Can't get rid of Mebroot trojan :(

Discussion in 'Malware Help (A Specialist Will Reply)' started by Survector, Apr 30, 2011.

  1. Survector

    Survector Private E-2

    Problems
    Slow PC with blue screens (message: 'Dump physical memory to disk') popping up (usually after restarting Windows) and CPU continously at 100%.

    Steps taken
    1) NOD32: detecting Mebroot trojan but can't delete it.

    2) SUPERantispyware & MBAM: deletes several trojans (does not detect Mebroot trojan). Recent scan (today): nothing detected.

    3) Combofix: doesn't work, I get a blue screen with the message 'Dump physical memory to disk' and PC restarts. Tried both safe & normal startup mode.

    4) MBRCheck log:
    465 GB \\.\PhysicalDrive1 Known-bad MBR code detected (Whistler / Black Internet)!
    SHA1: 610C151EA6600B4828D09565D95688B3829C12B2
    38 GB \\.\PhysicalDrive0 Known-bad MBR code detected (Whistler / Black Internet)!
    SHA1: 610C151EA6600B4828D09565D95688B3829C12B2
    931 GB \\.\PhysicalDrive8 RE: Windows Vista MBR code detected
    SHA1: 8DF43F2BDE2D9451948FA14B5279969C777A7979
    931 GB \\.\PhysicalDrive2 RE: Windows XP MBR code detected
    SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A
    1397 GB \\.\PhysicalDrive7 RE: Windows XP MBR code detected
    SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A

    Found non-standard or infected MBR.

    Used MBRCheck to repair drives but after restart the disks were still infected.
    Interestingly, I formatted disk 0 (38 GB) but disk is still infected.

    5) MGtools: see attachment.

    6) fixmbr: can't use this command, I have a Packard Bell pc (Vista) and can't use a Windows boot cd to use fixmbr.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Why is that?

    Please use add/remove programs to uninstall:
    Java(TM) 6 Update 15
    Java(TM) 6 Update 3
    Java(TM) 6 Update 5
    Java(TM) 6 Update 7

    Now download The Avenger by Swandog469, and save it to your Desktop.

    * Extract+ avenger.exe from the Zip file and save it to your desktop

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run Ccleaner to clean out only temp files and nothing else!

    Make sure these folders are cleaned out:
    C:\Windows\Temp\
    C:\Users\User\AppData\Local\temp\

    Now download and install:
    Java Runtime 6

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123tdk.com).
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:
    * TDSSKiller log
    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  3. Survector

    Survector Private E-2

    Okay, I got it to work: there's a recovery partition on my HD that I can access and in the prompt I typed bootrec.exe /fixmbr. MBRCheck says there's no infection anymore (see att.).

    However, I now get a blue screen every time I start windows (but not in safe mode).
    Here's the code: 0x0000008e (0xc0000005, 0x821f5a69, 0xa401991c, 0x000000000)
    0x0000008e appears to be memory related, though running the windows memory tool says there aren't any problems.
    I doubt it's hardware related if the blue screen doesn't pop up in safe mode ?

    Avenger gave an error, prolly because I'm in safe mode.
    MGTools didn't work either: I get the message 'renewing systeminformation' and then it quits.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please click Start, All Program, Accessories and you will see ( among other things ) a Command Prompt entry.

    • Right click the Command Prompt entry and select Run As Administrator.
      • It is critical that you run it this way.

    • If you do this properly, a command prompt window will open with a title of Administrator Command Prompt.
    • Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple/brown is merely informational.

    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    GetRunKey<-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    ShowNew<-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
     
  5. Survector

    Survector Private E-2

    I'm not sure what you mean, he doesn't recognize the commands and there appear only to be text files in c:\MGTools (see attach.)
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    At the C:\MGTools prompt just type in GetRunKey and press enter. THen do it again with ShowNew.
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If you still can't get the logs, try download the latest version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one. Run the exe and see if you can get me a new log.
     
  8. Survector

    Survector Private E-2

    Ok, I attached the log files.
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download OTM by Old Timer and save it to your Desktop.




    Code:
    :Processes
    explorer.exe
    
    :Files
    C:\Windows\Tasks\At1.job
    C:\Windows\Tasks\at10.job
    C:\Windows\Tasks\at100.job
    C:\Windows\Tasks\at101.job
    C:\Windows\Tasks\at102.job
    C:\Windows\Tasks\at103.job
    C:\Windows\Tasks\at104.job
    C:\Windows\Tasks\at105.job
    C:\Windows\Tasks\at106.job
    C:\Windows\Tasks\at107.job
    C:\Windows\Tasks\at108.job
    C:\Windows\Tasks\at109.job
    C:\Windows\Tasks\at11.job
    C:\Windows\Tasks\at110.job
    C:\Windows\Tasks\at111.job
    C:\Windows\Tasks\at112.job
    C:\Windows\Tasks\at113.job
    C:\Windows\Tasks\at114.job
    C:\Windows\Tasks\at115.job
    C:\Windows\Tasks\at116.job
    C:\Windows\Tasks\at117.job
    C:\Windows\Tasks\at118.job
    C:\Windows\Tasks\at119.job
    C:\Windows\Tasks\at12.job
    C:\Windows\Tasks\at120.job
    C:\Windows\Tasks\at121.job
    C:\Windows\Tasks\at122.job
    C:\Windows\Tasks\at123.job
    C:\Windows\Tasks\at124.job
    C:\Windows\Tasks\at125.job
    C:\Windows\Tasks\at126.job
    C:\Windows\Tasks\at127.job
    C:\Windows\Tasks\at128.job
    C:\Windows\Tasks\at129.job
    C:\Windows\Tasks\at13.job
    C:\Windows\Tasks\at130.job
    C:\Windows\Tasks\at131.job
    C:\Windows\Tasks\at132.job
    C:\Windows\Tasks\at133.job
    C:\Windows\Tasks\at134.job
    C:\Windows\Tasks\at135.job
    C:\Windows\Tasks\at136.job
    C:\Windows\Tasks\at137.job
    C:\Windows\Tasks\at138.job
    C:\Windows\Tasks\at139.job
    C:\Windows\Tasks\at14.job
    C:\Windows\Tasks\at140.job
    C:\Windows\Tasks\at141.job
    C:\Windows\Tasks\at142.job
    C:\Windows\Tasks\at143.job
    C:\Windows\Tasks\at144.job
    C:\Windows\Tasks\at145.job
    C:\Windows\Tasks\at146.job
    C:\Windows\Tasks\at147.job
    C:\Windows\Tasks\at148.job
    C:\Windows\Tasks\at149.job
    C:\Windows\Tasks\at15.job
    C:\Windows\Tasks\at150.job
    C:\Windows\Tasks\at151.job
    C:\Windows\Tasks\at152.job
    C:\Windows\Tasks\at153.job
    C:\Windows\Tasks\at154.job
    C:\Windows\Tasks\at155.job
    C:\Windows\Tasks\at156.job
    C:\Windows\Tasks\at157.job
    C:\Windows\Tasks\at158.job
    C:\Windows\Tasks\at159.job
    C:\Windows\Tasks\at16.job
    C:\Windows\Tasks\at160.job
    C:\Windows\Tasks\at161.job
    C:\Windows\Tasks\at162.job
    C:\Windows\Tasks\at163.job
    C:\Windows\Tasks\at164.job
    C:\Windows\Tasks\at165.job
    C:\Windows\Tasks\at166.job
    C:\Windows\Tasks\at167.job
    C:\Windows\Tasks\at168.job
    C:\Windows\Tasks\at169.job
    C:\Windows\Tasks\at17.job
    C:\Windows\Tasks\at170.job
    C:\Windows\Tasks\at171.job
    C:\Windows\Tasks\at172.job
    C:\Windows\Tasks\at173.job
    C:\Windows\Tasks\at174.job
    C:\Windows\Tasks\at175.job
    C:\Windows\Tasks\at176.job
    C:\Windows\Tasks\at177.job
    C:\Windows\Tasks\at178.job
    C:\Windows\Tasks\at179.job
    C:\Windows\Tasks\at18.job
    C:\Windows\Tasks\at180.job
    C:\Windows\Tasks\at181.job
    C:\Windows\Tasks\at182.job
    C:\Windows\Tasks\at183.job
    C:\Windows\Tasks\at184.job
    C:\Windows\Tasks\at185.job
    C:\Windows\Tasks\at186.job
    C:\Windows\Tasks\at187.job
    C:\Windows\Tasks\at188.job
    C:\Windows\Tasks\at189.job
    C:\Windows\Tasks\at19.job
    C:\Windows\Tasks\at190.job
    C:\Windows\Tasks\at191.job
    C:\Windows\Tasks\at192.job
    C:\Windows\Tasks\at193.job
    C:\Windows\Tasks\at194.job
    C:\Windows\Tasks\at195.job
    C:\Windows\Tasks\at196.job
    C:\Windows\Tasks\at197.job
    C:\Windows\Tasks\at198.job
    C:\Windows\Tasks\at199.job
    C:\Windows\Tasks\at2.job
    C:\Windows\Tasks\at20.job
    C:\Windows\Tasks\at200.job
    C:\Windows\Tasks\at201.job
    C:\Windows\Tasks\at202.job
    C:\Windows\Tasks\at203.job
    C:\Windows\Tasks\at204.job
    C:\Windows\Tasks\at205.job
    C:\Windows\Tasks\at206.job
    C:\Windows\Tasks\at207.job
    C:\Windows\Tasks\at208.job
    C:\Windows\Tasks\at209.job
    C:\Windows\Tasks\at21.job
    C:\Windows\Tasks\at210.job
    C:\Windows\Tasks\at211.job
    C:\Windows\Tasks\at212.job
    C:\Windows\Tasks\at213.job
    C:\Windows\Tasks\at214.job
    C:\Windows\Tasks\at215.job
    C:\Windows\Tasks\at216.job
    C:\Windows\Tasks\at217.job
    C:\Windows\Tasks\at218.job
    C:\Windows\Tasks\at219.job
    C:\Windows\Tasks\at22.job
    C:\Windows\Tasks\at220.job
    C:\Windows\Tasks\at221.job
    C:\Windows\Tasks\at222.job
    C:\Windows\Tasks\at223.job
    C:\Windows\Tasks\at224.job
    C:\Windows\Tasks\at225.job
    C:\Windows\Tasks\at226.job
    C:\Windows\Tasks\at227.job
    C:\Windows\Tasks\at228.job
    C:\Windows\Tasks\at229.job
    C:\Windows\Tasks\at23.job
    C:\Windows\Tasks\at230.job
    C:\Windows\Tasks\at231.job
    C:\Windows\Tasks\at232.job
    C:\Windows\Tasks\at233.job
    C:\Windows\Tasks\at234.job
    C:\Windows\Tasks\at235.job
    C:\Windows\Tasks\at236.job
    C:\Windows\Tasks\at237.job
    C:\Windows\Tasks\at238.job
    C:\Windows\Tasks\at239.job
    C:\Windows\Tasks\at24.job
    C:\Windows\Tasks\at240.job
    C:\Windows\Tasks\at25.job
    C:\Windows\Tasks\at26.job
    C:\Windows\Tasks\at27.job
    C:\Windows\Tasks\at28.job
    C:\Windows\Tasks\at29.job
    C:\Windows\Tasks\at3.job
    C:\Windows\Tasks\at30.job
    C:\Windows\Tasks\at31.job
    C:\Windows\Tasks\at32.job
    C:\Windows\Tasks\at33.job
    C:\Windows\Tasks\at34.job
    C:\Windows\Tasks\at35.job
    C:\Windows\Tasks\at36.job
    C:\Windows\Tasks\at37.job
    C:\Windows\Tasks\at38.job
    C:\Windows\Tasks\at39.job
    C:\Windows\Tasks\at4.job
    C:\Windows\Tasks\at40.job
    C:\Windows\Tasks\at41.job
    C:\Windows\Tasks\at42.job
    C:\Windows\Tasks\at43.job
    C:\Windows\Tasks\at44.job
    C:\Windows\Tasks\at45.job
    C:\Windows\Tasks\at46.job
    C:\Windows\Tasks\at47.job
    C:\Windows\Tasks\at48.job
    C:\Windows\Tasks\at49.job
    C:\Windows\Tasks\at5.job
    C:\Windows\Tasks\at50.job
    C:\Windows\Tasks\at51.job
    C:\Windows\Tasks\at52.job
    C:\Windows\Tasks\at53.job
    C:\Windows\Tasks\at54.job
    C:\Windows\Tasks\at55.job
    C:\Windows\Tasks\at56.job
    C:\Windows\Tasks\at57.job
    C:\Windows\Tasks\at58.job
    C:\Windows\Tasks\at59.job
    C:\Windows\Tasks\at6.job
    C:\Windows\Tasks\at60.job
    C:\Windows\Tasks\at61.job
    C:\Windows\Tasks\at62.job
    C:\Windows\Tasks\at63.job
    C:\Windows\Tasks\at64.job
    C:\Windows\Tasks\at65.job
    C:\Windows\Tasks\at66.job
    C:\Windows\Tasks\at67.job
    C:\Windows\Tasks\at68.job
    C:\Windows\Tasks\at69.job
    C:\Windows\Tasks\at7.job
    C:\Windows\Tasks\at70.job
    C:\Windows\Tasks\at71.job
    C:\Windows\Tasks\at72.job
    C:\Windows\Tasks\at73.job
    C:\Windows\Tasks\at74.job
    C:\Windows\Tasks\at75.job
    C:\Windows\Tasks\at76.job
    C:\Windows\Tasks\at77.job
    C:\Windows\Tasks\at78.job
    C:\Windows\Tasks\at79.job
    C:\Windows\Tasks\at8.job
    C:\Windows\Tasks\at80.job
    C:\Windows\Tasks\at81.job
    C:\Windows\Tasks\at82.job
    C:\Windows\Tasks\at83.job
    C:\Windows\Tasks\at84.job
    C:\Windows\Tasks\at85.job
    C:\Windows\Tasks\at86.job
    C:\Windows\Tasks\at87.job
    C:\Windows\Tasks\at88.job
    C:\Windows\Tasks\at89.job
    C:\Windows\Tasks\at9.job
    C:\Windows\Tasks\at90.job
    C:\Windows\Tasks\at91.job
    C:\Windows\Tasks\at92.job
    C:\Windows\Tasks\at93.job
    C:\Windows\Tasks\at94.job
    C:\Windows\Tasks\at95.job
    C:\Windows\Tasks\at96.job
    C:\Windows\Tasks\at97.job
    C:\Windows\Tasks\at98.job
    C:\Windows\Tasks\at99.job
    C:\ProgramData\0LbPNawl.dat
    C:\ProgramData\61q6o46e8220c14y4uxr01jg5f00adhtyl0247wa
    C:\ProgramData\r70a4M06.exe
    C:\Users\User\AppData\Roaming\chc.4875E02D9FB21EE389F73B8D1702B320485DF8CE.1
    C:\Users\User\AppData\Local\20E1847C-9F87-454D-6766-4CFB6B1E74BB.txt
    
    :Reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] "fevpsievsyzvnmjtzwxiTaskMgr"=-
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] "qreawpuyadioauofktrsTaskMgr"=-
    
    :Commands
    [purity]
    [ResetHosts]
    [createrestorepoint]
    [emptytemp]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * OTM Log
    * C:\MGlogs.zip
     
  10. Survector

    Survector Private E-2

    Done.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    One more time:




    Code:
    :Processes
    explorer.exe
    
    :Services
    klmdb
    
    :Files
    C:\Windows\System32\drivers\klmdb.sys
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    "fevpsievsyzvnmjtzwxiTaskMgr"=-
    "qreawpuyadioauofktrsTaskMgr"=-
    :Commands
    [purity]
    [ResetHosts]
    [createrestorepoint]
    [emptytemp]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * OTM Log
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  12. Survector

    Survector Private E-2

    Done.

    One note though:

    MGTools doesn't ask at any time for a confirmation about HijackThis.
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    That's it. Your logs are clean now. Tell me what malware issues you are still having, if any.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0

    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  14. Survector

    Survector Private E-2

    Thanks for your time and help. I don't have any malware anymore, I checked again with MBAM and Superantispyware to be sure.

    However, I still have those blue screens in windows normal mode.
    Do you have any advice to solve this ?
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You need to post in the software forum for additional assistance with that issue. However, my advice would be to go into msconfig and stop all startups. Then see if you still have the BSOD's in normal mode. Add the items back in msconfig one at a time until you find the culprit.
     
  16. Survector

    Survector Private E-2

    Ok, I will follow your advice.
    And thanks again for the help.
     
  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds