Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Services.exe - Applicaiton Error


  • Please log in to reply
2 replies to this topic

#1 bartman1

bartman1

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:23 AM

Posted 31 December 2011 - 08:56 PM

I know others have had this problem but I am not able to remove this myself.

I am using a Dell Inspiron 9400 laptop with XP

The error is:
services.exe - Application Error
The Instruction at "0x0032595a" referenced memory at "0x00000000". The Memory Could not be "read".
Click OK to terminate the program
Click on Cancel to debug the program

When I click either one I get a notice that the system will shut down in one minute which it does.

I have run every Malwarebytes, Ad Aware, Avira and SuperAntiSpyware, Spybot Search and Destroy.

I followed the instructions on this site but could not download the ATF Cleaner as that link did not work.

I am attaching logs for the Malwarebytes and SuperAntiSpyware.

Thanks for your help.

Malwarebytes Log

08:25:24 Bart DeLio MESSAGE Protection started successfully
08:27:37 Bart DeLio MESSAGE IP Protection started successfully
08:39:58 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:40:01 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:40:07 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:40:11 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:40:14 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:40:20 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:40:31 Bart DeLio IP-BLOCK 206.161.121.2 (Type: outgoing)
08:40:31 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:40:34 Bart DeLio IP-BLOCK 206.161.121.2 (Type: outgoing)
08:40:37 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:40:40 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:40:40 Bart DeLio IP-BLOCK 206.161.121.2 (Type: outgoing)
08:40:40 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:40:46 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:42:19 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:42:22 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:42:28 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:49:36 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:49:39 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:49:40 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:49:40 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:49:40 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:49:42 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:49:42 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:49:43 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:49:43 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:49:45 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:49:45 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:49:48 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:49:49 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:49:49 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:49:50 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:49:56 Bart DeLio IP-BLOCK 67.29.139.199 (Type: outgoing)
08:49:59 Bart DeLio IP-BLOCK 67.29.139.199 (Type: outgoing)
08:50:05 Bart DeLio IP-BLOCK 67.29.139.199 (Type: outgoing)
08:50:17 Bart DeLio IP-BLOCK 67.29.139.199 (Type: outgoing)
08:50:20 Bart DeLio IP-BLOCK 67.29.139.199 (Type: outgoing)
08:50:26 Bart DeLio IP-BLOCK 67.29.139.199 (Type: outgoing)
08:51:58 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:52:01 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:52:07 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:52:39 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:52:42 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:52:48 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:53:39 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:53:42 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:53:48 Bart DeLio IP-BLOCK 206.161.121.5 (Type: outgoing)
08:53:51 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:53:54 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:54:00 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:54:20 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:54:23 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:54:29 Bart DeLio IP-BLOCK 141.136.16.152 (Type: outgoing)
08:55:00 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:55:02 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:55:08 Bart DeLio IP-BLOCK 206.161.121.3 (Type: outgoing)
08:56:43 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:56:46 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:56:52 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:57:59 Bart DeLio IP-BLOCK 206.161.121.2 (Type: outgoing)
08:58:02 Bart DeLio IP-BLOCK 206.161.121.2 (Type: outgoing)
08:58:08 Bart DeLio IP-BLOCK 206.161.121.2 (Type: outgoing)
08:58:27 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:58:30 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:58:32 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:58:35 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:58:36 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:58:41 Bart DeLio IP-BLOCK 206.161.121.4 (Type: outgoing)
08:59:05 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:59:09 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)
08:59:14 Bart DeLio IP-BLOCK 141.136.16.151 (Type: outgoing)

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 12/31/2011 at 02:28 PM

Application Version : 5.0.1142

Core Rules Database Version : 8091
Trace Rules Database Version: 5903

Scan type : Quick Scan
Total Scan Time : 00:25:51

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 280
Memory threats detected : 0
Registry items scanned : 30660
Registry threats detected : 1
File items scanned : 12468
File threats detected : 98

Malware.VirusBurst
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\virusburster.exe

Adware.Tracking Cookie
C:\Documents and Settings\Bart DeLio\Cookies\OTVWMO1H.txt [ /adultfriendfinder.com ]
C:\Documents and Settings\Bart DeLio\Cookies\LL4LBLEE.txt [ /scrabblefinder.com ]
C:\Documents and Settings\Bart DeLio\Cookies\72V5H68X.txt [ /stats.townnews.com ]
C:\Documents and Settings\Bart DeLio\Cookies\JSCD39CU.txt [ /leeenterprises.112.2o7.net ]
C:\Documents and Settings\Bart DeLio\Cookies\JHKPTGEO.txt [ /at.atwola.com ]
C:\Documents and Settings\Bart DeLio\Cookies\5DKHJBZV.txt [ /ar.atwola.com ]
C:\Documents and Settings\Bart DeLio\Cookies\OJYICUGG.txt [ /2o7.net ]
C:\Documents and Settings\Bart DeLio\Cookies\Y7I1AALU.txt [ /admarketplace.net ]
C:\Documents and Settings\Bart DeLio\Cookies\6I7RZRVF.txt [ /a1.interclick.com ]
C:\Documents and Settings\Bart DeLio\Cookies\6W7ZJ4S2.txt [ /collective-media.net ]
C:\Documents and Settings\Bart DeLio\Cookies\OC58JL8N.txt [ /trackalyzer.com ]
C:\Documents and Settings\Bart DeLio\Cookies\J2EEVPXA.txt [ /tacoda.at.atwola.com ]
C:\Documents and Settings\Bart DeLio\Cookies\HUWB0R18.txt [ /legolas-media.com ]
C:\Documents and Settings\Bart DeLio\Cookies\S44N32Y9.txt [ /choicemediainc.112.2o7.net ]
C:\Documents and Settings\Bart DeLio\Cookies\Z1GFTFR2.txt [ /ads.golfzing.com ]
C:\Documents and Settings\Bart DeLio\Cookies\XRC2REN4.txt [ /advertise.com ]
C:\Documents and Settings\Bart DeLio\Cookies\KZQ1I4DR.txt [ /liveclicker.net ]
C:\Documents and Settings\Bart DeLio\Cookies\NPFXRRK6.txt [ /content.yieldmanager.com ]
C:\Documents and Settings\Bart DeLio\Cookies\60TA1VSK.txt [ /eyewonder.com ]
C:\Documents and Settings\Bart DeLio\Cookies\N4O0GAO0.txt [ /theclickcheck.com ]
C:\Documents and Settings\Bart DeLio\Cookies\4JTFE4QK.txt [ /akamai.interclickproxy.com ]
C:\Documents and Settings\Bart DeLio\Cookies\ORIDARRI.txt [ /cn.clickable.net ]
C:\Documents and Settings\Bart DeLio\Cookies\INP3B08G.txt [ /thefind.com ]
C:\Documents and Settings\Bart DeLio\Cookies\W0TIOEBP.txt [ /dc.tremormedia.com ]
C:\Documents and Settings\Bart DeLio\Cookies\4NW5ENSI.txt [ /uk.at.atwola.com ]
C:\Documents and Settings\Bart DeLio\Cookies\XTDPW28Q.txt [ /ad.wsod.com ]
C:\Documents and Settings\Bart DeLio\Cookies\KRWULZWL.txt [ /msnportal.112.2o7.net ]
C:\Documents and Settings\Bart DeLio\Cookies\FXTE89GN.txt [ /invitemedia.com ]
C:\Documents and Settings\Bart DeLio\Cookies\81UWLN00.txt [ /ads.pgatour.com ]
C:\Documents and Settings\Bart DeLio\Cookies\V3681RO3.txt [ /adserver.adtechus.com ]
C:\Documents and Settings\Bart DeLio\Cookies\P9G7B4PV.txt [ /adinterax.com ]
C:\Documents and Settings\Bart DeLio\Cookies\VW0FSAD0.txt [ /yieldmanager.net ]
C:\Documents and Settings\Bart DeLio\Cookies\KOLCWGU3.txt [ /content.yieldmanager.com ]
C:\Documents and Settings\Bart DeLio\Cookies\N6FIGOPQ.txt [ /dmtracker.com ]
C:\Documents and Settings\Bart DeLio\Cookies\CNBPK677.txt [ /bridge1.admarketplace.net ]
C:\Documents and Settings\Bart DeLio\Cookies\07C1NXTS.txt [ /richmedia.yahoo.com ]
C:\Documents and Settings\Bart DeLio\Cookies\ZW7WFEW6.txt [ /ads.undertone.com ]
C:\Documents and Settings\Bart DeLio\Cookies\EAA9CLUV.txt [ /adxpose.com ]
C:\Documents and Settings\Bart DeLio\Cookies\YVS8OHHW.txt [ /interclick.com ]
C:\Documents and Settings\Bart DeLio\Cookies\44SH6XE9.txt [ /atwola.com ]
C:\Documents and Settings\Bart DeLio\Cookies\UZKCC13R.txt [ /t2.trackalyzer.com ]
C:\Documents and Settings\Bart DeLio\Cookies\7ZHTZZFG.txt [ /media6degrees.com ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HHP1J4BP.txt [ Cookie:system@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\4PH09L2F.txt [ Cookie:system@fastclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\B9QP7YPI.txt [ Cookie:system@www.burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\V3BSN4AD.txt [ Cookie:system@ads.gamersmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YM5V56WD.txt [ Cookie:system@dc.tremormedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9HCL9R1E.txt [ Cookie:system@tacoda.at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YPLNT2CD.txt [ Cookie:system@stat.onestat.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IKGLVC6S.txt [ Cookie:system@pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NXJFMW8Q.txt [ Cookie:system@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\VKRKSTPS.txt [ Cookie:system@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IU22NKD1.txt [ Cookie:system@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\FH2L3RJ4.txt [ Cookie:system@akamai.interclickproxy.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\O9ZKFGD1.txt [ Cookie:system@atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\W4028UDN.txt [ Cookie:system@adsonar.com/adserving ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\JY4ZJCZT.txt [ Cookie:system@bridge1.admarketplace.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\V7093RT5.txt [ Cookie:system@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\RCTPYZDV.txt [ Cookie:system@eyewonder.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KXGS2XXK.txt [ Cookie:system@lucidmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ZBQPSWXF.txt [ Cookie:system@adinterax.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\WZY7G0GS.txt [ Cookie:system@getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\KBQUQNYH.txt [ Cookie:system@trafficmp.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\QYHCG6FX.txt [ Cookie:system@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\NLNB18RL.txt [ Cookie:system@ads.pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ZLKZFTUP.txt [ Cookie:system@xml.prostreammedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\27FNFQJ6.txt [ Cookie:system@realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Y4AO8MIE.txt [ Cookie:system@burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\HB7ZCI7D.txt [ Cookie:system@ghmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\3IW7D790.txt [ Cookie:system@adbrite.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\37YKBRBA.txt [ Cookie:system@static.getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\ASJL1DT9.txt [ Cookie:system@yieldmanager.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\X7I7YY8N.txt [ Cookie:system@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\Z15SR6SL.txt [ Cookie:system@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\MFIXHEZI.txt [ Cookie:system@advertise.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\AW717B2Z.txt [ Cookie:system@bs.serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2U430SQ1.txt [ Cookie:system@pro-market.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\J43TVDW3.txt [ Cookie:system@bizzclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LYEI2FOK.txt [ Cookie:system@casalemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\X81FI9KZ.txt [ Cookie:system@tag.2bluemedia.hiro.tv/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\8VSYP8RN.txt [ Cookie:system@adserver.adtechus.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\DBLG2FA3.txt [ Cookie:system@questionmarket.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9C9IQ0Y7.txt [ Cookie:system@r1-ads.ace.advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\033MLR69.txt [ Cookie:system@network.realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\03RZ6DYP.txt [ Cookie:system@tribalfusion.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\TJWBYHGQ.txt [ Cookie:system@statcounter.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6R8IQN0G.txt [ Cookie:system@247realmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\9KYSUY0I.txt [ Cookie:system@adtech.de/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\DM6GZ5L6.txt [ Cookie:system@cdn.jemamedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\0TJP5NVP.txt [ Cookie:system@mm.chitika.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\09SR47HZ.txt [ Cookie:system@advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\OQXOXZJV.txt [ Cookie:system@content.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\1FU30YUI.txt [ Cookie:system@youngbucks.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\8B4YMT4K.txt [ Cookie:system@totalbeauty.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\GCUYY3ZN.txt [ Cookie:system@citygridmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\LVQIG9S1.txt [ Cookie:system@clicks.thespecialsearch.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\C7GIUPJX.txt [ Cookie:system@filter.plusfind.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\8SJZDVRB.txt [ Cookie:system@mediaservices-d.openxenterprise.com/ ]

Edited by hamluis, 01 January 2012 - 08:23 AM.
Moved from XP to Am I Infected.


BC AdBot (Login to Remove)

 


#2 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:01:23 AM

Posted 31 December 2011 - 09:32 PM

Hi -
Please read this output from M/soft -
Re: referenced memory at "0x00000000". The Memory Could not be "read".

Microsoft has confirmed that this is a bug in the Microsoft products that are listed in the "Applies to" section.
This bug was corrected in the latest service pack for Visual Studio 6.0.

For more information about Visual Studio service packs, click the following article numbers to view the articles in the Microsoft Knowledge Base:
194022 (http://support.microsoft.com/kb/194022/ ) INFO: Visual Studio 6.0 Service packs, What, Where, Why

194295 (http://support.microsoft.com/kb/194295/ ) HOWTO: Tell That a Visual Studio service Pack Is Installed
To download the latest Visual Studio service pack, visit the following Microsoft Web site:
http://msdn2.microsoft.com/en-us/vstudio/Aa718353.aspx

Thank You -

Edited by noknojon, 31 December 2011 - 09:33 PM.


#3 bartman1

bartman1
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:23 AM

Posted 01 January 2012 - 02:24 PM

The link provided does not work. Can you clarify this link?

http://msdn2.microsoft.com/en-us/vstudio/Aa718353.aspx

Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users