Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Cant remove sekikawe


  • Please log in to reply
17 replies to this topic

#1 Dallas78

Dallas78

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 06 January 2009 - 07:38 PM

Hello Folks,

I'm having a bit of a nightmare trying to remove trojans from my desktop. I've used malwarebytes, superantispyware, CCcleaner and super utilities and can not shift it.

From CCleaner I have the following text:

ActiveX/COM Issue InProcServer32\C:\WINDOWS\system32\boravupi.dll HKCR\CLSID\{fe09ef20-a9f5-49d1-944b-b0f5963a5076}
Missing Startup Software Rundll32.exe "C:\WINDOWS\system32\sekikawe.dll",s HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


Cant delete this from startup. I'm quite new at this so ANY help would be very much appreciated.

Thanks everyone :D

BC AdBot (Login to Remove)

 


#2 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:01:40 AM

Posted 06 January 2009 - 07:46 PM

Hi and welcome to BleepingComputer :thumbsup:


Oops hit the enter button too fast - Let's start with a malwarebytes log. Please update and run Mawarebytes and post a fresh log.

The process of cleaning your computer may require temporarily disabliling some security programs. If you are using SpyBot Search and Destroy, please refer to Note 2 at the bottom of this page.

On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note:
-- If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Note 2:
-- MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes (like Spybot's Teatimer), they may interfere with the fix or alert you after scanning with MBAM. Please disable such programs until disinfection is complete or permit them to allow the changes. To disable these programs, please view this topic: How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs

Edited by rigel, 06 January 2009 - 07:48 PM.
Pressed button to fast

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#3 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 06 January 2009 - 09:04 PM

Hello,

Thanks for the seriously fast reply.

Here is the MBAM Log as requested.

Malwarebytes' Anti-Malware 1.26
Database version: 1119
Windows 5.1.2600 Service Pack 3

06/01/2009 23:37:14
mbam-log-2009-01-06 (23-37-14).txt

Scan type: Full Scan (C:\|)
Objects scanned: 109598
Time elapsed: 18 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hetesodazo (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


I've restarted and MB is still finding it and CCleaner is still finding it in the startup.

Thanks millions :thumbsup:

#4 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:01:40 AM

Posted 06 January 2009 - 09:08 PM

You are welcome :thumbsup:

Let's continue
Please download ATF Cleaner by Atribune & save it to your desktop.
alternate download link DO NOT use yet.

Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the
    definitions before scanning by selecting "Check for Updates". (If you encounter
    any problems while downloading the updates, manually download them from
    here and
    unzip into the program's folder.
    )
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under
    Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner
    Options
    , make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose:
    Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp"

ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#5 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 07 January 2009 - 05:29 AM

Hey,

Thanks again for this. I'm just on my way to work now - but will do this when I get home later...

I've picked up ATF and I already use SASpyware.... So I will follow this later today. Thanks again :D :thumbsup:

#6 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 08 January 2009 - 02:00 PM

Hi rigel, :thumbsup:

Hope you are well...

sorry it's taken so long to get back to you.

Here is the Superantispyware log.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/08/2009 at 05:48 PM

Application Version : 4.24.1004

Core Rules Database Version : 3541
Trace Rules Database Version: 1530

Scan type : Complete Scan
Total Scan Time : 00:54:25

Memory items scanned : 248
Memory threats detected : 0
Registry items scanned : 6281
Registry threats detected : 3
File items scanned : 18174
File threats detected : 4

Unclassified.Unknown Origin
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run#userinit [ C:\WINDOWS\system32\ntos.exe ]
HKU\S-1-5-21-583907252-2147219963-682003330-500\Software\Microsoft\Windows\CurrentVersion\Run#userinit [ C:\WINDOWS\system32\ntos.exe ]
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run#userinit [ C:\WINDOWS\system32\ntos.exe ]

Adware.WsnPoem
C:\WINDOWS\system32\wsnpoem\audio.dll
C:\WINDOWS\system32\wsnpoem\video.dll
C:\WINDOWS\system32\wsnpoem

Trojan.Downloader-Gen
C:\WINDOWS\SYSTEM32\NTOS.EXE





Also in the startup reg are 2 items.

Rundll32.exe"c:\windows\systerm32\hidisuza.dll",a
Rundll32.exe"C:\WINDOWS\systerm32\balomane.dll",s



Again - thank you for your help and apologies for not getting back sooner.

C

#7 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:01:40 AM

Posted 08 January 2009 - 02:04 PM

No problem with time :thumbsup:

Another scan - this one a little different.

Please print out and follow these instructions: "How to use SDFix". <- This program is for Windows 2000/XP ONLY.
When using this tool, you must use the Administrator's account or an account with "Administrative rights"
  • Disconnect from the Internet and temporarily disable your anti-virus, script blocking and any real time protection programs before performing a scan.
  • When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt.
  • If SDFix is unable to run after rebooting from Safe Mode, run SDFix in either Mode, and type F, then press Enter for it to finish the final stage and produce the report.
  • Please copy and paste the contents of Report.txt in your next reply.
  • Be sure to renable you anti-virus and and other security programs before connecting to the Internet.
-- If the computer has been infected with the VirusAlert! malware warning from the clock and the Start Menu icons or drives are not visible, open the SDFix folder, right-click on either the XP_VirusAlert_Repair.inf or W2K VirusAlert_Repair.inf (depending on your version of Windows) and select Install from the Context menu. Then reboot to apply the changes.

take care,
rigel

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#8 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 09 January 2009 - 05:20 AM

Hi Rigel,

Thanks for your help over the last few days, however I'm still having problems and SDFix didnt seem to work on my PC.

I booted in safe mode - follwed all the instructions, C:\SDFix\RunThis.bat, selected Y and had the following message:


STARTING REPAIRS

CHECKING RUNNING PROCESSES AND SERVERS.


Tried this 8 times and the last time left it running for 6 Hours. Have I misssed something out.
Firefox is redirecting to antivirus 2009.

Rundll32.exe"c:\windows\systerm32\zawibavu.dll",b
Rundll32.exe"C:\WINDOWS\systerm32\balomane.dll",s
Rundll32.exe"c:\windows\systerm32\dabaliru.dll",a

Are still in the reg...


Thanks :thumbsup:

#9 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:01:40 AM

Posted 09 January 2009 - 08:48 AM

Ok... one more scan

Please run the F-Secure Online Scanner
Note: This Scanner is for Internet Explorer Only!
Follow the Instruction here for installation.
Accept the License Agreement.
Once the ActiveX installs,Click Full System Scan
Once the download completes, the scan will begin automatically.
The scan will take some time to finish, so please be patient.
When the scan completes, click the Automatic cleaning (recommended) button.
Click the Show Report button and Copy&Paste the entire report in your next reply.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#10 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 09 January 2009 - 11:56 AM

YOU ARE A DIAMOND...

THANKS !!

Will try this when I'm back home....

:thumbsup:

#11 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 10 January 2009 - 01:50 PM

Hey Rigel,

Hope your well... F-Secure report as requested.


Scanning Report
Saturday, January 10, 2009 17:48:54 - 18:48:56

Computer name: SONY
Scanning type: Scan system for malware, rootkits
Target: C:\
Result: 26 malware found
AdTool.Win32.MyWebSearch (spyware)

* System

INI/Vundo.A (virus)

* C:\WINDOWS\SYSTEM32\FFOUWGGH.INI

TrackingCookie.2o7 (spyware)

* System

TrackingCookie.Adtech (spyware)

* System

TrackingCookie.Advertising (spyware)

* System

TrackingCookie.Atdmt (spyware)

* System

TrackingCookie.Doubleclick (spyware)

* System

TrackingCookie.Mediaplex (spyware)

* System

TrackingCookie.Tradedoubler (spyware)

* System

TrackingCookie.Yieldmanager (spyware)

* System

Trojan.Win32.Agent (virus)

* System

Trojan.Win32.Agent.bfdf (virus)

* C:\WINDOWS\SYSTEM32\LUVOKIYA.DLL
* C:\WINDOWS\SYSTEM32\WAMAKOLA.DLL
* C:\WINDOWS\SYSTEM32\ZAWIBAVU.DLL

Trojan:W32/Vundo.HA (virus)

* System
* C:\WINDOWS\SYSTEM32\DABALIRU.DLL

Trojan:W32/Vundo.HJ (virus)

* System
* C:\WINDOWS\SYSTEM32\JOWEGIVE.DLL

Vundo.FBW (virus)

* C:\WINDOWS\SYSTEM32\ALOKAMAW.INI
* C:\WINDOWS\SYSTEM32\AYIKOVUL.INI
* C:\WINDOWS\SYSTEM32\EVIGEWOJ.INI
* C:\WINDOWS\SYSTEM32\IFODUJUF.INI
* C:\WINDOWS\SYSTEM32\INIYIYIV.INI
* C:\WINDOWS\SYSTEM32\UVABIWAZ.INI
* C:\WINDOWS\SYSTEM32\UWCKKVHK.INI
* C:\SYSTEM VOLUME INFORMATION\_RESTORE{9E40E353-F9CC-442D-822A-3960903327B5}\RP68\A0016372.INI

Statistics
Scanned:

* Files: 31389
* System: 3414
* Not scanned: 19

Actions:

* Disinfected: 0
* Renamed: 0
* Deleted: 0
* None: 26
* Submitted: 0

Files not scanned:

* C:\PAGEFILE.SYS
* C:\WINDOWS\TEMP\MCMSC_81MFMSPWCP4HQF4
* C:\WINDOWS\TEMP\MCMSC_SLRWIM22ZANHCZT
* C:\WINDOWS\TEMP\MCMSC_ZQRTX1KHCZAHKYY
* C:\WINDOWS\TEMP\SQLITE_9SAWGXSMDUVFHRM
* C:\WINDOWS\TEMP\SQLITE_F7IV4CSQL0EHOAN
* C:\WINDOWS\TEMP\SQLITE_OTPZ2HYBVVEJJGE
* C:\WINDOWS\TEMP\SQLITE_S5PTNXC24TTUZSW
* C:\WINDOWS\TEMP\SQLITE_TCJI3C2SSHJBJT7
* C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
* C:\WINDOWS\SYSTEM32\CONFIG\SAM
* C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
* C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
* C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM
* C:\WINDOWS\PREFETCH\LAYOUT.INI
* C:\DOCUMENTS AND SETTINGS\K. BOYLE\LOCAL SETTINGS\TEMP\ETILQS_78SOKVNZSFF5D0A8GGNG
* C:\DOCUMENTS AND SETTINGS\K. BOYLE\LOCAL SETTINGS\TEMP\SQLITE_5YQIACN9WPVBEBW
* C:\DOCUMENTS AND SETTINGS\K. BOYLE\LOCAL SETTINGS\TEMP\SQLITE_PRTZPC5SH4YCFNX
* C:\DOCUMENTS AND SETTINGS\K. BOYLE\LOCAL SETTINGS\TEMP\SQLITE_YBN2TW1UVLKC6FP



Thanks millions :D

#12 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:01:40 AM

Posted 10 January 2009 - 03:24 PM

Vundo is still hanging around....

Please rerun Malwarebytes in Full mode and SuperantiSpyware and post fresh logs. Then please retry SDFix. I am wanting to have SDFix complete its run.

Thanks Dallas and have a good afternoon!

rigel

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#13 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 11 January 2009 - 10:49 AM

Hi Rigel, hope your well :thumbsup:

I've run Malwarebytes and Superantispyware. Here are the reports.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/11/2009 at 02:48 PM

Application Version : 4.24.1004

Core Rules Database Version : 3704
Trace Rules Database Version: 1680

Scan type : Complete Scan
Total Scan Time : 01:45:35

Memory items scanned : 472
Memory threats detected : 0
Registry items scanned : 7174
Registry threats detected : 9
File items scanned : 66584
File threats detected : 11

Unclassified.Unknown Origin
HKLM\Software\Classes\CLSID\{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}
HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32

Adware.Tracking Cookie
C:\Documents and Settings\K. Boyle\Cookies\k._boyle@ad.yieldmanager[2].txt
C:\Documents and Settings\K. Boyle\Cookies\k._boyle@tradedoubler[2].txt
C:\Documents and Settings\K. Boyle\Cookies\k._boyle@doubleclick[2].txt
C:\Documents and Settings\K. Boyle\Cookies\k._boyle@angleinteractive.directtrack[2].txt
C:\Documents and Settings\K. Boyle\Cookies\k._boyle@directtrack[1].txt

Adware.Vundo Variant/Rel
HKLM\SOFTWARE\Microsoft\contim
HKLM\SOFTWARE\Microsoft\contim#SysShell
HKLM\SOFTWARE\Microsoft\rdfa
HKLM\SOFTWARE\Microsoft\rdfa#F
HKLM\SOFTWARE\Microsoft\rdfa#N

Trojan.Fake-Alert/Trace
HKU\S-1-5-21-583907252-2147219963-682003330-1004\SOFTWARE\Microsoft\fias4013

Adware.MyWebSearch-Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{9E40E353-F9CC-442D-822A-3960903327B5}\RP68\A0016391.EXE

Adware.Vundo Variant/QEF
C:\WINDOWS\SYSTEM32\RUTIHUKU.DLL

Trace.Known Threat Sources
C:\Documents and Settings\K. Boyle\Local Settings\Temporary Internet Files\Content.IE5\AKCZ7JAS\indexsg[1].htm
C:\Documents and Settings\K. Boyle\Local Settings\Temporary Internet Files\Content.IE5\T3HS1TBM\l.s.bg1z[1].gif
C:\Documents and Settings\K. Boyle\Local Settings\Temporary Internet Files\Content.IE5\91I82MSX\l.s.bg2z[1].gif
C:\Documents and Settings\K. Boyle\Local Settings\Temporary Internet Files\Content.IE5\AKCZ7JAS\favicon[2].ico


:trumpet:

Malwarebytes' Anti-Malware 1.26
Database version: 1119
Windows 5.1.2600 Service Pack 3

11/01/2009 12:42:42
mbam-log-2009-01-11 (12-42-42).txt

Scan type: Full Scan (C:\|)
Objects scanned: 106116
Time elapsed: 48 minute(s), 39 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 2
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hetesodazo (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\ntos.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\difoyuro.dll (Trojan.Agent) -> Delete on reboot.

Tried SDfix and it's just doesn't seem to be working for me? any suggestions? :flowers:

Thanks again Rigel.

Dallas :inlove:

#14 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:01:40 AM

Posted 11 January 2009 - 02:53 PM

I wish I had better news, but I think our tools here aren't going to be affective against the infection you have. Let's get you moved over to the HJT forum. Those guys use much stronger tools than we can use here. With that said...

Please follow this guide from step (6). Post a HJT log to the HJT forum and a Team member will be along to help you as soon as possible. You may wish to post a link back to this topic to see what was discussed thus far.

If you need any help with the guide, please let me know. Best wishes - you are in good hands...

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#15 Dallas78

Dallas78
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:40 AM

Posted 11 January 2009 - 03:39 PM

Rigel,

Thanks so much - you really have been a great help, thanks so much.


Hopefully I can get this fixed soon.


Cheers.


:thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users