Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Still have Rootkit.Win32.Zaccess.c - MsFilter.sys original missing


  • This topic is locked This topic is locked
14 replies to this topic

#1 MDMark2011

MDMark2011

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 02 September 2011 - 09:16 PM

Looks like others are also having problems with this.

First - thanks so much for all the advice in this forum. I have not had a major spyware infection before - but something my kids got into resulted in an incredibly nasty variant of the Windows Security virus. Disabled all virus programs (even in safe mode), popped up windows and took 100% CPU, disabled Task Manager, etc.

Finally, through a combination of following : http://www.bleepingcomputer.com/virus-removal/remove-security-suite
and using rkill, tdsskiller (had to run this first), malwarebytes (only worked with inherit as well) - was able to remove 30 infections and now can actually bring the PC up in regular mode and it is usable.

However, there is still one piece I can't get rid of. What happens is tdsskiller reports the infection of Rootkit.Wind32.Zaccess.c (and if not in safe mode - I see a process called 2806415889 running and in the windows directory) but cannot replace the MsConfig.sys file (seems to be missing from drivers directory). I believe when I first ran this that tdsskiller says it "cured" it - but it still came back and now I get a processing error in the tdsskiller log and it says the original MsConfig.sys file is missing.

The computer still will not run anti-virus programs in non-safe mode but everything else seems to work OK - which I get is still a bad place to be - but better than it was.

Thanks for any help...

Note the GMER log may be incomplete as the program terminates before completion but i manually copied the log before it abended.

DDS.log =>

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 7.0.5730.11
Run by family account at 21:17:31 on 2011-09-02
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.173 [GMT -4:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\2806415889:4001216856.exe
svchost.exe
C:\PROGRA~1\COMMON~1\AOL\ACS\AOLacsd.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Dell Support Center\bin\sprtsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\System32\svchost.exe -k termlfsvc
C:\WINDOWS\system32\UAService7.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\Dell\Media Experience\DMXLauncher.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Dell Support Center\bin\sprtcmd.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DellSupport\DSAgnt.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\McAfee Security Scan\2.0.181\SSScheduler.exe
C:\Program Files\QUICKENW\QWDLLS.EXE
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\HPZipm12.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = https://www.facebook.com/home.php
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uDefault_Page_URL = hxxp://www.google.com/ig/dell?hl=en&client=dell-inc&channel=us
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll
BHO: PC Tools Browser Guard BHO: {2a0f3d1b-0909-4ff4-b272-609cce6054e7} - c:\program files\spyware doctor\bdt\PCTBrowserDefender.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Skype Plug-In: {ae805869-2e5c-4ed4-8f7b-f1f7851a4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.7.6406.1642\swg.dll
BHO: CBrowserHelperObject Object: {ca6319c0-31b7-401e-a518-a07c3db8f777} - c:\program files\bae\BAE.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: Yontoo Layers: {fd72061e-9fde-484d-a58a-0bab4151cad8} - c:\program files\yontoo layers runtime\YontooIEClient.dll
TB: {BA52B914-B692-46c4-B683-905236F6F655} - No File
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: PC Tools Browser Guard: {472734ea-242a-422b-adf8-83d1e48cc825} - c:\program files\spyware doctor\bdt\PCTBrowserDefender.dll
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [LogitechSoftwareUpdate] "c:\program files\logitech\video\ManifestEngine.exe" boot
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Aim6]
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRun: [DellSupportCenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P DellSupportCenter
uRun: [UpdateFlow.Verizon] c:\program files\verizon\mccibrowser.exe -appkey=verizon -url=file://c:\program files\verizon\offlineupdate\redirector.htm
uRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil10p_ActiveX.exe -update activex
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [DMXLauncher] c:\program files\dell\media experience\DMXLauncher.exe
mRun: [ISUSPM Startup] "c:\program files\common files\installshield\updateservice\isuspm.exe" -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [<NO NAME>]
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [LVCOMSX] c:\windows\system32\LVCOMSX.EXE
mRun: [LogitechVideoRepair] c:\program files\logitech\video\ISStart.exe
mRun: [LogitechVideoTray] c:\program files\logitech\video\LogiTray.exe
mRun: [HP Software Update] "c:\program files\hp\hp software update\HPWuSchd2.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [dscactivate] "c:\program files\dell support center\gs_agent\custom\dsca.exe"
mRun: [DellSupportCenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P DellSupportCenter
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [Vyatecagu] rundll32.exe "c:\windows\ihufaquzacufo.dll",Startup
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\billmi~1.lnk - c:\program files\quickenw\BILLMIND.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpimag~1.lnk - c:\program files\hp\digital imaging\bin\hpqthb08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\desktop messenger\8876480\program\LDMConf.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\mcafee~1.lnk - c:\program files\mcafee security scan\2.0.181\SSScheduler.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\quicke~1.lnk - c:\program files\quickenw\QWDLLS.EXE
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - c:\program files\aim\aim.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
LSP: mswsock.dll
Trusted Zone: internet
Trusted Zone: intuit.com\ttlc
Trusted Zone: mcafee.com
Trusted Zone: turbotax.com
Trusted Zone: musicmatch.com\online
DPF: vzTCPConfig - hxxp://www2.verizon.net/help/fios_settings_POTT20009/include/vzTCPConfig.CAB
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21}
DPF: {6D2EF4B4-CB62-4C0B-85F3-B79C236D702C} - hxxp://www.facebook.com/controls/contactx.dll
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} - hxxp://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 71.252.0.12 68.237.161.12
TCP: Interfaces\{32F834E3-C65F-4E2A-9378-E832DAFE7DDE} : DhcpNameServer = 71.252.0.12 68.237.161.12
Filter: text/html - {090e7175-ec85-476a-8adc-40bb5209a214} -
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: terlcw32 - terlcw32.dll
Notify: terllsvcses - terlcw32.dll
AppInit_DLLs: c:\progra~1\google\google~1\GOEC62~1.DLL
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
============= SERVICES / DRIVERS ===============
.
R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2011-8-23 217032]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-10-24 165648]
R2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\spyware doctor\bdt\BDTUpdateService.exe [2011-8-23 112592]
R2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R2 TermServices;Remote Desktop Services;c:\windows\system32\svchost.exe -k termlfsvc [2005-8-16 14336]
S1 MpKsl166b6866;MpKsl166b6866;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{c370f0a6-0bcc-46dd-8ec5-2dbfe2266fc4}\mpksl166b6866.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{c370f0a6-0bcc-46dd-8ec5-2dbfe2266fc4}\MpKsl166b6866.sys [?]
S1 MpKsl23054faf;MpKsl23054faf;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{3bd11ca3-ecc5-4b46-a108-6d7eace71647}\mpksl23054faf.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{3bd11ca3-ecc5-4b46-a108-6d7eace71647}\MpKsl23054faf.sys [?]
S1 MpKsl33c2450d;MpKsl33c2450d;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{3060ebfb-e41e-4e5a-b3a4-0acca4f26afb}\mpksl33c2450d.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{3060ebfb-e41e-4e5a-b3a4-0acca4f26afb}\MpKsl33c2450d.sys [?]
S1 MpKsl34e02548;MpKsl34e02548;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{b4ea04ea-2eac-4ed5-91e0-28765788649c}\mpksl34e02548.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{b4ea04ea-2eac-4ed5-91e0-28765788649c}\MpKsl34e02548.sys [?]
S1 MpKsl485c3390;MpKsl485c3390;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{990694ac-b7f6-4646-851e-379f3a604966}\mpksl485c3390.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{990694ac-b7f6-4646-851e-379f3a604966}\MpKsl485c3390.sys [?]
S1 MpKsl4f58dd1e;MpKsl4f58dd1e;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f0f3a7cc-a4a5-44ea-b4b2-377bee3e1267}\mpksl4f58dd1e.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f0f3a7cc-a4a5-44ea-b4b2-377bee3e1267}\MpKsl4f58dd1e.sys [?]
S1 MpKsl56739d4e;MpKsl56739d4e;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a9b91e0c-3ef2-419f-ae80-f0dc7b4f112b}\mpksl56739d4e.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a9b91e0c-3ef2-419f-ae80-f0dc7b4f112b}\MpKsl56739d4e.sys [?]
S1 MpKsl79dcf051;MpKsl79dcf051;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{6115ea84-58b4-4c57-9045-9725514a1f79}\mpksl79dcf051.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{6115ea84-58b4-4c57-9045-9725514a1f79}\MpKsl79dcf051.sys [?]
S1 MpKsl7f361f14;MpKsl7f361f14;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{ac631325-b41c-47ee-a33f-c81cc2cb7e54}\mpksl7f361f14.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{ac631325-b41c-47ee-a33f-c81cc2cb7e54}\MpKsl7f361f14.sys [?]
S1 MpKsl811d97b0;MpKsl811d97b0;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{eb4460e3-7e5c-4e4c-99f5-4b7d1856aa1c}\mpksl811d97b0.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{eb4460e3-7e5c-4e4c-99f5-4b7d1856aa1c}\MpKsl811d97b0.sys [?]
S1 MpKsl8f2119f6;MpKsl8f2119f6;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{e25004e8-0dd9-4410-a584-ea750aac3b4b}\mpksl8f2119f6.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{e25004e8-0dd9-4410-a584-ea750aac3b4b}\MpKsl8f2119f6.sys [?]
S1 MpKsl95e37b4c;MpKsl95e37b4c;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{5709d145-6b2d-4d69-9ec3-226c004b9cd1}\mpksl95e37b4c.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{5709d145-6b2d-4d69-9ec3-226c004b9cd1}\MpKsl95e37b4c.sys [?]
S1 MpKsl9afbc519;MpKsl9afbc519;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{228e4888-00c1-4a4d-8fc1-aeff3a294648}\mpksl9afbc519.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{228e4888-00c1-4a4d-8fc1-aeff3a294648}\MpKsl9afbc519.sys [?]
S1 MpKsla2ee76a3;MpKsla2ee76a3;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{28277cce-307a-49b1-8c21-ece50e59f9b2}\mpksla2ee76a3.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{28277cce-307a-49b1-8c21-ece50e59f9b2}\MpKsla2ee76a3.sys [?]
S1 MpKsld9cdcc32;MpKsld9cdcc32;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{6738c878-e46e-4f83-9761-bbddecaa1895}\mpksld9cdcc32.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{6738c878-e46e-4f83-9761-bbddecaa1895}\MpKsld9cdcc32.sys [?]
S2 gupdate1c9a69b315c5b0;Google Update Service (gupdate1c9a69b315c5b0);c:\program files\google\update\GoogleUpdate.exe [2009-3-16 133104]
S3 gel90xne;gel90xne;c:\docume~1\family~1\locals~1\temp\gel90xne.sys [2005-9-28 31744]
S3 GoogleDesktopManager-051210-111108;Google Desktop Manager 5.9.1005.12335;c:\program files\google\google desktop search\GoogleDesktop.exe [2006-6-14 30192]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2009-3-16 133104]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2011-8-23 366840]
S3 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2011-8-23 1142224]
.
=============== Created Last 30 ================
.
2011-08-26 15:59:28 -------- d-----w- C:\TDSSKiller_Quarantine
2011-08-26 15:32:50 -------- d-----w- c:\documents and settings\family account\local settings\application data\Threat Expert
2011-08-26 15:17:51 43408 --sha-w- c:\windows\system32\c_62545.nl_
2011-08-26 13:56:25 -------- d--h--w- c:\windows\PIF
2011-08-26 13:48:18 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-08-26 13:48:14 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-08-26 13:48:14 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-08-24 00:34:52 -------- d-----w- c:\documents and settings\family account\application data\Malwarebytes
2011-08-24 00:34:44 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2011-08-24 00:09:01 767952 ----a-w- c:\windows\BDTSupport.dll
2011-08-24 00:09:00 165840 ----a-w- c:\windows\PCTBDRes.dll
2011-08-24 00:09:00 1652688 ----a-w- c:\windows\PCTBDCore.dll
2011-08-24 00:09:00 149456 ----a-w- c:\windows\SGDetectionTool.dll
2011-08-23 23:33:33 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2011-08-23 23:33:29 88040 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2011-08-23 23:33:29 217032 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2011-08-23 23:33:25 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2011-08-23 23:33:18 -------- d-----w- c:\program files\Spyware Doctor
2011-08-23 23:33:18 -------- d-----w- c:\program files\common files\PC Tools
2011-08-23 23:33:18 -------- d-----w- c:\documents and settings\family account\application data\PC Tools
2011-08-23 23:33:18 -------- d-----w- c:\documents and settings\all users\application data\PC Tools
2011-08-23 22:26:29 218624 ----a-w- c:\windows\system32\tercdw32.dll
2011-08-23 22:26:28 35840 ----a-w- c:\windows\system32\terlcw32.dll
2011-08-23 17:02:02 0 ----a-w- c:\documents and settings\family account\local settings\application data\oydm.exe
2011-08-23 17:02:02 0 ----a-w- c:\documents and settings\all users\application data\ovqr.exe
2011-08-23 17:02:01 0 ----a-w- c:\documents and settings\family account\local settings\application data\xsts.exe
2011-08-23 17:02:01 0 ----a-w- c:\documents and settings\family account\local settings\application data\wmgc.exe
2011-08-23 17:02:01 0 ----a-w- c:\documents and settings\family account\local settings\application data\gtbe.exe
2011-08-23 17:02:01 0 ----a-w- c:\documents and settings\all users\application data\oogr.exe
2011-08-23 17:02:01 0 ----a-w- c:\documents and settings\all users\application data\ggbt.exe
2011-08-23 17:02:01 0 ----a-w- c:\documents and settings\all users\application data\dtlf.exe
2011-08-23 14:58:07 0 ----a-w- c:\windows\Cqutivolupufaxa.bin
2011-08-23 14:58:05 -------- d-----w- c:\documents and settings\family account\local settings\application data\{39687C5B-32D9-463A-B16A-08C0BD7735E7}
2011-08-23 14:56:55 -------- d-----w- c:\program files\Yontoo Layers Runtime
2011-08-23 14:56:52 -------- d-----w- c:\documents and settings\all users\application data\Tarma Installer
2011-08-22 16:43:20 7152464 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f0f3a7cc-a4a5-44ea-b4b2-377bee3e1267}\mpengine.dll
2011-08-09 20:27:47 139656 ------w- c:\windows\system32\dllcache\rdpwd.sys
2011-08-09 20:26:53 10496 ------w- c:\windows\system32\dllcache\ndistapi.sys
2011-08-09 07:02:18 6881616 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\updates\mpengine.dll
2011-08-07 01:25:27 -------- d-----w- c:\documents and settings\family account\application data\Rovio
2011-08-07 01:24:06 -------- d-----w- c:\program files\Rovio
.
==================== Find3M ====================
.
2011-08-26 15:27:00 162816 ----a-w- c:\windows\system32\drivers\netbt.sys
2011-08-26 14:11:51 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-08-21 14:05:00 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
2011-07-12 07:32:04 701952 ----a-w- c:\windows\system32\_.dll
2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2011-06-24 14:10:36 139656 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2011-06-21 18:45:58 832512 ----a-w- c:\windows\system32\wininet.dll
2011-06-21 18:45:57 78336 ----a-w- c:\windows\system32\ieencode.dll
2011-06-21 18:45:57 1830912 ----a-w- c:\windows\system32\inetcpl.cpl
2011-06-21 18:45:57 17408 ----a-w- c:\windows\system32\corpol.dll
2011-06-21 11:47:20 389120 ----a-w- c:\windows\system32\html.iec
2011-06-20 17:44:52 293376 ----a-w- c:\windows\system32\winsrv.dll
.
============= FINISH: 21:19:27.37 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 02 September 2011 - 10:09 PM

Hi,

Please do the following:

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 MDMark2011

MDMark2011
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 03 September 2011 - 07:55 AM

Ran combofix.

1) Still gives me warning about Microsoft Security Essentials scanner running - even though I disabled from startup
2) Popped up a dialog saying "rootkit activity was detected on your machine, combofix needs to reboot", combofix told system to reboot
3) Combofix came up at reboot and restarted scan, finished stages 1-50, restored a bunch of infected files (essetentially every executable that was actively running basically as part of startup - Java, HP PrintManager, etc. ), combofix told system to reboot again
4) Combofix came up at reboot and indicating preparing log report
5) ComboFix Log attached...

I noted that the Update Manager (which had been previously not coming up since I got the virus), actually came up and indicated updates. I also noted in the task manager that the random process 2806415889 seems to be gone!!!

However I am waiting to reboot/re-enable virus programs and/or re-run tdsskiller to see if it is really gone until I hear back on next steps...

Thanks again!

Attached Files



#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 03 September 2011 - 03:22 PM

Hi

Please run the following:


  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

http://www.bleepingcomputer.com/forums/topic417216.html/page__pid__2394751

Collect::
c:\windows\system32\c_62545.nl_
c:\windows\system32\tercdw32.dll
c:\windows\system32\terlcw32.dll
c:\docume~1\FAMILY~1\LOCALS~1\Temp\gel90xne.sys

File::
c:\windows\Cqutivolupufaxa.bin

DirLook::
c:\documents and settings\family account\Local Settings\Application Data\{39687C5B-32D9-463A-B16A-08C0BD7735E7}

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\terlcw32]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\terllsvcses]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
"termlfsvc"=-	

Driver::
TermServices
gel90xne

DDS::
Trusted Zone: internet
Trusted Zone: intuit.com\ttlc
Trusted Zone: mcafee.com
Trusted Zone: turbotax.com
Trusted Zone: musicmatch.com\online

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


NEXT

  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 MDMark2011

MDMark2011
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 03 September 2011 - 04:34 PM

Attached is the updated combofix results log.

I get an error when trying to run MalwareBytes - "Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item"

I installed this in the middle of the virus issues - and was only able ever by copying mbam.exe "into Inherit" and then only able to run a onetime full scan. I never was able to run it more than once.

Should I attempt to un-install and re-install or use Inherit, or what do you suggest.

Attached Files



#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 03 September 2011 - 05:58 PM

Hi

I can unlock the files that have been locked down by the infection, so I need you to run the next program so we can see what's been locked down:

  • Please download Junction.zip and save it to your desktop.
  • Unzip it and put junction.exe in the Windows directory (C:\Windows).
  • Now go to Start > Run to open a run box > Copy and paste the following command in the open run box and click OK:

    cmd /c junction -s c:\ >log.txt&log.txt& del log.txt

  • A command window will open and the system will be scanned.
  • Wait until a log file opens.
  • Copy and paste or attach the content of it in your next reply



NEXT


  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

Folder::
c:\documents and settings\family account\Local Settings\Application Data\{39687C5B-32D9-463A-B16A-08C0BD7735E7}


Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 MDMark2011

MDMark2011
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 04 September 2011 - 06:25 PM

Here are the two logs from Junction and latest ComboFix run.

For what it matters - I don't need/use the SpyWare Doctor or MacAfee - was just trying to use them when I was in the middle of de-activating the original virus. My main virus program is the Windows Security Essentials and then need to make sure we unlock MalwareBytes and of course Battlefront II for the kids (looks like they were trying to run this while the main virus was still active).

Thanks again for all the help!

Attached Files



#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 04 September 2011 - 07:03 PM

Hi

Please do the following:

Please run the following:
  • please download GrantPerms.zip and save it to your desktop.
  • Unzip the file and run GrantPerms.exe
  • Copy and paste the following in the edit box:



c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\3ad391678a806ec4d691e83aaa393b6f_24adf822-76f7-4481-b30b-ff1b40f8687f
c:\\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\CacheManager\MpScanCache-1.bin
c:\\Documents and Settings\family account\Desktop\winlogon.exe
c:\\Documents and Settings\family account\Desktop\gmer\gmer.exe
c:\\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\\Program Files\Dell Support Center\HWDiag\bin\pcdrsysinfostorage.p5x
c:\\Program Files\LucasArts\Star Wars Battlefront II\GameData\BattlefrontII.exe
c:\\Program Files\Malwarebytes' Anti-Malware\mbam.exe
c:\\Program Files\McAfee Security Scan\2.0.181\McCHSvc.exe
c:\\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
c:\\Program Files\Spyware Doctor\pctsSvc.exe
c:\\Qoobox\BackEnv



  • Now Click Unlock.
  • When it is done click "OK".
  • Now click List Permissions and post the result (Perms.txt) that pops up.
  • A copy of Perms.txt will be saved in the same directory the tool is run.


Now give MBAM another try, it will probably need to be updated

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 MDMark2011

MDMark2011
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 05 September 2011 - 10:53 AM

OK - things looking promising now.

Attached are the GrantPerms and MBAM logs.

Looks like MBAM found 1 (maybe unrelated item) and MBAM quarantined and successfully removed.

I still have not tired running tdsskiller or re-enabled Microsoft Security Essentials yet.

You are doing a great job, thanks again!!!

Attached Files



#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 05 September 2011 - 03:09 PM

Hi, go ahead and re-enable MSSE and give TDSSKiller a try (should be clean)

let me know how the computer is running and if there are any outstanding issues.

Please also run a fresh DDS Log and Attach.txt

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 MDMark2011

MDMark2011
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 05 September 2011 - 05:12 PM

Everything working great. Thank you so much for all your help. Off to make a donation!!!

#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 05 September 2011 - 05:27 PM

that's great to hear, and thank-you very much

but please post the fresh DDS log so I can make certain there are no leftovers, then we'll have some housekeeping to do to clean up the tools properly.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 MDMark2011

MDMark2011
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:12 PM

Posted 05 September 2011 - 07:02 PM

No problem. Here are the updated clean DDS and Attach logs.

Attached Files



#14 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 05 September 2011 - 07:09 PM

Hi,

Please do the following:


Visit ADOBE and download the latest version of Acrobat Reader (version X)
Having the latest updates ensures there are no security vulnerabilities in your system.

NEXT

Posted Image
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update.
  • Download the latest version of Java Runtime Environment (JRE) 7 and save it to your desktop.
  • Scroll down to where it says JDK 7 (JDK or JRE)
  • Click the Download JDK button tunderneath
  • Select the Windows platform from the dropdown menu.
  • Read the License Agreement and then check the box that says: "Oracle Binary Code License Agreement for Java SE ". Click on Continue. The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel, double-click on Add or Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE or Java™ 6) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7-windows-i586.exe to install the newest version.
  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.


NEXT


Please advise how the computer is running now and if there are any outstanding issues.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#15 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:10:12 PM

Posted 10 September 2011 - 05:45 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users