Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

possible rootkit prob, Internet Redirect, High CPU usage, ads playing from speakers


  • This topic is locked This topic is locked
3 replies to this topic

#1 audz123

audz123

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:02 PM

Posted 03 June 2011 - 12:57 AM

I Read in a previous post, in a post that had similar problems to what I'm having that i should post on here and include a log from from GMCE or somthing. I ran that and I am posting the results here hopefully someone can help

GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-06-03 01:49:59
Windows 6.1.7600 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 Hitachi_ rev.FBEO
Running: gmer.exe; Driver: C:\Users\Audrey\AppData\Local\Temp\kxliqpog.sys


---- System - GMER 1.0.15 ----

SSDT 86D57180 ZwAlertResumeThread
SSDT 86D57260 ZwAlertThread
SSDT 86D56838 ZwAllocateVirtualMemory
SSDT 86BB5188 ZwAlpcConnectPort
SSDT 86D5A8D8 ZwAssignProcessToJobObject
SSDT 86D5AE80 ZwCreateMutant
SSDT 86D5A5F8 ZwCreateSymbolicLinkObject
SSDT 86D562F8 ZwCreateThread
SSDT 86D5A6E8 ZwCreateThreadEx
SSDT 86D5A9B8 ZwDebugActiveProcess
SSDT 86D56A08 ZwDuplicateObject
SSDT 86D58CA0 ZwFreeVirtualMemory
SSDT 86D5AF70 ZwImpersonateAnonymousToken
SSDT 86D570A0 ZwImpersonateThread
SSDT 86CE7D90 ZwLoadDriver
SSDT 86D58BA0 ZwMapViewOfSection
SSDT 86D5ADA0 ZwOpenEvent
SSDT 86D54CD8 ZwOpenProcess
SSDT 86D56928 ZwOpenProcessToken
SSDT 86D5ABE0 ZwOpenSection
SSDT 86D56AF8 ZwOpenThread
SSDT 86D5A7E8 ZwProtectVirtualMemory
SSDT 86D56BE8 ZwResumeThread
SSDT 86D57500 ZwSetContextThread
SSDT 86D589D0 ZwSetInformationProcess
SSDT 86D5AA98 ZwSetSystemInformation
SSDT 86D5ACC0 ZwSuspendProcess
SSDT 86D57340 ZwSuspendThread
SSDT 86D54E10 ZwTerminateProcess
SSDT 86D57420 ZwTerminateThread
SSDT 86D58AC0 ZwUnmapViewOfSection
SSDT 86D58D90 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwSaveKeyEx + 13BD 82C4C569 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 82C71092 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text ntkrnlpa.exe!RtlSidHashLookup + 224 82C78834 8 Bytes [80, 71, D5, 86, 60, 72, D5, ...]
.text ntkrnlpa.exe!RtlSidHashLookup + 23C 82C7884C 4 Bytes [38, 68, D5, 86]
.text ntkrnlpa.exe!RtlSidHashLookup + 248 82C78858 4 Bytes [88, 51, BB, 86]
.text ntkrnlpa.exe!RtlSidHashLookup + 29C 82C788AC 4 Bytes [D8, A8, D5, 86]
.text ntkrnlpa.exe!RtlSidHashLookup + 318 82C78928 4 Bytes [80, AE, D5, 86]
.text ...
.text C:\windows\system32\DRIVERS\tos_sps32.sys section is writeable [0x88D2E000, 0x3C849, 0xE8000020]
.dsrt C:\windows\system32\DRIVERS\tos_sps32.sys unknown last section [0x88D73000, 0x3DC, 0x48000040]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!DialogBoxIndirectParamW 77134AA7 5 Bytes JMP 7290FED8 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!DialogBoxParamW 7713564A 5 Bytes JMP 72704BA7 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!DialogBoxParamA 7714CF6A 5 Bytes JMP 7290FE75 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!DialogBoxIndirectParamA 7714D29C 5 Bytes JMP 7290FF3B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!MessageBoxIndirectA 7715E8C9 5 Bytes JMP 7290FE0A C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!MessageBoxIndirectW 7715E9C3 5 Bytes JMP 7290FD9F C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!MessageBoxExA 7715EA29 5 Bytes JMP 7290FD3D C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] USER32.dll!MessageBoxExW 7715EA4D 5 Bytes JMP 7290FCDB C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WININET.dll!HttpAddRequestHeadersA 75F29ABA 5 Bytes JMP 01626B70
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WININET.dll!HttpAddRequestHeadersW 75F30848 5 Bytes JMP 01626D70
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WS2_32.dll!closesocket 77613BED 5 Bytes JMP 0165000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WS2_32.dll!recv 776147DF 5 Bytes JMP 005F000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WS2_32.dll!connect 776148BE 5 Bytes JMP 0164000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WS2_32.dll!getaddrinfo 77616737 5 Bytes JMP 0178000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WS2_32.dll!send 7761C4C8 5 Bytes JMP 0176000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2584] WS2_32.dll!gethostbyname 77627133 5 Bytes JMP 0177000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!SetWindowsHookExW 7711210A 5 Bytes JMP 7279463B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!DialogBoxIndirectParamW 77134AA7 5 Bytes JMP 7290FED8 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!DialogBoxParamW 7713564A 5 Bytes JMP 72704BA7 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!DialogBoxParamA 7714CF6A 5 Bytes JMP 7290FE75 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!DialogBoxIndirectParamA 7714D29C 5 Bytes JMP 7290FF3B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!MessageBoxIndirectA 7715E8C9 5 Bytes JMP 7290FE0A C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!MessageBoxIndirectW 7715E9C3 5 Bytes JMP 7290FD9F C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!MessageBoxExA 7715EA29 5 Bytes JMP 7290FD3D C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] USER32.dll!MessageBoxExW 7715EA4D 5 Bytes JMP 7290FCDB C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] ole32.dll!OleLoadFromStream 771D5BF6 5 Bytes JMP 7291022B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WININET.dll!HttpAddRequestHeadersA 75F29ABA 5 Bytes JMP 019B6B70
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WININET.dll!HttpAddRequestHeadersW 75F30848 5 Bytes JMP 019B6D70
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WS2_32.dll!closesocket 77613BED 5 Bytes JMP 01BC000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WS2_32.dll!recv 776147DF 5 Bytes JMP 0080000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WS2_32.dll!connect 776148BE 5 Bytes JMP 01BB000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WS2_32.dll!getaddrinfo 77616737 5 Bytes JMP 01CF000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WS2_32.dll!send 7761C4C8 5 Bytes JMP 01BD000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2972] WS2_32.dll!gethostbyname 77627133 5 Bytes JMP 01CE000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!SetWindowsHookExW 7711210A 5 Bytes JMP 7279463B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!DialogBoxIndirectParamW 77134AA7 5 Bytes JMP 7290FED8 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!DialogBoxParamW 7713564A 5 Bytes JMP 72704BA7 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!DialogBoxParamA 7714CF6A 5 Bytes JMP 7290FE75 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!DialogBoxIndirectParamA 7714D29C 5 Bytes JMP 7290FF3B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!MessageBoxIndirectA 7715E8C9 5 Bytes JMP 7290FE0A C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!MessageBoxIndirectW 7715E9C3 5 Bytes JMP 7290FD9F C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!MessageBoxExA 7715EA29 5 Bytes JMP 7290FD3D C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] USER32.dll!MessageBoxExW 7715EA4D 5 Bytes JMP 7290FCDB C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] ole32.dll!OleLoadFromStream 771D5BF6 5 Bytes JMP 7291022B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WININET.dll!HttpAddRequestHeadersA 75F29ABA 5 Bytes JMP 01326B70
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WININET.dll!HttpAddRequestHeadersW 75F30848 5 Bytes JMP 01326D70
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WS2_32.dll!closesocket 77613BED 5 Bytes JMP 0188000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WS2_32.dll!recv 776147DF 5 Bytes JMP 0186000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WS2_32.dll!connect 776148BE 5 Bytes JMP 0187000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WS2_32.dll!getaddrinfo 77616737 5 Bytes JMP 018B000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WS2_32.dll!send 7761C4C8 5 Bytes JMP 0189000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5240] WS2_32.dll!gethostbyname 77627133 5 Bytes JMP 018A000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!DialogBoxIndirectParamW 77134AA7 5 Bytes JMP 7290FED8 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!DialogBoxParamW 7713564A 5 Bytes JMP 72704BA7 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!DialogBoxParamA 7714CF6A 5 Bytes JMP 7290FE75 C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!DialogBoxIndirectParamA 7714D29C 5 Bytes JMP 7290FF3B C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!MessageBoxIndirectA 7715E8C9 5 Bytes JMP 7290FE0A C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!MessageBoxIndirectW 7715E9C3 5 Bytes JMP 7290FD9F C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!MessageBoxExA 7715EA29 5 Bytes JMP 7290FD3D C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] USER32.dll!MessageBoxExW 7715EA4D 5 Bytes JMP 7290FCDB C:\windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] WININET.dll!HttpAddRequestHeadersA 75F29ABA 5 Bytes JMP 00516B70
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] WININET.dll!HttpAddRequestHeadersW 75F30848 5 Bytes JMP 00516D70
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] ws2_32.DLL!closesocket 77613BED 5 Bytes JMP 0077000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] ws2_32.DLL!recv 776147DF 5 Bytes JMP 0061000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] ws2_32.DLL!connect 776148BE 5 Bytes JMP 0062000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] ws2_32.DLL!getaddrinfo 77616737 5 Bytes JMP 0212000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] ws2_32.DLL!send 7761C4C8 5 Bytes JMP 0078000A
.text C:\Program Files\Internet Explorer\iexplore.exe[5320] ws2_32.DLL!gethostbyname 77627133 5 Bytes JMP 0211000A

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \Driver\ACPI_HAL \Device\00000056 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)

AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)

Device \Driver\iaStor \Device\Ide\iaStor0 868DB1ED
Device \Driver\iaStor \Device\Ide\IAAStorageDevice-0 868DB1ED
Device \Driver\iaStor \Device\Ide\IAAStorageDevice-1 868DB1ED

AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\tdx \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

---- Threads - GMER 1.0.15 ----

Thread System [4:276] 868DFE7A
Thread System [4:280] 868E2008

---- Files - GMER 1.0.15 ----

File C:\Users\Audrey\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GCEWYQBK\extended[2].xml 138 bytes
File C:\Users\Audrey\AppData\Roaming\Microsoft\Windows\Cookies\audrey@CALZ4E2Q.txt 0 bytes
File C:\Windows\Temp\TMP000006FA0E2095C26D16A366 0 bytes

---- EOF - GMER 1.0.15 ----


Please Help The ark.txt file is also attached

Attached Files

  • Attached File  ARK.txt   22.74KB   1 downloads


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:02 PM

Posted 08 June 2011 - 09:25 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.


We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.


In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply





Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".


information and logs:

  • In your next post I need the following

  • .logs from DDS
  • log from RKUnHooker
  • let me know of any problems you may have had

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:02 PM

Posted 11 June 2011 - 12:42 AM

Hello

48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:02 PM

Posted 14 June 2011 - 12:07 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users