Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

trojan virus [RESOLVED]


  • This topic is locked This topic is locked

#61
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Download F-Secure Blacklight from here: http://www.f-secure....light/try.shtml
Run Blacklight.
Leave [X]scan through windows explorer checked,
click > scan then > next, you may see items such as the following:
hclean32.exe, csyew.exe, dmwlr.exe choose to let blacklite rename them.
Do not rename "wbemtest.exe"
The tool will ask if you want to reboot (restart) choose yes.
Note: csyew.exe and dmwlr.exe are (were) random named files.

After you have rebooted post back with a fresh hijackthis log please.
  • 0

Advertisements


#62
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
btw O1 - Hosts: 68.104.187.26 L2authd.lineage2.com is the lineage2 server i play on

black light didnt detect anything no did i have anything to rename heres the bl log

09/05/05 18:47:47 [Info]: BlackLight Engine 1.0.23 initialized
09/05/05 18:47:47 [Info]: OS: 5.1 build 2600 (Service Pack 2)
09/05/05 18:47:47 [Note]: 4019 0
09/05/05 18:47:47 [Note]: 4019 1
09/05/05 18:47:47 [Note]: 4019 2
09/05/05 18:47:47 [Note]: 4019 3
09/05/05 18:47:47 [Note]: 4019 4
09/05/05 18:47:47 [Note]: 4005 0
09/05/05 18:48:05 [Note]: 4006 0
09/05/05 18:48:05 [Note]: 4011 784
09/05/05 18:48:05 [Note]: FSRAW library version 1.7.1011
09/05/05 18:49:00 [Note]: 4007 0



and heres the new HJT Log


Logfile of HijackThis v1.99.1
Scan saved at 6:52:01 PM, on 9/5/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\McAfee\McAfee Firewall\CPD.EXE
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\McAfee\McAfee Firewall\CPD.EXE
C:\Program Files\McAfee\McAfee Shared Components\Guardian\CMGrdian.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\McAfee.com\Agent\MCAGENT.EXE
C:\Program Files\AIM\aim.exe
C:\Program Files\HiJackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.download.com/
O1 - Hosts: 68.104.187.26 L2authd.lineage2.com
O4 - HKLM\..\Run: [McAfee Guardian] "C:\Program Files\McAfee\McAfee Shared Components\Guardian\CMGrdian.exe" /SU
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\MCAGENT.EXE
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O16 - DPF: {48884C41-EFAC-433D-958A-9FADAC41408E} (EGamesPlugin Class) - https://www.e-games....GamesPlugin.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1124684073609
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft...free/asinst.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: McAfee Firewall - Unknown owner - C:\Program Files\McAfee\McAfee Firewall\CPD.EXE" /SERVICE (file missing)
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - C:\WINDOWS\system32\pctspk.exe
  • 0

#63
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Your log looks fine, and it's good that Blacklight did not find anything...

Let's try a couple of things:

Open HiJackThis.
Click Open the Misc Tools section
Click Open ADS Spy...
Put a check next to quick scan
Put a check next to ignore safe system info streams
Click scan.
Click save log (adsspy.txt) and post the contents of that notepad.

Then, please download WebRoot SpySweeper from HERE (It's a 2 week trial):
  • Click the Free Trial link under to "SpySweeper" to download the program.
  • Install it.
  • Once the program is installed, it will open.
  • It will prompt you to update to the latest definitions, click Yes.
  • Once the definitions are installed, click Sweep Now on the left side.
  • Click the Start button.
  • When it's done scanning, click the Next button.
  • Make sure everything has a check next to it, then click the Next button.
  • It will remove all of the items found.
  • Click Session Log in the upper right corner, copy everything in that window.
  • Click the Summary tab and click Finish.
  • Paste the contents of the session log you copied into your next reply.

  • 0

#64
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
heres adsspy log:

C:\WINDOWS\Zapotec.bmp : czwidy (11736 bytes)
C:\WINDOWS\_default(2).pif : mtitak (3567 bytes)
C:\WINDOWS\_default(2).pif : uapofi (4870 bytes)
C:\WINDOWS\_default(3).pif : mtitak (3567 bytes)
C:\WINDOWS\_default(3).pif : uapofi (4870 bytes)



heres the spysweeper log:

********
4:10 PM: |··· Start of Session, Tuesday, September 06, 2005 ···|
4:10 PM: Spy Sweeper started
4:10 PM: Sweep initiated using definitions version 529
4:10 PM: Starting Memory Sweep
4:13 PM: Memory Sweep Complete, Elapsed Time: 00:02:22
4:13 PM: Starting Registry Sweep
4:13 PM: Registry Sweep Complete, Elapsed Time:00:00:13
4:13 PM: Starting Cookie Sweep
4:13 PM: Found Spy Cookie: 2o7.net cookie
4:13 PM: nestoooor@2o7[2].txt (ID = 1957)
4:13 PM: Found Spy Cookie: advertising cookie
4:13 PM: nestoooor@advertising[1].txt (ID = 2175)
4:13 PM: Found Spy Cookie: atwola cookie
4:13 PM: nestoooor@ar.atwola[1].txt (ID = 2256)
4:13 PM: Found Spy Cookie: atlas dmt cookie
4:13 PM: nestoooor@atdmt[2].txt (ID = 2253)
4:13 PM: nestoooor@atwola[1].txt (ID = 2255)
4:13 PM: Found Spy Cookie: servedby advertising cookie
4:13 PM: nestoooor@servedby.advertising[2].txt (ID = 3335)
4:13 PM: Found Spy Cookie: statcounter cookie
4:13 PM: nestoooor@statcounter[2].txt (ID = 3447)
4:13 PM: Cookie Sweep Complete, Elapsed Time: 00:00:03
4:13 PM: Starting File Sweep
4:14 PM: Warning: Failed to read file "c:\documents and settings\nestoooor\local settings\temp\perflib_perfdata_a4.dat". System Error. Code: 32.
The process cannot access the file because it is being used by another process
4:17 PM: File Sweep Complete, Elapsed Time: 00:04:10
4:17 PM: Full Sweep has completed. Elapsed time 00:06:53
4:17 PM: Traces Found: 7
4:19 PM: Removal process initiated
4:19 PM: Quarantining All Traces: 2o7.net cookie
4:19 PM: Quarantining All Traces: advertising cookie
4:19 PM: Quarantining All Traces: atwola cookie
4:19 PM: Quarantining All Traces: atlas dmt cookie
4:19 PM: Quarantining All Traces: servedby advertising cookie
4:19 PM: Quarantining All Traces: statcounter cookie
4:19 PM: Removal process completed. Elapsed time 00:00:02
********
4:09 PM: |··· Start of Session, Tuesday, September 06, 2005 ···|
4:09 PM: Spy Sweeper started
4:10 PM: Processing Hosts File Alerts
4:10 PM: Allowed Hosts File entry: L2authd.lineage2.com
4:10 PM: |··· End of Session, Tuesday, September 06, 2005 ···|
  • 0

#65
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Open HiJackThis.
Click Open the Misc Tools section
Click Open ADS Spy...
Put a check next to quick scan
Put a check next to ignore safe system info streams
Click scan.
Put a check next to the following items:

C:\WINDOWS\Zapotec.bmp : czwidy (11736 bytes)
C:\WINDOWS\_default(2).pif : mtitak (3567 bytes)
C:\WINDOWS\_default(2).pif : uapofi (4870 bytes)
C:\WINDOWS\_default(3).pif : mtitak (3567 bytes)
C:\WINDOWS\_default(3).pif : uapofi (4870 bytes)


Click remove selected

Reboot and post another HiJackThis log.

I also need to know where the incoming UDP/TCP are coming from please :tazz:
  • 0

#66
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
heres the HJT log:

Logfile of HijackThis v1.99.1
Scan saved at 6:03:59 PM, on 9/6/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\pctspk.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\Program Files\McAfee\McAfee Firewall\CPD.EXE
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\McAfee\McAfee Firewall\CPD.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\McAfee\McAfee Shared Components\Guardian\CMGrdian.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
C:\Program Files\McAfee.com\Agent\MCAGENT.EXE
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Ventrilo\Ventrilo.exe
C:\Program Files\HiJackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.download.com/
O1 - Hosts: 68.104.187.26 L2authd.lineage2.com
O4 - HKLM\..\Run: [McAfee Guardian] "C:\Program Files\McAfee\McAfee Shared Components\Guardian\CMGrdian.exe" /SU
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\McAfee.com\Agent\McUpdate.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
O4 - HKLM\..\Run: [MCAgentExe] C:\Program Files\McAfee.com\Agent\MCAGENT.EXE
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky...can_unicode.cab
O16 - DPF: {48884C41-EFAC-433D-958A-9FADAC41408E} (EGamesPlugin Class) - https://www.e-games....GamesPlugin.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1124684073609
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft...free/asinst.cab
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: McAfee Firewall - Unknown owner - C:\Program Files\McAfee\McAfee Firewall\CPD.EXE" /SERVICE (file missing)
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PCTEL Speaker Phone (Pctspk) - PCtel, Inc. - C:\WINDOWS\system32\pctspk.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe



oh and the warnings incoming/outgoing UDP/TCP is in my warning logs from my mcaffe firewall
  • 0

#67
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts

oh and the warnings incoming/outgoing UDP/TCP is in my warning logs from my mcaffe firewall

Ah, that's fine, I went back to the first few pages and found the info I was looking for :tazz:

Please download Rootkit Revealer (link is at the very bottom of the page)
  • Unzip it to your desktop.
  • Open the rootkitrevealer folder and double-click rootkitrevealer.exe
  • Click the Scan button (bottom right)
  • It may take a while to scan (don't do anything while it's running)
  • When it's done, go up to File > Save. Choose to save it to your desktop.
  • Open rootkitrevealer.txt on your desktop and copy the entire contents and paste them here

  • 0

#68
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
C:\$VAULT$.AVG\00574484.FIL 9/7/2005 3:31 PM 28.97 KB Hidden from Windows API.
C:\System Volume Information\_restore{3A9554E9-A229-430E-A79F-9BA0251B3404}\RP29\A0023381.exe 8/6/2005 1:41 PM 28.51 KB Visible in Windows API, but not in MFT or directory index.
  • 0

#69
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
I need to know if you are on DSL, cable, or dial-up?

Also, do you have a modem or a router? If you have a router, I need to know the make and model, please.
  • 0

#70
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
cable - modem
  • 0

Advertisements


#71
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Go to Start > Run. Type:

cmd

Click OK.

Type the following:

ipconfig /release

Hit enter.

(make sure that space is in there between g and /)

Then type:

ipconfig /renew

Hit Enter.

(make sure that space is in there)

Type exit hit enter.

Hopefully, this will get you a new IP address. Reboot your computer and let me know if you're still having problems with incoming packets. It's not caused from something on your computer, someone is looking for an enabled Windows Messenger Service for spam. Yours is disabled so basically they are just annoying.

If you are still receiving them, then you will need to call your Cable company and get a new IP address.

Let me know how this goes, please!
  • 0

#72
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
still getting it....going to try n call cable company now ^_^
  • 0

#73
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
Sounds like a plan because your logs are coming out fine! :tazz:
  • 0

#74
renditions`

renditions`

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 123 posts
ok im good i just have to disconnect my modem and leave it for 30mins to change my ip =) thx for the help RAWE & MICHELLE :) :tazz:
  • 0

#75
Michelle

Michelle

    Malware Removal Goddess

  • Retired Staff
  • 8,928 posts
You're very welcome! We are more than happy to help! :)

If you would like to keep McAfee (the firewall appears to be working well!) I strongly advise uninstalling AVG as they will interfere with one another :)

Congratulations your log is clean! Great job on the clean up :tazz:

I recommend checking the http://www.microsoft.com website periodically for critical updates to install.

Here are some tips, to reduce the potential for spyware infection in the future, I strongly recommend installing the following applications:

Detect and Remove Programs:
  • How to use Ad-Aware to remove Spyware <= If you suspect that you have spyware installed on your computer, here are instructions on how to download, install and then use Ad-Aware.
  • How to use Spybot to remove Spyware <= If you suspect that you have spyware installed on your computer, here are instructions on how to download, install and then use Spybot. Similar to Ad-Aware, I strongly recommend both to catch most spyware.
Prevention Programs:
  • Spywareblaster <= SpywareBlaster will prevent spyware from being installed.
  • Spywareguard <= SpywareGuard offers realtime protection from spyware installation attempts.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP