Hi Pierre
I see you took the site down
http://www.easythumbs.com/freexxx/w.html
and I apologize for saying easythumbs installs the exploit...I meant that page was calling to a .chm which exploits an IE and Outlook Express vulnerability...no problem with anyone that keeps their software updated, its been patched since the spring
That was a comment about that subdomain @ easythumbs, and it was not my intention to refer to easythumbs as a whole...sorry about that
