Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Still Infected?


  • Please log in to reply
14 replies to this topic

#1 jimmymac

jimmymac

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 17 August 2009 - 08:11 PM

I cannot connect to my bank website. The diagnosis of the error was that the website was not responding. However, I can get online there at work. So, I ran a scan with Avira and found no infections on either my computer, or my wife's. However, I ran MBAM and found 2 infections on this computer and 21 on hers, which MBAM removed. I have posted each log file with the corresponding computer's OS & AV. Still having the issue of not being able to connect to my online banking.

Windows Vista
IE 8
Avira Free Version

Malwarebytes' Anti-Malware 1.40
Database version: 2644
Windows 6.0.6001 Service Pack 1

8/17/2009 7:01:44 PM
mbam-log-2009-08-17 (19-01-44).txt

Scan type: Quick Scan
Objects scanned: 79939
Time elapsed: 2 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



Windows XP SP3
IE 8
Avira Free Version

Malwarebytes' Anti-Malware 1.40
Database version: 2644
Windows 5.1.2600 Service Pack 3

8/17/2009 7:01:29 PM
mbam-log-2009-08-17 (19-01-29).txt

Scan type: Quick Scan
Objects scanned: 116016
Time elapsed: 17 minute(s), 3 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 11
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 6

Memory Processes Infected:
C:\Program Files\Gamevance\gamevance32.exe (Adware.Gamevance) -> Unloaded process successfully.

Memory Modules Infected:
C:\Program Files\Gamevance\gamevancelib32.dll (Adware.Gamevance) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{0ed403e8-470a-4a8a-85a4-d7688cfe39a3} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0ed403e8-470a-4a8a-85a4-d7688cfe39a3} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0ed403e8-470a-4a8a-85a4-d7688cfe39a3} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{014c4232-6904-47b9-9144-7e0fb7277444} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0ab02d6c-f605-425f-b7cb-b9e96c9faf1e} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{32864a05-9d09-472c-abd0-081818ec713b} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{beac7dc8-e106-4c6a-931e-5a42e7362883} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{beac7dc8-e106-4c6a-931e-5a42e7362883} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{beac7dc8-e106-4c6a-931e-5a42e7362883} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\gamevance (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\gvtl (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gamevance (Adware.Gamevance) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Gamevance (Adware.Gamevance) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\Gamevance\gamevancelib32.dll (Adware.Gamevance) -> Quarantined and deleted successfully.
C:\Program Files\Gamevance\ars.cfg (Adware.Gamevance) -> Quarantined and deleted successfully.
C:\Program Files\Gamevance\gamevance32.exe (Adware.Gamevance) -> Quarantined and deleted successfully.
C:\Program Files\Gamevance\gvtl.dll (Adware.Gamevance) -> Quarantined and deleted successfully.
C:\Program Files\Gamevance\gvun.exe (Adware.Gamevance) -> Quarantined and deleted successfully.
C:\Program Files\Gamevance\icon.ico (Adware.Gamevance) -> Quarantined and deleted successfully.

BC AdBot (Login to Remove)

 


#2 neomage

neomage

  • Members
  • 306 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:39 AM

Posted 17 August 2009 - 09:03 PM

Hello, jimmymac.
Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.



:flowers: We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

:thumbsup: Try to ping bank's website IP.


In your next reply, please include the following:
  • RootRepeal.txt
  • Ping Results


Regards,
neomage

#3 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:39 AM

Posted 17 August 2009 - 09:08 PM

If you are not sure on how to ping a website, look here:

http://wiki.phoenixlabs.org/wiki/How_to_pi...ess%3F#Step_One
Computer Pro

#4 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 17 August 2009 - 11:07 PM

I forgot to put on the post that my Vista machine is 64 bit. I get a message that it won't work with 64 bit OS's.

#5 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 17 August 2009 - 11:31 PM

This is from the XP SP3 machine

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/17 23:12
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA9FE9000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B71000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA831A000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\documents and settings\sarah&james\local settings\temp\~dfe584.tmp
Status: Allocation size mismatch (API: 393216, Raw: 16384)

Path: c:\documents and settings\sarah&james\local settings\temp\~dfb046.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "<unknown>" at address 0xf7cd7426

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0xf7cd741c

#: 063 Function Name: NtDeleteKey
Status: Hooked by "<unknown>" at address 0xf7cd742b

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "<unknown>" at address 0xf7cd7435

#: 098 Function Name: NtLoadKey
Status: Hooked by "<unknown>" at address 0xf7cd743a

#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0xf7cd7408

#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0xf7cd740d

#: 193 Function Name: NtReplaceKey
Status: Hooked by "<unknown>" at address 0xf7cd7444

#: 204 Function Name: NtRestoreKey
Status: Hooked by "<unknown>" at address 0xf7cd743f

#: 247 Function Name: NtSetValueKey
Status: Hooked by "<unknown>" at address 0xf7cd7430

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys" at address 0xaa20f0b0

==EOF==

Request timed out.
Request timed out.
Request timed out.
Request timed out.

Ping statistics for 74.202.64.70:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss).

#6 neomage

neomage

  • Members
  • 306 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:39 AM

Posted 17 August 2009 - 11:39 PM

Your choices are very limited of tools you can run. SO both the computer can't pint he ip? Seems like network issue. Your rootkit scan is clean.

Edited by neomage, 17 August 2009 - 11:42 PM.


#7 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 17 August 2009 - 11:41 PM

I get the same ping results on the Vista machine. All packets lost.

#8 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 17 August 2009 - 11:44 PM

Your choices are very limited of tools you can run. SO both the computer can't pint he ip? Seems like network issue. Your rootkit scan is clean.


Both are clean? Should I reboot my router and modem?

#9 neomage

neomage

  • Members
  • 306 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:39 AM

Posted 18 August 2009 - 12:22 AM

Try to connect directly with out a router and firewall. Also Check your host file: http://www.bleepingcomputer.com/tutorials/hosts-files-explained/ . Post its contents in your next post.

#10 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 18 August 2009 - 12:26 PM

I still can't get to the bank website with the ethernet cable directly from the modem connected to either computer. Both host files are empty. The Vista file contents are below. The XP just contains the local entry. Also, the XP machine is not able to connect to the iTunes store through the iTunes app any longer. Right now, my banking website is the only URL that I cannot access.

# Copyright © 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost
::1 localhost

#11 neomage

neomage

  • Members
  • 306 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:39 AM

Posted 18 August 2009 - 02:51 PM

Hello, jimmymac.
Just to be sure lets try rootkit scan.

:flowers: Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now".
  • Click Yes and allow the driver and its randomly named .tmp file (i.e. F.tmp) to load if asked.
  • If the scan did not start automatically, make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

:thumbsup: Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.

c:\documents and settings\sarah&james\local settings\temp\~dfe584.tmp
c:\documents and settings\sarah&james\local settings\temp\~dfb046.tmp


Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/

In your next reply, please include the following:
  • sarscan.log
  • Virustotal/Jotti Scan Log

Regards,
neomage

#12 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 18 August 2009 - 03:08 PM

Thanks neomage. Will this work on the Vista 64 bit machine as well?

#13 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 18 August 2009 - 08:42 PM

XP machine.

Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/18/2009 at 19:01:11 PM
User "Sarah&James" on computer "MCREYNOLDS"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x100 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\PUTFEZ4W\site=goodhousekeeping;sect=beauty;sub=hair;page=celebrity-hairstyles-one-length-may07;cat=beauty;subcat=;kw=ist;sz=1x2;dcopt=ist;tile=1;ord=5315857503159418[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\PUTFEZ4W\;site=goodhousekeeping;sect=beauty;sub=hair;page=celebrity-hairstyles-one-length-may07;cat=beauty;subcat=;kw=ist;sz=728x90;tile=1;pos=1;ord=5315857503159418[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\UY5DTCZA\ADTYPE=BIGBOX&PAGEPOS=5&CATEGORY=HOME&PAGE=MAIN&SITE=FOOD&TILE=913835078132176&ORD=616019078&PAGETYPE=SECTION&UNIQUEID=FOOD_SECTION_32176_1&SECTION_ID=32176[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\PUTFEZ4W\site=goodhousekeeping;sect=beauty;sub=hair;page=celebrity-hairstyles-one-length-may07;cat=beauty;subcat=;kw=ist;sz=336x280;tile=2;pos=4;ord=5315857503159418[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\C78DZJP9\E_LEADERBOARD&PAGEPOS=1&CATEGORY=HOME&PAGE=MAIN&SITE=FOOD&TILE=913835078132176&ORD=616019078&PAGETYPE=SECTION&UNIQUEID=FOOD_SECTION_32176_1&SECTION_ID=32176[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\PUTFEZ4W\te=goodhousekeeping;sect=home;sub=decor;page=decorating-ideas-master-bedroom;cat=home;subcat=;tool=flipbook;kw=;sz=336x280;tile=9;pos=3;ord=5458982128274359[1]
Hidden: file C:\Program Files\Google\Google Desktop Search\temp\_PREV_GoogleDesktopSetup.exe
Hidden: file C:\WINDOWS\system32\config\SECURITY.tmp.LOG
Hidden: file C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcrst.dll
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\XCVU1A5X\TYPE=PUSHDOWN&PAGEPOS=1&CATEGORY=HOME&PAGE=MAIN&SITE=FOOD&TILE=913835078132176&ORD=616019078&PAGETYPE=SECTION&UNIQUEID=FOOD_SECTION_32176_1&SECTION_ID=32176[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\67QRE0SY\,http%3A%2F%2Fomg.yahoo[1].com%2Fxhr%2Fad%2Flrec%2F2115807099%3Fref%3Dahr0cdovl3d3dy55ywhvby5jb20v%26token%3Db475da4881df940801d7698aa9d116ab,;ord=1246917831
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\PUTFEZ4W\pid=33216460;aid=214612932;ko=0;cid=31990055;rid=32007931;rv=1;&timestamp=1246850352562;eid1=2;ecn1=1;etm1=3;eid2=10;ecn2=1;etm2=0;eid3=4;ecn3=1;etm3=0;[1].gif
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\C78DZJP9\=SUPERSTITIAL&PAGEPOS=3&CATEGORY=HOME&PAGE=MAIN&SITE=FOOD&TILE=913835078132176&ORD=616019078&PAGETYPE=SECTION&UNIQUEID=FOOD_SECTION_32176_1&SECTION_ID=32176[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\0TMV81UF\LeaderTop,LeaderBtm,Popunder,Ribbon1,Ribbon2,Skyscraper,Splogo1,Splogo2,Splogo3,Splogo4,Splogo5,Sponsor1,MedRectangle,MSDtxt1,MSDtxt2,MSDtxt3,Txt1,Txt2,Txt3[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\XCVU1A5X\;net=ns;u=ns-79265406_1250568649,1123cb12670805c,Miscellaneous,;;kw=;dcopt=ist;tile=1;ord1=783686;sz=728x90;contx=Miscellaneous;btg=;ord=%202198555304372222[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\SVTU6BG2\page;net=ns;u=ns-43714135_1250568650,1123cb12670805c,Miscellaneous,;;kw=;tile=3;ord1=491119;sz=120x600,160x600;contx=Miscellaneous;btg=;ord=2198555304372222[1]
Hidden: file C:\Documents and Settings\Sarah&James\Local Settings\Temporary Internet Files\Content.IE5\C5F1R2KO\;net=ns;u=ns-67450676_1250568651,1123cb12670805c,Miscellaneous,;;kw=;dcopt=ist;tile=1;ord1=824529;sz=728x90;contx=Miscellaneous;btg=;ord=%202198555304372222[1]
Stopped logging on 8/18/2009 at 19:38:09 PM

Neither of the tmp files in your post were listed on the XP Machine.

#14 neomage

neomage

  • Members
  • 306 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:39 AM

Posted 18 August 2009 - 08:52 PM

Log seems clean. Try to run a tracert to that ip and see how far it goes. http://www.lightningsupport.com/index.php?...p;page=index_v2 . You should be able to run sophos on 64 bit as far as i know. Have you tried running it on 64 bit?

Edited by neomage, 18 August 2009 - 08:52 PM.


#15 jimmymac

jimmymac
  • Topic Starter

  • Members
  • 50 posts
  • OFFLINE
  •  
  • Local time:02:39 AM

Posted 18 August 2009 - 08:54 PM

Just out of curiosity, I rebooted both my modem and my router, and now I can connect to that website. Hmmmm, maybe they did some security updates and I had to reset my IP address with them? Thanks for your help. At least I have peace of mind after getting a clean rootkit scan.

I love this site!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users