt pick anything up then please download Superantispyware
And run this in safemode

Get back to us and let us know the results.

Edited by samuel3, 22 June 2008 - 05:49 PM.


#3 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 22 June 2008 - 07:47 PM

Hello, Klmnumbers.

Download Ad-ware this may find it, update it then go into safemode then scan with it: heres the link: Ad-ware

If Ad-ware doesnt pick anything up then please download Superantispyware
And run this in safemode

Get back to us and let us know the results.


The exact same thing happened. It located and removed the malware, and prompted me to reboot my computer to complete the removal.
(I ran the test in safe mode then let it reboot to normal, should I be rebooting it to safe mode as well?)

Once the computer started back up, all of the malware was back on.

I wondered if my computer was restoring automatically with system restore, so I've turned off system restore as well; should I turn it back on?

I just really want this to be off my computer. I'm sick of it changing my desktop and potentially getting into my private data. =/

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,240 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:25 AM

Posted 22 June 2008 - 09:49 PM

Please tell us your Operating System (XP etc...)
Run Malwarebytes from regular mode
SAS from safe mode
Would you please post the Malwarebyte, SAS and Smit fraud reports in your next reply.

MBam..The log is automatically saved and can be viewed by clicking the Logs tab in MBAM

SAS...To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.


SmitFraud..The report can be found at the root of the system drive, usually at C:\rapport.txt

Edited by boopme, 22 June 2008 - 09:52 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 22 June 2008 - 10:54 PM

Ok, I use XP

This is the SAS Log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/22/2008 at 11:32 PM

Application Version : 4.15.1000

Core Rules Database Version : 3487
Trace Rules Database Version: 1478

Scan type : Quick Scan
Total Scan Time : 00:11:22

Memory items scanned : 147
Memory threats detected : 0
Registry items scanned : 404
Registry threats detected : 0
File items scanned : 8474
File threats detected : 7

Rogue.Malware Protector 2008
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\How to Register Malware Protector 2008.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\License Agreement.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Malware Protector 2008.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Register Malware Protector 2008.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Uninstall.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008
C:\Documents and Settings\Kelly\Application Data\Microsoft\Internet Explorer\Quick Launch\Malware Protector 2008.lnk



This is the MBAM log:

Malwarebytes' Anti-Malware 1.18
Database version: 880

11:08:20 PM 6/22/2008
mbam-log-6-22-2008 (23-08-19).txt

Scan type: Quick Scan
Objects scanned: 38896
Time elapsed: 3 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 1
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008 (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\How to Register Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\License Agreement.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Register Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Uninstall.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kelly\Application Data\Microsoft\Internet Explorer\Quick Launch\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kelly\Local Settings\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.


This is the SmitFraud log:

SmitFraudFix v2.328

Scan done at 23:13:03.00, Sun 06/22/2008
Run from C:\Documents and Settings\Kelly\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

Killing process


hosts


127.0.0.1 localhost

VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


Generic Renos Fix

GenericRenosFix by S!Ri


Deleting infected files


IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS1\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS2\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS3\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162


Deleting Temp Files


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Registry Cleaning

Registry Cleaning done.

SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


End

#6 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:25 AM

Posted 23 June 2008 - 03:24 AM

Would you download ATF Cleaner

http://www.bleepingcomputer.com/forums/ind...mp;#entry839950

make sure MBAM and SAS are updated

Physically disconnect from the internet

Run MBAM in normal mode, reboot immediately into safe mode, do a complete clean with atf cleaner, run the SAS fix

Stay off the internet and make sure the malware can't use it either

after a reboot run another quick scan with MBAM

Edited by DaChew, 23 June 2008 - 03:25 AM.

Chewy

No. Try not. Do... or do not. There is no try.

#7 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:25 AM

Posted 23 June 2008 - 03:37 AM

A further note, I see you have comcast as a dns server, has McAfee been installed in the past?

This might explain a lot if so, that situation, if applicable, would be my first concern
Chewy

No. Try not. Do... or do not. There is no try.

#8 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 23 June 2008 - 04:48 PM

A further note, I see you have comcast as a dns server, has McAfee been installed in the past?

This might explain a lot if so, that situation, if applicable, would be my first concern


I don't believe my desktop has McAfee. I know for a fact my laptop came with McAfee installed, and no matter what I did, I could not get it off my computer; I uninstalled it, but it kept asking me to update my software, although that seems to stop.

I've had my desktop for a while, and I genuinely don't remember; I think it came with Norton tho. I use AVG for my protection software

and I'm off to try your suggestion, I'll be back with news. XD

#9 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:25 AM

Posted 23 June 2008 - 04:56 PM

norton's and mcafee both have special removal tools since add and remove programs does not work with them

It's essential that these removal tools be run when uninstalling to prevent the program remnants from interfering with other protection and malware removal
Chewy

No. Try not. Do... or do not. There is no try.

#10 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 23 June 2008 - 05:18 PM

Ok.

I unplugged my modem, ran MBAM, restarted in safe mode, cleaned out all the temp files with ATF, then ran SAS.

The computer rebooted in normal mode and everything was back again; Now I'm getting Malware Protector 2008 and Antivirus XP 2008 fake "virus" warnings.

It seems to be removing the files but they simply reinstall. =(


ETA - Hmmm.. I genuinely don't remember about my original antivirus software; Of course, I had no idea they had removal tools; I'm sure when I removed it, I went to uninstall the program in the start menu then prob tried add/remove programs; Is there something I can do now to remedy this situation if that is in fact what is wrong?

Edited by klmnumbers, 23 June 2008 - 05:20 PM.


#11 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:25 AM

Posted 23 June 2008 - 05:29 PM

would you post that last MBAM log please?

Download SmitfraudFix (by S!Ri) to your Desktop.
http://siri.urz.free.fr/Fix/SmitfraudFix.exe

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press Enter
This program will scan large amounts of files on your computer for known patterns so please be patient while it works. When it is done, the results of the scan will be displayed and it will create a log named rapport.txt in the root of your drive, eg: Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.

IMPORTANT: Do NOT run any other options until you are asked to do so!

**If the tool fails to launch from the Desktop, please move SmitfraudFix.exe directly to the root of the system drive (usually C:), and launch from there.
Chewy

No. Try not. Do... or do not. There is no try.

#12 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 23 June 2008 - 05:41 PM

I already have SMitfraud; So should I be running this scan in Safe mode or regular? Also, should I unplug the internet again?

Here is the last MBAM log:

Malwarebytes' Anti-Malware 1.18
Database version: 883

6:16:51 PM 6/23/2008
mbam-log-6-23-2008 (18-16-51).txt

Scan type: Quick Scan
Objects scanned: 38782
Time elapsed: 2 minute(s), 44 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Kelly\Local Settings\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kelly\Local Settings\Temp\.ttA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

#13 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 23 June 2008 - 05:49 PM

This is the result of the search by Smitfraud; I just ran it in normal mode with the net connected


SmitFraudFix v2.328

Scan done at 18:46:07.40, Mon 06/23/2008
Run from C:\Documents and Settings\Kelly\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Dell\Media Experience\DMXLauncher.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\lphceo8j0epc7.exe
C:\Program Files\Dell Support\DSAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\OpenOffice.org 2.1\program\soffice.exe
C:\Program Files\OpenOffice.org 2.1\program\soffice.BIN
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Kelly\Desktop\SmitfraudFix\Policies.exe
C:\WINDOWS\system32\cmd.exe

hosts


C:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32


C:\WINDOWS\system32\LogFiles


C:\Documents and Settings\Kelly


C:\Documents and Settings\Kelly\Application Data


Start Menu


C:\DOCUME~1\Kelly\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components



IEDFix
!!!Attention, following keys are not inevitably infected!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



VACFix
!!!Attention, following keys are not inevitably infected!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix
!!!Attention, following keys are not inevitably infected!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""


Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""


Rustock



DNS

Description: Broadcom 440x 10/100 Integrated Controller - Packet Scheduler Miniport
DNS Server Search Order: 68.87.74.162
DNS Server Search Order: 68.87.68.162

HKLM\SYSTEM\CCS\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS1\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS2\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS3\Services\Tcpip\..\{75CC2055-E5FF-4B55-86EE-93FAC78E93FF}: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=68.87.74.162 68.87.68.162


Scanning for wininet.dll infection


End

#14 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:25 AM

Posted 23 June 2008 - 06:34 PM

let's see if we can get an expert to look at this, I was wanting a running processes list to see if some leftover AV was running
Chewy

No. Try not. Do... or do not. There is no try.

#15 klmnumbers

klmnumbers
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:02:25 AM

Posted 23 June 2008 - 06:44 PM

Ok, hehe. Sorry my case is such a problem. It's just even more frustrating because I just replaced the motherboard after not having a desktop for a couple of months, and now this. All because I went to a website someone linked me to. =/




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users