Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Yet another Aurora Log [CLOSED]


  • This topic is locked This topic is locked

#1
stros

stros

    New Member

  • Member
  • Pip
  • 2 posts
Logfile of HijackThis v1.99.1
Scan saved at 7:13:53 PM, on 6/6/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\slserv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
c:\windows\system32\qxhosg.exe
C:\Azureus\Azureus.exe
C:\Program Files\Java\jre1.5.0_02\bin\javaw.exe
C:\Program Files\Napster\NapsterClient-US-3.1.1.4.dat
C:\Documents and Settings\user\Desktop\HJT\HijackThis.exe

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [hawvgk] c:\windows\system32\qxhosg.exe
O4 - HKLM\..\RunOnce: [MicrosoftAntiSpywareCleaner] C:\Program Files\Microsoft AntiSpyware\gcASCleaner.exe
O4 - HKLM\..\RunOnce: [GIANTAntiSpywareCleaner] C:\Program Files\Microsoft AntiSpyware\gcASCleaner.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe
  • 0

Advertisements


#2
greyknight17

greyknight17

    Malware Expert

  • Visiting Consultant
  • 16,560 posts
Welcome to GTG.

Please print out the instructions here (or save it in Notepad) so that you can follow along more easily.

Download Ewido Security Suite at http://www.ewido.net/en/download/ and install it. Update to the newest definitions. If you have trouble updating, you may do it manually at http://www.ewido.net...wnload/updates/ Do NOT the Ewido scan yet.

Please download Nailfix at http://www.noidea.us...050515010747824 Unzip it to the desktop but do NOT run it yet.

Reboot into Safe Mode by hitting the F8 key repeatedly until a menu shows up (and choose Safe Mode from the list). In some systems, this may be the F5 key, so try that if F8 doesn't work.

Once in Safe Mode, please double-click on nailfix.cmd. Your desktop and icons will disappear and reappear, and a window should open and close very quickly --- this is normal.

Next run a full scan in Ewido. Save the log from the Ewido scan so that you can post it later.

Run a scan in HijackThis. Check each of the following and hit 'Fix checked' (after checking them) if they still exist (make sure not to miss any):

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O4 - HKLM\..\Run: [hawvgk] c:\windows\system32\qxhosg.exe
O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe


Close all open windows except for HijackThis and click Fix Checked.

Delete these if found:

c:\windows\system32\qxhosg.exe

Restart your computer.

Download FindIt's.zip http://forums.net-in...=post&id=142443 to your desktop.

1. Unzip/extract the files inside to a folder on your desktop.
2. Open the folder. Double click on FindIt's.bat and wait for Notepad to open a text file. It will take a while so please be patient... Note: If you are having problems using FindIt's.bat (16 bit error), copy autoexec.nt from the C:\WINDOWS\repair folder to C:\WINDOWS\system32 folder. Now try running FindIt's.bat.
3. Then post the results here along with the new HijackThis log. Also post the Ewido scan results here.
  • 0

#3
stros

stros

    New Member

  • Topic Starter
  • Member
  • Pip
  • 2 posts
OK.. i did all this hopefully i get these logfiles right.

findit's log -

Microsoft Windows XP [Version 5.1.2600]
The current date is: Mon 06/06/2005
PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, THERE MIGHT BE LEGIT FILES LISTED AND PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
»»»»»»»»»»»»»»»»»»»»»»»» Todo Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»»»


»»»»»»»»»»»»»»»»»»»»»»»» aurora Files found »»»»»»»»»»»»»»»»»»»»»»»»»»»


»»»»»»»»»»»»»»»»»»»»»»»» Suspect's »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Dont delete file's in the section without guidance
If any doubt back them up first

* UPX! C:\WINDOWS\System32\ITJMYYG.EXE
* UPX! C:\WINDOWS\SMLDLY~1.EXE

»»»»» lagitamate file's can/will show in this section.

* UPX! C:\WINDOWS\System32\CPUINF32.DLL
* UPX! C:\WINDOWS\System32\MPLAA6.DLL
* UPX! C:\WINDOWS\System32\MPLAM6.DLL
* UPX! C:\WINDOWS\System32\MPLAPX.DLL
* UPX! C:\WINDOWS\System32\MPLAW7.DLL
* UPX! C:\WINDOWS\System32\MPLVA6.DLL
* UPX! C:\WINDOWS\System32\MPLVM6.DLL
* UPX! C:\WINDOWS\System32\MPLVPX.DLL
* UPX! C:\WINDOWS\System32\MPLVW7.DLL
* UPX! C:\WINDOWS\System32\XVID.DLL
»»»»»»»»»»»»»»»»»»»»»»»» Buddy file's »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
* buddy C:\WINDOWS\SMLDLY~1.EXE

»»»»»»»»»»»»»»»»»»»»»»»» SAHAgent Files found »»»»»»»»»»»»»»»»»»»»»»»»»

»»»»»»»»»»»»»»»»»»»»»»»» Misc checks »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


»»»»» Check for Windows\SYSTEM32\cache32_rtneg* folder.

Volume in drive C has no label.
Volume Serial Number is 803F-79DE

Directory of C:\WINDOWS\SYSTEM32

»»»»» Checking for SAHAgent ico files.
Volume in drive C has no label.
Volume Serial Number is 803F-79DE

Directory of C:\WINDOWS\system32


»»»»»»»»»»»»»»»»»»»»»»»».


---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 9:18:06 PM, 6/6/2005
+ Report-Checksum: 9E988955

+ Date of database: 6/7/2005
+ Version of scan engine: v3.0

+ Duration: 29 min
+ Scanned Files: 63951
+ Speed: 36.46 Files/Second
+ Infected files: 38
+ Removed files: 0
+ Files put in quarantine: 0
+ Files that could not be opened: 0
+ Files that could not be cleaned: 0

+ Binder: Yes
+ Crypter: Yes
+ Archives: Yes

+ Scanned items:
C:\

+ Scan result:
C:\Documents and Settings\user\Cookies\user@a.websponsors[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@adknowledge[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@ads.addynamix[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@ads.vnuemedia[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@advertising[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@ar.atwola[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@atdmt[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@burstnet[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@cgi-bin[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@cgi-bin[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@cgi-bin[4].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@com[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@debnt.imixserver[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@desky.imixserver[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@doubleclick[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@imixserver[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@mediaplex[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@perf.overture[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@realguide.real[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@realmedia[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@real[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@search.msn[2].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@servedby.advertising[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@targetnet[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@twci.coremetrics[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Cookies\user@z1.adserver[1].txt -> Spyware.Tracking-Cookie -> Ignored
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\048LABUA\untitled[1].com -> Trojan.Crypt.d -> Ignored
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\C7BLGTUY\Nail[1].exe -> Trojan.Nail -> Ignored
C:\Program Files\AWS\WeatherBug\MiniBugTransporter.dll -> Spyware.Wheaterbug.a -> Ignored
C:\Program Files\Microsoft AntiSpyware\Quarantine\0EA2A77E-FE8D-44F7-AA70-41A558\A76C748C-7966-47EE-BF48-80B1FA -> Trojan.Agent.db -> Ignored
C:\Program Files\Microsoft AntiSpyware\Quarantine\5F6CA71C-8391-48FA-B59E-3F9232\399B1DF8-D039-497E-839C-4FD18E -> Trojan.Agent.db -> Ignored
C:\Program Files\Microsoft AntiSpyware\Quarantine\9DC226E0-393C-42FF-9F35-894CDC\3A566D3C-C2EF-49F3-B262-67BDA8 -> Trojan.Agent.db -> Ignored
C:\Program Files\Microsoft AntiSpyware\Quarantine\BF558476-EEE0-441F-B37A-BD76F7\C10F43A9-554D-4BC1-B755-646E17 -> Trojan.Agent.db -> Ignored
C:\Program Files\Microsoft AntiSpyware\Quarantine\CF61F3DB-226A-40C6-818D-09D342\0C14FA2C-58C4-4598-B529-6E2EF2 -> Trojan.Agent.db -> Ignored
C:\Program Files\Microsoft AntiSpyware\Quarantine\D53F7074-54FA-40A8-9B9A-8CED2E\DCCDC2F8-9BD8-42B2-AB39-4A39CB -> Trojan.Agent.cp -> Ignored
C:\WINDOWS\smldlytlu.exe -> Spyware.BetterInternet -> Ignored
C:\WINDOWS\system32\itjmyyg.exe -> Trojan.Agent.cp -> Ignored
C:\WINDOWS\system32\qxhosg.exe -> Trojan.Agent.cp -> Ignored


::Report End



--------------------------------

This is the hijackthis log saved in the folder, i hope its the right one..

Logfile of HijackThis v1.99.1
Scan saved at 9:18:49 PM, on 6/6/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\explorer.exe
C:\Program Files\ewido\security suite\SecuritySuite.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\user\Desktop\HJT\HijackThis.exe

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [tqmdrn] c:\windows\system32\itjmyyg.exe
O4 - HKLM\..\RunOnce: [MicrosoftAntiSpywareCleaner] C:\Program Files\Microsoft AntiSpyware\gcASCleaner.exe
O4 - HKLM\..\RunOnce: [GIANTAntiSpywareCleaner] C:\Program Files\Microsoft AntiSpyware\gcASCleaner.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido\security suite\ewidoguard.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe


Thanks.
  • 0

#4
greyknight17

greyknight17

    Malware Expert

  • Visiting Consultant
  • 16,560 posts
Please print out the instructions here (or save it in Notepad) so that you can follow along more easily.

Download Ewido Security Suite at http://www.ewido.net/en/download/ and install it. Update to the newest definitions. If you have trouble updating, you may do it manually at http://www.ewido.net...wnload/updates/ Do NOT the Ewido scan yet.

Please download Nailfix at http://www.noidea.us...050515010747824 Unzip it to the desktop but do NOT run it yet.

Download KillBox http://www.greyknigh...spy/KillBox.exe. Don't run it yet.

The Temp folders should be cleaned out periodically as installation programs and hijack programs leave a lot of junk there. Download CleanUp! http://cleanup.stevengould.org/ (Alternate Link if main link don't work - http://www.greyknigh...spy/CleanUp.exe ) and install it. Don't run it yet.

Reboot into Safe Mode by hitting the F8 key repeatedly until a menu shows up (and choose Safe Mode from the list). In some systems, this may be the F5 key, so try that if F8 doesn't work.

Once in Safe Mode, please double-click on nailfix.cmd. Your desktop and icons will disappear and reappear, and a window should open and close very quickly --- this is normal.

Next run a full scan in Ewido. Save the log from the Ewido scan so that you can post it later.

Make sure that Microsoft Antispyware is closed now. We don't want it running now.

Run a scan in HijackThis. Check each of the following and hit 'Fix checked' (after checking them) if they still exist (make sure not to miss any):

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\Nail.exe
O2 - BHO: (no name) - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - (no file)
O4 - HKLM\..\Run: [tqmdrn] c:\windows\system32\itjmyyg.exe


Close all open windows except for HijackThis and click Fix Checked.

Run KillBox and check the box that says 'End Explorer Shell While Killing File'. Next click on 'Delete on Reboot'. For each of the following files below, check the box that says 'Unregister .dll Before Deleting' if it's not grayed out. Copy and paste each of the following into KillBox (hitting the X button for each file - choose NO when it asks if you want to reboot):

c:\windows\system32\itjmyyg.exe
C:\WINDOWS\System32\ITJMYYG.EXE
C:\WINDOWS\SMLDLY~1.EXE
C:\WINDOWS\smldlytlu.exe
C:\WINDOWS\system32\itjmyyg.exe
C:\WINDOWS\system32\qxhosg.exe


I want you to delete all the backups in this quarantine folder:
C:\Program Files\Microsoft AntiSpyware\Quarantine\

Run CleanUp! and click on CleanUp! button. Once it's done, you may click the Close button. When asked if you want to logoff, choose Yes.

Restart your computer.

Download FindIt's.zip http://forums.net-in...=post&id=142443 to your desktop.

1. Unzip/extract the files inside to a folder on your desktop.
2. Open the folder. Double click on FindIt's.bat and wait for Notepad to open a text file. It will take a while so please be patient... Note: If you are having problems using FindIt's.bat (16 bit error), copy autoexec.nt from the C:\WINDOWS\repair folder to C:\WINDOWS\system32 folder. Now try running FindIt's.bat.
3. Then post the results here along with the new HijackThis log. Also post the Ewido scan results here.

I want you to go to this site and upload these files (one by one) and submit them:

C:\WINDOWS\System32\MPLAA6.DLL
C:\WINDOWS\System32\MPLAM6.DLL
C:\WINDOWS\System32\MPLAPX.DLL
C:\WINDOWS\System32\MPLAW7.DLL
C:\WINDOWS\System32\MPLVA6.DLL
C:\WINDOWS\System32\MPLVM6.DLL
C:\WINDOWS\System32\MPLVPX.DLL
C:\WINDOWS\System32\MPLVW7.DLL
C:\WINDOWS\System32\XVID.DLL

Post back if they have something. If it's nothing found, no need to post it.
  • 0

#5
greyknight17

greyknight17

    Malware Expert

  • Visiting Consultant
  • 16,560 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member with address of this thread. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP