Jump to content

Recommended Posts

I've had some viruses or malwares...whatever...in the past; but nothing like this. Started by telling me my hard drive was going bad. Then it started launching XP recovery steps. Pop-ups galore, and then all my desktop icons and some programs started disappearing and/or malfunctioning. I also get redirects, whenever I try to search for help...and this happens on all my accounts, even those with limited priviledges...and safe mode isn't much better.

I'm not sure where to go at this point, other than to re-load XP and risk losing anything I can't retrieve from the hard drive. This is my first post here; can anyone offer another solution?

Thanks

Link to post
Share on other sites

post-32477-1261866970.gif

Logs will be closed if you haven't replied within 3 days

Please don't attach the scans / logs for these tools, use "copy/paste".

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

XP Users

Double-click My Computer.

Click the Tools menu, and then click Folder Options.

Click the View tab.

Uncheck "Hide file extensions for known file types."

Under the "Hidden files" folder, select "Show hidden files and folders."

Uncheck "Hide protected operating system files."

Click Apply, and then click OK.

Vista / Windows7 Users

To enable the viewing of hidden and protected system files in Windows Vista please follow these steps:

Close all programs so that you are at your desktop.

Click on the Start button. This is the small round button with the Windows flag in the lower left corner.

Click on the Control Panel menu option.

When the control panel opens you can either be in Classic View or Control Panel Home view:

If you are in the Classic View do the following:

Double-click on the Folder Options icon.

Click on the View tab.

If you are in the Control Panel Home view do the following:

Click on the Appearance and Personalization link.

Click on Show Hidden Files or Folders.

Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.

Remove the checkmark from the checkbox labeled Hide extensions for known file types.

Remove the checkmark from the checkbox labeled Hide protected operating system files.

Please do not delete anything unless instructed to.

I've been seeing some Java infections lately.

Go here and follow the instructions to clear your Java Cache

http://www.java.com/en/download/help/plugin_cache.xml

Next:

Please download Malwarebytes' Anti-Malware to your desktop.

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
    MBAM.PNG
  • When the scan is complete, click OK, then Show Results to view the results.
  • mbam1.png
  • Then click Remove Selected .
  • When completed, a log will open in Notepad. Please save it to a convenient location and post the results.
  • Note: If you receive a notice that some of the items couldn't be removed, that they have been added to the delete on reboot list, please reboot.

Also please describe how your computer behaves at the moment.

Please don't attach the scans / logs, use "copy/paste".

Link to post
Share on other sites

Thanks LT. Here's what I was able to do, of what I consider the 3 steps you advised me on:

1. I set my computer to show all hidden files.

2. I was not able to access Java in control panel; it was saying I did not have sufficient priviledge, even though AFAIK I have admin priviledge.

3. I was able to run a quick scan; 24 objects found, here is the log

Malwarebytes' Anti-Malware 1.50.1.1100

www.malwarebytes.org

Database version: 6697

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

6/1/2011 7:46:42 PM

mbam-log-2011-06-01 (19-46-42).txt

Scan type: Quick scan

Objects scanned: 180865

Time elapsed: 14 minute(s), 18 second(s)

Memory Processes Infected: 2

Memory Modules Infected: 2

Registry Keys Infected: 0

Registry Values Infected: 4

Registry Data Items Infected: 9

Folders Infected: 0

Files Infected: 7

Memory Processes Infected:

c:\documents and settings\all users\application data\reanowdtdeg.exe (Trojan.FakeMS) -> 512 -> Unloaded process successfully.

c:\documents and settings\all users\application data\18341668.exe (Trojan.Agent) -> 4040 -> Unloaded process successfully.

Memory Modules Infected:

c:\WINDOWS\imstexpi.dll (Trojan.Hiloti) -> Delete on reboot.

c:\WINDOWS\otibiveba.dll (IPH.Trojan.Hiloti.B) -> Delete on reboot.

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Njelivafe (Trojan.Hiloti) -> Value: Njelivafe -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rEAnOwDTDeg (Trojan.FakeMS) -> Value: rEAnOwDTDeg -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rkawehusuca (IPH.Trojan.Hiloti.B) -> Value: Rkawehusuca -> Delete on reboot.

HKEY_CLASSES_ROOT\.exe\shell\open\command\(default) (Hijack.ExeFile) -> Value: (default) -> Quarantined and deleted successfully.

Registry Data Items Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop (PUM.Hidden.Desktop) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Chris\Local Settings\Application Data\ssk.exe" -a "firefox.exe") Good: (firefox.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Chris\Local Settings\Application Data\ssk.exe" -a "firefox.exe") Good: (firefox.exe -safe-mode) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Chris\Local Settings\Application Data\ssk.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

c:\WINDOWS\imstexpi.dll (Trojan.Hiloti) -> Delete on reboot.

c:\documents and settings\all users\application data\reanowdtdeg.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.

c:\WINDOWS\otibiveba.dll (IPH.Trojan.Hiloti.B) -> Delete on reboot.

c:\documents and settings\Chris\local settings\temporary internet files\Content.IE5\X7O963A1\windows-update-sp4-kb66481-setup[1].exe (Trojan.Hiloti) -> Quarantined and deleted successfully.

c:\documents and settings\Chris\application data\Adobe\plugs\mmc207.exe (Trojan.Agent) -> Quarantined and deleted successfully.

c:\documents and settings\Chris\application data\Adobe\plugs\mmc213.exe (Trojan.Agent) -> Quarantined and deleted successfully.

c:\documents and settings\all users\application data\18341668.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Thanks.

Link to post
Share on other sites

How's it running now?

Is it safe to go back? I've been corresponding off my Guest account.

Looks like all my desktops files and programs are hidden (transparent icon)...and I get the occasional program not working error. No program icons on my taskbar, and I haven't tried to Google search; it was redirect ALL my searches.

Link to post
Share on other sites

Run this under your normal account

Download unhide.exe & save it to your windows folder:

Right click on unhide.exe and select Run as administrator (In case you have Vista or Win7)

Reboot

This will unhide folders/files that were set to be hidden by the infection you had.

Let me know if that solved your problem.

Link to post
Share on other sites

Run this under your normal account

Download unhide.exe & save it to your windows folder:

Right click on unhide.exe and select Run as administrator (In case you have Vista or Win7)

Reboot

This will unhide folders/files that were set to be hidden by the infection you had.

Let me know if that solved your problem.

Lt, it appeared to be working. I could see my favorites bar URLs restored, so I assume the desktop and stuff was doing its thing behind the scenes.

But then I got an error "services and controller app had an error" and system was set to shut down in 60 seconds. C:\windows\system32\services.exe with a status code 1073740972. I saw this once before as well.

Oh, and I am still getting redirected from Google.

Thanks again.

Link to post
Share on other sites

LT, I hope it's OK...I went ahead a bit. First, I was able to run a full mbam scan and it returned good. Second, I was able to go back and run the unhide.exe without incident...and all my icons, shortcuts, etc appear to be back (out of order in some cases, but I can do some housekeeping). Also, I am now able to get into Java, and I deleted the temp files as instructed.

Should I just keep on the look-out for abnormalities and post?

Link to post
Share on other sites

Please download DDS by sUBs from one of the following links and save it to your desktop.

[*]Disable any script blocking protection (How to Disable your Security Programs)

[*]Double click DDS icon to run the tool (may take up to 3 minutes to run)

[*]When done, DDS.txt will open.

[*]After a few moments, attach.txt will open in a second window.

[*]Save both reports to your desktop.

---------------------------------------------------

  • Post the contents of the DDS.txt in your next reply

Link to post
Share on other sites

Please download DDS by sUBs from one of the following links and save it to your desktop.

[*]Disable any script blocking protection (How to Disable your Security Programs)

[*]Double click DDS icon to run the tool (may take up to 3 minutes to run)

[*]When done, DDS.txt will open.

[*]After a few moments, attach.txt will open in a second window.

[*]Save both reports to your desktop.

---------------------------------------------------

  • Post the contents of the DDS.txt in your next reply

Here's the dds.txt. Do you need the attach.txt as well?

.

DDS (Ver_2011-06-01.06) - NTFSx86

Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_18

Run by Chris at 9:32:24 on 2011-06-02

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.638.276 [GMT -4:00]

.

AV: AntiVir Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

FW: AVG Firewall *Enabled*

.

============== Running Processes ===============

.

C:\WINDOWS\system32\svchost.exe -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

svchost.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\hkcmd.exe

C:\Program Files\Analog Devices\Core\smax4pnp.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe

C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\WINDOWS\system32\inetsrv\inetinfo.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\Program Files\Avira\AntiVir Desktop\avshadow.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\system32\wscntfy.exe

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

.

============== Pseudo HJT Report ===============

.

uWindow Title = Windows Internet Explorer provided by MSN & Bing

uInternet Settings,ProxyOverride = <local>

BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background

mRun: [igfxTray] c:\windows\system32\igfxtray.exe

mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe

mRun: [soundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"

mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"

mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE

IE: Download with &FileFactory Turbo - c:\program files\filefactory turbo\plugins\ie\FileFactoryIE.html

IE: {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - res://c:\program files\iespell\iespell.dll/SPELLCHECK.HTM

IE: {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - res://c:\program files\iespell\iespell.dll/SPELLOPTION.HTM

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1258599316859

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://javadl-esd.sun.com/update/1.6.0/jinstall-6-windows-i586.cab

DPF: {B80CD4E6-5B02-4B6C-99BE-68F1511E9549} - hxxp://plugin.slingbox.com/downloads/pc/1.4.0.90/WebSlingPlayer.cab

DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab

DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} - hxxps://secure.logmein.com/activex/ractrl.cab?lmi=100

TCP: DhcpNameServer = 192.168.15.1

TCP: Interfaces\{4ABF98BF-7BBF-4FDC-A50E-BE9B5C1E308D} : DhcpNameServer = 192.168.15.1

Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL

Notify: igfxcui - igfxsrvc.dll

.

================= FIREFOX ===================

.

FF - ProfilePath - c:\documents and settings\chris\application data\mozilla\firefox\profiles\b7c30e1u.default\

FF - plugin: c:\documents and settings\chris\local settings\application data\google\update\1.3.21.53\npGoogleUpdate3.dll

FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension

FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff

FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}

.

============= SERVICES / DRIVERS ===============

.

R1 6bd6aafb-ce29-4dbb-ad25-c59a3e0c7415;6bd6aafb-ce29-4dbb-ad25-c59a3e0c7415;c:\windows\iprot\6bd6aafb-ce29-4dbb-ad25-c59a3e0c7415\PhysMem.sys [2009-11-21 3584]

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-5-30 11608]

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-5-30 136360]

R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-5-30 269480]

R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-5-30 61960]

S2 PEVSystemStart;PEVSystemStart;c:\combofix\pev.cfxxe [2010-4-26 256512]

S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2011-2-19 39984]

.

=============== Created Last 30 ================

.

2011-05-31 00:29:13 302592 ----a-w- C:\zljbi7ue.exe

2011-05-31 00:00:23 0 ----a-w- c:\windows\Otoho.bin

2011-05-31 00:00:22 -------- d-----w- c:\documents and settings\chris\local settings\application data\{91B76EBD-4003-4885-A44C-721A9CD95550}

2011-05-30 17:14:34 -------- d-----w- c:\windows\msdownld.tmp

2011-05-30 14:50:45 -------- d-----w- c:\documents and settings\chris\application data\tor

2011-05-30 13:54:10 -------- d-----w- c:\documents and settings\chris\application data\Avira

2011-05-30 13:10:19 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2011-05-30 13:10:18 -------- d-----w- c:\program files\Avira

2011-05-30 13:10:18 -------- d-----w- c:\documents and settings\all users\application data\Avira

2011-05-30 01:12:22 -------- d-----w- C:\ComboFix

2011-05-30 00:14:52 -------- d-----w- c:\windows\system32\wbem\repository\FS

2011-05-30 00:14:52 -------- d-----w- c:\windows\system32\wbem\Repository

2011-05-15 20:44:18 -------- d-----w- c:\documents and settings\chris\local settings\application data\Doubleclick_Industries

2011-05-15 20:43:51 -------- d-----w- c:\documents and settings\chris\application data\FileFactory Turbo

2011-05-15 20:43:39 -------- d-----w- c:\program files\FileFactory Turbo

.

==================== Find3M ====================

.

2011-05-29 13:11:30 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-03-07 05:33:50 692736 ----a-w- c:\windows\system32\inetcomm.dll

.

============= FINISH: 9:33:07.23 ===============

Link to post
Share on other sites

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

Redirect seems to be better now. Can't see any immediate issues still present. Will keep an eye on.

ComboFix 11-05-29.01 - Chris 06/02/2011 14:16:12.6.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.638.380 [GMT -4:00]

Running from: c:\documents and settings\Chris\Desktop\ComboFix.exe

AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

FW: AVG Firewall *Enabled* {8decf618-9569-4340-b34a-d78d28969b66}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\documents and settings\Chris\Application Data\Adobe\plugs

c:\documents and settings\Chris\Application Data\Adobe\shed

.

---- Previous Run -------

.

c:\documents and settings\All Users\Application Data\defender.exe

.

Infected copy of c:\windows\system32\drivers\volsnap.sys was found and disinfected

Restored copy from - Kitty had a snack :P

.

((((((((((((((((((((((((( Files Created from 2011-05-02 to 2011-06-02 )))))))))))))))))))))))))))))))

.

.

2011-05-31 00:11 . 2011-05-31 00:11 -------- d-----w- c:\documents and settings\Chris-User\Local Settings\Application Data\{1DD73503-B8BC-40CE-B614-EDFB14419C18}

2011-05-31 00:00 . 2011-05-31 00:00 -------- d-----w- c:\documents and settings\Chris\Local Settings\Application Data\{91B76EBD-4003-4885-A44C-721A9CD95550}

2011-05-30 17:14 . 2011-05-30 17:14 -------- d-----w- c:\windows\msdownld.tmp

2011-05-30 14:50 . 2011-05-30 14:50 -------- d-----w- c:\documents and settings\Chris\Application Data\tor

2011-05-30 14:48 . 2011-05-30 15:03 -------- d-----w- c:\documents and settings\Chris\Application Data\Vidalia

2011-05-30 13:54 . 2011-05-30 13:54 -------- d-----w- c:\documents and settings\Chris\Application Data\Avira

2011-05-30 13:10 . 2011-04-01 21:07 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2011-05-30 13:10 . 2011-04-01 21:07 137656 ----a-w- c:\windows\system32\drivers\avipbb.sys

2011-05-30 13:10 . 2010-06-17 19:27 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys

2011-05-30 13:10 . 2010-06-17 19:27 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys

2011-05-30 13:10 . 2011-05-30 13:10 -------- d-----w- c:\program files\Avira

2011-05-30 13:10 . 2011-05-30 13:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira

2011-05-30 00:15 . 2011-05-31 01:32 -------- d-----w- c:\documents and settings\Guest

2011-05-30 00:14 . 2011-05-30 00:14 -------- d-----w- c:\windows\system32\wbem\Repository

2011-05-18 02:44 . 2011-05-18 02:45 -------- d-----w- c:\program files\7-Zip

2011-05-15 20:44 . 2011-05-15 20:44 -------- d-----w- c:\documents and settings\Chris\Local Settings\Application Data\Doubleclick_Industries

2011-05-15 20:43 . 2011-05-15 20:44 -------- d-----w- c:\documents and settings\Chris\Application Data\FileFactory Turbo

2011-05-15 20:43 . 2011-05-15 20:43 -------- d-----w- c:\program files\FileFactory Turbo

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-05-29 13:11 . 2011-02-20 01:44 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-03-07 05:33 . 2009-11-18 21:33 692736 ----a-w- c:\windows\system32\inetcomm.dll

.

.

((((((((((((((((((((((((((((( SnapShot_2011-05-30_01.18.17 )))))))))))))))))))))))))))))))))))))))))

.

+ 2011-06-02 18:14 . 2011-06-02 18:14 16384 c:\windows\temp\Perflib_Perfdata_6bc.dat

+ 2009-11-19 02:48 . 2009-01-07 22:21 26144 c:\windows\system32\spupdsvc.exe

- 2009-11-19 02:48 . 2009-01-07 23:21 26144 c:\windows\system32\spupdsvc.exe

+ 2009-11-19 02:47 . 2009-01-07 22:20 16928 c:\windows\system32\spmsg.dll

- 2009-11-19 02:47 . 2009-01-07 23:20 16928 c:\windows\system32\spmsg.dll

+ 2006-06-29 13:05 . 2009-01-07 22:20 23552 c:\windows\system32\normaliz.dll

- 2006-06-29 13:05 . 2009-01-07 23:20 23552 c:\windows\system32\normaliz.dll

+ 2006-06-28 22:59 . 2009-01-07 22:20 24576 c:\windows\system32\nlsdl.dll

- 2006-06-28 22:59 . 2009-01-07 23:20 24576 c:\windows\system32\nlsdl.dll

+ 2007-08-13 23:39 . 2009-03-08 08:32 36864 c:\windows\system32\ieudinit.exe

- 2007-08-13 23:39 . 2009-03-08 09:32 36864 c:\windows\system32\ieudinit.exe

- 2006-06-29 13:05 . 2009-01-07 23:20 26112 c:\windows\system32\idndl.dll

+ 2006-06-29 13:05 . 2009-01-07 22:20 26112 c:\windows\system32\idndl.dll

+ 2011-05-30 13:10 . 2010-06-17 19:27 28520 c:\windows\system32\drivers\ssmdrv.sys

+ 2004-08-04 12:00 . 2008-04-13 18:41 52352 c:\windows\system32\dllcache\volsnap.sys

- 2010-08-17 13:17 . 2010-08-17 13:17 58880 c:\windows\system32\dllcache\spoolsv.exe

+ 2004-08-04 12:00 . 2010-08-17 13:17 58880 c:\windows\system32\dllcache\spoolsv.exe

- 2011-04-23 21:20 . 2010-07-05 13:15 26488 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\update\spcustom.dll

- 2011-04-23 21:20 . 2010-07-05 13:15 17272 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\spmsg.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 12800 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\xpshims.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 66560 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\mshtmled.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 55296 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\msfeedsbs.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 43520 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\licmgr10.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 25600 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\jsproxy.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 12800 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\xpshims.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 66560 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\mshtmled.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 55296 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\msfeedsbs.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 43520 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\licmgr10.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 25600 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\jsproxy.dll

+ 2011-05-30 17:14 . 2009-12-11 08:38 69120 c:\windows\ie8updates\KB2447568-IE8\iecompat.dll

+ 2010-02-06 16:35 . 2010-10-18 11:10 7680 c:\windows\system32\dllcache\iecompat.dll

+ 2009-11-19 02:47 . 2009-01-07 22:21 121856 c:\windows\system32\xmllite.dll

- 2009-11-19 02:47 . 2008-04-14 00:12 121856 c:\windows\system32\xmllite.dll

+ 2009-01-07 23:20 . 2009-01-07 22:20 265720 c:\windows\system32\msdbg2.dll

- 2009-01-07 23:20 . 2009-01-07 23:20 265720 c:\windows\system32\msdbg2.dll

+ 2011-05-29 05:56 . 2011-06-02 18:14 224226 c:\windows\system32\inetsrv\MetaBase.bin

- 2011-04-23 21:20 . 2010-07-05 13:16 382840 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\update\updspapi.dll

- 2011-04-23 21:20 . 2010-07-05 13:15 755576 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\update\update.exe

- 2011-04-23 21:20 . 2010-07-05 13:15 231288 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\spuninst.exe

- 2011-04-23 21:20 . 2011-02-22 23:27 919552 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\wininet.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 206848 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\occache.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 611840 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\mstime.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 602112 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\msfeeds.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 247808 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\ieproxy.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 184320 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\iepeers.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 743424 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\iedvtool.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 387584 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\iedkcs32.dll

- 2011-04-23 21:20 . 2011-02-22 12:08 173568 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\ie4uinit.exe

- 2011-04-23 21:20 . 2011-02-22 23:06 916480 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\wininet.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 206848 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\occache.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 611840 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\mstime.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 602112 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\msfeeds.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 247808 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\ieproxy.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 184320 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\iepeers.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 743424 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\iedvtool.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 387584 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\iedkcs32.dll

- 2011-04-23 21:20 . 2011-02-18 11:49 173568 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\ie4uinit.exe

+ 2011-05-30 17:14 . 2010-02-22 14:23 382840 c:\windows\ie8updates\KB2447568-IE8\spuninst\updspapi.dll

+ 2011-05-30 17:14 . 2010-02-22 14:23 231288 c:\windows\ie8updates\KB2447568-IE8\spuninst\spuninst.exe

+ 2009-01-07 22:20 . 2009-01-07 22:20 1497088 c:\windows\system32\dllcache\shdocvw.dll

+ 2009-01-07 22:20 . 2009-01-07 22:20 1022976 c:\windows\system32\dllcache\browseui.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 1212928 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\urlmon.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 5964800 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\mshtml.dll

- 2011-04-23 21:20 . 2011-02-22 23:27 1992192 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3QFE\iertutil.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 1210880 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\urlmon.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 5962240 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\mshtml.dll

- 2011-04-23 21:20 . 2011-02-22 23:06 1991680 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\iertutil.dll

+ 2010-02-06 16:28 . 2011-04-29 15:29 42829768 c:\windows\system32\MRT.exe

- 2011-04-23 21:20 . 2011-02-22 23:06 11080704 c:\windows\SoftwareDistribution\Download\4a68e5ecf881bfdf9f622e39f79b4af0\SP3GDR\ieframe.dll

.

-- Snapshot reset to current date --

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2004-02-10 155648]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2004-02-10 118784]

"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-19 421888]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-06-15 141624]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2009-12-17 149224]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-01-31 35760]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]

"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2011-03-28 281768]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\uTorrent\\uTorrent.exe"=

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

.

R1 6bd6aafb-ce29-4dbb-ad25-c59a3e0c7415;6bd6aafb-ce29-4dbb-ad25-c59a3e0c7415;c:\windows\iprot\6bd6aafb-ce29-4dbb-ad25-c59a3e0c7415\PhysMem.sys [11/21/2009 11:53 PM 3584]

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [5/30/2011 9:10 AM 136360]

S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2/19/2011 9:44 PM 39984]

.

Contents of the 'Scheduled Tasks' folder

.

2011-05-27 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 15:50]

.

2011-06-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-329068152-261903793-682003330-1003Core.job

- c:\documents and settings\Chris\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-01-08 00:35]

.

2011-06-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-329068152-261903793-682003330-1003UA.job

- c:\documents and settings\Chris\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-01-08 00:35]

.

.

------- Supplementary Scan -------

.

uInternet Settings,ProxyOverride = <local>

IE: Download with &FileFactory Turbo - c:\program files\FileFactory Turbo\Plugins\IE\FileFactoryIE.html

TCP: DhcpNameServer = 192.168.15.1

FF - ProfilePath - c:\documents and settings\Chris\Application Data\Mozilla\Firefox\Profiles\b7c30e1u.default\

FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension

FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff

FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-06-02 14:22

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

Completion time: 2011-06-02 14:24:58

ComboFix-quarantined-files.txt 2011-06-02 18:24

ComboFix2.txt 2011-04-23 19:01

.

Pre-Run: 21,883,912,192 bytes free

Post-Run: 21,955,731,456 bytes free

.

- - End Of File - - B96D1D8C2B5023AD7ABE0FC8E2CC23BE

Link to post
Share on other sites

Infected copy of c:\windows\system32\drivers\volsnap.sys was found and disinfected

That was your bad guy

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*]Using a secure browser plugin M86 SecureBrowsing makes it safe to search, surf and socialize online. This free browser plug-in displays security icons next to links on search engines and social networking sites like Facebook, Twitter and LinkedIn, so you'll know which pages are safe and which ones to avoid.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.