Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Unable to remove DARKSMA? HELPER.DLL?


  • This topic is locked This topic is locked
9 replies to this topic

#1 cooner

cooner

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:33 PM

Posted 04 March 2009 - 12:08 PM

Having repeated problems with a virus - DARKSMA??, HELPER?? - that 1) sets the firewall flag to off and 2) opens explorer to: .../common/helper.dll on startup. Removed successfully twice previously. Running Malwarebytes for protection and scan with CA AV occasionally. Nothing sees a problem, but Malwarebytes sometimes tags a memory object for termination and once caught the helper.dll problem.

Running XP v2002 sp3 on an old HP with an AMD3200.

Thanks for the help.

Attached Files



BC AdBot (Login to Remove)

 


#2 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:02:33 AM

Posted 12 March 2009 - 08:46 PM

Howdy, my name is Hoov, and I will be helping you with your dilemma. Appologies for taking so long in getting to you and your problem.

Please make sure you watch this thread for responses. If you click the options tab at the top of your first post, you can select to track this thread.

Here is what I am asking you to do during the repair of your computer

*Tell me everything that you have done, if anything, to try and fix this problem.

*Please only use 1 forum to help clear up your problem. Posting on more than 1 and following instructions from more than 1 forum will cause those helping you to pull out thier hair.

*Follow my instructions - If you can't for some reason, or if you don't understand something, please tell me. If you deviate from my instructions, tell me, it may make a difference on where we go. Don't install anything, even other programs that have nothing to do with security or malware, it could cause things to change, and I would never know it.

*Have faith. I will do all I can to get your computer working, and if I can't - someone else here will know something else to try.

*Stick with me to the end. My aim is to fix your problems, and give you the tools and knowledge to keep this from happening again.

Now onto trying to fix your computer.

If I am helping you and you don't hear from me for 24Hrs, send me a PM Please!

Would you please update Malwarebytes' Anti-Malware and run a full scan. Post the log from this scan and the last Malwarebytes' Anti-Malware scan that found anything.

And then Please perform a BitDefender Online Virus and Malware Scan here:
http://www.bitdefender.com/scan8/ie.html
* Click on I Agree.
* An ActiveX warning box will appear, click on Install.
* Under Select What You Want To Check For Viruses.
* Please Check My Computer and Click Ok
* Now Click On Click Here To Scan
* Next, Click on Click here to export the scan report
* Save it to your Desktop.
* In your next reply, please include the BitDefender log.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#3 cooner

cooner
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:33 PM

Posted 15 March 2009 - 02:59 PM

Hey Hoov.

Thanks for the help.

Since I posted the problem, I have done relatively little to rid the problem. (1) I ran the Kapersky on-line scanner. It identified system32/mst123.dll and I deleted it. (2) I also installed the COMODO firewall so I can monitor traffic.

Do you want to know what I have done since the problem started some montths ago? I am not sure I can reconstruct all of it, but let me know if you want more info. Basically I followed the instructions in one of these threads - yes, I now you all warn against that......I'll faithfully follow your advice from here - no new programs, no ad hoc removal efforts, etc.

Let me know what's next....

Thanks again.

Cooner

Pasted below i order are:
LAST INFECTED MBAM LOG
PREVIOUS INFECTED MBAM LOG
MOST RECENT MBAM LOG
BITDEFENDER LOG


LAST INFECTED MBAM LOG

Malwarebytes' Anti-Malware 1.34
Database version: 1761
Windows 5.1.2600 Service Pack 3

2/13/2009 6:19:04 PM
mbam-log-2009-02-13 (18-19-04).txt

Scan type: Quick Scan
Objects scanned: 96917
Time elapsed: 18 minute(s), 44 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 8
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Program Files\Common\helper.dll (Trojan.BHO) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\main.bho (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{8e3c68cd-f500-4a2a-8cb9-132bb38c3573} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{986a8ac1-ab4d-4f41-9068-4b01c0197867} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{afd4ad01-58c1-47db-a404-fbe00a6c5486} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{afd4ad01-58c1-47db-a404-fbe00a6c5486} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{afd4ad01-58c1-47db-a404-fbe00a6c5486} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\main.bho.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{a0e1054b-01ee-4d57-a059-4d99f339709f} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\Common\helper.dll (Trojan.BHO) -> Delete on reboot.

PREVIOUS INFECTED MBAM LOG

Malwarebytes' Anti-Malware 1.33
Database version: 1714
Windows 5.1.2600 Service Pack 3

2/1/2009 10:58:33 PM
mbam-log-2009-02-01 (22-58-33).txt

Scan type: Quick Scan
Objects scanned: 70454
Time elapsed: 4 minute(s), 55 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 26
Registry Values Infected: 4
Registry Data Items Infected: 3
Folders Infected: 4
Files Infected: 17

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\xxyyxuSK.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\jswavx.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\opnkJAsp.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0cfb391a-b677-4849-b4af-8ab6812cc91f} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{0cfb391a-b677-4849-b4af-8ab6812cc91f} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4159cd17-5c0d-4dbb-9281-0a4c62e2cbc8} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4159cd17-5c0d-4dbb-9281-0a4c62e2cbc8} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\opnkjasp (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4159cd17-5c0d-4dbb-9281-0a4c62e2cbc8} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\main.bho (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{8e3c68cd-f500-4a2a-8cb9-132bb38c3573} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{986a8ac1-ab4d-4f41-9068-4b01c0197867} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{afd4ad01-58c1-47db-a404-fbe00a6c5486} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{afd4ad01-58c1-47db-a404-fbe00a6c5486} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{afd4ad01-58c1-47db-a404-fbe00a6c5486} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\main.bho.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{a0e1054b-01ee-4d57-a059-4d99f339709f} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\icheck (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\GetModule (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\40408b53 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cogad (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\getmodule36 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\xxyyxusk -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\xxyyxusk -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SecurityProviders (Trojan.Agent) -> Data: digeste.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\iCheck (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\cogad (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\GetModule (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\xxyyxuSK.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\KSuxyyxx.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\KSuxyyxx.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jswavx.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\opnkJAsp.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\djhffclj.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jlcffhjd.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\cogad\cogad.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Common\helper.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jtrqxkkd.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wpv711233435211.cpx (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\iCheck\Uninstall.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule\GetModule36.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\GetModule\dicik.gz (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\GetModule\kwdik.gz (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\GetModule\ofadik.gz (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\digeste.dll (Trojan.Agent) -> Quarantined and deleted successfully.

MOST RECENT MBAM LOG

Malwarebytes' Anti-Malware 1.34
Database version: 1842
Windows 5.1.2600 Service Pack 3

3/14/2009 9:48:01 PM
mbam-log-2009-03-14 (21-48-00).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 299688
Time elapsed: 3 hour(s), 11 minute(s), 46 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


BITDEFENDER LOG

Statistics

Time
02:19:55

Files
681821

Folders
16614

Boot Sectors
0

Archives
16824

Packed Files
32838




Results

Identified Viruses
5

Infected Files
10

Suspect Files
2

Warnings
0

Disinfected
0

Deleted Files
11




Engines Info

Virus Definitions
2793917

Engine build
AVCORE v1.7 (build 8314.19) (i386) (Sep 29 2008 17:19:14)

Scan plugins
17

Archive plugins
45

Unpack plugins
7

E-mail plugins
6

System plugins
4




Scan Settings

First Action
Disinfect

Second Action
Delete

Heuristics
Yes

Enable Warnings
Yes

Scanned Extensions
*;

Exclude Extensions


Scan Emails
Yes

Scan Archives
Yes

Scan Packed
Yes

Scan Files
Yes

Scan Boot
Yes




Scanned File
Status

C:\hp\bin\KillWind.exe
Infected with: Virtool.1992

C:\hp\bin\KillWind.exe
Deleted

C:\Program Files\Yahoo!\YUM\Files\browser_browser2004082501-02091701.exe
Suspected of: Dropped:Generic.Malware.SYkd.6250B97C

C:\Program Files\Yahoo!\YUM\Files\browser_browser2004082501-02091701.exe
Disinfection failed

C:\Program Files\Yahoo!\YUM\Files\browser_browser2004082501-02091701.exe
Deleted

C:\Program Files\Yahoo! Games\Tradewinds\WebDriverSilentInstall.exe=>(NSIS o)=>zlib_nsis0022
Detected with: Spyware.945

C:\Program Files\Yahoo! Games\Tradewinds\WebDriverSilentInstall.exe=>(NSIS o)=>zlib_nsis0022
Deleted

C:\Program Files\Yahoo! Games\Tradewinds\WebDriverSilentInstall.exe=>(NSIS o)
Update failed

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1312\A0239787.dll
Infected with: Trojan.Generic.1536683

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1312\A0239787.dll
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1314\A0241819.dll
Infected with: Trojan.Generic.1536683

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1314\A0241819.dll
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1316\A0241830.dll
Infected with: Trojan.Generic.1536683

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1316\A0241830.dll
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1317\A0243842.dll
Infected with: Trojan.Generic.1536683

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1317\A0243842.dll
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1317\A0243843.dll
Infected with: Trojan.Generic.1536683

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1317\A0243843.dll
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1317\A0243844.dll
Detected with: Adware.Generic.9654

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1317\A0243844.dll
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1326\A0244979.exe
Infected with: Virtool.1992

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1326\A0244979.exe
Deleted

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1326\A0244980.exe
Suspected of: Dropped:Generic.Malware.SYkd.6250B97C

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1326\A0244980.exe
Disinfection failed

C:\System Volume Information\_restore{70304573-AB33-4072-AA96-4495C42D15E3}\RP1326\A0244980.exe
Deleted

C:\WINDOWS\system32\mst123.dll
Infected with: Trojan.Generic.1452677

C:\WINDOWS\system32\mst123.dll
Disinfection failed

C:\WINDOWS\system32\mst123.dll
Delete failed

#4 cooner

cooner
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:33 PM

Posted 16 March 2009 - 09:44 AM

Hoov,

This from the MBAM scan last night......

Thanks,

cooner

Malwarebytes' Anti-Malware 1.34
Database version: 1853
Windows 5.1.2600 Service Pack 3

3/16/2009 7:36:36 AM
mbam-log-2009-03-16 (07-36-36).txt

Scan type: Quick Scan
Objects scanned: 98426
Time elapsed: 13 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{f02a3d1a-d7b2-41ca-a1eb-58c9cb4764d7} (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\mst123.dll (Trojan.Agent) -> Delete on reboot.

#5 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:02:33 AM

Posted 16 March 2009 - 04:25 PM

I am sorry to have left you hanging this weekend. I am having a cat5e cable problem. I have a real ugly fix right now so I can do some catch up and let people know I didn't abandon them intentionally. I won't be able to post again until March 17 at about 5PM East Coast USA time (UCT -4).

Sorry for any inconvenience.


Try going to free.avg.com and downloading, then installing, updating and running it. Make sure you turn off the CA antivirus first.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#6 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:02:33 AM

Posted 22 March 2009 - 06:30 PM

cooner, do you still need help?
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#7 cooner

cooner
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:33 PM

Posted 23 March 2009 - 11:28 PM

Hoov,

I do still need help.....I am waiting for things to clear up in your domain.

Thanks,

Brian

#8 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:02:33 AM

Posted 24 March 2009 - 08:50 AM

Lets go ahead with it. I am good for now.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#9 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:02:33 AM

Posted 06 April 2009 - 10:26 PM

cooner, do you still need help? We need to get this done.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#10 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:02:33 AM

Posted 11 April 2009 - 01:09 AM

This thread is closed due to inactivity.
If you need this topic reopened, please send me a PM. This applies to the thread originator only, all others start a new thread.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users