Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Clickover, Overclick and Antivirus Pro


  • This topic is locked This topic is locked
15 replies to this topic

#1 duncanstein

duncanstein

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 21 August 2009 - 12:16 PM

Hello All,

I have gotten the Antivirus Pro at least twice now. I can get rid of it with Malwarebytes. Not sure how it get on here though.

My biggest issue is the highjacking of my browser. If I do a search I get the proper results but if I click on a result it takes me to some other site. If I click the back button, different site. If I just type in the site I want or copy and paste the address from the search results it goes to the site I want.

I followed the directions on how to post and the DDS thing did not work properly. It did not go to the black window, it just gave me a notepad file. Below is an example of what it gave me. I was going to post the whole thing but it was too big to load up. I posted the part that was legible. There was tons of the other stuff!!

       X     d     8 a      `    x a ? 
A S K N E X T V O L G E T P A S S W O R D 1
L I C E N S E D L G R E N A M E D L G  R E P L A C E F I L E D L G  S T A R T D L G  D V C L A L  ( @   33333333330  o  ox   o xx  o8 ? o 8Ǐ ?̏ o8x ?̏ 8x o?̏ x ̏ o                              
  S e l e c t d e s t i n a t i o n f o l d e r
E x t r a c t i n g % s S k i p p i n g % s  U n e x p e c t e d e n d o f a r c h i v e  T h e f i l e " % s " h e a d e r i s c o r r u p t % T h e a r c h i v e c o m m e n t h e a d e r i s c o r r u p t  T h e a r c h i v e c o m m e n t i s c o r r u p t  N o t e n o u g h m e m o r y  U n k n o w n m e t h o d i n % s  C a n n o t o p e n % s  C a n n o t c r e a t e % s  C a n n o t c r e a t e f o l d e r % s  6 C R C f a i l e d i n t h e e n c r y p t e d f i l e % s ( w r o n g p a s s w o r d ? )  C R C f a i l e d i n % s  P a c k e d d a t a C R C f a i l e d i n % s  W r o n g p a s s w o r d f o r % s 5 W r i t e e r r o r i n t h e f i l e % s . P r o b a b l y t h e d i s k i s f u l l  R e a d e r r o r i n t h e f i l e % s  F i l e c l o s e e r r o r  T h e r e q u i r e d v o l u m e i s a b s e n t 2 T h e a r c h i v e i s e i t h e r i n u n k n o w n f o r m a t o r d a m a g e d  E x t r a c t i n g f r o m % s N e x t v o l u m e  T h e a r c h i v e h e a d e r i s c o r r u p t  C l o s e  E r r o r a E r r o r s e n c o u n t e r e d w h i l e p e r f o r m i n g t h e o p e r a t i o n
L o o k a t t h e i n f o r m a t i o n w i n d o w f o r m o r e d e t a i l s PA  b y t e s m o d i f i e d o n  f o l d e r i s n o t a c c e s s i b l e l S o m e f i l e s c o u l d n o t b e c r e a t e d .
P l e a s e c l o s e a l l a p p l i c a t i o n s , r e b o o t W i n d o w s a n d r e s t a r t t h i s i n s t a l l a t i o n \ S o m e i n s t a l l a t i o n f i l e s a r e c o r r u p t .
P l e a s e d o w n l o a d a f r e s h c o p y a n d r e t r y t h e i n s t a l l a t i o n A l l f i l e s PA E < u l > < l i > P r e s s < b > I n s t a l l < / b > b u t t o n t o s t a r t e x t r a c t i o n . < / l i > < b r > < b r > 6 < l i > U s e < b > B r o w s e < / b > b u t t o n t o s e l e c t t h e d e s t i n a t i o n 4 f o l d e r f r o m t h e f o l d e r s t r e e . I t c a n b e a l s o e n t e r e d  m a n u a l l y . < / l I > < b r > < b r > 8 < l I > I f t h e d e s t i n a t i o n f o l d e r d o e s n o t e x i s t , i t w i l l b e 2 c r e a t e d a u t o m a t i c a l l y b e f o r e e x t r a c t i o n . < / l I > < / u l > PAh        | <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
version="1.0.0.0"
processorArchitecture="X86"
name="WinRAR SFX"
type="win32"/>
<description>WinRAR SFX module</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="requireAdministrator"
uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity
type="win32"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
processorArchitecture="X86"
publicKeyToken="6595b64144ccf1df"
language="*"/>
</dependentAssembly>
</dependency>
</assembly>
P e e f e f e f e (f e 2f e <f e Hf e Rf `f pf f f f f  f f f f f KERNEL32.DLL ADVAPI32.DLL COMCTL32.DLL COMDLG32.DLL GDI32.DLL OLE32.DLL SHELL32.DLL USER32.DLL LoadLibraryA GetProcAddress VirtualProtect VirtualAlloc VirtualFree ExitProcess RegCloseKey GetOpenFileNameA DeleteObject OleInitialize SHGetMalloc SetMenu Rar! ;s
z # k j  3 CMT
P
/N
E7AiCCoHwTWr3ܽ2zt7ͯ+A6INoQ&ѽ!f<dqUݮoe-ut. 
I0Js(95 Assoc.cmd Ik fqױ`.'IX1Kh=LJ4>hTw{br!)`CP3P_








The ark.txt is as follows:


ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/08/21 12:21
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA867F000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA5F0000 Size: 8192 File Visible: No Signed: -
Status: -

Name: fdkvlov.sys
Image Path: C:\WINDOWS\system32\drivers\fdkvlov.sys
Address: 0xA8717000 Size: 61440 File Visible: No Signed: -
Status: -

Name: hjgruiokejpihp.sys
Image Path: C:\WINDOWS\system32\drivers\hjgruiokejpihp.sys
Address: 0xA88F0000 Size: 163840 File Visible: - Signed: -
Status: Hidden from the Windows API!

Name: iqdpiqym.sys
Image Path: C:\WINDOWS\system32\drivers\iqdpiqym.sys
Address: 0xA8707000 Size: 61440 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA777E000 Size: 49152 File Visible: No Signed: -
Status: -

Name: rxhd.sys
Image Path: C:\WINDOWS\system32\drivers\rxhd.sys
Address: 0xA8727000 Size: 61440 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\hjgruibdibnmdx.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruihjwlfsgy.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruiiycvbjta.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruilog.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruixstwxmwg.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruivpfjpbivrb.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruiwgvtdcxtlb.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruixhspnckshm.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruiluvssngkmi.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruinmcxgaibvl.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruinxtqitvpvs.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruiowqjihptwv.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruitxtibcriof.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\hjgruiokejpihp.sys
Status: Invisible to the Windows API!

Path: c:\windows\system32\ccm\servicedata\messaging\endpointqueues\policyagent_policyevaluator\000000oa.msg
Status: Allocation size mismatch (API: 32768, Raw: 28672)

Path: c:\windows\system32\ccm\servicedata\messaging\endpointqueues\ls_scheduledcleanup\00000061.msg
Status: Allocation size mismatch (API: 16384, Raw: 12288)

Path: c:\windows\system32\ccm\servicedata\messaging\endpointqueues\policyagent_requestassignments\0000009x.msg
Status: Allocation size mismatch (API: 40960, Raw: 36864)

Path: c:\windows\system32\ccm\servicedata\messaging\outgoingqueues\amp_[http]mp_locationmanager\00000019.msg
Status: Allocation size mismatch (API: 8192, Raw: 4096)

Path: c:\windows\system32\ccm\servicedata\messaging\outgoingqueues\mp_mp_ddrendpoint\0000000d.msg
Status: Allocation size mismatch (API: 135168, Raw: 131072)

Path: c:\windows\system32\ccm\servicedata\messaging\outgoingqueues\mp_statusreceiver\00000030.msg
Status: Allocation size mismatch (API: 73728, Raw: 61440)

Path: c:\windows\system32\ccm\servicedata\messaging\outgoingqueues\mp_[http]mp_policymanager\0000009i.msg
Status: Allocation size mismatch (API: 20480, Raw: 16384)

Stealth Objects
-------------------
Object: Hidden Module [Name: hjgruixstwxmwg.dll]
Process: svchost.exe (PID: 1576) Address: 0x007c0000 Size: 53248

Object: Hidden Module [Name: hjgruiiycvbjta.dll]
Process: svchost.exe (PID: 1576) Address: 0x10000000 Size: 28672

Object: Hidden Handle [Index: 4, Type: UnknownType]
Process: MsMpEng.exe (PID: 1728) Address: 0xe6a90610 Size: -

Object: Hidden Handle [Index: 4, Type: UnknownType]
Process: svchost.exe (PID: 1772) Address: 0xe2f4f818 Size: -

Hidden Services
-------------------
Service Name: hjgruicohfhkbg
Image Path: C:\WINDOWS\system32\drivers\hjgruiokejpihp.sys

==EOF==

There is also a 'settings.dat' file that appeared? I tried to attach it but it keeps saying that I did not select a file to upload?


Thanks for your time,
David

Attached Files

  • Attached File  ark.txt   8.59KB   1 downloads
  • Attached File  dds.txt   351.5KB   5 downloads

Edited by duncanstein, 21 August 2009 - 12:32 PM.


BC AdBot (Login to Remove)

 


#2 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 21 August 2009 - 02:54 PM

I have to add that now when I do a search it takes a long time and it comes back with sites that are like, sales sites I guess, not the regular results.

I did see a result that said "toseeka.org and toseeka.com".

Not sure if this info helps but it is a change that I thought I should pass on.

#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:19 AM

Posted 23 August 2009 - 03:58 PM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#4 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 23 August 2009 - 08:06 PM

Thanks Sam!

I wasn't sure if you wanted me to attach the file or include it in the body of the reply. I figured I would err on the side that took up less space. :thumbup2:

Thanks again for your help,
David


ComboFix 09-08-22.06 - duncad01 08/23/2009 20:39.1.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.2038.1461 [GMT -4:00]
Running from: c:\documents and settings\duncad01\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\program files\mantec~1
c:\program files\ppatch~1
c:\program files\WinPCap
c:\program files\WinPCap\rpcapd.exe
c:\windows\javapatch123.exe
c:\windows\mantec~1
c:\windows\RM.exe
c:\windows\system32\7186.exe
c:\windows\system32\AutoRun.inf
c:\windows\system32\aybeg.ini2
c:\windows\system32\bojpkrbb.ini
c:\windows\system32\c2
c:\windows\system32\c4
c:\windows\system32\config\systemprofile\Start Menu\Programs\Windows Antivirus Pro
c:\windows\system32\config\systemprofile\Start Menu\Programs\Windows Antivirus Pro\Windows Antivirus Pro.lnk
c:\windows\system32\drivers\hjgruiokejpihp.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\eokthqgx.ini
c:\windows\system32\eyaucycm.dll
c:\windows\system32\gwncjjmn.ini
c:\windows\system32\hjgruibdibnmdx.dat
c:\windows\system32\hjgruihjwlfsgy.dat
c:\windows\system32\hjgruiiycvbjta.dll
c:\windows\system32\hjgruilog.dat
c:\windows\system32\hjgruixstwxmwg.dll
c:\windows\system32\ixxijiyp.ini
c:\windows\system32\k8
c:\windows\system32\kronitil.ini
c:\windows\system32\New Text Document.txt
c:\windows\system32\ocowxmmx.ini
c:\windows\system32\onhraruw.ini
c:\windows\system32\Packet.dll
c:\windows\system32\pmahgtsy.dll
c:\windows\system32\ptegxfrj.ini
c:\windows\system32\pthreadVC.dll
c:\windows\system32\rqtss.ini
c:\windows\system32\s7
c:\windows\system32\urlliqil.ini
c:\windows\system32\uwxigdip.ini
c:\windows\system32\WanPacket.dll
c:\windows\system32\winmm64.dll
c:\windows\system32\wpcap.dll
c:\windows\system32\x3
c:\windows\system32\ypjghyqg.ini
c:\windows\system32\yxpedvso.ini
c:\windows\wnsxs~1

----- BITS: Possible infected sites -----

hxxp://UWIATLSMS03:80
c:\windows\system32\proquota.exe . . . is missing!!

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_hjgruicohfhkbg
-------\Legacy_hjgruicohfhkbg
-------\Legacy_NPF
-------\Service_npf


((((((((((((((((((((((((( Files Created from 2009-07-24 to 2009-08-24 )))))))))))))))))))))))))))))))
.

2009-08-18 20:46 . 2009-08-18 20:46 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
2009-08-13 00:20 . 2009-08-13 00:20 -------- d-----w- c:\documents and settings\duncad01\Application Data\GARMIN
2009-08-13 00:15 . 2009-08-13 00:15 -------- d-----w- c:\program files\Garmin GPS Plugin
2009-08-13 00:14 . 2009-08-13 00:14 -------- d-----w- c:\program files\DIFX
2009-08-13 00:14 . 2009-08-13 00:14 -------- d-----w- c:\program files\Garmin
2009-08-09 04:15 . 2009-08-09 04:15 152576 ----a-w- c:\documents and settings\duncad01\Application Data\Sun\Java\jre1.6.0_15\lzma.dll
2009-08-01 16:52 . 2009-07-03 14:49 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-08-01 15:13 . 2009-07-03 14:49 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-08-01 15:11 . 2009-08-01 15:11 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
2009-08-01 15:11 . 2009-07-08 17:28 2920112 -c--a-w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}\Ad-AwareAE.exe
2009-08-01 15:11 . 2009-08-01 15:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-08-01 15:11 . 2009-08-01 15:11 -------- d-----w- c:\program files\Lavasoft
2009-07-30 15:05 . 2009-08-21 02:40 3942048 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-07-27 01:52 . 2009-07-27 01:52 -------- d-----w- c:\documents and settings\All Users\Application Data\MumboJumbo
2009-07-27 01:52 . 2009-07-27 01:52 -------- d-----w- c:\program files\MumboJumbo

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-22 14:55 . 2008-07-12 01:31 -------- d-----w- c:\program files\Google
2009-08-21 02:40 . 2009-07-11 02:40 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-09 04:16 . 2008-05-04 12:38 -------- d-----w- c:\program files\Java
2009-08-06 17:15 . 2008-06-25 02:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-08-06 17:10 . 2008-02-20 23:56 -------- d-----w- c:\documents and settings\duncad01\Application Data\Yahoo!
2009-08-06 17:10 . 2008-02-20 23:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2009-08-03 17:36 . 2009-07-11 02:40 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-03 17:36 . 2009-07-11 02:40 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-03 01:44 . 2009-03-14 01:00 -------- d-----w- c:\documents and settings\duncad01\Application Data\Apple Computer
2009-07-25 09:23 . 2008-12-19 14:39 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-07-21 01:24 . 2009-07-21 01:24 -------- d-----w- c:\program files\BFG
2009-07-16 20:21 . 2009-07-15 02:21 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-07-16 20:16 . 2009-07-15 02:11 -------- d-----w- c:\documents and settings\All Users\Application Data\BigFishGamesCache
2009-07-15 02:14 . 2009-07-15 02:14 -------- d-----w- c:\program files\bfgclient
2009-07-14 20:37 . 2009-07-14 20:37 -------- d-----w- c:\program files\Data Freight
2009-07-11 02:40 . 2009-07-11 02:40 -------- d-----w- c:\documents and settings\duncad01\Application Data\Malwarebytes
2009-07-11 02:40 . 2009-07-11 02:40 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-07-06 15:23 . 2009-07-06 15:22 256 ----a-w- c:\documents and settings\duncad01\pool.bin
2009-07-06 13:22 . 2009-07-06 13:22 -------- d-----w- c:\program files\Common Files\OMRON
2009-07-06 13:22 . 2008-04-29 23:08 -------- d-----w- c:\program files\Rockwell Software
2009-07-06 13:22 . 2008-04-29 23:08 -------- d-----w- c:\program files\Common Files\Rockwell
2009-07-06 13:22 . 2009-07-06 13:22 -------- d-----w- c:\program files\Common Files\OPC Foundation
2009-07-04 20:09 . 2009-07-04 20:09 -------- d-----w- c:\program files\Windows Defender
2009-06-30 13:01 . 2009-05-10 13:54 -------- d-----w- c:\program files\Rockwell Automation
2009-06-30 12:42 . 2009-06-30 12:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Rockwell Automation
2009-06-30 12:41 . 2009-06-30 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\WFCU
2009-06-30 12:41 . 2009-06-30 12:41 131 ------w- c:\documents and settings\duncad01\Local Settings\Application Data\fusioncache.dat
2009-06-29 21:47 . 2008-04-20 22:14 -------- d-----w- c:\program files\3DHA - Home And Landscape Deluxe Suite
2009-02-02 08:00 . 2009-02-02 11:48 338 ---h-tr- c:\program files\Backup Log
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PopUpStopperFreeEdition"="c:\progra~1\PANICW~1\POP-UP~1\PSFree.exe" [2005-03-17 536576]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"OfficeScanNT Monitor"="c:\program files\Trend Micro\OfficeScan Client\pccntmon.exe" [2005-08-31 335872]
"hpqSRMon"="c:\program files\HP\Digital Imaging\bin\hpqSRMon.exe" [2007-08-22 80896]
"EverioService"="c:\program files\CyberLink\PCM4Everio\EverioService.exe" [2008-04-03 151552]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2007-08-16 236016]
"Sprint SmartView"="c:\program files\Sprint\Sprint SmartView\SprintSV.exe" [2008-10-15 17664]
"HP Software Update"="c:\program files\Hewlett-Packard\HP Software Update\HPWuSchd.exe" [2003-06-25 49152]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-10-24 233472]
"basicsmssmenu"="c:\program files\Seagate\Basics\Basics Status\MaxMenuMgrBasics.exe" [2007-10-09 169328]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-03-13 342312]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-10-11 29984]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-10-11 46368]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-08-31 328992]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2008-05-29 1085440]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-12-21 86016]
"UsbCipHelper"="c:\program files\Rockwell Automation\Rockwell Automation USB CIP Driver Package\UsbCipHelper\UsbCipHelper.exe" [2008-05-27 434176]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2006-11-03 866584]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-07-25 149280]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoMSAppLogo5ChannelNotify"= 1 (0x1)
"NoDisconnect"= 1 (0x1)

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoSimpleStartMenu"= 1 (0x1)
"NoWelcomeScreen"= 1 (0x1)
"NoAutoUpdate"= 1 (0x1)
"ForceStartMenuLogOff"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\windowsupdate\au]
"NoAutoUpdate"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-06-18 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2007-04-19 18:41 294912 ------w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-73586283-1580436667-725345543-33128\Scripts\Logon\0\0]
"Script"=\\uninet\uwwapps\Java6.5\javafix.bat

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\Rosetta Stone\\Rosetta Stone V3\\RosettaStoneVersion3.exe"=
"c:\\Program Files\\Rosetta Stone\\Rosetta Stone V3\\support\\bin\\RosettaStoneLtdServices.exe"=
"c:\\Program Files\\CyberLink\\PCM4Everio\\PCM4Everio.exe"=
"c:\\Program Files\\CyberLink\\PCM4Everio\\EverioService.exe"=
"c:\\WINDOWS\\system32\\mshta.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Brother\\Brmfl08b\\FAXRX.exe"=
"c:\\WINDOWS\\system32\\OpcEnum.exe"=
"c:\\Program Files\\Rockwell Software\\RSLinx\\RSLINX.EXE"=
"c:\\Program Files\\Rockwell Software\\OPCTools\\OPCTest\\opctest.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"<NO NAME>"=
"54925:UDP"= 54925:UDP:BrotherNetwork Scanner
"135:TCP"= 135:TCP:Port 135 TCP

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [8/1/2009 11:13 AM 64160]
R1 RSSerial;RSLinx Classic Serial Driver;c:\windows\system32\rsserial.sys [7/5/2008 6:19 PM 155440]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [10/10/2006 2:53 PM 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/27/2007 1:39 PM 55024]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 10:49 AM 1029456]
R2 TmFilter;Trend Micro Filter;c:\program files\Trend Micro\OfficeScan Client\tmxpflt.sys [11/9/2005 10:34 PM 190480]
R2 TmPreFilter;Trend Micro PreFilter;c:\program files\Trend Micro\OfficeScan Client\tmpreflt.sys [11/9/2005 10:34 PM 31248]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R3 PcmkWdm;%PcmkWdm.DeviceDesc%;c:\windows\system32\drivers\PcmkWdm.sys [4/22/2002 4:12 PM 58140]
S1 ohci13944;ohci13944;c:\windows\system32\drivers\ohci13944.sys --> c:\windows\system32\drivers\ohci13944.sys [?]
S2 hokjhotvza;hokjhotvza;\??\c:\windows\system32\drivers\kagfsmznl.sys --> c:\windows\system32\drivers\kagfsmznl.sys [?]
S2 ngurc;ngurc;\??\c:\windows\system32\drivers\ycggztkcwfmemfy.sys --> c:\windows\system32\drivers\ycggztkcwfmemfy.sys [?]
S3 Ca522bv;CA522B WebCam Driver;c:\windows\system32\drivers\Ca522Bv.sys [10/16/2007 1:36 PM 2329216]
S3 RsiKtControl;RsiKtControl;c:\windows\system32\RSIKT.SYS [7/5/2008 6:19 PM 39067]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/16/2006 6:51 PM 4096]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2009-08-22 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-07-03 14:49]

2009-08-24 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 23:20]
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Aim6 - (no file)
SSODL-WinCheck-{EAD8F454-EC03-4B47-A5B7-6534DA513FA5} - winmm64.dll
Notify-tsazplhg - tsazplhg.dll


.
------- Supplementary Scan -------
.
Trusted Zone: uwwnet
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {59F156FC-9BC4-11D5-B0A5-0060085A719D} - hxxp://opal.pascocountyfl.net/permit/opalplayerx5.cab
FF - ProfilePath - c:\documents and settings\duncad01\Application Data\Mozilla\Firefox\Profiles\vej8phzt.default\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-08-23 20:50
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
UsbCipHelper = c:\program files\Rockwell Automation\Rockwell Automation USB CIP Driver Package\UsbCipHelper\UsbCipHelper.exe????????????j?w??????@???D????? ??|P?E????|????????????1??|????P?E?????????4???????????????????>?@?????T???<??????|?????????????$???? ???D??????>@????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-73586283-1580436667-725345543-33128\Software\Microsoft\Driver Signing]
@Denied: (2) (Administrators)
@Allowed: (2) (Administrators)
@SACL=
"Policy"=dword:00000000

[HKEY_USERS\S-1-5-21-73586283-1580436667-725345543-33128\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_LOCAL_MACHINE\software\DeterministicNetworks\DNE\Parameters]
"SymbolicLinkValue"=hex(6):5c,00,52,00,65,00,67,00,69,00,73,00,74,00,72,00,79,
00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,79,00,73,00,\

[HKEY_LOCAL_MACHINE\software\Microsoft\Driver Signing]
@Denied: (2) (Administrators)
"Policy"=hex:00,00,00,00
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1280)
c:\windows\system32\CSGina.dll
c:\windows\system32\VPNAPI.DLL
c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'explorer.exe'(1748)
c:\progra~1\PANICW~1\POP-UP~1\XAHook.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Seagate\Basics\Service\SyncServicesBasics.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Cisco Systems\VPN Client\cvpnd.exe
c:\program files\Rockwell Software\RSCommon\RSOBSERV.EXE
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Dell\QuickSet\NicConfigSvc.exe
c:\program files\Trend Micro\OfficeScan Client\NTRtScan.exe
c:\progra~1\ROCKWE~1\RSLinx\RSLINX.EXE
c:\program files\SigmaTel\C-Major Audio\DellXPM_5515v131\WDM\stacsv.exe
c:\program files\Trend Micro\OfficeScan Client\TmListen.exe
c:\windows\system32\CCM\CcmExec.exe
c:\program files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
c:\windows\system32\wbem\unsecapp.exe
c:\windows\system32\msiexec.exe
c:\windows\Temp\EK100D.EXE
c:\program files\Trend Micro\OfficeScan Client\POP3Trap.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Brother\ControlCenter3\BrccMCtl.exe
c:\program files\Brother\Brmfcmon\BrMfimon.exe
.
**************************************************************************
.
Completion time: 2009-08-24 20:56 - machine was rebooted
ComboFix-quarantined-files.txt 2009-08-24 00:56

Pre-Run: 47,235,018,752 bytes free
Post-Run: 47,453,720,576 bytes free

Current=8 Default=8 Failed=7 LastKnownGood=9 Sets=1,2,3,4,5,6,7,8,9
297

Attached Files


Edited by Buckeye_Sam, 24 August 2009 - 11:06 AM.


#5 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 23 August 2009 - 09:22 PM

Sam,

I opened Firefox and did a Google search and was not re-directed!

I'm sure there is more to do but I thought you might want to know that.

Thanks!

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:19 AM

Posted 24 August 2009 - 11:11 AM

Actually it's much easier for me to review the log if you post it directly into your response.
It looks like we removed the rootkit infection, but still just a bit more to do.

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

Driver::
ohci13944
hokjhotvza
ngurc

File::
c:\windows\system32\drivers\ycggztkcwfmemfy.sys
c:\windows\system32\drivers\kagfsmznl.sys
c:\windows\system32\drivers\ohci13944.sys
Prior to running Combofix.exe you should disable your antivirus program.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.


===================



Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 24 August 2009 - 10:22 PM

Ok Sam, here goes.

Combo Fix log:

ComboFix 09-08-24.05 - duncad01 08/24/2009 22:05.2.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.2038.1412 [GMT -4:00]
Running from: c:\documents and settings\duncad01\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\duncad01\Desktop\CFScript.txt

FILE ::
"c:\windows\system32\drivers\kagfsmznl.sys"
"c:\windows\system32\drivers\ohci13944.sys"
"c:\windows\system32\drivers\ycggztkcwfmemfy.sys"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat

----- BITS: Possible infected sites -----

hxxp://UWDCTPATAM01:80
c:\windows\system32\proquota.exe . . . is missing!!

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_HOKJHOTVZA
-------\Legacy_NGURC
-------\Legacy_OHCI13944
-------\Service_hokjhotvza
-------\Service_ngurc
-------\Service_ohci13944


((((((((((((((((((((((((( Files Created from 2009-07-25 to 2009-08-25 )))))))))))))))))))))))))))))))
.

2009-08-18 20:46 . 2009-08-18 20:46 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
2009-08-13 00:20 . 2009-08-13 00:20 -------- d-----w- c:\documents and settings\duncad01\Application Data\GARMIN
2009-08-13 00:15 . 2009-08-13 00:15 -------- d-----w- c:\program files\Garmin GPS Plugin
2009-08-13 00:14 . 2009-08-13 00:14 -------- d-----w- c:\program files\DIFX
2009-08-13 00:14 . 2009-08-13 00:14 -------- d-----w- c:\program files\Garmin
2009-08-09 04:15 . 2009-08-09 04:15 152576 ----a-w- c:\documents and settings\duncad01\Application Data\Sun\Java\jre1.6.0_15\lzma.dll
2009-08-01 16:52 . 2009-07-03 14:49 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-08-01 15:13 . 2009-07-03 14:49 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-08-01 15:11 . 2009-08-01 15:11 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
2009-08-01 15:11 . 2009-07-08 17:28 2920112 -c--a-w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}\Ad-AwareAE.exe
2009-08-01 15:11 . 2009-08-01 15:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-08-01 15:11 . 2009-08-01 15:11 -------- d-----w- c:\program files\Lavasoft
2009-07-30 15:05 . 2009-08-21 02:40 3942048 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-07-27 01:52 . 2009-07-27 01:52 -------- d-----w- c:\documents and settings\All Users\Application Data\MumboJumbo
2009-07-27 01:52 . 2009-07-27 01:52 -------- d-----w- c:\program files\MumboJumbo

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-22 14:55 . 2008-07-12 01:31 -------- d-----w- c:\program files\Google
2009-08-21 02:40 . 2009-07-11 02:40 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-09 04:16 . 2008-05-04 12:38 -------- d-----w- c:\program files\Java
2009-08-06 17:15 . 2008-06-25 02:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-08-06 17:10 . 2008-02-20 23:56 -------- d-----w- c:\documents and settings\duncad01\Application Data\Yahoo!
2009-08-06 17:10 . 2008-02-20 23:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2009-08-03 17:36 . 2009-07-11 02:40 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-03 17:36 . 2009-07-11 02:40 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-03 01:44 . 2009-03-14 01:00 -------- d-----w- c:\documents and settings\duncad01\Application Data\Apple Computer
2009-07-25 09:23 . 2008-12-19 14:39 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-07-21 01:24 . 2009-07-21 01:24 -------- d-----w- c:\program files\BFG
2009-07-16 20:21 . 2009-07-15 02:21 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-07-16 20:16 . 2009-07-15 02:11 -------- d-----w- c:\documents and settings\All Users\Application Data\BigFishGamesCache
2009-07-15 02:14 . 2009-07-15 02:14 -------- d-----w- c:\program files\bfgclient
2009-07-14 20:37 . 2009-07-14 20:37 -------- d-----w- c:\program files\Data Freight
2009-07-11 02:40 . 2009-07-11 02:40 -------- d-----w- c:\documents and settings\duncad01\Application Data\Malwarebytes
2009-07-11 02:40 . 2009-07-11 02:40 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-07-06 15:23 . 2009-07-06 15:22 256 ----a-w- c:\documents and settings\duncad01\pool.bin
2009-07-06 13:22 . 2009-07-06 13:22 -------- d-----w- c:\program files\Common Files\OMRON
2009-07-06 13:22 . 2008-04-29 23:08 -------- d-----w- c:\program files\Rockwell Software
2009-07-06 13:22 . 2008-04-29 23:08 -------- d-----w- c:\program files\Common Files\Rockwell
2009-07-06 13:22 . 2009-07-06 13:22 -------- d-----w- c:\program files\Common Files\OPC Foundation
2009-07-04 20:09 . 2009-07-04 20:09 -------- d-----w- c:\program files\Windows Defender
2009-06-30 13:01 . 2009-05-10 13:54 -------- d-----w- c:\program files\Rockwell Automation
2009-06-30 12:42 . 2009-06-30 12:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Rockwell Automation
2009-06-30 12:41 . 2009-06-30 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\WFCU
2009-06-30 12:41 . 2009-06-30 12:41 131 ------w- c:\documents and settings\duncad01\Local Settings\Application Data\fusioncache.dat
2009-06-29 21:47 . 2008-04-20 22:14 -------- d-----w- c:\program files\3DHA - Home And Landscape Deluxe Suite
2009-02-02 08:00 . 2009-02-02 11:48 338 ---h-tr- c:\program files\Backup Log
.

((((((((((((((((((((((((((((( SnapShot@2009-08-24_00.50.37 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-08-25 02:12 . 2009-08-25 02:12 16384 c:\windows\Temp\Perflib_Perfdata_7d0.dat
+ 2009-08-25 02:13 . 2005-08-31 21:18 172099 c:\windows\Temp\KLF72F.EXE
+ 2006-11-07 06:50 . 2006-11-07 06:50 236328 c:\windows\system32\CCM\Cache\001000C7.742.System\UpdateWUSCatalog.exe
+ 2006-11-07 06:50 . 2006-11-07 06:50 166856 c:\windows\system32\CCM\Cache\001000C7.742.System\syncxml.exe
+ 2006-11-07 06:50 . 2006-11-07 06:50 203560 c:\windows\system32\CCM\Cache\001000C7.742.System\SmsWusHandler.exe
+ 2006-11-07 06:50 . 2006-11-07 06:50 355112 c:\windows\system32\CCM\Cache\001000C7.742.System\ScanWrapper.exe
+ 2006-11-07 06:50 . 2006-11-07 06:50 207656 c:\windows\system32\CCM\Cache\001000C7.742.System\ScanHlpr.dll
+ 2006-11-07 06:50 . 2006-11-07 06:50 154408 c:\windows\system32\CCM\Cache\001000C7.742.System\PatchDownloader.dll
+ 2006-11-07 06:50 . 2006-11-07 06:50 310056 c:\windows\system32\CCM\Cache\001000C7.742.System\advertisement.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PopUpStopperFreeEdition"="c:\progra~1\PANICW~1\POP-UP~1\PSFree.exe" [2005-03-17 536576]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"OfficeScanNT Monitor"="c:\program files\Trend Micro\OfficeScan Client\pccntmon.exe" [2005-08-31 335872]
"hpqSRMon"="c:\program files\HP\Digital Imaging\bin\hpqSRMon.exe" [2007-08-22 80896]
"EverioService"="c:\program files\CyberLink\PCM4Everio\EverioService.exe" [2008-04-03 151552]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2007-08-16 236016]
"Sprint SmartView"="c:\program files\Sprint\Sprint SmartView\SprintSV.exe" [2008-10-15 17664]
"HP Software Update"="c:\program files\Hewlett-Packard\HP Software Update\HPWuSchd.exe" [2003-06-25 49152]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-10-24 233472]
"basicsmssmenu"="c:\program files\Seagate\Basics\Basics Status\MaxMenuMgrBasics.exe" [2007-10-09 169328]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-03-13 342312]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-10-11 29984]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-10-11 46368]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-08-31 328992]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2008-05-29 1085440]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-12-21 86016]
"UsbCipHelper"="c:\program files\Rockwell Automation\Rockwell Automation USB CIP Driver Package\UsbCipHelper\UsbCipHelper.exe" [2008-05-27 434176]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2006-11-03 866584]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-07-25 149280]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoMSAppLogo5ChannelNotify"= 1 (0x1)
"NoDisconnect"= 1 (0x1)

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoSimpleStartMenu"= 1 (0x1)
"NoWelcomeScreen"= 1 (0x1)
"NoAutoUpdate"= 1 (0x1)
"ForceStartMenuLogOff"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\windowsupdate\au]
"NoAutoUpdate"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-06-18 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2007-04-19 18:41 294912 ------w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-73586283-1580436667-725345543-33128\Scripts\Logon\0\0]
"Script"=\\uninet\uwwapps\Java6.5\javafix.bat

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\Rosetta Stone\\Rosetta Stone V3\\RosettaStoneVersion3.exe"=
"c:\\Program Files\\Rosetta Stone\\Rosetta Stone V3\\support\\bin\\RosettaStoneLtdServices.exe"=
"c:\\Program Files\\CyberLink\\PCM4Everio\\PCM4Everio.exe"=
"c:\\Program Files\\CyberLink\\PCM4Everio\\EverioService.exe"=
"c:\\WINDOWS\\system32\\mshta.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Brother\\Brmfl08b\\FAXRX.exe"=
"c:\\WINDOWS\\system32\\OpcEnum.exe"=
"c:\\Program Files\\Rockwell Software\\RSLinx\\RSLINX.EXE"=
"c:\\Program Files\\Rockwell Software\\OPCTools\\OPCTest\\opctest.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"<NO NAME>"=
"54925:UDP"= 54925:UDP:BrotherNetwork Scanner
"135:TCP"= 135:TCP:Port 135 TCP

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [8/1/2009 11:13 AM 64160]
R1 RSSerial;RSLinx Classic Serial Driver;c:\windows\system32\rsserial.sys [7/5/2008 6:19 PM 155440]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [10/10/2006 2:53 PM 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2/27/2007 1:39 PM 55024]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 10:49 AM 1029456]
R2 TmFilter;Trend Micro Filter;c:\program files\Trend Micro\OfficeScan Client\tmxpflt.sys [11/9/2005 10:34 PM 190480]
R2 TmPreFilter;Trend Micro PreFilter;c:\program files\Trend Micro\OfficeScan Client\tmpreflt.sys [11/9/2005 10:34 PM 31248]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R3 PcmkWdm;%PcmkWdm.DeviceDesc%;c:\windows\system32\drivers\PcmkWdm.sys [4/22/2002 4:12 PM 58140]
S3 Ca522bv;CA522B WebCam Driver;c:\windows\system32\drivers\Ca522Bv.sys [10/16/2007 1:36 PM 2329216]
S3 RsiKtControl;RsiKtControl;c:\windows\system32\RSIKT.SYS [7/5/2008 6:19 PM 39067]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2/16/2006 6:51 PM 4096]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2009-08-24 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-07-03 14:49]

2009-08-25 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 23:20]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://portal.srv.unisourcelink.net/
Trusted Zone: uwwnet
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {59F156FC-9BC4-11D5-B0A5-0060085A719D} - hxxp://opal.pascocountyfl.net/permit/opalplayerx5.cab
FF - ProfilePath - c:\documents and settings\duncad01\Application Data\Mozilla\Firefox\Profiles\vej8phzt.default\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-08-24 22:14
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
UsbCipHelper = c:\program files\Rockwell Automation\Rockwell Automation USB CIP Driver Package\UsbCipHelper\UsbCipHelper.exe????????????j?w??????@???D????? ??|P?E????|????????????1??|????P?E?????????4???????????????????>?@?????T???<??????|?????????????$???? ???D??????>@????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-73586283-1580436667-725345543-33128\Software\Microsoft\Driver Signing]
@Denied: (2) (Administrators)
@Allowed: (2) (Administrators)
@SACL=
"Policy"=dword:00000000

[HKEY_USERS\S-1-5-21-73586283-1580436667-725345543-33128\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_LOCAL_MACHINE\software\DeterministicNetworks\DNE\Parameters]
"SymbolicLinkValue"=hex(6):5c,00,52,00,65,00,67,00,69,00,73,00,74,00,72,00,79,
00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,79,00,73,00,\

[HKEY_LOCAL_MACHINE\software\Microsoft\Driver Signing]
@Denied: (2) (Administrators)
"Policy"=hex:00,00,00,00
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1280)
c:\windows\system32\CSGina.dll
c:\windows\system32\VPNAPI.DLL
c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'explorer.exe'(3200)
c:\progra~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL
c:\progra~1\COMMON~1\MICROS~1\WEBCOM~1\11\OWC11.DLL
c:\progra~1\PANICW~1\POP-UP~1\XAHook.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Seagate\Basics\Service\SyncServicesBasics.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Cisco Systems\VPN Client\cvpnd.exe
c:\program files\Rockwell Software\RSCommon\RSOBSERV.EXE
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Dell\QuickSet\NicConfigSvc.exe
c:\program files\Trend Micro\OfficeScan Client\NTRtScan.exe
c:\progra~1\ROCKWE~1\RSLinx\RSLINX.EXE
c:\program files\SigmaTel\C-Major Audio\DellXPM_5515v131\WDM\stacsv.exe
c:\program files\Trend Micro\OfficeScan Client\TmListen.exe
c:\windows\system32\CCM\CcmExec.exe
c:\program files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
c:\windows\system32\wbem\unsecapp.exe
c:\windows\system32\msiexec.exe
c:\windows\Temp\KLF72F.EXE
c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
c:\program files\Trend Micro\OfficeScan Client\POP3Trap.exe
c:\program files\Brother\ControlCenter3\BrccMCtl.exe
c:\program files\Brother\Brmfcmon\BrMfimon.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2009-08-25 22:19 - machine was rebooted
ComboFix-quarantined-files.txt 2009-08-25 02:19
ComboFix2.txt 2009-08-24 00:56

Pre-Run: 47,641,337,856 bytes free
Post-Run: 47,602,831,360 bytes free

Current=8 Default=8 Failed=7 LastKnownGood=9 Sets=1,2,3,4,5,6,7,8,9
266





Malwarebytes log:

Malwarebytes' Anti-Malware 1.40
Database version: 2692
Windows 5.1.2600 Service Pack 2

8/24/2009 11:13:32 PM
mbam-log-2009-08-24 (23-13-32).txt

Scan type: Full Scan (C:\|)
Objects scanned: 230292
Time elapsed: 49 minute(s), 18 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\hjgruiiycvbjta.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9281BC62-871F-4525-9D9B-464380604F82}\RP458\A0126105.dll (Trojan.TDSS) -> Quarantined and deleted successfully.


This is kinda fun, what's next???

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:19 AM

Posted 25 August 2009 - 10:17 AM

It's looking pretty good. Next we need to see if you have another copy of a file that is shown to be missing so we can replace it.

Please do a search on your computer for this file and let me know any locations that it's found.

proquota.exe
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 25 August 2009 - 01:45 PM

Did a search. It did not find "proquota.exe".

I did find "proquota.ex_" in C:\I386.

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:19 AM

Posted 25 August 2009 - 02:09 PM

That should work for us.

Click Start -> Run -> cmd
Type in this command and hit enter

expand c:\I386\proquota.ex_ c:\windows\system32\proquota.exe


How is your computer behaving now? Any problems?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 25 August 2009 - 04:29 PM

Expand done.


Computer acting great!!!!!!

No hijack and it's faster than I can remember!!



Thank you Sam the Man!

#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:19 AM

Posted 25 August 2009 - 05:55 PM

Glad I could help! :)
Just a few last steps and then some recommendations for you.



We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:thumbup2: :)
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#13 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 25 August 2009 - 08:56 PM

Very cool! Thanks again.

One more thing (sorry) :thumbup2:


Windows Defender popped up with a "Review Changes to your computer settings".
It has a list of things I need to allow or deny. It happened when I uninstalled Combofix I think.

This is the list:

Detected changes:
New: procexp90.Sys
Original: Not available

safeboot (New)
HKLM\System\CurrentControlSet\Control\Safeboot\Network\procexp90.Sys
/\
again with \Minimal\ after Safeboot



Detected changes:
New: PEVSystemStart
Original: Not available

safeboot (New)
HKLM\System\CurrentControlSet\Control\Safeboot\Network\PEVSystemStart
/\
again with \Minimal\ after Safeboot





Should I allow or deny these? Last thing I want to do is let something in and have to go "Hey Sam, are you busy??". :)

#14 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:19 AM

Posted 26 August 2009 - 09:59 AM

Yep, those are ok. Go ahead and allow the changes.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#15 duncanstein

duncanstein
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:19 AM

Posted 26 August 2009 - 05:38 PM

Ok.

Thanks for all of your help Sam.

I have already told tons of people about this site!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users