Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Search results redirect and Windows Security Essentials can't update


  • Please log in to reply
5 replies to this topic

#1 LisaDroesdov

LisaDroesdov

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:31 PM

Posted 24 May 2011 - 03:05 AM

Hello Bleeping Computer folks,

Thanks in advance for your help. I was here once before over a year ago and was able to clear up my computer's infection that none of my antivirus programs were able to fix. I'm hoping y'all can help me again.

I am running Windows XP, Service Pack 3. I suspect I have some uninstalled updates as I have automatic updates turned off, but I don't want to touch it right now with an active malware infection of some sort. I am seeing a few different symptoms:

1) All of my Google and Yahoo! search results redirect to some sort of spammy looking directory site. at www.scour.com.

2) Periodically I lose Internet connectivity and have to restart my computer. On one occasion, local networking disabled itself -- I had not used control panel in about 2 weeks and definitely did not disable my LAN while in the middle of browsing the web, but there it was!

On another occasion my Intel ProSet Wireless adapter dropped my wireless connection and gave me a "Trouble Applying Profile!" error message that I've never seen before. This may not be related but the last time I had a virus that my usual software couldn't clear up it did cause connectivity problems, so I am thinking it may well be related.

3) Windows Security Essentials is unable to update itself due to a "connectivity problem." This is consistent repeatedly even though I am online using the Web while it is trying to download updates. It won't scan without updating.

4) When I shut my computer down, I get a "not responding" window from a program titled in Chinese characters. This started around the same time as the search redirect and I have not installed any new programs or browser extensions since then.

I've tried scanning with MalWare Bytes Anti Malware (fully updated) and it did not remove the problem. Likewise Super Anti Spyware, which did find some stuff and quarantine it but didn't solve the problem.

I have a version of ComboFix installed a year ago the last time I needed BleepingComputer help but didn't want to run it without expert guidance. I'm good enough with these things not to annoy the sys admins at work TOO often (I do try turning it off and on again before asking for help) but certainly not expert enough to go messing with essential functions without help!

The computer is a Dell Inspiron E1405 laptop with no known hardware issues (knock on wood).

Thanks in advance for any assistance and I hope this report was decent!

Edited by hamluis, 24 May 2011 - 06:26 AM.
Edited, moved from XP to Am I Infected.


BC AdBot (Login to Remove)

 


#2 techextreme

techextreme

    Bleepin Tech


  • Members
  • 2,125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pittsburgh, PA
  • Local time:05:31 PM

Posted 24 May 2011 - 01:53 PM

Hi LisaDroesdov,

Could you please post the latest logs from both Malwarebytes and SuperAntispyware?

I'd also like you to run one more utility and post the resulting log.

Please download GMER from one of the following locations and save it to your desktop:

* Main Mirror
This version will download a randomly named file (Recommended)
* Zipped Mirror
This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.

* Disconnect from the Internet and close all running programs.
* Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
* Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
* Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.
Posted Image

* GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
* If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
* Now click the Scan button. If you see a rootkit warning window, click OK.
* When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
* Click the Copy button and paste the results into your next reply.
* Exit GMER and re-enable all active protection when done.

-- If you encounter any problems, try running GMER in Safe Mode.
Techextreme

"Admire those who attempt great things, even though they fail."

-- Seneca

#3 LisaDroesdov

LisaDroesdov
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:31 PM

Posted 29 May 2011 - 02:58 AM

Thank you for your help! Sorry it took me a few days to reply.

GMER LOG:

GMER 1.0.15.15627 - http://www.gmer.net
Rootkit scan 2011-05-28 09:04:41
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 TOSHIBA_MK1032GSX rev.AS022D
Running: 2hrgbwfb.exe; Driver: C:\DOCUME~1\Jelena\LOCALS~1\Temp\fxtdapoc.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\Program Files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_XP\AVGIDSShim.sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwOpenProcess [0xA973D670]
SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xA9BB00B0]
SSDT \??\C:\Program Files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_XP\AVGIDSShim.sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwTerminateThread [0xA973D7C0]
SSDT \??\C:\Program Files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_XP\AVGIDSShim.sys (IDS Application Activity Monitor Loader Driver./AVG Technologies CZ, s.r.o. ) ZwWriteVirtualMemory [0xA973D860]

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs AVGIDSFilter.sys (IDS Application Activity Monitor Filter Driver./AVG Technologies CZ, s.r.o. )

Device \FileSystem\Udfs \UdfsCdRom DLAIFS_M.SYS (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Udfs \UdfsDisk DLAIFS_M.SYS (Drive Letter Access Component/Sonic Solutions)

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\BTHUSB \Device\00000094 bthport.sys (Bluetooth Bus Driver/Microsoft Corporation)

AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\BTHUSB \Device\00000096 bthport.sys (Bluetooth Bus Driver/Microsoft Corporation)

AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device mrxsmb.sys (Windows NT SMB Minirdr/Microsoft Corporation)
Device A8413D20

AttachedDevice fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\001641743c11 (not active ControlSet)
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001641743c11
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@NoChange 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS@Installed 1
Reg HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid@ {00020420-0000-0000-C000-000000000046}
Reg HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32@ {00020420-0000-0000-C000-000000000046}
Reg HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib@ {29D67D3C-509A-4544-903F-C8C1B8236554}
Reg HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib@Version 1.0
Reg HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid@ {00020424-0000-0000-C000-000000000046}
Reg HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid32@ {00020424-0000-0000-C000-000000000046}
Reg HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib@ {E47CAEE0-DEEA-464A-9326-3F2801535A4D}
Reg HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib@Version 1.0

---- EOF - GMER 1.0.15 ----

SUPER ANTI SPYWARE LOG:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/11/2011 at 00:52 AM

Application Version : 4.33.1000

Core Rules Database Version : 7030
Trace Rules Database Version: 4842

Scan type : Quick Scan
Total Scan Time : 00:26:21

Memory items scanned : 519
Memory threats detected : 0
Registry items scanned : 602
Registry threats detected : 10
File items scanned : 12665
File threats detected : 31

Adware.Tracking Cookie
C:\Documents and Settings\Jelena\Cookies\jelena@tribalfusion[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@advertising[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@ad.yieldmanager[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@media6degrees[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@adecn[1].txt
C:\Documents and Settings\Jelena\Cookies\jelena@doubleclick[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@specificclick[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@yieldmanager[1].txt
C:\Documents and Settings\Jelena\Cookies\jelena@adbrite[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@user.lucidmedia[1].txt
C:\Documents and Settings\Jelena\Cookies\jelena@invitemedia[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@apmebf[1].txt
C:\Documents and Settings\Jelena\Cookies\jelena@ru4[1].txt
C:\Documents and Settings\Jelena\Cookies\jelena@ads.pubmatic[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@atdmt[1].txt
C:\Documents and Settings\Jelena\Cookies\jelena@mediaplex[2].txt
C:\Documents and Settings\Jelena\Cookies\jelena@specificmedia[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@doubleclick[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@atdmt[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@atwola[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@tacoda.at.atwola[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@ar.atwola[2].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@ar.atwola[3].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@2o7[2].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@serving-sys[2].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@questionmarket[2].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@cdn.at.atwola[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@advertising[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@revsci[2].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@at.atwola[1].txt
C:\Documents and Settings\KatCrossBuns\Cookies\katcrossbuns@avgtechnologies.112.2o7[1].txt

Adware.MyWebSearch/FunWebProducts
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid32
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib#Version


MALWARE BYTES ANTI MALWARE LOG:

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6543

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

5/10/2011 7:22:55 AM
mbam-log-2011-05-10 (07-22-55).txt

Scan type: Full scan (C:\|)
Objects scanned: 389097
Time elapsed: 1 hour(s), 39 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{0FDF7EFA-E8F5-429E-8D96-B3574FC14A52} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0FDF7EFA-E8F5-429E-8D96-B3574FC14A52} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0FDF7EFA-E8F5-429E-8D96-B3574FC14A52} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\.fsharproj (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\localservice\application data\0200000048f9f1d11270c.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270o.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270p.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270s.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270c.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270o.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270p.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270s.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\authz32.dll (Trojan.Agent) -> Quarantined and deleted successfully.

#4 techextreme

techextreme

    Bleepin Tech


  • Members
  • 2,125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pittsburgh, PA
  • Local time:05:31 PM

Posted 31 May 2011 - 09:23 AM

Hi LisaDroesdov,

I'd like you to update MBAM and once again run a "Full System Scan".

Open Malwarebytes and click the update tab. Press the "Check for updates" button and allow the update to download and install.

When it has finished, click on the "Scanner" tab and put the dot next to "Perform Full Scan".

When this is finished, please post the log in your reply.
Techextreme

"Admire those who attempt great things, even though they fail."

-- Seneca

#5 LisaDroesdov

LisaDroesdov
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:31 PM

Posted 06 June 2011 - 08:44 AM

Hi techextreme,

I did that and also installed the free trial of the full version of MBAM. Since running this scan, Windows Security Essentials successfully updated, but there still seems to be an infection because my brand new 30 day trial of the active protection from MBAM frequently gives me the "prevented your computer from accessing a malicious website (outgoing)" message. Here's the log:

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6772

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

6/4/2011 3:55:38 PM
mbam-log-2011-06-04 (15-55-38).txt

Scan type: Full scan (C:\|)
Objects scanned: 397766
Time elapsed: 1 hour(s), 47 minute(s), 59 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 1
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 12

Memory Processes Infected:
c:\WINDOWS\system32\kbdhu132.exe (Trojan.Agent) -> 3792 -> Unloaded process successfully.
c:\WINDOWS\system32\d3dpmesh32.exe (Trojan.Agent) -> 2180 -> Unloaded process successfully.

Memory Modules Infected:
c:\WINDOWS\system32\lftga11n32.dll (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{6192C45F-02BD-5817-83EB-ED6CCFB8B4C5} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6192C45F-02BD-5817-83EB-ED6CCFB8B4C5} (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Agent) -> Bad: (C:\WINDOWS\system32\lftga11n32.dll) Good: () -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\kbdhu132.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\lftga11n32.dll (Trojan.Agent) -> Delete on reboot.
c:\WINDOWS\system32\d3dpmesh32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Jelena\local settings\Temp\n.exn (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270c.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270o.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270p.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\localservice\application data\0200000048f9f1d11270s.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270c.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270o.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270p.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0200000048f9f1d11270s.manifest (Malware.Trace) -> Quarantined and deleted successfully.

#6 techextreme

techextreme

    Bleepin Tech


  • Members
  • 2,125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pittsburgh, PA
  • Local time:05:31 PM

Posted 06 June 2011 - 02:41 PM

Ok. Seems Malwarebytes is catching something each time. Let's run an online virus scan of your computer, then when that is finished, let's update Malwarebytes once again and run another full scan. Please post both logs when complete.

Please perform a scan with Eset Onlinescan (NOD32).
(Requires Internet Explorer to work. If given the option, choose "Quarantine" instead of delete.)
Vista Users be sure to run Internet Explorer as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select "Run as Administrator" from the context menu.

  • You will see the Terms of Use. Tick the check-box in front of YES, I accept the Terms of Use
  • Now click Start.
  • You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then Click Install ActiveX component.
  • A new window will appear asking "Do you want to install this software?" (OnlineScanner.cab)".
  • Answer Yes to install and download the ActiveX controls that allows the scan to run.
  • Click Start.(the Onlinescanner will now prepare itself for running on your pc)
  • To do a full-scan, check: "Remove found threats" and "Scan potentially unwanted applications"
  • Press Scan to start the online scan. (this could take some time to complete)
  • When the scan has finished, it will show a screen with two tabs "overview" and "details" and the option to get information or buy software. Just close the window.
  • Now click Start > Run... > type: C:\Program Files\Eset\EsetOnlineScanner\log.txt
  • The scan results will open in Notepad.
  • Copy and paste the log results in your next reply.

Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn\ them back on after you are finished
Techextreme

"Admire those who attempt great things, even though they fail."

-- Seneca




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users