1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Having Trouble removing malware - cpvfeed

Discussion in 'Virus & Other Malware Removal' started by gabemstr, Jul 10, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    I've come to notice that whenever I go through Yahoo, Myspace, and CA Lottery..Ia random pop up starts to appear with this web address:

    cpvfeed
    link removed by cybertech

    This one has Yahoo in it. This pop-up has occurred plenty of times already. I have noticed it starting to pop up about a month ago I'd guess?

    Could someone please assist me in solving this problem?

    Some things that I feel you should know:

    I have Windows XP..just the original..not professional
    I have hijackthis, Smitfraudfix, Spybot, Adaware SE, and AVG Free Edition.
    I probably have other things that I just forgot to mention.
     
  2. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Hi, Welcome to TSG!!


    Click here to download HJTInstall.exe
    • Save HJTInstall.exe to your desktop.
    • Doubleclick on the HJTInstall.exe icon on your desktop.
    • By default it will install to C:\Program Files\Trend Micro\HijackThis .
    • Click on Install.
    • It will create a HijackThis icon on the desktop.
    • Once installed, it will launch Hijackthis.
    • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
    • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    • Come back here to this thread and Paste the log in your next reply.
    • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.
     
  3. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:04:38 PM, on 7/11/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\ewido anti-malware\ewidoctrl.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\UPHClean\uphclean.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\WINDOWS\system32\VTTimer.exe
    C:\HP\KBD\KBD.EXE
    C:\Program Files\PeerGuardian\pg2.exe
    C:\Program Files\NetMeter\NetMeter.exe
    C:\Program Files\Trillian\trillian.exe
    C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
    C:\WINDOWS\system32\utilman.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Web Accelerator Helper - {69A87B7D-DE56-4136-9655-716BA50C19C7} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O2 - BHO: ArsPlugin Class - {DABE0C57-5B57-4E2D-837A-08F290F7458E} - C:\Program Files\GSR\arsplg.dll
    O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
    O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
    O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot\TeaTimer.exe
    O4 - HKCU\..\Run: [PeerGuardian] C:\Program Files\PeerGuardian\pg2.exe
    O4 - HKCU\..\Run: [C:\Program Files\NetMeter\NetMeter.exe] C:\Program Files\NetMeter\NetMeter.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-21-1935655697-1644491937-725345543-1003\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Desktop\Reader\AdobeUpdateManager.exe" AcRdB7_0_8 (User 'Rodel')
    O4 - HKUS\S-1-5-21-1935655697-1644491937-725345543-1004\..\Run: [ChikkaIM] C:\Program Files\Chikka\Chikka.exe (User 'Evelyn')
    O4 - HKUS\S-1-5-21-1935655697-1644491937-725345543-1008\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet (User 'Kristen-2')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'Default user')
    O4 - Startup: Chikka.lnk = C:\Program Files\Chikka\chikka.exe
    O4 - Startup: PeerGuardian.lnk = C:\Program Files\PeerGuardian\pg2.exe
    O4 - Startup: Trillian.lnk = C:\Program Files\Trillian\trillian.exe
    O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra button: Bonjour - {7F9DB11C-E358-4ca6-A83D-ACC663939424} - C:\Program Files\Bonjour\ExplorerPlugin.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1172546800187
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1172546773734
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: Bonjour Service - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

    --
    End of file - 6209 bytes
     
  4. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Download ComboFix from Here or Here to your Desktop.
    • Double click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Post that log and a HiJackthis log in your next reply
    Note: Do not mouseclick combofix's window while its running. That may cause it to stall
     
  5. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    "Gabriel" - 2007-07-11 16:36:40 - ComboFix 07-07-12.3 - Service Pack 2


    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


    C:\Program Files\Common Files\Yazzle1162OinUninstaller.exe
    C:\Program Files\myglobalsearch
    C:\Program Files\myglobalsearch\bar\1.bin\M9FFXTBR.JAR
    C:\Program Files\myglobalsearch\bar\1.bin\M9NTSTBR.JAR
    C:\temp\tn3
    C:\WINDOWS\cs_cache.ini
    C:\WINDOWS\system32\~.exe
    C:\WINDOWS\system32\drivers\core.cache.dsk
    C:\WINDOWS\system32\drivers\core.sys
    C:\WINDOWS\system32\o05PrEz
    C:\WINDOWS\system32\o05PrEz\o05PrEz1083.exe
    C:\WINDOWS\system32\rlxf.dll
    C:\WINDOWS\wr.txt


    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))


    -------\LEGACY_CORE
    -------\core


    ((((((((((((((((((((((((( Files Created from 2007-06-11 to 2007-07-11 )))))))))))))))))))))))))))))))


    2007-07-11 16:32 51,200 --a------ C:\WINDOWS\nircmd.exe
    2007-07-11 10:59 <DIR> d-------- C:\DOCUME~1\KRISTE~1\APPLIC~1\Yahoo!
    2007-07-06 10:13 347,136 -ra------ C:\WINDOWS\system32\hypertrm.dll
    2007-07-06 10:11 <DIR> dr-h----- C:\DOCUME~1\Gabriel\APPLIC~1\yahoo!
    2007-07-06 09:47 <DIR> d-------- C:\!KillBox
    2007-06-20 14:33 <DIR> d-------- C:\DOCUME~1\Gabriel\APPLIC~1\DivX
    2007-06-15 13:24 <DIR> d---s---- C:\DOCUME~1\Guest\UserData
    2007-06-12 23:06 8,464 --a------ C:\WINDOWS\system32\sporder.dll
    2007-06-12 23:05 220,349 --a------ C:\WINDOWS\itpb_4.exe


    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

    2007-07-11 23:43:11 -------- d-----w C:\Program Files\PeerGuardian
    2007-07-11 18:59:46 -------- d-----w C:\Program Files\Trend Micro
    2007-07-10 21:46:09 -------- d-----w C:\DOCUME~1\Gabriel\APPLIC~1\uTorrent
    2007-07-06 23:45:12 -------- d-----w C:\Program Files\Google
    2007-07-06 19:24:44 -------- d-----w C:\Program Files\ewido anti-malware
    2007-07-06 19:16:54 -------- d-----w C:\Program Files\Trillian
    2007-07-06 17:33:28 -------- d-----w C:\Program Files\Steam
    2007-07-06 17:17:59 -------- d-----w C:\Program Files\Windows Desktop Search
    2007-07-06 17:13:51 -------- d-----w C:\Program Files\Windows NT
    2007-07-06 17:11:29 -------- d-----w C:\Program Files\Messenger
    2007-07-06 17:02:15 -------- d-----w C:\Program Files\DivX
    2007-07-04 16:42:04 -------- d-----w C:\Program Files\Ad-Aware
    2007-06-09 05:45:27 262,144 ----a-w C:\WINDOWS\system32\default_user_class.dat
    2007-06-02 09:11:38 -------- d-----w C:\Program Files\Microsoft CAPICOM 2.1.0.2
    2007-06-02 09:09:38 -------- d-----w C:\Program Files\Malicious Software Removal Tool
    2007-06-02 08:46:26 -------- d-----w C:\Program Files\MSXML 6.0
    2007-06-02 08:28:24 -------- d-----w C:\Program Files\MSXML 4.0
    2007-06-02 08:26:10 -------- d-----w C:\Program Files\Windows Media Connect 2
    2007-06-02 07:40:10 -------- d-----w C:\Program Files\UPHClean
    2007-06-02 07:38:37 -------- d-----w C:\Program Files\MSBuild
    2007-06-02 07:33:32 -------- d-----w C:\Program Files\Reference Assemblies
    2007-06-02 07:08:48 -------- d-----w C:\Program Files\Windows Journal Viewer
    2007-06-02 06:59:24 -------- d-----w C:\Program Files\AutoPatcher
    2007-05-07 05:43:03 4,991 ----a-w C:\WINDOWS\mozver.dat
    2007-04-18 16:12:23 2,854,400 ----a-w C:\WINDOWS\system32\msi.dll
    2007-04-17 05:47:36 33,624 ----a-w C:\WINDOWS\system32\wups.dll
    2007-04-17 05:45:54 1,710,936 ----a-w C:\WINDOWS\system32\wuaueng.dll
    2007-04-17 05:45:48 549,720 ----a-w C:\WINDOWS\system32\wuapi.dll
    2007-04-17 05:45:42 325,976 ----a-w C:\WINDOWS\system32\wucltui.dll
    2007-04-17 05:45:36 203,096 ----a-w C:\WINDOWS\system32\wuweb.dll
    2007-04-17 05:45:28 92,504 ----a-w C:\WINDOWS\system32\cdm.dll
    2007-04-17 05:45:20 53,080 ----a-w C:\WINDOWS\system32\wuauclt.exe
    2007-04-17 05:45:20 43,352 ----a-w C:\WINDOWS\system32\wups2.dll


    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))


    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}]
    2006-12-18 05:16 59032 --a------ C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{69A87B7D-DE56-4136-9655-716BA50C19C7}]
    2007-05-18 11:00 303104 --a------ C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}]
    2006-11-09 16:21 440056 --a------ C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{DABE0C57-5B57-4E2D-837A-08F290F7458E}]
    2006-09-20 15:33 73216 --a------ C:\Program Files\GSR\arsplg.dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "AVG7_CC"="C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe" [2007-04-20 17:23]
    "VTTimer"="VTTimer.exe" [2004-10-22 09:53 C:\WINDOWS\system32\VTTimer.exe]
    "KBD"="C:\HP\KBD\KBD.EXE" [2005-02-02 14:44]
    "PCSuiteTrayApplication"="C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" [2006-11-08 14:27]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SpybotSD TeaTimer"="C:\Program Files\Spybot\TeaTimer.exe" [2005-05-30 23:04]
    "PeerGuardian"="C:\Program Files\PeerGuardian\pg2.exe" [2005-09-18 16:40]
    "C:\Program Files\NetMeter\NetMeter.exe"="C:\Program Files\NetMeter\NetMeter.exe" [2004-03-04 12:47]

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
    "PcSync"=C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
    "{54D9498B-CF93-414F-8984-8CE7FDE0D391}"="C:\Program Files\ewido anti-malware\shellhook.dll" [2004-09-30 05:21]



    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\H]
    AutoRun\command- H:\Info.exe folder.htt 480 480


    **************************************************************************

    catchme 0.3.915 W2K/XP/Vista - rootkit detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-07-11 16:47:23
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "C:\\Program Files\\NetMeter\\NetMeter.exe"="C:\\Program Files\\NetMeter\\NetMeter.exe"

    Completion time: 2007-07-11 16:48:39 - machine was rebooted
    C:\ComboFix-quarantined-files.txt ... 2007-07-11 16:48

    --- E O F ---




    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:05:47 PM, on 7/11/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\ewido anti-malware\ewidoctrl.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\UPHClean\uphclean.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\WINDOWS\system32\VTTimer.exe
    C:\HP\KBD\KBD.EXE
    C:\Program Files\Spybot\TeaTimer.exe
    C:\Program Files\PeerGuardian\pg2.exe
    C:\Program Files\NetMeter\NetMeter.exe
    C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\Trillian\trillian.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Web Accelerator Helper - {69A87B7D-DE56-4136-9655-716BA50C19C7} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O2 - BHO: ArsPlugin Class - {DABE0C57-5B57-4E2D-837A-08F290F7458E} - C:\Program Files\GSR\arsplg.dll
    O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
    O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
    O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot\TeaTimer.exe
    O4 - HKCU\..\Run: [PeerGuardian] C:\Program Files\PeerGuardian\pg2.exe
    O4 - HKCU\..\Run: [C:\Program Files\NetMeter\NetMeter.exe] C:\Program Files\NetMeter\NetMeter.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'Default user')
    O4 - Startup: Chikka.lnk = C:\Program Files\Chikka\chikka.exe
    O4 - Startup: PeerGuardian.lnk = C:\Program Files\PeerGuardian\pg2.exe
    O4 - Startup: Trillian.lnk = C:\Program Files\Trillian\trillian.exe
    O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra button: Bonjour - {7F9DB11C-E358-4ca6-A83D-ACC663939424} - C:\Program Files\Bonjour\ExplorerPlugin.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1172546800187
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1172546773734
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: Bonjour Service - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

    --
    End of file - 5547 bytes
     
  6. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    ewido version 4 is now obsolete. If you purchased Ewido, you can get a free upgrade to AVG Antispyware version 7.5.
    Go to add/remove programs and remove ewido version 4.

    Please download the OTMoveIt by OldTimer.
    • Save it to your desktop.
    • Please double-click OTMoveIt.exe to run it.
    • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

      C:\WINDOWS\itpb_4.exe
      C:\Program Files\NetMeter


    • Return to OTMoveIt, right click on the "Paste List of Files/Folders to be moved" window and choose Paste.
    • Click the red Moveit! button.
    • Close OTMoveIt
    If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.



    Please download ATF Cleaner by Atribune.
    This program is for XP and Windows 2000 only

    • Double-click ATF-Cleaner.exe to run the program.
      Under Main choose: Select All
      Click the Empty Selected button.

    Click Exit on the Main menu to close the program.



    Download and scan with SUPERAntiSpyware Free for Home Users
    • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    • An icon will be created on your desktop. Double-click that icon to launch the program.
    • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
    • Under "Configuration and Preferences", click the Preferences button.
    • Click the Scanning Control tab.
    • Under Scanner Options make sure the following are checked (leave all others unchecked):
      • Close browsers before scanning.
      • Scan for tracking cookies.
      • Terminate memory threats before quarantining.
    • Click the "Close" button to leave the control center screen.
    • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive.
    • On the right, under "Complete Scan", choose Perform Complete Scan.
    • Click "Next" to start the scan. Please be patient while it scans your computer.
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • If asked if you want to reboot, click "Yes".
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.
      • Click Preferences, then click the Statistics/Logs tab.
      • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
      • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
      • Please copy and paste the Scan Log results in your next reply with a new hijackthis log.
    • Click Close to exit the program.
     
  7. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    I have experienced many many problems with the things you told me to do...

    First off..I removed Ewido version 4...it was actually verison 3.5 haha.

    I downloaded "OTMoveIt by OldTimer" and copied these filepaths to the clipboard:

    C:\WINDOWS\itpb_4.exe
    C:\Program Files\NetMeter

    but then..at the end, 2 pop ups occurred that said unable to move filepath "NetMeter.dlp"!
    (something like that...I don't remember exactly..because of what I'm about to tell you next.)

    ATF Cleaner worked fine.

    My main problem is as follows:

    I ran SUPERAntiSpyware following all of your directions. I did this at 11PM last night. I woke up..and it was still scanning, with memory and registry items completed, but file items still scanning and at over 35k....and it has scanned at this point over 10 hours.

    So after another hour or so...I check the computer...and SUPERAntiSpyware disappeared! The window disappeared..so then I restarted computer, checked to see if there was a log..and there isn't.. -_-

    So right now I am currently scanning again, currently scanning file items and is at 4876 files so far.

    I knew that something must have went wrong due to the window disappearing, and me not being able to do these steps:

    # After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    # Make sure everything has a checkmark next to it and click "Next".
    # A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    # If asked if you want to reboot, click "Yes".

    ---------------------------------------------------------------------------------------------------------

    So due to these problems..I cannot move on further.

    But I am still scanning my computer with SUPERAntiSpyware...so we shall see.

    I will await for your response.
     
  8. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Click here to download Dr.Web CureIt and save it to your desktop.
    • Doubleclick the drweb-cureit.exe file and Allow to run the express scan
    • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it. This is only a short scan.
    • Once the short scan has finished, mark the drives that you want to scan.
    • Select all drives. A red dot shows which drives have been chosen.
    • Click the green arrow at the right, and the scan will start.
    • Click 'Yes to all' if it asks if you want to cure/move the file.
    • When the scan has finished, look if you can click next icon next to the files found: [​IMG]
    • If so, click it and then click the next icon right below and select Move incurable as you'll see in next image:
      [​IMG]
      This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it can't be cured. (this in case if we need samples)
    • After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list
    • Save the report to your desktop. The report will be called DrWeb.csv
    • Close Dr.Web Cureit.
    • Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.
    • After reboot, post the contents of the log from Dr.Web you saved previously in your next reply along with a new Hijack This log.
     
  9. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    Before doing Dr.Web CureIt, the SUPERAntiSpyware scan completed, thus here is the log of that + the hijack this log, ALL before doing Dr. Web CureIt.

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 07/15/2007 at 07:19 AM

    Application Version : 3.9.1008

    Core Rules Database Version : 3269
    Trace Rules Database Version: 1280

    Scan type : Complete Scan
    Total Scan Time : 17:02:57

    Memory items scanned : 474
    Memory threats detected : 0
    Registry items scanned : 5910
    Registry threats detected : 0
    File items scanned : 147212
    File threats detected : 220

    Adware.Tracking Cookie
    C:\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Evelyn\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Evelyn\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Filipino kid\Cookies\filipino [email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Filipino kid\Cookies\filipino [email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Filipino kid\Cookies\filipino [email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Filipino kid\Cookies\filipino [email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Filipino kid\Cookies\filipino [email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\owner[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][2].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Kristen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Kristen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Kristen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Kristen\Cookies\[email protected][2].txt

    Adware.180solutions/Search Assistant
    C:\DOCUMENTS AND SETTINGS\GABRIEL\DESKTOP\OLD\OLD DRIVE\DOCUMENTS AND SETTINGS\GABRIEL\LOCAL SETTINGS\TEMP\RES1C8.TMP

    Unclassified.Unknown Origin
    C:\DOCUMENTS AND SETTINGS\GABRIEL\MY DOCUMENTS\APPS\AHEAD NERO BURNING ROM V6.6.0.6 ULTRA EDITION +\NERO6.MULTIKEYGEN.EXE

    Adware.ClickSpring/Yazzle
    C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\COMMON FILES\YAZZLE1162OINUNINSTALLER.EXE.VIR

    Trojan.Downloader-Gen/BundleBase
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\O05PREZ\O05PREZ1083.EXE.VIR

    RelevantKnowledge Spyware Component
    C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\RLXF.DLL.VIR
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP644\A0073934.DLL

    Adware.webHancer
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP556\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP556\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP556\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP557\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP557\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP557\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP558\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP558\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP558\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP559\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP559\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP559\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP560\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP560\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP560\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP561\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP561\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP561\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP562\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP562\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP562\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP563\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP563\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP563\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP564\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP564\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP564\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP565\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP565\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP565\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP566\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP566\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP566\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP567\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP567\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP567\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP568\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP568\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP568\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP569\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP569\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP569\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP570\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP570\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP570\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP571\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP571\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP571\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP572\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP572\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP572\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP573\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP573\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP573\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP574\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP574\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP574\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP575\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP575\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP575\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP576\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP576\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP576\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP577\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP577\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP577\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP578\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP578\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP578\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP579\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP579\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP579\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP580\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP580\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP580\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP581\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP581\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP581\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP582\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP582\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP582\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP583\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP583\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP583\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP584\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP584\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP584\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP585\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP585\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP585\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP586\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP586\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP586\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP587\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP587\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP587\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP588\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP588\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP588\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP589\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP589\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP589\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP590\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP590\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP590\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP591\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP591\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP591\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP592\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP592\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP592\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP593\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP593\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP593\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP594\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP594\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP594\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP595\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP595\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP595\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP596\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP596\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP596\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP597\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP597\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP597\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP598\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP598\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP598\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP599\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP599\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP599\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP600\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP600\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP600\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP601\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP601\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP601\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP602\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP602\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP602\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP603\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP603\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP603\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP604\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP604\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP604\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP605\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP605\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP605\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP606\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP606\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP606\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP607\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP607\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP607\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP608\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP608\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP608\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\A0068620.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\A0068622.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\SNAPSHOT\MFEX-6.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\SNAPSHOT\MFEX-7.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\SNAPSHOT\MFEX-8.DAT
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP615\A0068950.DLL

    Trojan.Unknown Origin
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\A0068629.EXE

    Trojan.Downloader-Gen/Installer
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP609\A0068630.EXE

    Adware.WebBuying Assistant-Installer
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP619\A0069198.EXE

    Adware.SysMon
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP620\A0069924.EXE

    Trojan.Rootkit-TnCore/Installer
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP620\A0069927.EXE

    Trojan.Downloader-StdRun/Variant
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{D62B225F-5D0A-428C-9B6D-25326BFB4BCD}\RP620\A0069928.EXE

    Trace.Known Threat Sources
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Local Settings\Temporary Internet Files\Content.IE5\5I0AN1TW\massiveBlocksFast[1].swf
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Local Settings\Temporary Internet Files\Content.IE5\4D6RWPQV\init[1].js
    C:\Documents and Settings\Gabriel\Desktop\OLD\OLD DRIVE\Documents and Settings\Gabriel\Local Settings\Temporary Internet Files\Content.IE5\XNTF92FH\prompt_ie_xpsp2[1].js

    The SUPERAntiSpyware log and the HiJackThis log is too large for a single post, so I will post the HiJackThis log in the next reply.
     
  10. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:51:32 AM, on 7/15/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\UPHClean\uphclean.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\WINDOWS\system32\VTTimer.exe
    C:\HP\KBD\KBD.EXE
    C:\Program Files\Spybot\TeaTimer.exe
    C:\Program Files\PeerGuardian\pg2.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    C:\Program Files\Trillian\trillian.exe
    C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Web Accelerator Helper - {69A87B7D-DE56-4136-9655-716BA50C19C7} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O2 - BHO: ArsPlugin Class - {DABE0C57-5B57-4E2D-837A-08F290F7458E} - C:\Program Files\GSR\arsplg.dll
    O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
    O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
    O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot\TeaTimer.exe
    O4 - HKCU\..\Run: [PeerGuardian] C:\Program Files\PeerGuardian\pg2.exe
    O4 - HKCU\..\Run: [C:\Program Files\NetMeter\NetMeter.exe] C:\Program Files\NetMeter\NetMeter.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'Default user')
    O4 - Startup: Chikka.lnk = C:\Program Files\Chikka\chikka.exe
    O4 - Startup: PeerGuardian.lnk = C:\Program Files\PeerGuardian\pg2.exe
    O4 - Startup: Trillian.lnk = C:\Program Files\Trillian\trillian.exe
    O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra button: Bonjour - {7F9DB11C-E358-4ca6-A83D-ACC663939424} - C:\Program Files\Bonjour\ExplorerPlugin.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1172546800187
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1172546773734
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: Bonjour Service - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

    --
    End of file - 5545 bytes
     
  11. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Please download the OTMoveIt by OldTimer.
    • Save it to your desktop.
    • Please double-click OTMoveIt.exe to run it.
    • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

      C:\WINDOWS\itpb_4.exe
      C:\Program Files\NetMeter


    • Return to OTMoveIt, right click on the "Paste List of Files/Folders to be moved" window and choose Paste.
    • Click the red Moveit! button.
    • Close OTMoveIt
    If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.



    Post your hijackthis log again after.
     
  12. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    I am sorry for the very late response..

    When I ran OTMoveIt, and tried moving

    C:\WINDOWS\itpb_4.exe
    C:\Program Files\NetMeter

    again..the right box indicated that the files were not found.

    I think we should start over, and I will give you a new hiJackThis log.

    As of 3 days ago though, I have stopped receiving the cpv feed pop up..it's just that my computer has been running much slower lately..and I keep getting an indicator that says I'm too low on virtual memory..so there still may be a hidden problem.

    so I will give you a new HiJackThis log after I restart my computer in a few minutes.
     
  13. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 11:55:25 PM, on 7/18/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\UPHClean\uphclean.exe
    C:\WINDOWS\Explorer.EXE
    C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
    C:\WINDOWS\system32\VTTimer.exe
    C:\HP\KBD\KBD.EXE
    C:\Program Files\Spybot\TeaTimer.exe
    C:\Program Files\PeerGuardian\pg2.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
    C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: Google Web Accelerator Helper - {69A87B7D-DE56-4136-9655-716BA50C19C7} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O2 - BHO: ArsPlugin Class - {DABE0C57-5B57-4E2D-837A-08F290F7458E} - C:\Program Files\GSR\arsplg.dll
    O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
    O3 - Toolbar: Google Web Accelerator - {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - C:\Program Files\Google\Web Accelerator\GoogleWebAccToolbar.dll
    O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
    O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot\TeaTimer.exe
    O4 - HKCU\..\Run: [PeerGuardian] C:\Program Files\PeerGuardian\pg2.exe
    O4 - HKCU\..\Run: [C:\Program Files\NetMeter\NetMeter.exe] C:\Program Files\NetMeter\NetMeter.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVGFRE~1\avgw.exe /RUNONCE (User 'Default user')
    O4 - Startup: Chikka.lnk = C:\Program Files\Chikka\chikka.exe
    O4 - Startup: PeerGuardian.lnk = C:\Program Files\PeerGuardian\pg2.exe
    O4 - Startup: Trillian.lnk = C:\Program Files\Trillian\trillian.exe
    O4 - Global Startup: Run Google Web Accelerator.lnk = C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_10\bin\ssv.dll
    O9 - Extra button: Bonjour - {7F9DB11C-E358-4ca6-A83D-ACC663939424} - C:\Program Files\Bonjour\ExplorerPlugin.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1172546800187
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1172546773734
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
    O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
    O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
    O23 - Service: Bonjour Service - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

    --
    End of file - 5472 bytes
     
  14. cybertech

    cybertech Retired Moderator

    Joined:
    Apr 16, 2002
    Messages:
    72,115
    Download WinPFind3U.exe to your Desktop and double-click on it to extract the files. It will create a folder named WinPFind3u on your desktop.

    Open the WinPFind3u folder and double-click on WinPFind3U.exe to start the program.
    • In the Processes group click ALL
    • In the Win32 Services group click ALL
    • In the Driver Services group click ALL
    • In the Registry group click ALL
    • In the Files Created Within group click 60 days Make sure Non-Microsoft only is UNCHECKED
    • In the Files Modified Within group select 30 days Make sure Non-Microsoft only is UNCHECKED
    • In the File String Search group select ALL
    • in the Additional scans sections please press select ALL
    • Now click the Run Scan button on the toolbar.
    • The program will be scanning huge amounts of data so depending on your system it could take a long time to complete. Let it run unhindered until it finishes.
    • When the scan is complete Notepad will open with the report file loaded in it.
    • Save that notepad file but click on the "Format" menu and make sure that "word wrap" is not checked. If it is then click on it to uncheck it.
    Please post the resulting log here as an attachment.

    • Click on the orange Post a Reply! button
    • scroll down to Manage Attachments
    • Click in the box that says Upload File from your Computer
    • Click the Browse... button and find the file then click open
    • Click the Upload button
    • Wait until you see Current Attachment and your file name
    • Click on Close this window
    • Then submit the reply.
     
  15. gabemstr

    gabemstr Thread Starter

    Joined:
    Jul 10, 2007
    Messages:
    33
    Here's the attachment.
     

    Attached Files:

  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/594265

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice