Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

So Many Problems! Please Can Some One Help!


  • Please log in to reply
7 replies to this topic

#1 afy4ev4

afy4ev4

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:12:04 AM

Posted 24 April 2008 - 04:05 AM

Hi,

Please can someone help!

I have sooo many problems with my pc that i dont know where to start!

1. All my programmes are not running and bringing up the following message on All programmes:

windows cannot find c:\program files\internet explorer\iexplore.exe.

2. I am unable to download most antispyware software as once it initally downloads, it will not let me run the programme.

3. I have tried to reboot my pc, but it will not allow me to. It brings up error message - BIOS LOCK, contact manufacturer.

4. Internet is not running properly, its very slow and brings up error messages and closes down itself.

5. My control panel is not working, it will not allow me to go into any of the icon.

6. I have one anti spyware programme set up called SPYWARE TERMINATOR. It shows that i have a TROJAN.bancos virus.

It tries to get rid of it, but everytime i restart my pc it reapears!

Please can someone be kind enough to help! I will be awaiting your reponse.

Thank you

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,136 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:04 AM

Posted 24 April 2008 - 01:01 PM

Sounds like you have several issues going on here.

What OS (Win 2K, XPsp1, XPsp2, Vista) are you using? What type of anti-virus are you using? Can you reboot in "Safe Mode" so you can run your scans from there?

Your infection:

is a generic detection for threats that primarily target Portuguese speaking customers of some Brazilian banks. The threat comes in the form of a Trojan that will try to capture the username and password and (sometimes even mouse clicks) of the victims and send the captured information via File Transfer Protocol (FTP) to the Trojan's author.

ca.com

If your computer was used for online banking, has credit card information or other sensitive data on it, you should immediately disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the backdoor Trojan has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the backdoor Trojan has been removed the computer is now secure. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read "When should I re-format? How should I reinstall?".

Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. If you wish to proceed, please do the following.

If you're using Windows 2000/XP, please print out and follow the instructions for using SDFix in BC's self-help tutorial "How to use SDFix".
-- When using this tool, you must use the Administrator's account or an account with "Administrative rights"
-- Disconnect from the Internet and temporarily disable your anti-virus and any anti-malware real time protection before performing a scan.

When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt. Please copy and paste the contents of Report.txt in your next reply. Be sure to renable you anti-virus and and other security programs before connecting to the Internet.

Please print out and follow the instructions for using Malwarebytes Anti-Malware (scroll down).
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

If you cannot download these programs, download them from another computer (friend, family member), save to a usb stick or CD and then transfer to your computer.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 afy4ev4

afy4ev4
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:12:04 AM

Posted 26 April 2008 - 07:52 AM

Hi Quietman,

First of all id like to thank you with taking the time out to help me. It is very much appreciated!

I am using Windows XP and have followed your instructions. I have a log for both programmes. I d like to mention that i am able to now fully use my computer and it has been running quicker!

The SDFix report log:

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :


Restoring Windows Registry Values
Restoring Windows Default Hosts File
Restoring Default Desktop Wallpaper

Rebooting


Checking Files :

Trojan Files Found:

C:\WINDOWS\SYSTEM32\JILSNAP.BMP - Deleted
C:\WINDOWS\SYSTEM32\GBELGF~1.BMP - Deleted
C:\WINDOWS\SYSTEM32\TSRQDC~1.BMP - Deleted
C:\WINDOWS\system32\kdfvg.exe - Deleted
C:\WINDOWS\Temp\70FC.tmp.lst - Deleted
C:\WINDOWS\Temp\6C28.tmp.lst - Deleted
C:\WINDOWS\Temp\5C48.tmp.lst - Deleted
C:\WINDOWS\Temp\E28.tmp.lst - Deleted
C:\WINDOWS\Temp\1DB0.tmp.lst - Deleted
C:\WINDOWS\Temp\1476.tmp.lst - Deleted
C:\WINDOWS\Temp\1AE3.tmp.lst - Deleted
C:\WINDOWS\Temp\33AB.tmp.lst - Deleted
C:\WINDOWS\Temp\6510.tmp.lst - Deleted
C:\WINDOWS\Temp\2861.tmp.lst - Deleted
C:\WINDOWS\Temp\B3D.tmp.lst - Deleted
C:\WINDOWS\Temp\6BC3.tmp.lst - Deleted
C:\WINDOWS\Temp\1FCB.tmp.lst - Deleted
C:\WINDOWS\Temp\24F7.tmp.lst - Deleted
C:\WINDOWS\Temp\5BDC.tmp.lst - Deleted
C:\WINDOWS\Temp\1628.tmp.lst - Deleted
C:\WINDOWS\Temp\8BE.tmp.lst - Deleted
C:\WINDOWS\Temp\5512.tmp.lst - Deleted
C:\WINDOWS\Temp\1C1D.tmp.lst - Deleted
C:\WINDOWS\Temp\2FFE.tmp.lst - Deleted
C:\WINDOWS\Temp\42C3.tmp.lst - Deleted
C:\WINDOWS\Temp\5E5D.tmp.lst - Deleted
C:\WINDOWS\Temp\4E38.tmp.lst - Deleted
C:\WINDOWS\Temp\49EC.tmp.lst - Deleted
C:\WINDOWS\Temp\5BEB.tmp.lst - Deleted
C:\WINDOWS\Temp\176.tmp.lst - Deleted
C:\WINDOWS\Temp\4908.tmp.lst - Deleted
C:\WINDOWS\Temp\7EB3.tmp.lst - Deleted
C:\WINDOWS\Temp\18CC.tmp.lst - Deleted
C:\WINDOWS\Temp\77D8.tmp.lst - Deleted
C:\WINDOWS\Temp\3F29.tmp.lst - Deleted
C:\WINDOWS\Temp\11B1.tmp.lst - Deleted
C:\WINDOWS\Temp\47AE.tmp.lst - Deleted
C:\WINDOWS\Temp\2F7D.tmp.lst - Deleted
C:\WINDOWS\Temp\63A0.tmp.lst - Deleted
C:\WINDOWS\Temp\50B6.tmp.lst - Deleted
C:\WINDOWS\Temp\29C2.tmp.lst - Deleted
C:\WINDOWS\Temp\3D57.tmp.lst - Deleted
C:\WINDOWS\Temp\3264.tmp.lst - Deleted
C:\WINDOWS\Temp\4716.tmp.lst - Deleted
C:\WINDOWS\Temp\508A.tmp.lst - Deleted
C:\WINDOWS\Temp\E03.tmp.lst - Deleted
C:\WINDOWS\Temp\1BF9.tmp.lst - Deleted
C:\WINDOWS\Temp\3306.tmp.lst - Deleted
C:\WINDOWS\Temp\62B0.tmp.lst - Deleted
C:\WINDOWS\Temp\6C25.tmp.lst - Deleted
C:\WINDOWS\Temp\6E42.tmp.lst - Deleted
C:\WINDOWS\Temp\56E7.tmp.lst - Deleted
C:\WINDOWS\Temp\4703.tmp.lst - Deleted
C:\WINDOWS\Temp\46F8.tmp.lst - Deleted
C:\WINDOWS\Temp\1F5C.tmp.lst - Deleted
C:\WINDOWS\Temp\46AE.tmp.lst - Deleted
C:\WINDOWS\Temp\5D50.tmp.lst - Deleted
C:\WINDOWS\Temp\1D52.tmp.lst - Deleted
C:\WINDOWS\Temp\9E4.tmp.lst - Deleted
C:\WINDOWS\Temp\2D7F.tmp.lst - Deleted
C:\WINDOWS\Temp\2C13.tmp.lst - Deleted
C:\WINDOWS\Temp\3E2F.tmp.lst - Deleted
C:\WINDOWS\Temp\26ED.tmp.lst - Deleted
C:\WINDOWS\Temp\373B.tmp.lst - Deleted
C:\WINDOWS\system32\bnsock.dll - Deleted
C:\WINDOWS\system32\kr_done1 - Deleted
C:\WINDOWS\system32\mrdt.log - Deleted
C:\WINDOWS\system32\rc.dat - Deleted
C:\Documents and Settings\Application Data\wsnpoem\audio.dll - Deleted



Folder C:\Documents and Settings\Application Data\wsnpoem - Removed


Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1353.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-26 10:20:01
Windows 5.1.2600 Service Pack 1 FAT NTAPI

scanning hidden processes ...

scanning hidden services ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

Remaining Files :


File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :

Sun 30 Mar 2008 1,246 ..SH. --- "C:\WINDOWS\system32\ahyyjwie.tmp"
Mon 4 Feb 2008 210 ..SH. --- "C:\WINDOWS\system32\wgumzjgp.dllbox"
Sat 16 Feb 2008 23,082 ..SH. --- "C:\WINDOWS\system32\ozdprfgs.dllbox"
Sat 23 Feb 2008 29,960 ..SH. --- "C:\WINDOWS\system32\pvzngyxq.dllbox"
Sat 1 Mar 2008 19,458 ..SH. --- "C:\WINDOWS\system32\pozfpwzt.dllbox"
Tue 4 Mar 2008 19,458 ..SH. --- "C:\WINDOWS\system32\tincfrhh.dllbox"
Thu 29 Aug 2002 4,639 A.SH. --- "C:\Program Files\Windows Media Player\mplayer2.exe"
Thu 29 Aug 2002 520,192 A.SH. --- "C:\Program Files\Windows Media Player\wmplayer.exe"
Mon 22 Dec 2003 303,104 A..H. --- "C:\Trial_icon\files\Microsoft Office 2003 Edition 60 Day Trial.exe"
Tue 1 Apr 2008 165,376 A..H. --- "C:\WINDOWS\system32\.3c600f9f\3c600f9f.core.dll"
Tue 24 Oct 2006 401 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv19.bak"
Sat 13 May 2006 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"

Finished!



The log for Malwarebytes Anti Malware is as follows:

Malwarebytes' Anti-Malware 1.11
Database version: 683

Scan type: Full Scan (C:\|)
Objects scanned: 57144
Time elapsed: 28 minute(s), 18 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 18
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 4
Files Infected: 17

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{2b0b59b4-55a3-4737-9fd5-b93c6430bf75} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2b0b59b4-55a3-4737-9fd5-b93c6430bf75} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{98663e21-9cce-4cf6-863c-911a9523a66f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98663e21-9cce-4cf6-863c-911a9523a66f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{71da2a4e-acb3-4065-9e41-8bc42eabe427} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\jkwslist (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\aldd (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{98663e21-9cce-4cf6-863c-911a9523a66f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\zip (Trojan.Clicker) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\WINDOWS\Installer\{4e7c6748-365f-4055-92e3-f1d40e12e935} (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nGpxx01 (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Rabio\Search Enhancer (Adware.SearchEnhancer) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Rabio (Adware.Rabio) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\wgumzjgp.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ozdprfgs.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pvzngyxq.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pozfpwzt.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tincfrhh.dllbox (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jmqjrihh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nGpxx01\nGpxx011065.exe (Trojan.DownLoader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cu1\corab2130.exe (Adware.RABCO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\.3c600f9f\3c600f9f.core.dll (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{8262530E-0E2D-4962-BC39-C3FF21E4457F}\RP173\A0096272.dll (Adware.RABCO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{8262530E-0E2D-4962-BC39-C3FF21E4457F}\RP173\A0096333.scr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{8262530E-0E2D-4962-BC39-C3FF21E4457F}\RP173\A0096340.scr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{8262530E-0E2D-4962-BC39-C3FF21E4457F}\RP173\A0096358.scr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{8262530E-0E2D-4962-BC39-C3FF21E4457F}\RP183\A0097748.exe (Trojan.Peed) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{8262530E-0E2D-4962-BC39-C3FF21E4457F}\RP240\A0099347.scr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\acrsecB.fon (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\acrsecI.fon (Trojan.Agent) -> Quarantined and deleted successfully.

I hope all is okay now. If you have any more tips then please let me know.

Once again thank you for your help!

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,136 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:04 AM

Posted 26 April 2008 - 05:41 PM

Now do a full system scan with your anti-virus in safe mode. When done let me know how the computer is running and if there are any more reports of infection.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 afy4ev4

afy4ev4
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:12:04 AM

Posted 27 April 2008 - 06:09 AM

Hi,

I have run the scan in safe mode and used my own anti-virus programme and Malwarebytes anti malware to run the scan.

They have both come up with no infected files or viruses, which is great!

Again thank you for all your help!

The log for Malwarebytes anti malware is as follows:

Malwarebytes' Anti-Malware 1.11
Database version: 683

Scan type: Full Scan (C:\|)
Objects scanned: 56242
Time elapsed: 34 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Thank you.

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,136 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:04 AM

Posted 27 April 2008 - 07:33 AM

You're welcome.

Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

To protect yourself against malware and reduce the potential for re-infection, be sure to read:
"Simple and easy ways to keep your computer safe".
"How did I get infected?, With steps so it does not happen again!".
"Best Practices - Internet Safety for 2008".
"Hardening Windows Security - Part 1 & Part 2".
"IE Recommended Minimal Security Settings".
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 afy4ev4

afy4ev4
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:12:04 AM

Posted 27 April 2008 - 12:55 PM

Hiya,

I have done what you suggested. Computer is looking good and running much smoother!

Do you think all is well now?

I will obviously take on board the information i have read in the articles to prevent infection in future.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,136 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:04 AM

Posted 27 April 2008 - 04:34 PM

Safe surfing and have a malware free day.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users