Trojan

View previous topic View next topic Go down

Trojan

Post by Super Spicko on Fri 17 Aug 2012, 12:17 pm

Hi, I have a virus on my other computer, it comes up as (Trojan.JS.Redirector.ANR) I can't seem to find anything on the net about this one, is it the same as the AR? Any advice would be greatly appreciated

Super Spicko

Unborn
Unborn

Posts : 4
Joined : 2012-08-17
Operating System : Windows 7

View user profile

Back to top Go down

Re: Trojan

Post by Superdave on Sat 18 Aug 2012, 11:44 am

Hello and welcome to GeekPolice.Net My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
*****************************************************************
Download Security Check by screen317 from one of the following links and save it to your desktop.

Link 1
Link 2

* Double-click Security Check.bat
* Follow the on-screen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt
* Post the contents of that document in your next reply.

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.

****************************************************************
SUPERAntiSpyware

If you already have SUPERAntiSpyware be sure to check for updates before scanning!


Download SuperAntispyware Free Edition (SAS)
* Double-click the icon on your desktop to run the installer.
* When asked to Update the program definitions, click Yes
* If you encounter any problems while downloading the updates, manually download and unzip them from here
* Next click the Preferences button.

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
* Click the Scanning Control tab.
* Under Scanner Options make sure only the following are checked:

•Close browsers before scanning
•Scan for tracking cookies
•Terminate memory threats before quarantining
Please leave the others unchecked

•Click the Close button to leave the control center screen.

* On the main screen click Scan your computer
* On the left check the box for the drive you are scanning.
* On the right choose Perform Complete Scan
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete a summary box will appear. Click OK
* Make sure everything in the white box has a check next to it, then click Next
* It will quarantine what it found and if it asks if you want to reboot, click Yes

•To retrieve the removal information please do the following:
•After reboot, double-click the SUPERAntiSpyware icon on your desktop.
•Click Preferences. Click the Statistics/Logs tab.

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

•It will open in your default text editor (preferably Notepad).
•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

* Save the log somewhere you can easily find it. (normally the desktop)
* Click close and close again to exit the program.
*Copy and Paste the log in your post.
*********************************************
Please download Malwarebytes Anti-Malware from here.
Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: Trojan

Post by Super Spicko on Sun 19 Aug 2012, 6:39 pm

These are the results from the checkup.txt you asked me to post:


Results of screen317's Security Check version 0.99.46
Windows 7 Service Pack 1 x64 (UAC is enabled)
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Disabled!
Bitdefender Antivirus
Microsoft Security Essentials
Antivirus up to date!
`````````Anti-malware/Other Utilities Check:`````````
AVS Registry Cleaner version 2.2
Java(TM) 6 Update 33
Java(TM) 7 Update 5
Java version out of Date!
Adobe Reader X 10.1.3 Adobe Reader out of Date!
Mozilla Firefox (14.0.1)
Google Chrome 21.0.1180.77
Google Chrome 21.0.1180.79
Google Chrome Plugins...
````````Process Check: objlist.exe by Laurent````````
Microsoft Security Essentials MSMpEng.exe
Microsoft Security Essentials msseces.exe
Bitdefender Bitdefender 2012 vsserv.exe
Bitdefender Bitdefender 2012 updatesrv.exe
Bitdefender Bitdefender 2012 bdagent.exe
Bitdefender Bitdefender 2012 seccenter.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:
````````````````````End of Log``````````````````````

Super Spicko

Unborn
Unborn

Posts : 4
Joined : 2012-08-17
Operating System : Windows 7

View user profile

Back to top Go down

Re: Trojan

Post by Superdave on Mon 20 Aug 2012, 3:57 am

Registry cleaners are extremely powerful applications and their potential for harming your OS far outweighs any small potential for improving your computer's performance.
AVS Registry Cleaner version 2.2
There are a number of them available and some are more safe than others. Keep in mind that no two registry cleaners work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad" entry. One cleaner may find entries on your system that will not cause a problem when removed, another may not find the same entries, and still another may want to remove entries required for a program to work. Without research into what the registry entry selected for deletion is, a registry cleaner can end up being an automated method to cause problems with the registry.

For routine use by those not familiar with the registry, the benefits to your computer are negligible while the potential risks are great.

Further reading: XP Fixes Myth #1: Registry Cleaners
***********************************************************
Update Your Java (JRE)

Old versions of Java have vulnerabilities that malware can use to infect your system.


First Verify your Java Version

If there are any other version(s) installed then update now.

Get the new version (if needed)

If your version is out of date install the newest version of the Sun Java Runtime Environment.

Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Be sure to close ALL open web browsers before starting the installation.

Remove any old versions

1. Download JavaRa and unzip the file to your Desktop.
2. Open JavaRA.exe and choose Remove Older Versions
3. Once complete exit JavaRA.

Additional Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.
*******************************************************
Update your Adobe Reader. get.adobe.com/reader.

Be sure to uncheck the Free McAfee Security Scan so it isn't installed.

*****************************************************************
Please post the other logs after you have run the scans.

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: Trojan

Post by Super Spicko on Mon 20 Aug 2012, 4:07 pm

Scan 1 of :

Malwarebytes Anti-Malware (Trial) 1.62.0.1300
[You must be registered and logged in to see this link.]

Database version: v2012.08.19.07

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Tammy Hendriksen :: RUMCUB [administrator]

Protection: Enabled

20/08/2012 8:44:28 AM
mbam-log-2012-08-20 (08-44-28).txt

Scan type: Full scan (C:\|D:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 1081144
Time elapsed: 3 hour(s), 33 minute(s), 50 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 3
C:\Users\Tammy Hendriksen\Documents\My Downloads\Miro_setup.exe (PUP.BundleInstaller.OI) -> Quarantined and deleted successfully.
C:\Users\Tammy Hendriksen\Documents\TAMMY DOCS\TAMS DOCUMENTS\Magic.Photo.Editor.v3.8.Multilingual\crack\MagicPhoto.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
D:\PROGRAM FILES\Magic Photo Editor\MagicPhoto.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.

(end)

Super Spicko

Unborn
Unborn

Posts : 4
Joined : 2012-08-17
Operating System : Windows 7

View user profile

Back to top Go down

Re: Trojan

Post by Super Spicko on Mon 20 Aug 2012, 4:10 pm

Scan 1 of:

SUPERAntiSpyware Scan Log
[You must be registered and logged in to see this link.]

Generated 08/19/2012 at 03:43 PM

Application Version : 5.5.1012

Core Rules Database Version : 9083
Trace Rules Database Version: 6895

Scan type : Quick Scan
Total Scan Time : 00:00:20

Operating System Information
Windows 7 Home Premium 64-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User

Memory items scanned : 113
Memory threats detected : 0
Registry items scanned : 29443
Registry threats detected : 0
File items scanned : 3733
File threats detected : 75

Adware.Tracking Cookie
C:\Users\Tammy Hendriksen\AppData\Roaming\Microsoft\Windows\Cookies\CKVSKJ85.txt [ /atdmt.com ]
C:\Users\Tammy Hendriksen\AppData\Roaming\Microsoft\Windows\Cookies\RB2FBJ1C.txt [ /doubleclick.net ]
C:\Users\Tammy Hendriksen\AppData\Roaming\Microsoft\Windows\Cookies\IH1HBNQB.txt [ /tribalfusion.com ]
C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\Low\MG5664Z0.txt [ Cookie:guest@revsci.net/ ]
C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\Low\32JBFWU8.txt [ Cookie:guest@doubleclick.net/ ]
C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\Low\NFVIQWQ0.txt [ Cookie:guest@imrworldwide.com/cgi-bin ]
C:\USERS\TAMMY HENDRIKSEN\Cookies\CKVSKJ85.txt [ Cookie:tammy [You must be registered and logged in to see this link.]/ ]
C:\USERS\TAMMY HENDRIKSEN\Cookies\RB2FBJ1C.txt [ Cookie:tammy [You must be registered and logged in to see this link.]/ ]
C:\USERS\TAMMY HENDRIKSEN\Cookies\IH1HBNQB.txt [ Cookie:tammy [You must be registered and logged in to see this link.]/ ]
.incredimailmediabar2.ourtoolbar.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.incredimailmediabar2.ourtoolbar.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api6.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api6.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api16.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api16.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api18.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api18.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.dmtracker.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adtech.de [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api29.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api29.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.statcounter.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api25.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api25.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.liveperson.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.kontera.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api32.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api32.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api20.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api20.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api19.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api19.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.liveperson.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
server.iad.liveperson.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api15.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api15.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api15.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api21.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api21.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api21.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api30.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api30.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api30.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]


Scan 2 of:

SUPERAntiSpyware Scan Log
[You must be registered and logged in to see this link.]

Generated 08/19/2012 at 08:22 PM

Application Version : 5.5.1012

Core Rules Database Version : 9083
Trace Rules Database Version: 6895

Scan type : Complete Scan
Total Scan Time : 04:38:05

Operating System Information
Windows 7 Home Premium 64-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User

Memory items scanned : 772
Memory threats detected : 0
Registry items scanned : 74151
Registry threats detected : 7
File items scanned : 555607
File threats detected : 79

Adware.Tracking Cookie
C:\Users\Tammy Hendriksen\AppData\Roaming\Microsoft\Windows\Cookies\CKVSKJ85.txt [ /atdmt.com ]
C:\Users\Tammy Hendriksen\AppData\Roaming\Microsoft\Windows\Cookies\RB2FBJ1C.txt [ /doubleclick.net ]
C:\Users\Tammy Hendriksen\AppData\Roaming\Microsoft\Windows\Cookies\IH1HBNQB.txt [ /tribalfusion.com ]
C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\Low\MG5664Z0.txt [ Cookie:guest@revsci.net/ ]
C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\Low\32JBFWU8.txt [ Cookie:guest@doubleclick.net/ ]
C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\Low\NFVIQWQ0.txt [ Cookie:guest@imrworldwide.com/cgi-bin ]
C:\USERS\TAMMY HENDRIKSEN\Cookies\CKVSKJ85.txt [ Cookie:tammy [You must be registered and logged in to see this link.]/ ]
C:\USERS\TAMMY HENDRIKSEN\Cookies\RB2FBJ1C.txt [ Cookie:tammy [You must be registered and logged in to see this link.]/ ]
C:\USERS\TAMMY HENDRIKSEN\Cookies\IH1HBNQB.txt [ Cookie:tammy [You must be registered and logged in to see this link.]/ ]
.incredimailmediabar2.ourtoolbar.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.incredimailmediabar2.ourtoolbar.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api6.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api6.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api16.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api16.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api18.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api18.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.dmtracker.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.ad.yieldmanager.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.adtech.de [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.revsci.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api29.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api29.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.statcounter.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api25.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api25.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.interclick.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.liveperson.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.serving-sys.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.kontera.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api32.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api32.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api20.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api20.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.doubleclick.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api19.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api19.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.liveperson.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
server.iad.liveperson.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api15.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api15.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api15.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api21.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api21.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api21.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api30.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api30.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api30.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]

Adware.HBHelper
(x86) HKU\S-1-5-21-1201863338-1861871862-4098503907-1007\Software\Microsoft\Internet Explorer\URLSearchHooks#{CA3EB689-8F09-4026-AA10-B9534C691CE0}
(x86) HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
(x86) HKU\S-1-5-21-1201863338-1861871862-4098503907-1007_Classes\Software\Microsoft\Internet Explorer\URLSearchHooks#{CA3EB689-8F09-4026-AA10-B9534C691CE0}

Browser Hijacker.Deskbar
(x64) HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
(x64) HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32
(x64) HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib
(x64) HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib#Version

Trojan.Agent/Gen-Downloader
D:\PROGRAM INSTALLS\INCREDIMAIL_INSTALL.EXE

Trojan.Agent/Gen-StartPage
D:\PROGRAM INSTALLS\TUBEHUNTER.V9.7_KEYGEN-FFF\KEYGEN.EXE
ZIP ARCHIVE( D:\PROGRAM INSTALLS\TUBEHUNTER.V9.7_KEYGEN-FFF\TUBEHUNTER.V9.7_KEYGEN-FFF.ZIP )/KEYGEN.EXE
D:\PROGRAM INSTALLS\TUBEHUNTER.V9.7_KEYGEN-FFF\TUBEHUNTER.V9.7_KEYGEN-FFF.ZIP


Scan 3 of :

SUPERAntiSpyware Scan Log
[You must be registered and logged in to see this link.]

Generated 08/20/2012 at 02:53 AM

Application Version : 5.5.1012

Core Rules Database Version : 9083
Trace Rules Database Version: 6895

Scan type : Complete Scan
Total Scan Time : 06:14:00

Operating System Information
Windows 7 Home Premium 64-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User

Memory items scanned : 766
Memory threats detected : 0
Registry items scanned : 74147
Registry threats detected : 0
File items scanned : 652194
File threats detected : 25

Adware.Tracking Cookie
api18.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
accounts.google.com.au [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api31.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
accounts.google.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
accounts.google.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.tags.toolbarsmedia.com [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api22.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
api26.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.api28.thetrafficstat.net [ C:\USERS\TAMMY HENDRIKSEN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]

Super Spicko

Unborn
Unborn

Posts : 4
Joined : 2012-08-17
Operating System : Windows 7

View user profile

Back to top Go down

Re: Trojan

Post by Superdave on Tue 21 Aug 2012, 12:24 pm

Please download aswMBR.exe ( 511KB ) to your desktop.

Double click the aswMBR.exe to run it



Click the "Scan" button to start scan

Note: Do not take action against any **Rootkit** entries until I have reviewed the log. Often there are false positives



On completion of the scan click save log, save it to your desktop and post in your next reply
***************************************************************
Download Combofix from any of the links below, and save it to your DESKTOP.

Link 1
Link 2
Link 3

To prevent your anti-virus application interfering with ComboFix we need to disable it. See here for a tutorial regarding how to do so if you are unsure.

  • Close any open windows and double click ComboFix.exe to run it.

    You will see the following image:



Click I Agree to start the program.

ComboFix will then extract the necessary files and you will see this:



As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. This will not occur in Windows Vista and 7

It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

If you did not have it installed, you will see the prompt below. Choose YES.



Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).

Leave your computer alone while ComboFix is running. ComboFix will restart your computer if malware is found; allow it to do so.

Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: Trojan

Post by Sponsored content Today at 7:36 pm


Sponsored content


Back to top Go down

View previous topic View next topic Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum