Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Vundo, Gootkit, Backdoor.bot, Malware.trace, Severe infection

  • This topic is locked This topic is locked
9 replies to this topic

#1 TommyI


  • Members
  • 12 posts
  • Local time:10:52 AM

Posted 03 April 2010 - 12:09 PM


My computer has gotten severely infected with malware, it started a couple of days ago when I accessed a Simpsons-streaming site. The internet slowed down dramatically, I started getting google redirections, and Adaware was unable to completely remove the problematic files. I noticed there was something with lsass.exe being malfunctioning (probably virus related to this)? Anyway, I made a system restore, going back a couple of days. However, this didn't help it.

I did a MBAM scan and noticed the names that are mentioned in the topic title. I wanna try to remove as much as possible, try to do a clean and then repair, and then attempt to format and reinstall the system.

Any help is appreciated,
Best regards


P.S. I tried running the GMER application but when I start the scan, my computer just restarts.

DDS log:

DDS (Ver_10-03-17.01) - NTFSx86 NETWORK
Run by Administrat”r at 18:26:38,03 on 2010-04-03
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Home Edition 5.1.2600.3.1252.46.1053.18.1015.620 [GMT 2:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\Program\Internet Explorer\iexplore.exe
C:\Documents and Settings\Administratör\Skrivbord\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://eeepc.asus.com/global
uInternet Connection Wizard,ShellNext = hxxp://www.weathertalkz.com/web.php?q=4097.4097.1002.0.0.8b7d8b290b44760425941852de33d78ae29fb6c63df6a063b62a4f7191186efb.1.141375
BHO: {0598769c-cbcc-43a1-9d0c-2cb771c6be7b} - c:\windows\system32\epgrrere.dll
BHO: Länkhjälp till Adobe PDF Reader: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program\delade filer\adobe\acrobat\activex\AcroIEHelper.dll
BHO: : {3ac854ed-040a-4d2b-afcc-74c1122bc22e} - c:\windows\system32\sqewyex.dll
BHO: Windows Live inloggningshjälpen: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program\delade filer\microsoft shared\windows live\WindowsLiveLogin.dll
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [AsusTray] c:\program\eeepc\acpi\AsTray.exe
mRun: [AsusACPIServer] c:\program\eeepc\acpi\AsAcpiSvr.exe
mRun: [AsusEPCMonitor] c:\program\eeepc\acpi\AsEPCMon.exe
mRun: [SynTPEnh] c:\program\synaptics\syntp\SynTPEnh.exe
mRun: [SynAsusAcpi] c:\program\synaptics\syntp\SynAsusAcpi.exe
mRun: [SunJavaUpdateSched] c:\program\java\jre1.5.0\bin\jusched.exe
mRun: [QuickTime Task] "c:\program\quicktime\qttask .exe" -atboottime
mRun: [rmosnq] RUNDLL32.EXE c:\windows\system32\msyblkya.dll,w
mRun: [Ad-Watch] c:\program\lavasoft\ad-aware\AAWTray.exe
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
dRun: [YVIBBBHA8C] c:\windows\temp\Rgd.exe
mExplorerRun: [exec] c:\windows\fonts\services.exe
StartupFolder: c:\docume~1\alluse~1\start-~1\program\autost~1\bankid~1.lnk - c:\program\personal\bin\Personal.exe
StartupFolder: c:\docume~1\alluse~1\start-~1\program\autost~1\bttray.lnk - c:\program\widcomm\bluetooth software\BTTray.exe
StartupFolder: c:\docume~1\alluse~1\start-~1\program\autost~1\superh~1.lnk - c:\program\asus\eeepc\super hybrid engine\SuperHybridEngine.exe
uPolicies-system: DisableRegistryTools = 1 (0x1)
dPolicies-system: DisableRegistryTools = 1 (0x1)
IE: Skicka till &Bluetooth-enhet... - c:\program\widcomm\bluetooth software\btsendto_ie_ctx.htm
IE: Skicka till Bluetooth - c:\program\widcomm\bluetooth software\btsendto_ie.htm
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program\widcomm\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0000-ABCDEFFEDCBC} - c:\program\java\jre1.5.0\bin\npjpi150.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program\micros~4\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\program\micros~4\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://javadl-esd.sun.com/update/1.5.0/jinstall-1_5_0-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: app_dll.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: GootkitSSO - {45073E56-2B8D-4476-B74A-1A40AFB9A13E} - c:\windows\system32\msxsltsso.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-4-1 64160]
R0 lhqjbptv;lhqjbptv;c:\windows\system32\drivers\lhqjbptv.sys [2009-4-29 23424]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program\lavasoft\ad-aware\AAWService.exe [2009-3-9 1029456]
R3 L1c;NDIS Miniport Driver for Atheros AR8131/AR8132 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1c51x86.sys [2009-4-1 38912]
S0 ksilpad;ksilpad;c:\windows\system32\drivers\qjmwhcrl.sys --> c:\windows\system32\drivers\qjmwhcrl.sys [?]
S0 nydmoygo;nydmoygo;c:\windows\system32\drivers\ngsl.sys --> c:\windows\system32\drivers\ngsl.sys [?]
S0 pdvht;pdvht;c:\windows\system32\drivers\kfhplmnj.sys --> c:\windows\system32\drivers\kfhplmnj.sys [?]
S0 xnvka;xnvka;c:\windows\system32\drivers\aoyr.sys --> c:\windows\system32\drivers\aoyr.sys [?]
S2 BtwSvc;BtwSvc;c:\windows\system32\svchost.exe -k netsvcs [2009-4-29 14336]
S2 peresvc;peresvc Service;c:\windows\system32\PereSvc.exe [2008-4-15 69120]
S2 sseqyhkl;NDIS System Controller;c:\windows\system32\svchost.exe -k netsvcs [2009-4-29 14336]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2009-5-4 1684736]
S3 uvclf;uvclf;c:\windows\system32\drivers\uvclf.sys [2009-4-1 39040]

=============== Created Last 30 ================

2010-04-03 16:19:15 4 ----a-w- c:\program\1154437.dat
2010-04-03 16:02:47 238920 ----a-w- c:\windows\system32\7661,356.exe
2010-04-03 16:02:24 167971 ----a-w- c:\windows\system32\907,5564.exe
2010-04-03 00:04:24 94720 ----a-w- c:\windows\system32\rthdcpl.exe
2010-04-02 22:41:43 62496 ----a-w- c:\windows\system32\MSWINSCK.OCX
2010-04-02 22:41:42 200192 ----a-w- c:\windows\system32\1066,08.exe
2010-04-02 22:40:52 238920 ----a-w- c:\windows\system32\3378,977.exe
2010-04-02 22:40:44 168265 ----a-w- c:\windows\system32\4127,924.exe
2010-04-02 20:34:02 93696 ----a-w- c:\windows\system32\app_dll.dll
2010-04-02 15:48:39 238920 ----a-w- c:\windows\system32\6605,601.exe
2010-04-02 15:48:33 168265 ----a-w- c:\windows\system32\6278,803.exe
2010-04-02 11:51:45 238920 ----a-w- c:\windows\system32\5270,151.exe
2010-04-02 11:51:38 168400 ----a-w- c:\windows\system32\8618,28.exe
2010-04-02 10:11:58 238920 ----a-w- c:\windows\system32\5070,719.exe
2010-04-02 10:11:52 168400 ----a-w- c:\windows\system32\9758,569.exe
2010-04-02 09:52:15 42496 ----a-w- c:\windows\system32\msxsltsso.dll
2010-04-02 01:38:35 238920 ----a-w- c:\windows\system32\2668,986.exe
2010-04-02 01:38:27 94208 ----a-w- c:\windows\system32\w.exe
2010-04-02 01:38:27 36864 ----a-w- c:\windows\system32\ms.bin
2010-04-02 01:38:27 36864 ----a-w- c:\windows\system32\d.bin
2010-04-02 01:38:26 170686 ----a-w- c:\windows\system32\1110,041.exe
2010-04-02 01:01:24 238920 ----a-w- c:\windows\system32\9933,695.exe
2010-04-02 01:01:13 170686 ----a-w- c:\windows\system32\5614,74.exe
2010-04-01 22:41:01 0 d-----w- c:\docume~1\admini~1\applic~1\Malwarebytes
2010-04-01 14:35:52 238920 ----a-w- c:\windows\system32\3838,114.exe
2010-04-01 14:35:43 170686 ----a-w- c:\windows\system32\6509,974.exe
2010-04-01 13:32:52 238920 ----a-w- c:\windows\system32\3700,938.exe
2010-04-01 13:32:27 170686 ----a-w- c:\windows\system32\2463,495.exe
2010-04-01 13:01:13 238920 ----a-w- c:\windows\system32\1995,768.exe
2010-04-01 13:01:03 169814 ----a-w- c:\windows\system32\7373,316.exe
2010-04-01 12:15:31 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-01 12:15:27 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-04-01 12:15:26 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-01 12:15:26 0 d-----w- c:\program\Malwarebytes' Anti-Malware
2010-04-01 10:54:14 238920 ----a-w- c:\windows\system32\8964,457.exe
2010-04-01 10:54:07 169814 ----a-w- c:\windows\system32\5939,905.exe
2010-04-01 10:33:10 238920 ----a-w- c:\windows\system32\2373,728.exe
2010-04-01 10:33:02 169814 ----a-w- c:\windows\system32\3784,601.exe
2010-03-31 23:52:05 0 d-----w- c:\program\BitTorrent
2010-03-31 23:40:45 15688 ----a-w- c:\windows\system32\lsdelete.exe
2010-03-31 23:29:17 238920 ----a-w- c:\windows\system32\3304,362.exe
2010-03-31 23:29:10 168786 ----a-w- c:\windows\system32\9908,716.exe
2010-03-31 23:16:27 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-03-31 23:07:00 0 d-----w- c:\windows\system32\GroupPolicy
2010-03-31 23:06:58 238920 ----a-w- c:\windows\system32\1124,186.exe
2010-03-31 23:06:51 36865 ----a-w- c:\windows\system32\msyblkya.dll
2010-03-31 23:06:47 44032 ----a-w- c:\windows\system32\so.bin
2010-03-31 23:06:47 168786 ----a-w- c:\windows\system32\8241,693.exe
2010-03-31 22:54:22 94720 ----a-w- c:\windows\system32\regedit.exe
2010-03-31 22:54:05 0 d-----w- c:\windows\system32\wbem\Repository
2010-03-31 19:50:07 0 dc-h--w- c:\docume~1\alluse~1\applic~1\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2010-03-31 19:49:49 0 d-----w- c:\program\Lavasoft
2010-03-31 18:55:56 0 ----a-w- c:\windows\system32\F.tmp

==================== Find3M ====================

2010-04-03 16:26:29 74540 ----a-w- c:\windows\system32\perfc01D.dat
2010-04-03 16:26:29 405144 ----a-w- c:\windows\system32\perfh01D.dat
2010-04-03 16:24:14 94720 ----a-w- c:\windows\system32\hkcmd.exe
2010-04-03 16:21:18 327192 ----a-w- c:\windows\system32\drivers\iaStor.sys
2010-04-03 16:02:23 94720 ----a-w- c:\windows\system32\ctfmon.exe
2010-04-03 00:04:33 94720 ----a-w- c:\windows\system32\rundll32.exe
2010-04-02 11:02:54 1048576 ---ha-w- c:\documents and settings\administratör\NTUSER.DAT
2010-04-01 11:34:01 94720 ----a-w- c:\windows\system32\igfxpers.exe
2010-03-31 21:07:28 182656 ----a-w- c:\windows\system32\drivers\ndis.sys
2009-08-27 00:46:32 32768 --sha-w- c:\windows\system32\config\systemprofile\lokala inställningar\tidigare\history.ie5\mshist012009082720090828\index.dat

============= FINISH: 18:27:24,42 ===============

BC AdBot (Login to Remove)


#2 syler


  • Malware Response Team
  • 8,150 posts
  • Gender:Male
  • Location:Warrington, UK
  • Local time:04:52 PM

Posted 03 April 2010 - 12:53 PM

Hello TommyI,

Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed, click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper

If you need help, see this link:



#3 TommyI

  • Topic Starter

  • Members
  • 12 posts
  • Local time:10:52 AM

Posted 03 April 2010 - 02:06 PM


I downloaded Combofix and tried to run it but an alert came up saying that the contents of the combofix package have been compromised, and that I should download a fresh copy of combofix. It also says that it might be some kind of virus known as Virut doing this?
I tried downloading it several times but it still shows the same message.


#4 syler


  • Malware Response Team
  • 8,150 posts
  • Gender:Male
  • Location:Warrington, UK
  • Local time:04:52 PM

Posted 03 April 2010 - 02:50 PM

Well if you have Virut that is not good, but lets check to see if you do have it. Don't run combofix for now, run DrWeb
in safe mode if you have any problems getting into safe mode then just run it in normal mode.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on drweb-cureit.exe to start the program.
  • Cancel any prompts to download the latest CureIt version and click Start.
  • At the prompt to "Start scan now", click Ok. Allow the setup.exe/driver to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)


#5 TommyI

  • Topic Starter

  • Members
  • 12 posts
  • Local time:10:52 AM

Posted 03 April 2010 - 03:26 PM

I think the link is broken so should I try to find an alternative download of it from google?

#6 syler


  • Malware Response Team
  • 8,150 posts
  • Gender:Male
  • Location:Warrington, UK
  • Local time:04:52 PM

Posted 03 April 2010 - 03:59 PM

The link is fine for me try using the following link instead, if you still can't download it you could try downloading
it on another computer and transferring it over using CD or flash drive.



#7 TommyI

  • Topic Starter

  • Members
  • 12 posts
  • Local time:10:52 AM

Posted 03 April 2010 - 04:49 PM

Ok, this is great. When I start the Scan in DrWeb a Windows error messages pops up stating that an error has been encountered and that the program will shut down. Am I screwed?

#8 syler


  • Malware Response Team
  • 8,150 posts
  • Gender:Male
  • Location:Warrington, UK
  • Local time:04:52 PM

Posted 04 April 2010 - 07:00 AM

It does indeed appear that you have Virut, unfortunately the only real option I see now is to format and reinstall Windows.
Cleaning this type of infection can be near impossible to do, so their is no point in helpers trying to clean up this infection,
If you would really like to have a go at cleaning this then you can have a go on your and I will give you some links
to tools that may be able to help you do this, just let me know what you are going to do, thanks.

Your system is infected with a nasty variant of Virut, a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer. Virux is an even more complex file infector which also infects script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable.

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.
McAfee Risk Assessment and Overview of W32/Virut
This kind of infection is contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...
Keygen and Crack Sites Distribute VIRUX and FakeAV

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:

If you are going to go ahead and format please take note of the following information.

I strongly recommend that you do not back up any of the following:
  • applications/installers
  • executable files (*.exe)
  • screensavers (*.scr)
  • autorun (.ini) or script (.php, .asp, .html, .htm, .xml) files
  • compressed files (.zip, .cab, .rar) that have .exe or .scr files inside them: Virut can penetrate and infect these files within compressed files too
  • any Operating System-related files
  • any files you do not recognize
If you have to backup files, do so only for important documents. You should back up only the data you really need and can't replace - like Word files, spreadsheets, pictures and other important (personal) data files you are in need of. Reformatting will destroy them all and you cannot retrieve the files once you have performed the reformat. There is no harm in backing up MS Office documents and other important (personal) data.
You can scan files with an AV scanner, but please remember that scanners are not 100% foolproof! Please hold to what I said above. With a Virut infection, there is always a chance of backed up data reinfecting your system (if you don't back up properly), and you can start the whole process over again.
It's also advisable to not copy files from the infected machine to your flash drive or external hard drive as they may become compromised in the process. You may also risk infecting another machine. Preferably, burn them to CD/DVD.

Should you have any further questions regarding this, don't hesitate to ask.


#9 TommyI

  • Topic Starter

  • Members
  • 12 posts
  • Local time:10:52 AM

Posted 04 April 2010 - 08:50 AM

Thanks for all the help! I'm getting an USB- optical drive and going to format and reinstall Windows.

Best regards,

#10 syler


  • Malware Response Team
  • 8,150 posts
  • Gender:Male
  • Location:Warrington, UK
  • Local time:04:52 PM

Posted 04 April 2010 - 10:38 AM

No problem thumbup2.gif

Just make sure you are careful when backing up.

Since this issue appears resolved ... this Topic is closed. Glad we could help.

If you need this topic reopened, please request this by sending me a PM
with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users