Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Internet Security 2011

  • This topic is locked This topic is locked
4 replies to this topic

#1 Adam L. Howard

Adam L. Howard

  • Members
  • 3 posts
  • Gender:Male
  • Local time:05:34 PM

Posted 18 April 2011 - 08:05 AM

DDS (Ver_11-03-05.01) - NTFSx86
Run by !adam.l.howard at 8:45:07.38 on Mon 04/18/2011
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2039.796 [GMT -4:00]
FW: McAfee Host Intrusion Prevention Firewall *Disabled*
============== Running Processes ===============
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\SafeBoot\SbClientManager.exe
C:\Program Files\Hewlett-Packard\CM\AUM Agent\bin\AUMService.exe
C:\Program Files\Juniper Networks\Common Files\dsNcService.exe
C:\Program Files\McAfee\Host Intrusion Prevention\FireSvc.exe
C:\Program Files\McAfee\Host Intrusion Prevention\HIPSCore\HIPSvc.exe
C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Juniper Networks\JUNS\dsAccessService.exe
C:\Program Files\McAfee\Audit Manager\AuditManagerService.exe
C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Program Files\Linksys\Wireless-G Notebook Adapter\NICServ.exe
C:\Program Files\Network Time Protocol\ntpd.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Program Files\Hewlett-Packard\CM\Agent\radexecd.exe
C:\Program Files\Hewlett-Packard\CM\Agent\radsched.exe
C:\Program Files\Hewlett-Packard\CM\Agent\Radstgms.exe
C:\Program Files\McAfee\Endpoint Encryption for Files and Folders\SbCeCoreService.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\McAfee\Endpoint Encryption for Files and Folders\SbCeCore.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe
C:\Program Files\Roxio\Drag-to-Disc\DrgToDsc.exe
C:\Program Files\SafeBoot Tray Manager\SbTrayManager.exe
C:\Program Files\McAfee\Host Intrusion Prevention\FireTray.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\Program Files\McAfee\Policy Auditor Agent\PASysTray.exe
C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE
C:\Program Files\Hewlett-Packard\CM\AUM Agent\bin\AUMStatus.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Temp\DDS Tool\dds.scr
============== Pseudo HJT Report ===============
uInternet Settings,ProxyOverride = <local>
BHO: PowerBroker Desktops Browser Helper: {0a9cdb52-ebdf-4210-9c6a-b90c2fd410ab} - c:\windows\system32\pmbho.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan enterprise\scriptsn.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [SoundMAX] c:\program files\analog devices\soundmax\Smax4.exe /tray
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [AccelerometerSysTrayApplet] c:\windows\system32\AccelerometerSt.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
mRun: [<NO NAME>]
mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\9.0\sharedcom\RoxWatchTray9.exe"
mRun: [RoxioDragToDisc] "c:\program files\roxio\drag-to-disc\DrgToDsc.exe"
mRun: [SafeBootTrayManager] "c:\program files\safeboot tray manager\SbTrayManager.exe"
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\udaterui.exe" /StartedFromRunKey
mRun: [McAfee Host Intrusion Prevention Tray] "c:\program files\mcafee\host intrusion prevention\FireTray.exe"
mRun: [Communicator] "c:\program files\microsoft office communicator\communicator.exe" /fromrunkey
mRun: [McAfee Policy Auditor Tray Icon] "c:\program files\mcafee\policy auditor agent\PASysTray.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [!AUMStatus] c:\program files\hewlett-packard\cm\aum agent\bin\AUMStatus.exe
mRun: [RadiaUserConnect] c:\program files\hewlett-packard\cm\agent\radpnlwr.exe ucrex.rex
mRun: [RUNRADTRAY] c:\progra~1\hewlet~1\cm\agent\radtray.exe
mRun: [SbCeCore] "c:\program files\mcafee\endpoint encryption for files and folders\SbCeCore.exe"
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [DameWare MRC Agent] c:\windows\system32\DWRCST.exe
dRunOnce: [TSClientMSIUninstaller] cmd.exe /C "cscript %systemroot%\Installer\TSClientMsiTrans\tscuinst.vbs"
dRunOnce: [TSClientAXDisabler] cmd.exe /C "%systemroot%\Installer\TSClientMsiTrans\tscdsbl.bat"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\wirele~1.lnk - c:\program files\linksys\wireless-g notebook adapter\Gcc.exe
uPolicies-explorer: StartMenuLogoff = 1 (0x1)
uPolicies-explorer: GreyMSIAds = 1 (0x1)
uPolicies-explorer: NoWindowsUpdate = 1 (0x1)
uPolicies-explorer: NoAutoUpdate = 1 (0x1)
uPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
mPolicies-system: LogonType = 0 (0x0)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {9b935470-ad4a-11d5-b63e-00c04faedb18}
DPF: {b5859259-c40b-4b2a-af9d-3bf0f634b1d5}
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {E5F5D008-DD2C-4D32-977D-1A0ADF03058B} - hxxps://vpn.safelnk.net/dana-cached/setup/JuniperSetupSP1.cab
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: btpload32.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Notification Packages = SbNp5 scecli
mASetup: {2F4C24E6-CBD4-4AAC-B56F-C9FD44DE5668} - Msiexec.exe /fu {2F4C24E6-CBD4-4AAC-B56F-C9FD44DE5668} /qb-!
mASetup: {5AFEB001-A86F-458B-B129-A313D9ED4DDF} - "c:\program files\safeboot\AutoDomain.exe" /RUNONLOGON
mASetup: {EEBF9CA6-567B-41cd-B5F6-EF2C7FEF37B5} - rundll32.exe advpack.dll,LaunchINFSectionEx c:\windows\inf\wmactedp.inf,PerUserStub,,4
============= SERVICES / DRIVERS ===============
R0 MfeEERM;MfeEERM;c:\windows\system32\drivers\MfeEERM.sys [2010-3-12 157512]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2008-1-31 344712]
R0 SafeBoot;SafeBoot;c:\windows\system32\drivers\SafeBoot.sys [2008-2-22 103760]
R0 SBAlg;SBAlg;c:\windows\system32\drivers\SbAlg.sys [2007-7-16 44976]
R0 SBAlg00;SBAlg00;c:\windows\system32\drivers\SbAlg00.sys [2009-6-4 7472]
R0 SBAlg01;SBAlg01;c:\windows\system32\drivers\SbAlg01.sys [2009-6-4 7728]
R0 SBAlg11;SBAlg11;c:\windows\system32\drivers\SbAlg11.sys [2009-6-4 22992]
R0 SBAlg12;SBAlg12;c:\windows\system32\drivers\SbAlg12.sys [2009-6-4 45040]
R0 SbCe;SbCe;c:\windows\system32\drivers\SbCe.sys [2010-3-12 505800]
R0 SbFsLock;SbFsLock;c:\windows\system32\drivers\SbFsLock.sys [2008-2-22 6496]
R0 vmscsi;vmscsi;c:\windows\system32\drivers\vmscsi.sys [2008-1-30 10880]
R1 privman;privman;c:\windows\system32\drivers\privman.sys [2010-12-23 30416]
R1 RsvLock;RsvLock;c:\windows\system32\drivers\RsvLock.sys [2008-2-22 33328]
R1 SbFlop;SbFlop;c:\windows\system32\drivers\SbFlop.sys [2008-2-22 34480]
R1 SbPrcCtl;SbPrcCtl;c:\windows\system32\drivers\SbPrcCtl.sys [2008-2-22 15248]
R2 AUMService;HPCA Application Usage Manager Agent Service;c:\program files\hewlett-packard\cm\aum agent\bin\AUMService.exe [2009-9-30 235064]
R2 BTService;PowerBroker Desktop Service;c:\windows\system32\btservice.exe [2010-12-23 420680]
R2 enterceptAgent;McAfee Host Intrusion Prevention Service;c:\program files\mcafee\host intrusion prevention\FireSvc.exe [2010-6-15 1498224]
R2 hips;McAfee HIPSCore Service;c:\program files\mcafee\host intrusion prevention\hipscore\HIPSvc.exe [2010-12-3 35696]
R2 IntelligentResponseAgent;Intelligent Response Agent;c:\program files\mandiant\mandiant intelligent response agent\miragent.exe -service -servicename intelligentresponseagent --> c:\program files\mandiant\mandiant intelligent response agent\miragent.exe -service -servicename IntelligentResponseAgent [?]
R2 JuniperAccessService;Juniper Unified Network Service;c:\program files\common files\juniper networks\juns\dsAccessService.exe [2009-11-17 124200]
R2 McAfeeAuditManager;McAfee Audit Manager Service;c:\program files\mcafee\audit manager\AuditManagerService.exe [2009-8-27 151552]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\mcafee\virusscan enterprise\EngineServer.exe [2010-10-22 22816]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2009-9-22 103744]
R2 McShield;McAfee McShield;c:\program files\mcafee\virusscan enterprise\Mcshield.exe [2010-10-22 147984]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\VsTskMgr.exe [2010-10-22 66880]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2009-12-10 69192]
R2 NTP;Network Time Protocol;c:\program files\network time protocol\ntpd.exe [2000-4-14 172032]
R2 radexecd;HPCA Notify Daemon;c:\program files\hewlett-packard\cm\agent\radexecd.exe [2009-10-17 300776]
R2 radsched;HPCA Scheduler Daemon;c:\program files\hewlett-packard\cm\agent\radsched.exe [2009-10-17 194280]
R2 Radstgms;HPCA MSI Redirector;c:\program files\hewlett-packard\cm\agent\Radstgms.exe [2009-10-17 333544]
R2 SafeBootClientManager;SafeBoot Client Manager;c:\program files\safeboot\SbClientManager.exe [2008-2-22 380988]
R2 SbCeCoreService;McAfee Endpoint Encryption Core Service;c:\program files\mcafee\endpoint encryption for files and folders\SbCeCoreService.exe [2010-3-12 154440]
R2 WinINSTALLScheduler;WinINSTALL Scheduler;c:\windows\system32\sswschnt.exe [2008-3-6 77824]
R3 FirehkMP;FirehkMP;c:\windows\system32\drivers\firehk.sys [2009-12-10 44680]
R3 HIPK;McAfee Inc. HIPK;c:\windows\system32\drivers\HIPK.sys [2009-12-10 107960]
R3 HIPPSK;McAfee Inc. HIPPSK;c:\windows\system32\drivers\HIPPSK.sys [2009-12-10 38680]
R3 HIPQK;McAfee Inc. HIPQK;c:\windows\system32\drivers\HIPQK.sys [2009-12-10 35552]
R3 HPAUMDriver;HPAUMDriver;c:\windows\system32\drivers\HPAUMDriver.sys [2009-9-11 11152]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [2008-1-30 36608]
R3 Mandiant_Tools;Mandiant_Tools;c:\documents and settings\all users\application data\mandiant\mandiant intelligent response agent\mktools.sys [2010-11-24 19920]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2008-1-31 91896]
R3 RadiaMsi;RadiaMsi;c:\windows\system32\drivers\radiamsi.sys [2009-9-11 29072]
R3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [2008-3-6 47616]
R3 SbCeCd;SbCeCd;c:\windows\system32\drivers\SbCeCd.sys [2010-3-12 96864]
S1 mferkdk;VSCore mferkdk;\??\c:\program files\mcafee\virusscan enterprise\mferkdk.sys --> c:\program files\mcafee\virusscan enterprise\mferkdk.sys [?]
S2 VMMEMCTL;VMware server memory controller;\??\c:\program files\vmware\vmware tools\drivers\memctl\vmmemctl.sys --> c:\program files\vmware\vmware tools\drivers\memctl\vmmemctl.sys [?]
S3 Firehk;McAfee NDIS Intermediate Filter;c:\windows\system32\drivers\firehk.sys [2009-12-10 44680]
S3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2008-1-31 43192]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2010-12-3 66536]
S3 vmmouse;VMware Pointing Device;c:\windows\system32\drivers\vmmouse.sys [2008-1-30 4608]
S3 vmx_svga;vmx_svga;c:\windows\system32\drivers\vmx_svga.sys [2008-1-30 15744]
S3 vmxnet;VMware Ethernet Adapter Driver;c:\windows\system32\drivers\vmxnet.sys [2008-1-30 22528]
=============== Created Last 30 ================
2011-04-18 12:44:24 625664 ----a-w- c:\temp\dds tool\dds.scr
2011-04-18 11:55:24 -------- d-----w- c:\docume~1\!adaml~1.how\applic~1\Macromedia
2011-04-18 11:55:20 -------- d-----w- c:\docume~1\!adaml~1.how\applic~1\Adobe
2011-04-18 11:54:31 -------- d-----w- c:\documents and settings\!adam.l.howard\Tracing
2011-04-18 11:54:00 -------- d-----w- c:\docume~1\!adaml~1.how\locals~1\applic~1\Roxio
2011-04-18 11:34:33 40328 ----a-w- c:\windows\system32\HIPIS0e011b5.dll
2011-04-11 16:49:28 -------- d-----w- c:\windows\SoftwareDistribution_PrevConct
2011-04-04 17:13:42 677888 -c----w- c:\windows\system32\dllcache\lhmstsc.exe
2011-04-04 17:13:42 270848 -c----w- c:\windows\system32\dllcache\sbe.dll
2011-04-04 17:13:42 186880 -c----w- c:\windows\system32\dllcache\encdec.dll
2011-04-04 17:13:41 2067456 -c----w- c:\windows\system32\dllcache\lhmstscx.dll
2011-03-22 09:49:32 -------- d-----w- c:\docume~1\alluse~1\applic~1\GroupPolicy
==================== Find3M ====================
2011-04-08 05:15:38 136512 ----a-w- c:\windows\system32\KevlarSigs.dll
2011-02-15 19:18:45 9093 ----a-w- c:\windows\system32\zMOVEPST.BAT
2011-02-11 15:46:25 3439 ----a-w- c:\windows\system32\zzPSTfind.bat
2011-02-09 13:53:52 270848 ----a-w- c:\windows\system32\sbe.dll
2011-02-09 13:53:52 186880 ----a-w- c:\windows\system32\encdec.dll
2011-02-02 07:58:35 2067456 ----a-w- c:\windows\system32\mstscax.dll
2011-01-27 11:57:06 677888 ----a-w- c:\windows\system32\mstsc.exe
2011-01-21 14:44:37 439296 ----a-w- c:\windows\system32\shimgvw.dll
============= FINISH: 8:46:57.73 ===============

BC AdBot (Login to Remove)


#2 Adam L. Howard

Adam L. Howard
  • Topic Starter

  • Members
  • 3 posts
  • Gender:Male
  • Local time:05:34 PM

Posted 18 April 2011 - 08:21 AM

GMER log

DDS Tool Attach

Attached Files

#3 gringo_pr


    Bleepin Gringo

  • Malware Response Team
  • 136,772 posts
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 PM

Posted 25 April 2011 - 06:08 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.


  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop


    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply

Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"

"just click on Cancel, then Accept".

information and logs:

  • In your next post I need the following

  • .logs from DDS
  • log from RKUnHooker
  • let me know of any problems you may have had


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr


    Bleepin Gringo

  • Malware Response Team
  • 136,772 posts
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 PM

Posted 28 April 2011 - 12:36 AM


48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 gringo_pr


    Bleepin Gringo

  • Malware Response Team
  • 136,772 posts
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 PM

Posted 01 May 2011 - 02:20 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users