Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hijackthis log - JAro


  • This topic is locked This topic is locked
7 replies to this topic

#1 Jarom

Jarom

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 20 September 2004 - 07:05 AM

Hi
It's my hijacklog, can you help me with it?
Thank you


Logfile of HijackThis v1.98.2
Scan saved at 13:42:49, on 04-09-20
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MDM.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\COMMON FILES\EPSON\EBAPI\SAGENT2.EXE
C:\PROGRAM FILES\SIHSTECH\SECRET FOLDERS\SCRTFLDR.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCEVTMGR.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCSETMGR.EXE
C:\WINDOWS\SYSTEM\APIRV32.EXE
C:\WINDOWS\MFCVL32.EXE
C:\WINDOWS\CRNN.EXE
C:\WINDOWS\SYSTEM\ADDJR32.EXE
C:\WINDOWS\SYSTEM\SYSDK32.EXE
C:\WINDOWS\NETNT32.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\INTERNAT.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\SISTRAY.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\SYSTEM\KHOOKER.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\HIJACKTHIS\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = about:blank
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = w3cache.pik-net.pl:8080
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
R3 - Default URLSearchHook is missing
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O2 - BHO: Class - {4D49E5B9-5653-E44B-2CB4-33EC062B56A7} - C:\WINDOWS\SYSTEM\NTDX32.DLL
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [internat.exe] internat.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [IrMon] IrMon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\SYSTEM\SISTRAY.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\SYSTEM\khooker.exe
O4 - HKLM\..\Run: [QuickTime Task] C:\WINDOWS\SYSTEM\QTTASK.EXE
O4 - HKLM\..\Run: [Zasobnik systemowy] SysTray.Exe
O4 - HKLM\..\Run: [_sfbinaryfile_] c:\program files\sihstech\secret folders\scrtfldr.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"
O4 - HKLM\..\Run: [sais] c:\program files\180solutions\sais.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [Machine Debug Manager] C:\WINDOWS\SYSTEM\MDM.EXE
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [SAgent2ExePath] C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
O4 - HKLM\..\RunServices: [_sfbinaryfile_] c:\program files\sihstech\secret folders\scrtfldr.exe
O4 - HKLM\..\RunServices: [ScriptBlocking] "C:\Program Files\Common Files\Symantec Shared\Script Blocking\SBServ.exe" -reg
O4 - HKLM\..\RunServices: [ccEvtMgr] "C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe"
O4 - HKLM\..\RunServices: [ccSetMgr] "C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe"
O4 - HKLM\..\RunServices: [APIRV32.EXE] C:\WINDOWS\SYSTEM\APIRV32.EXE
O4 - HKLM\..\RunServices: [JAVAPG.EXE] C:\WINDOWS\SYSTEM\JAVAPG.EXE
O4 - HKLM\..\RunServices: [IERJ.EXE] C:\WINDOWS\IERJ.EXE
O4 - HKLM\..\RunServices: [CRNN.EXE] C:\WINDOWS\CRNN.EXE
O4 - HKLM\..\RunServices: [SDKVX32.EXE] C:\WINDOWS\SYSTEM\SDKVX32.EXE
O4 - HKLM\..\RunServices: [SDKKP.EXE] C:\WINDOWS\SDKKP.EXE
O4 - HKLM\..\RunServices: [APISB32.EXE] C:\WINDOWS\SYSTEM\APISB32.EXE
O4 - HKLM\..\RunServices: [CRME.EXE] C:\WINDOWS\CRME.EXE
O4 - HKLM\..\RunServices: [JAVAWI32.EXE] C:\WINDOWS\SYSTEM\JAVAWI32.EXE
O4 - HKLM\..\RunServices: [SYSZH32.EXE] C:\WINDOWS\SYSTEM\SYSZH32.EXE
O4 - HKLM\..\RunServices: [CRAT32.EXE] C:\WINDOWS\SYSTEM\CRAT32.EXE
O4 - HKLM\..\RunServices: [JAVAIQ.EXE] C:\WINDOWS\SYSTEM\JAVAIQ.EXE
O4 - HKLM\..\RunServices: [SYSDK32.EXE] C:\WINDOWS\SYSTEM\SYSDK32.EXE
O4 - HKLM\..\RunServices: [MFCVL32.EXE] C:\WINDOWS\MFCVL32.EXE
O4 - HKLM\..\RunServices: [ADDJR32.EXE] C:\WINDOWS\SYSTEM\ADDJR32.EXE
O4 - HKLM\..\RunServices: [NETNT32.EXE] C:\WINDOWS\NETNT32.EXE
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\PROGRAM FILES\GADU-GADU\GG.EXE" /tray
O4 - HKCU\..\Run: [Spyware Begone] C:\FREESCAN\FREESCAN.EXE -FastScan
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\SYSTEM\E_SRCV02.EXE
O15 - Trusted Zone: *.05p.com
O15 - Trusted Zone: *.searchmiracle.com
O15 - Trusted Zone: *.scoobidoo.com
O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} (MetaStreamCtl Class) - http://components.metastream.com/MTSInstal...MetaStream3.cab
O16 - DPF: {6BF52A52-394A-11D3-B153-00C04F79FAA6} (Windows Media Player 7) - http://activex.microsoft.com/activex/contr...en/nsmp2inf.cab
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_file.php...8a29296baabe1d6
O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = asi.gliwice.pl
O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 213.186.65.65,213.186.65.75
O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - (no file)

BC AdBot (Login to Remove)

 


#2 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:12:36 PM

Posted 20 September 2004 - 07:33 AM

Hi,

I am examining your log.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image

#3 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:12:36 PM

Posted 20 September 2004 - 08:24 AM

Jarom,

Print this instructions because you are not able to acces the Internet in SafeMode.

Internet Explorer should remain closed during the cleanup. If you open Internet Explorer the fix will fail.

1. Please download About:Buster from here: About:Buster Download. Once it is downloaded extract it to
c:\aboutbuster. We will use that program later in this process. Don't use it yet.

2. Download Ad-aware SE 1.05: here
Install it. When you get the last screen, with the "Finish" button and 3 options, uncheck those three items.
Open AdAware and click the "Check for updates now" link. Close AdAware. Don't use it yet.

3. Copy the contents of the Quote Box below to Notepad.
Click File menu -> Save and name the file as fix.reg
Change the Save as Type to All Files
Save this file on the desktop. Don't use it yet.

REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HSA]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SE]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SW]


4. Make sure you are set to show hidden files and folders:
A. On the Tools menu in Windows Explorer, click Folder Options.
B. Click the View tab.
C. Under Hidden files and folders, click Show hidden files and folders.
D. Uncheck Hide extensions for known filetypes and Hide protected operating system files.

5. Close all windows and browsers, open HijackThis, press the Config... button, then Misc. Tools button, and press Open Process Manager , select the files (one at a time), and press Kill process and Yes to confirm.:

sais.exe
APIRV32.EXE
JAVAPG.EXE
IERJ.EXE
CRNN.EXE
SDKVX32.EXE
SDKKP.EXE
APISB32.EXE
CRME.EXE
JAVAWI32.EXE
SYSZH32.EXE
CRAT32.EXE
JAVAIQ.EXE
SYSDK32.EXE
MFCVL32.EXE
ADDJR32.EXE
NETNT32.EXE

Close HijackThis.

After this massacre :thumbsup: delete these files:

C:\WINDOWS\SYSTEM\APIRV32.EXE <-- this file
C:\WINDOWS\SYSTEM\JAVAPG.EXE <-- this file
C:\WINDOWS\IERJ.EXE <-- this file
C:\WINDOWS\CRNN.EXE <-- this file
C:\WINDOWS\SYSTEM\SDKVX32.EXE <-- this file
C:\WINDOWS\SDKKP.EXE <-- this file
C:\WINDOWS\SYSTEM\APISB32.EXE <-- this file
C:\WINDOWS\CRME.EXE <-- this file
C:\WINDOWS\SYSTEM\JAVAWI32.EXE <-- this file
C:\WINDOWS\SYSTEM\SYSZH32.EXE <-- this file
C:\WINDOWS\SYSTEM\CRAT32.EXE <-- this file
C:\WINDOWS\SYSTEM\JAVAIQ.EXE <-- this file
C:\WINDOWS\SYSTEM\SYSDK32.EXE <-- this file
C:\WINDOWS\MFCVL32.EXE <-- this file
C:\WINDOWS\SYSTEM\ADDJR32.EXE <-- this file
C:\WINDOWS\NETNT32.EXE <-- this file

If you get an error when deleting a file, right click on the file and check to see if the read only attribute is checked. if it is, uncheck it and try again.

Delete this folder:
180solutions in c:\program files\

6. Close all windows and browsers, run HijackThis! again, press "Scan" and tick the boxes next to all these, close all other windows, then press "Fix Checked" button.

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\qwnti.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = about:blank
R3 - Default URLSearchHook is missing

O2 - BHO: Class - {4D49E5B9-5653-E44B-2CB4-33EC062B56A7} - C:\WINDOWS\SYSTEM\NTDX32.DLL

O4 - HKLM\..\Run: [sais] c:\program files\180solutions\sais.exe
O4 - HKLM\..\RunServices: [APIRV32.EXE] C:\WINDOWS\SYSTEM\APIRV32.EXE
O4 - HKLM\..\RunServices: [JAVAPG.EXE] C:\WINDOWS\SYSTEM\JAVAPG.EXE
O4 - HKLM\..\RunServices: [IERJ.EXE] C:\WINDOWS\IERJ.EXE
O4 - HKLM\..\RunServices: [CRNN.EXE] C:\WINDOWS\CRNN.EXE
O4 - HKLM\..\RunServices: [SDKVX32.EXE] C:\WINDOWS\SYSTEM\SDKVX32.EXE
O4 - HKLM\..\RunServices: [SDKKP.EXE] C:\WINDOWS\SDKKP.EXE
O4 - HKLM\..\RunServices: [APISB32.EXE] C:\WINDOWS\SYSTEM\APISB32.EXE
O4 - HKLM\..\RunServices: [CRME.EXE] C:\WINDOWS\CRME.EXE
O4 - HKLM\..\RunServices: [JAVAWI32.EXE] C:\WINDOWS\SYSTEM\JAVAWI32.EXE
O4 - HKLM\..\RunServices: [SYSZH32.EXE] C:\WINDOWS\SYSTEM\SYSZH32.EXE
O4 - HKLM\..\RunServices: [CRAT32.EXE] C:\WINDOWS\SYSTEM\CRAT32.EXE
O4 - HKLM\..\RunServices: [JAVAIQ.EXE] C:\WINDOWS\SYSTEM\JAVAIQ.EXE
O4 - HKLM\..\RunServices: [SYSDK32.EXE] C:\WINDOWS\SYSTEM\SYSDK32.EXE
O4 - HKLM\..\RunServices: [MFCVL32.EXE] C:\WINDOWS\MFCVL32.EXE
O4 - HKLM\..\RunServices: [ADDJR32.EXE] C:\WINDOWS\SYSTEM\ADDJR32.EXE
O4 - HKLM\..\RunServices: [NETNT32.EXE] C:\WINDOWS\NETNT32.EXE

O15 - Trusted Zone: *.05p.com
O15 - Trusted Zone: *.searchmiracle.com
O15 - Trusted Zone: *.scoobidoo.com

O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_file.php...8a29296baabe1d6

O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - (no file)


Delete these file:
C:\WINDOWS\system\qwnti.dll <-- this file
C:\WINDOWS\SYSTEM\NTDX32.DLL <-- this file

7. REBOOT into SafeMode: Starting your computer in Safe mode, use the F8 method.

8. Double-click on the fix.reg file you saved earlier on your desktop, and when it prompts to merge say Yes, and this will clear some registry entries left behind by the process.

9. Stay in SafeMode and run About:Buster. Click on the Start button and then OK to start the scan. This will scan your computer for the bad files and delete them. If it asks if you would like to do a second pass, allow it to do so.

Run About:Buster again. Scan again. If it asks if you would like to do a second pass, allow it to do so.

Stay in SafeMode

10. Run AdAware, press the Start button, unckeck Scan for negligible risk entries, select Perform full system scan and press Next. Let AdAware remove anything it finds.

Stay in SafeMode

11. Clean out temporary and Temporary Internet Files.
A. Click Start, point to Programs, point to Accessories, point to System Tools, and then click Disk Cleanup.
B. Choose the drive you want to scan from the drop-down menu, and wait while the program calculates how much disk space is available for cleanup.
C. To delete obsolete files, click the Disk Cleanup tab, select the check boxes next to the files that you want to remove, click OK, and then click Yes.
Make sure these 3 are checked:
Temporary Files
Temporary Internet Files
Recycle Bin

12. REBOOT normally.

13. Perform a full scan here: Trendmicro, tick Clean and let him remove anything he finds.

14. Run HijackThis! again and post a new log.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image

#4 Jarom

Jarom
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 21 September 2004 - 09:10 AM

Hi
I think that problem still exist
It is mu Log

Logfile of HijackThis v1.98.2
Scan saved at 16:05:19, on 04-09-21
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MDM.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\COMMON FILES\EPSON\EBAPI\SAGENT2.EXE
C:\PROGRAM FILES\SIHSTECH\SECRET FOLDERS\SCRTFLDR.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCEVTMGR.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCSETMGR.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\INTERNAT.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\SISTRAY.EXE
C:\WINDOWS\SYSTEM\KHOOKER.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\RNAAPP.EXE
C:\WINDOWS\SYSTEM\TAPISRV.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\PROGRAM FILES\NORTON ANTIVIRUS\OPSCAN.EXE
C:\WINDOWS\CRDY32.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\HIJACKTHIS\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = w3cache.pik-net.pl:8080
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {82F9C2F7-4319-A455-8101-BE69B64E6A67} - C:\WINDOWS\SYSTEM\ADDVB32.DLL
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [internat.exe] internat.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [IrMon] IrMon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\SYSTEM\SISTRAY.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\SYSTEM\khooker.exe
O4 - HKLM\..\Run: [QuickTime Task] C:\WINDOWS\SYSTEM\QTTASK.EXE
O4 - HKLM\..\Run: [Zasobnik systemowy] SysTray.Exe
O4 - HKLM\..\Run: [_sfbinaryfile_] c:\program files\sihstech\secret folders\scrtfldr.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [Machine Debug Manager] C:\WINDOWS\SYSTEM\MDM.EXE
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [SAgent2ExePath] C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
O4 - HKLM\..\RunServices: [_sfbinaryfile_] c:\program files\sihstech\secret folders\scrtfldr.exe
O4 - HKLM\..\RunServices: [IPDZ.EXE] C:\WINDOWS\IPDZ.EXE
O4 - HKLM\..\RunServices: [SYSXV32.EXE] C:\WINDOWS\SYSXV32.EXE
O4 - HKLM\..\RunServices: [CRQB.EXE] C:\WINDOWS\SYSTEM\CRQB.EXE
O4 - HKLM\..\RunServices: [NTBH.EXE] C:\WINDOWS\NTBH.EXE
O4 - HKLM\..\RunServices: [ADDMN.EXE] C:\WINDOWS\ADDMN.EXE
O4 - HKLM\..\RunServices: [APIQO.EXE] C:\WINDOWS\APIQO.EXE
O4 - HKLM\..\RunServices: [NTSD32.EXE] C:\WINDOWS\NTSD32.EXE
O4 - HKLM\..\RunServices: [ADDFA32.EXE] C:\WINDOWS\ADDFA32.EXE
O4 - HKLM\..\RunServices: [SDKIK.EXE] C:\WINDOWS\SYSTEM\SDKIK.EXE
O4 - HKLM\..\RunServices: [IPOL.EXE] C:\WINDOWS\IPOL.EXE
O4 - HKLM\..\RunServices: [ScriptBlocking] "C:\Program Files\Common Files\Symantec Shared\Script Blocking\SBServ.exe" -reg
O4 - HKLM\..\RunServices: [ccEvtMgr] "C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe"
O4 - HKLM\..\RunServices: [ccSetMgr] "C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe"
O4 - HKLM\..\RunServices: [CRDY32.EXE] C:\WINDOWS\CRDY32.EXE
O4 - HKCU\..\Run: [Spyware Begone] C:\FREESCAN\FREESCAN.EXE -FastScan
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\PROGRAM FILES\GADU-GADU\GG.EXE" /tray
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\SYSTEM\E_SRCV02.EXE
O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} (MetaStreamCtl Class) - http://components.metastream.com/MTSInstal...MetaStream3.cab
O16 - DPF: {6BF52A52-394A-11D3-B153-00C04F79FAA6} (Windows Media Player 7) - http://activex.microsoft.com/activex/contr...en/nsmp2inf.cab
O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = asi.gliwice.pl
O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 213.186.65.65,213.186.65.75

#5 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:12:36 PM

Posted 21 September 2004 - 11:57 AM

I think that problem still exist


It's not easy to eliminate but there is a progress :thumbsup:. Maybe you will have to repeat this procedure two or three times. You will have to post every time a new HJT log.

Print this instructions because you are not able to acces the Internet in SafeMode.

Internet Explorer should remain closed during the cleanup. If you open Internet Explorer the fix will fail.

Go to the next step if fix.reg is still on your HDD.

Copy the contents of the Quote Box below to Notepad.
Click File menu -> Save and name the file as fix.reg
Change the Save as Type to All Files
Save this file on the desktop. Don't use it yet.

REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HSA]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SE]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SW]


1. Make sure you are set to show hidden files and folders:
A. On the Tools menu in Windows Explorer, click Folder Options.
B. Click the View tab.
C. Under Hidden files and folders, click Show hidden files and folders.
D. Uncheck Hide extensions for known filetypes and Hide protected operating system files.

2. Close all windows and browsers, open HijackThis, press the Config... button, then Misc. Tools button, and press Open Process Manager , select the files (one at a time), and press Kill process and Yes to confirm.:

C:\WINDOWS\CRDY32.EXE <-- this one

Delete this file:
C:\WINDOWS\CRDY32.EXE <-- this one

3. REBOOT into SafeMode: Starting your computer in Safe mode, use the F8 method.

4. Close all windows and browsers, run HijackThis! again, press "Scan" and tick the boxes next to all these, close all other windows, then press "Fix Checked" button.

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\pduhh.dll/sp.html#29126
R3 - Default URLSearchHook is missing

O2 - BHO: Class - {82F9C2F7-4319-A455-8101-BE69B64E6A67} - C:\WINDOWS\SYSTEM\ADDVB32.DLL

O4 - HKLM\..\RunServices: [IPDZ.EXE] C:\WINDOWS\IPDZ.EXE
O4 - HKLM\..\RunServices: [SYSXV32.EXE] C:\WINDOWS\SYSXV32.EXE
O4 - HKLM\..\RunServices: [CRQB.EXE] C:\WINDOWS\SYSTEM\CRQB.EXE
O4 - HKLM\..\RunServices: [NTBH.EXE] C:\WINDOWS\NTBH.EXE
O4 - HKLM\..\RunServices: [ADDMN.EXE] C:\WINDOWS\ADDMN.EXE
O4 - HKLM\..\RunServices: [APIQO.EXE] C:\WINDOWS\APIQO.EXE
O4 - HKLM\..\RunServices: [NTSD32.EXE] C:\WINDOWS\NTSD32.EXE
O4 - HKLM\..\RunServices: [ADDFA32.EXE] C:\WINDOWS\ADDFA32.EXE
O4 - HKLM\..\RunServices: [SDKIK.EXE] C:\WINDOWS\SYSTEM\SDKIK.EXE
O4 - HKLM\..\RunServices: [IPOL.EXE] C:\WINDOWS\IPOL.EXE
O4 - HKLM\..\RunServices: [CRDY32.EXE] C:\WINDOWS\CRDY32.EXE


5. Please look for all these files and delete them if found:
C:\WINDOWS\system\pduhh.dll <-- this file
C:\WINDOWS\SYSTEM\ADDVB32.DLL <-- this file
C:\WINDOWS\IPDZ.EXE <-- this file
C:\WINDOWS\SYSXV32.EXE <-- this file
C:\WINDOWS\SYSTEM\CRQB.EXE <-- this file
C:\WINDOWS\NTBH.EXE <-- this file
C:\WINDOWS\ADDMN.EXE <-- this file
C:\WINDOWS\APIQO.EXE <-- this file
C:\WINDOWS\NTSD32.EXE <-- this file
C:\WINDOWS\ADDFA32.EXE <-- this file
C:\WINDOWS\SYSTEM\SDKIK.EXE <-- this file
C:\WINDOWS\IPOL.EXE <-- this file
C:\WINDOWS\CRDY32.EXE <-- this file

If you get an error when deleting a file, right click on the file and check to see if the read only attribute is checked. if it is, uncheck it and try again.

6. Double-click on the fix.reg file you saved earlier on your desktop, and when it prompts to merge say Yes, and this will clear some registry entries left behind by the process.

7. Stay in SafeMode and run About:Buster. Click on the Start button and then OK to start the scan. This will scan your computer for the bad files and delete them. If it asks if you would like to do a second pass, allow it to do so.

Run About:Buster again. Scan again. If it asks if you would like to do a second pass, allow it to do so.

Stay in SafeMode

8. Run AdAware, press the Start button, unckeck Scan for negligible risk entries, select Perform full system scan and press Next. Let AdAware remove anything it finds.

Stay in SafeMode

9.. Clean out temporary and Temporary Internet Files.
A. Click Start, point to Programs, point to Accessories, point to System Tools, and then click Disk Cleanup.
B. Choose the drive you want to scan from the drop-down menu, and wait while the program calculates how much disk space is available for cleanup.
C. To delete obsolete files, click the Disk Cleanup tab, select the check boxes next to the files that you want to remove, click OK, and then click Yes.
Make sure these 3 are checked:
Temporary Files
Temporary Internet Files
Recycle Bin


10. REBOOT normally.

11. Perform a full scan here: Trendmicro, tick Clean and let him remove anything he finds.

12. Run HijackThis! again and post a new log.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image

#6 Jarom

Jarom
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 22 September 2004 - 09:51 AM

Hi
One more time (i hope last) my log from HijackThis
Now seems that my laptop is working correctly

/////
During cleaning process I could not find this files, which I have to delete
C:\WINDOWS\SYSTEM\ADDVB32.DLL <-- this file
C:\WINDOWS\IPDZ.EXE <-- this file
C:\WINDOWS\SYSXV32.EXE <-- this file
C:\WINDOWS\SYSTEM\CRQB.EXE <-- this file
C:\WINDOWS\NTBH.EXE <-- this file - I found instead ntbh.dll
C:\WINDOWS\ADDMN.EXE <-- this file
C:\WINDOWS\APIQO.EXE <-- this file - I found instead Apiqo.dll
C:\WINDOWS\NTSD32.EXE <-- this file
C:\WINDOWS\ADDFA32.EXE <-- this file
C:\WINDOWS\SYSTEM\SDKIK.EXE <-- this file
C:\WINDOWS\IPOL.EXE <-- this file
C:\WINDOWS\CRDY32.EXE - I found instead CDDY32.dll
////

What do you think about it?
regards
JArom

Logfile of HijackThis v1.98.2
Scan saved at 16:42:55, on 04-09-22
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MDM.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\COMMON FILES\EPSON\EBAPI\SAGENT2.EXE
C:\PROGRAM FILES\SIHSTECH\SECRET FOLDERS\SCRTFLDR.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCEVTMGR.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCSETMGR.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\INTERNAT.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\SISTRAY.EXE
C:\WINDOWS\SYSTEM\KHOOKER.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\HIJACKTHIS\HIJACKTHIS.EXE

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.onet.pl/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = w3cache.pik-net.pl:8080
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [internat.exe] internat.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [IrMon] IrMon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [SiS Tray] C:\WINDOWS\SYSTEM\SISTRAY.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\SYSTEM\khooker.exe
O4 - HKLM\..\Run: [QuickTime Task] C:\WINDOWS\SYSTEM\QTTASK.EXE
O4 - HKLM\..\Run: [Zasobnik systemowy] SysTray.Exe
O4 - HKLM\..\Run: [_sfbinaryfile_] c:\program files\sihstech\secret folders\scrtfldr.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [Machine Debug Manager] C:\WINDOWS\SYSTEM\MDM.EXE
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [SAgent2ExePath] C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
O4 - HKLM\..\RunServices: [_sfbinaryfile_] c:\program files\sihstech\secret folders\scrtfldr.exe
O4 - HKLM\..\RunServices: [ScriptBlocking] "C:\Program Files\Common Files\Symantec Shared\Script Blocking\SBServ.exe" -reg
O4 - HKLM\..\RunServices: [ccEvtMgr] "C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe"
O4 - HKLM\..\RunServices: [ccSetMgr] "C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe"
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\PROGRAM FILES\GADU-GADU\GG.EXE" /tray
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Startup: EPSON Status Monitor 3 Environment Check 2.lnk = C:\WINDOWS\SYSTEM\E_SRCV02.EXE
O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} (MetaStreamCtl Class) - http://components.metastream.com/MTSInstal...MetaStream3.cab
O16 - DPF: {6BF52A52-394A-11D3-B153-00C04F79FAA6} (Windows Media Player 7) - http://activex.microsoft.com/activex/contr...en/nsmp2inf.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = asi.gliwice.pl
O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 213.186.65.65,213.186.65.75

#7 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:12:36 PM

Posted 22 September 2004 - 12:22 PM

C:\WINDOWS\NTBH.EXE <-- this file - I found instead ntbh.dll
What do you think about it?

It's a mutating trojan. :flowers:

But you did an excellent job and your log looks clean now. :thumbsup:

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Glad I was able to help.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image

#8 Jarom

Jarom
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 23 September 2004 - 01:47 AM

Thank you very much for your help.
Jarom




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users