Jump to content


Photo

Popups gone, now off/on internet, dog-slow, services 90%


  • This topic is locked This topic is locked
8 replies to this topic

#1 RobFlum

RobFlum

    Member

  • Full Member
  • Pip
  • 4 posts

Posted 10 June 2007 - 09:51 PM

Hi,
I appreciate your help!!! We have had a mess of popups over the last 2 weeks: Healthyyy, ToSeekA, SAearchQ3, Search happy to find, search 4U, TagSearch, toomany search sites to name, c5,zedo a sex site, autodealerdirectory, bighealthtree, bolt, amxtravel, bestdietforme, bi-bi-search, canceriq, count3exitexchange, fling, jack9, etc etc. I run Adaware and Spybot weekly, and NOD32 anti-virus (which I setup wrong, now okay). I noticed C:\winnt\addins\infoeula.dll after one scan. It was creating ini, ini2 and .tmp files in the same folder. Their content looked suspiciously like the content of the dll. I would delete them and a couple of secs later they were back. I ran VirtumundoBeGone, but it couldn't remove {6D7D5679-4E81-430C-9C18-75FE169F1D07} (PsapiAnalyzer Object). I ran Atribune's VundoFix, and it was mostly successful, (no more popups) but now the PC is really sluggish, we lose connectivity often, and new scans keep turning up new stuff.
I tried to run Ewido/AVG, but in Safe Mode I get a message "Couldn't connect with service, please reinstall" which I did with same result. I am posting the results of an AVG scan in normal Windows mode, which I couldn't get a report on, also a HijackThis report.

Thanks!! Rob
P.S. Oooops, AVG is in Word doc form: screen shots. Here's the first HiajackThis report:
Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 9:55:13 PM, on 6/9/2007
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
Boot mode: Normal

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Eset\nod32krn.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Eset\nod32kui.exe
C:\Old Disk D\Documents and Settings\rob\Personal\Computer\Downloads\HiJackThis_v2.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.windstream.net/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1176007481769
O20 - Winlogon Notify: __c00B0470 - C:\WINNT\system32\__c00B0470.dat
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 2245 bytes
.......................................................................................
second HJ report:
Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 6:00:42 PM, on 6/10/2007
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
Boot mode: Normal

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Eset\nod32krn.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Old Disk D\Documents and Settings\rob\Personal\Computer\Downloads\HiJackThis_v2.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.windstream.net/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1176007481769
O20 - Winlogon Notify: __c00B0470 - C:\WINNT\system32\__c00B0470.dat
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 2295 bytes
................................................................................................
3rd HJ report:
Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 10:22:30 PM, on 6/10/2007
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
Boot mode: Normal

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Eset\nod32krn.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Old Disk D\Documents and Settings\rob\Personal\Computer\Downloads\AntiVirus\HiJackThis_v2.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.windstream.net/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1176007481769
O20 - Winlogon Notify: __c00B0470 - C:\WINNT\system32\__c00B0470.dat
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 2642 bytes

Edited by RobFlum, 14 June 2007 - 01:05 PM.


#2 RobFlum

RobFlum

    Member

  • Full Member
  • Pip
  • 4 posts

Posted 10 June 2007 - 09:57 PM

Most serious AVG threats:
Downloader.Small.zbi - deleted I hope
Logger.VBStat.h - deleted I hope
Trojan.Small - deleted I hope
Adware.WinAnti!virus
Adware.AvSystemcare
Adware.Weatherbug

The rest is tracking cookies.

Rob

#3 SWI Support Robot

SWI Support Robot

    Helper robot

  • SWI Bot
  • PipPipPipPipPip
  • 23,523 posts

Posted 13 June 2007 - 06:30 AM

Welcome to SWI. We apologize for the delay; our helpers have been very busy.
If you have not received help after 3 days, please CLICK HERE, and post a link to your log and the date it was originally posted.

Thank you for your patience.

[this is an automated reply]
This is an automated message. It does not count as help.

#4 nasdaq

nasdaq

    Forum Deity

  • Global Moderator
  • PipPipPipPipPip
  • 49,091 posts

Posted 16 June 2007 - 09:08 AM

Hello,

Print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.

Close all programs leaving only HijackThis running. Place a check against each of the following, making sure you get them all and not any others by mistake:

O20 - Winlogon Notify: __c00B0470 - C:\WINNT\system32\__c00B0470.dat

Click on Fix Checked when finished and exit HijackThis.

Delete this files in bold if found.
C:\WINNT\system32\__c00B0470.dat

Restart the computer normally to reset the registry.

Download Dr.Web CureIt to the desktop:
ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe
  • Doubleclick the drweb-cureit.exe file and Allow to run the express scan
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it. This is only a short scan.
  • Once the short scan has finished, mark the drives that you want to scan.
  • Select all drives. A red dot shows which drives have been chosen.
  • Click the green arrow at the right, and the scan will start.
  • Click 'Yes to all' if it asks if you want to cure/move the file.
  • When the scan has finished, look if you can click next icon next to the files found: Posted Image
  • If so, click it and then click the next icon right below and select Move incurable as you'll see in next image:
    Posted Image
    This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it can't be cured. (this in case if we need samples)
  • After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list
  • Save the report to your desktop. The report will be called DrWeb.csv
  • Close Dr.Web Cureit.
  • Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web you saved previously in your next reply. You can use Notepad to open the DrWeb.cvs report.
Include a fresh HijackThis log for review.

Let me know what problem persists.
nasdaq

Favorite tools: [ SpywareBlaster ] [ Spybot ] [ AdAware ] [ HijackThis ]
[ Housecall online virus scan ] [ Bitdefender online virus scan ]
[ AVG antivirus ] [ Sunbelt Personal Firewall ] [ ZoneAlarm firewall ]

My help is free, but if we have helped you in anyway,please considerDonating ,
see this topic for details.
We need members like you.

========
Shouldn't water be worth more than diamonds?
Adam Smith Glasgow, 1760

#5 RobFlum

RobFlum

    Member

  • Full Member
  • Pip
  • 4 posts

Posted 18 June 2007 - 05:04 AM

Okay! Here's the DrWeb log:
lmkmpgqo.exe;C:\WINNT\system32;Trojan.Virtumod;Deleted.;
ddaba.dll.vir;C:\WINNT\system32;Trojan.Virtumod;Deleted.;
setup.exe;C:\Documents and Settings\All Users\Application Data\AOL Downloads\triton_suite_install\6.1.32.1;Probably BACKDOOR.Trojan;Deleted.;
inst.exe;C:\Documents and Settings\All Users\Application Data\AOL Downloads\triton_suite_install_6.0.28.3;Probably BACKDOOR.Trojan;;
nsk22F.tmp;C:\Documents and Settings\Administrator\Local Settings\Temp;Tool.Prockill;Deleted.;
nsx16C.tmp;C:\Documents and Settings\Administrator\Local Settings\Temp;Tool.Prockill;Deleted.;
class3[1].htm\JavaScript.0;C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\9WGZX18P\class3[1].htm;VBS.PackFor;;
class3[1].htm;C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\9WGZX18P;Archive contains infected objects;Moved.;
RPEP1XAA.NQF;C:\Program Files\ESET\infected;Adware.ZenoSearch;Deleted.;
KCX3PPBA.NQF;C:\Program Files\ESET\infected;Adware.ZenoSearch;Deleted.;
CPJKEFAA.NQF;C:\Program Files\ESET\infected;Adware.ZenoSearch;Deleted.;
0NE2EFDA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
HKQ52VDA.NQF;C:\Program Files\ESET\infected;Trojan.DownLoader.22964;Deleted.;
5ZP32WCA.NQF;C:\Program Files\ESET\infected;Trojan.DownLoader.22964;Deleted.;
M54DRACA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
JNMUWNBA.NQF;C:\Program Files\ESET\infected;Trojan.DownLoader.22901;Deleted.;
VR3GTAAA.NQF;C:\Program Files\ESET\infected;Adware.Crew;Deleted.;
AU1U1YBA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
4INMU5CA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
R13ISDCA.NQF;C:\Program Files\ESET\infected;Adware.ZenoSearch;Deleted.;
LLIT51CA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
SNWO24BA.NQF;C:\Program Files\ESET\infected;Trojan.DownLoader.10963;Deleted.;
RPXZHUBA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
T0AQAVAA.NQF;C:\Program Files\ESET\infected;Trojan.Virtumod;Deleted.;
EFXAMZAA.NQF;C:\Program Files\ESET\infected;Trojan.PWS.Tanspy;Deleted.;
ZSJ1O2BA.NQF;C:\Old Disk C\Program Files\ESET\infected;Trojan.DownLoader.18101;Deleted.;
InstallHelper.exe;C:\Old Disk C\Program Files\Common Files\Motive;Probably MULDROP.Trojan;;
infoeula.dll.bad;C:\VundoFix Backups;Trojan.Virtumod;Deleted.;
eqrkcian.dll.bad;C:\VundoFix Backups;Trojan.Virtumod;Deleted.;
inst.exe;E:\Documents and Settings\All Users\Application Data\AOL Downloads\triton_suite_install_6.0.28.3;Probably BACKDOOR.Trojan;;
InstallHelper.exe;E:\Program Files\Common Files\Motive;Probably MULDROP.Trojan;;
ZSJ1O2BA.NQF;E:\Program Files\ESET\infected;Trojan.DownLoader.18101;Deleted.;

HijackThislog:
Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 5:51:31 AM, on 6/18/2007
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
Boot mode: Normal

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Eset\nod32krn.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Microsoft Office\Office\WINWORD.EXE
C:\Old Disk D\Documents and Settings\rob\Personal\Computer\Downloads\AntiVirus\HiJackThis_v2.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://webmail.windstream.net/
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\system32\msdxm.ocx
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1176007481769
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 2576 bytes

Dr Web found a ton of stuff - I'm hopeful we're good at this point.....

Thanks Nasdaq! Man, you're a busy guy!
By the way, I was unable to open the Dr Web cureit.exe during unzipping; maybe the file is corrupt. I was able to get their latest beta from a nearby folder, and that one unzipped fine.
It worries me that HijackThis has been unchanged for a couple of runs now, and Dr Web still found so much stuff.
Rob

#6 nasdaq

nasdaq

    Forum Deity

  • Global Moderator
  • PipPipPipPipPip
  • 49,091 posts

Posted 18 June 2007 - 08:23 AM

Nice Work your log is clean.

Please read this Prevention page with lots of info and tips how to prevent this in the future.
http://users.telenet...prevention.html
nasdaq

Favorite tools: [ SpywareBlaster ] [ Spybot ] [ AdAware ] [ HijackThis ]
[ Housecall online virus scan ] [ Bitdefender online virus scan ]
[ AVG antivirus ] [ Sunbelt Personal Firewall ] [ ZoneAlarm firewall ]

My help is free, but if we have helped you in anyway,please considerDonating ,
see this topic for details.
We need members like you.

========
Shouldn't water be worth more than diamonds?
Adam Smith Glasgow, 1760

#7 RobFlum

RobFlum

    Member

  • Full Member
  • Pip
  • 4 posts

Posted 18 June 2007 - 01:31 PM

Please read this Prevention page with lots of info and tips how to prevent this in the future.
http://users.telenet...prevention.html

Will do; hopefully I can get my daughter to do whatever needs doing this week. I'm out of town.
If not, guess I'll be doing the dance again soon......
thanks VERY much, Rob

#8 nasdaq

nasdaq

    Forum Deity

  • Global Moderator
  • PipPipPipPipPip
  • 49,091 posts

Posted 18 June 2007 - 01:46 PM

Glad we could help.
nasdaq

Favorite tools: [ SpywareBlaster ] [ Spybot ] [ AdAware ] [ HijackThis ]
[ Housecall online virus scan ] [ Bitdefender online virus scan ]
[ AVG antivirus ] [ Sunbelt Personal Firewall ] [ ZoneAlarm firewall ]

My help is free, but if we have helped you in anyway,please considerDonating ,
see this topic for details.
We need members like you.

========
Shouldn't water be worth more than diamonds?
Adam Smith Glasgow, 1760

#9 nasdaq

nasdaq

    Forum Deity

  • Global Moderator
  • PipPipPipPipPip
  • 49,091 posts

Posted 29 June 2007 - 08:02 AM

Glad we could help. :)

If you need this topic reopened, please tell the moderating team by replying here with the address of the thread. This applies only to the original topic starter. Everyone else please begin a New Topic.
nasdaq

Favorite tools: [ SpywareBlaster ] [ Spybot ] [ AdAware ] [ HijackThis ]
[ Housecall online virus scan ] [ Bitdefender online virus scan ]
[ AVG antivirus ] [ Sunbelt Personal Firewall ] [ ZoneAlarm firewall ]

My help is free, but if we have helped you in anyway,please considerDonating ,
see this topic for details.
We need members like you.

========
Shouldn't water be worth more than diamonds?
Adam Smith Glasgow, 1760




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Member of ASAP and UNITE
Support SpywareInfo Forum - click the button