Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Computer running very slow


  • Please log in to reply

#1
Emajination

Emajination

    Member

  • Member
  • PipPip
  • 39 posts
Hello,

I wanted to post my hijackthis logs to see if anyone can assist me with my issues.

Thanks in advance for your response.

Here is the log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:11:48 AM, on 5/12/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WUSB54Gv42.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\system32\hkcmd.exe
C:\PROGRA~1\MUSICM~1\MUSICM~3\MMDiag.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Microsoft IntelliType Pro\type32.exe
C:\Program Files\Microsoft IntelliPoint\point32.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Zune\ZuneLauncher.exe
C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mim.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Documents and Settings\Andre\Local Settings\Temporary Internet Files\Content.IE5\DR2RRV7Q\VundoFix[1].exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn3\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: WsftpBrowserHelper Class - {601ED020-FB6C-11D3-87D8-0050DA59922B} - C:\Program Files\WS_FTP Pro\wsbho2k0.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.0.1225.9868\swg.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn3\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [IntelMeM] C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
O4 - HKLM\..\Run: [ISUSPM Startup] "C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [MimBoot] C:\PROGRA~1\MUSICM~1\MUSICM~3\mimboot.exe
O4 - HKLM\..\Run: [MMTray] "C:\Program Files\Musicmatch\Musicmatch Jukebox\mm_tray.exe"
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [Corel Photo Downloader] C:\Program Files\Corel\Corel Photo Album 6\MediaDetect.exe
O4 - HKLM\..\Run: [IPPDetect] IPP4Detect.exe
O4 - HKLM\..\Run: [Smart Start UP] C:\Program Files\NewSoft\Smart Start UP\PnPDetect.exe /Automation
O4 - HKLM\..\Run: [type32] "C:\Program Files\Microsoft IntelliType Pro\type32.exe"
O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\point32.exe"
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [Zune Launcher] "C:\Program Files\Zune\ZuneLauncher.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [dscactivate] "C:\Program Files\Dell Support Center\gs_agent\custom\dsca.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
O4 - HKLM\..\RunOnce: [SymantecCleanUp] C:\DOCUME~1\Andre\LOCALS~1\Temp\SymClnUp.exe
O4 - HKLM\..\RunOnce: [avp6_post_install] msiexec.exe /i"c:\kav\kav7\kav.en.msi"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [AdobeUpdater] C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
O4 - HKUS\S-1-5-18\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: ymetray.lnk = C:\Program Files\Yahoo!\Yahoo! Music Jukebox\ymetray.exe
O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.micros...b?1156610263546
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn...ro.cab34246.cab
O16 - DPF: {D71F9A27-723E-4B8B-B428-B725E47CBA3E} (Imikimi_activex_plugin Control) - http://imikimi.com/d...kimi_plugin.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - http://zone.msn.com/...aploader_v6.cab
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe
O23 - Service: Google Desktop Manager 5.7.802.22438 (GoogleDesktopManager-022208-143751) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: WUSB54Gv42SVC - GEMTEKS - C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe
O24 - Desktop Component 0: (no name) - http://images.kodakg...03_0_BG.jpg?a=1

--
End of file - 10899 bytes
  • 0

Advertisements


#2
Emajination

Emajination

    Member

  • Topic Starter
  • Member
  • PipPip
  • 39 posts
Here is my malwarebytes log:

Malwarebytes' Anti-Malware 1.12
Database version: 739

Scan type: Full Scan (C:\|)
Objects scanned: 205115
Time elapsed: 2 hour(s), 5 minute(s), 1 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 7
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 16
Files Infected: 38

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mkrndofl.bdev (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mkrndofl.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\$LEAKY07$\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\$LEAKY07$\Application Data\WinAntiVirus Pro 2006\Logs (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kyra\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kyra\Application Data\WinAntiVirus Pro 2006\Logs (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kashmier\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kashmier\Application Data\WinAntiVirus Pro 2006\Logs (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brittney\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brittney\Application Data\WinAntiVirus Pro 2006\Logs (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\BASE (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\DELETED (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\LOG (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\SAVED (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Application Data\Antivirus (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Start Menu\Antivirus (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Melita\Local Settings\Temp\.tt93.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Local Settings\Temp\ms1210261389.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Local Settings\Temporary Internet Files\Content.IE5\4W0QPJU8\kriv[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Local Settings\Temporary Internet Files\Content.IE5\AAOLEDMS\css4[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Local Settings\Temporary Internet Files\Content.IE5\SMAZ5BT0\count[1].php (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Local Settings\Temporary Internet Files\Content.IE5\SMAZ5BT0\init[1].php (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0264848.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0264853.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0264854.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0273922.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\blackster.scr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\$LEAKY07$\Application Data\WinAntiVirus Pro 2006\Logs\update.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\$LEAKY07$\Application Data\WinAntiVirus Pro 2006\Logs\wa6Support.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\$LEAKY07$\Application Data\WinAntiVirus Pro 2006\Logs\winav.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kyra\Application Data\WinAntiVirus Pro 2006\Logs\wa6Support.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kyra\Application Data\WinAntiVirus Pro 2006\Logs\winav.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kashmier\Application Data\WinAntiVirus Pro 2006\Logs\update.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kashmier\Application Data\WinAntiVirus Pro 2006\Logs\wa6Support.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kashmier\Application Data\WinAntiVirus Pro 2006\Logs\winav.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brittney\Application Data\WinAntiVirus Pro 2006\Logs\update.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brittney\Application Data\WinAntiVirus Pro 2006\Logs\wa6Support.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brittney\Application Data\WinAntiVirus Pro 2006\Logs\winav.log (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\WinSpywareProtect.exe (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\LOG\20080509040736015.log (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\LOG\20080512011320046.log (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Adsl Software Limited\WinSpywareProtect\LOG\20080512012328171.log (Rogue.MalWarrior) -> Quarantined and deleted successfully.
C:\WINDOWS\rs.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\knxsrgte.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kyra\Start Menu\Programs\Startup\Think-Adz.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kashmier\Start Menu\Programs\Startup\Think-Adz.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brittney\Start Menu\Programs\Startup\Think-Adz.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Desktop\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Desktop\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Desktop\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Favorites\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Favorites\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Melita\Favorites\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
  • 0

#3
Emajination

Emajination

    Member

  • Topic Starter
  • Member
  • PipPip
  • 39 posts
Here is my SAS log as well

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/12/2008 at 04:12 AM

Application Version : 4.0.1154

Core Rules Database Version : 3458
Trace Rules Database Version: 1449

Scan type : Complete Scan
Total Scan Time : 01:47:54

Memory items scanned : 534
Memory threats detected : 0
Registry items scanned : 6642
Registry threats detected : 0
File items scanned : 22189
File threats detected : 239

Adware.Tracking Cookie
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][5].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected]ads.realtechnetwork[4].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][3].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][5].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][4].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][3].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][4].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][3].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][2].txt
C:\Documents and Settings\Kashmier\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][3].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][3].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][3].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][2].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\Kyra\Cookies\[email protected][1].txt
C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][bleep]mymilfass[1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][5].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt
C:\Documents and Settings\Melita\Cookies\[email protected][2].txt
C:\Documents and Settings\Melita\Cookies\[email protected][1].txt

Rogue.Antivirus 2008
C:\DOCUMENTS AND SETTINGS\MELITA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\349YVZPU\ANTVRS.EXE
C:\DOCUMENTS AND SETTINGS\MELITA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\Z1Z4D71L\ANTVRS.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0273916.EXE

Rogue.Antivirus 2008/Installer
C:\DOCUMENTS AND SETTINGS\MELITA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\O0UOJ4HC\ATNVRSINSTALL[1].EXE
C:\DOCUMENTS AND SETTINGS\MELITA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SMAZ5BT0\ATNVRSINSTALL[1].EXE
C:\DOCUMENTS AND SETTINGS\MELITA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SMAZ5BT0\ATNVRSINSTALL[2].EXE
C:\DOCUMENTS AND SETTINGS\MELITA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\Z1Z4D71L\ATNVRSINSTALL[1].EXE

Adware.Vundo-Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0264848.DLL

Adware.SXGAdvisor-A
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0273913.DLL

Trojan.Unclassified/GTS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0273914.DLL

Adware.Vundo-Variant/J
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0273919.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP792\A0273920.DLL

Here is my virtumondobegone log


[05/12/2008, 10:36:28] - VirtumundoBeGone v1.5 ( "C:\Documents and Settings\Andre\My Documents\VirtumundoBeGone.exe" )
[05/12/2008, 10:36:45] - Detected System Information:
[05/12/2008, 10:36:45] - Windows Version: 5.1.2600, Service Pack 2
[05/12/2008, 10:36:45] - Current Username: Andre (Admin)
[05/12/2008, 10:36:45] - Windows is in NORMAL mode.
[05/12/2008, 10:36:45] - Searching for Browser Helper Objects:
[05/12/2008, 10:36:45] - BHO 1: {02478D38-C3F9-4EFB-9B51-7695ECA05670} (&Yahoo! Toolbar Helper)
[05/12/2008, 10:36:45] - BHO 2: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader Link Helper)
[05/12/2008, 10:36:45] - BHO 3: {53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection)
[05/12/2008, 10:36:45] - BHO 4: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} (Yahoo! IE Services Button)
[05/12/2008, 10:36:45] - BHO 5: {5CA3D70E-1895-11CF-8E15-001234567890} (DriveLetterAccess)
[05/12/2008, 10:36:45] - BHO 6: {601ED020-FB6C-11D3-87D8-0050DA59922B} (WsftpBrowserHelper Class)
[05/12/2008, 10:36:45] - BHO 7: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (SSVHelper Class)
[05/12/2008, 10:36:45] - BHO 8: {AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
[05/12/2008, 10:36:45] - BHO 9: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} (Google Toolbar Notifier BHO)
[05/12/2008, 10:36:45] - Finished Searching Browser Helper Objects
[05/12/2008, 10:36:45] - Finishing up...
[05/12/2008, 10:36:45] - Nothing found! Exiting...

And my vundofix log


VundoFix V7.0.3

Scan started at 1:55:02 AM 5/12/2008

Listing files found while scanning....


VundoFix V7.0.3

Scan started at 8:54:01 AM 5/12/2008

Listing files found while scanning....

No infected files were found.

Edited by Emajination, 11 May 2008 - 11:43 AM.

  • 0

#4
Emajination

Emajination

    Member

  • Topic Starter
  • Member
  • PipPip
  • 39 posts
When running the SAS scan again, I am still receiving the same trojans/viruses.. Not sure what my next steps are.. I've followed everything on this site that I could to clean my computer, but the are still showing up.

Any assistance would be great.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP