Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Computer running slow, spybot not opening


  • Please log in to reply
9 replies to this topic

#1 wat1

wat1

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 15 May 2009 - 06:33 PM

My computer has been acting oddly since yesterday. When I turn the computer on, it goes through the normal processes, but then after the Windows xp logo, instead of going to the blue log in screen with the icons for the different profiles, it stays black for about 10 seconds and then a small window where I have to type in my account name and password appears. I can log on just fine, it's just annoying how it suddenly changed. After I log on to my account, sometimes explorer doesn't load like it normally does so after restarting the computer a few times, I decided to open the task manager and run explorer from there. Also, every time I start up the computer I get an error message hpqhtb08.exe - Application Error "The application failed to initialize properly (0xc000007b). Click OK to terminate the application."

I've run mbam and SAS, but I had to change the file names for both of those to work. Spybot won't start even if I do change file names, and adaware acts the same way. I ran mbam about 5 times, and each time it picked up about 16 occurrences of something called trojan.vundo.h. I ran ATF, restarted in safe mode to run SAS, here's the log for that scan:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/15/2009 at 02:03 AM

Application Version : 4.26.1002

Core Rules Database Version : 3868
Trace Rules Database Version: 1816

Scan type : Complete Scan
Total Scan Time : 01:07:36

Memory items scanned : 241
Memory threats detected : 2
Registry items scanned : 5973
Registry threats detected : 15
File items scanned : 119371
File threats detected : 8

Trojan.Vundo-Variant/Small-GEN
C:\WINDOWS\SYSTEM32\SSQRKHFY.DLL
C:\WINDOWS\SYSTEM32\SSQRKHFY.DLL
C:\WINDOWS\SYSTEM32\AWTQNLMC.DLL
C:\WINDOWS\SYSTEM32\AWTQNLMC.DLL
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\ssqRkhFy

Unclassified.Unknown Origin
HKLM\Software\Classes\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}
HKCR\CLSID\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}
HKCR\CLSID\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}\InprocServer32
HKCR\CLSID\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}
HKU\S-1-5-21-57989841-1547161642-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}
HKCR\CLSID\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}

Trojan.Vundo-Variant/NextGen
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3B3897CC-CD0F-4BB9-98D4-833C4695A374}
HKCR\CLSID\{3B3897CC-CD0F-4BB9-98D4-833C4695A374}
HKCR\CLSID\{3B3897CC-CD0F-4BB9-98D4-833C4695A374}\InprocServer32
HKCR\CLSID\{3B3897CC-CD0F-4BB9-98D4-833C4695A374}\InprocServer32#ThreadingModel

Adware.ShopAtHomeSelect
HKU\S-1-5-21-57989841-1547161642-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{E8DAAA30-6CAA-4B58-9603-8E54238219E2}

Adware.Vundo Variant/Rel
HKLM\SOFTWARE\Microsoft\RemoveRP

Trojan.Agent/Gen-TempZ
C:\DOCUMENTS AND SETTINGS\JEANETTE\APPLICATION DATA\_7196A200E1E05B65828D5FE6F8AC043B\DOWN\3XL000.EXE
C:\DOCUMENTS AND SETTINGS\WILL\APPLICATION DATA\_7196A200E1E05B65828D5FE6F8AC043B\DOWN\3XL000.EXE

Trojan.Agent/Gen-MSFake
C:\DOCUMENTS AND SETTINGS\JEANETTE\APPLICATION DATA\_7196A200E1E05B65828D5FE6F8AC043B\DOWN\LOG000.EXE
C:\DOCUMENTS AND SETTINGS\WILL\APPLICATION DATA\_7196A200E1E05B65828D5FE6F8AC043B\DOWN\LOG000.EXE

Trojan.Unknown Origin
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEMPROFILE\APPLICATION DATA\158A1693DDB03537
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEMPROFILE\APPLICATION DATA\436612C1BF51BE74


After that scan, I restarted my computer again and ran mbam and it comes up with nothing now, however after the SAS scan, about every 30 minutes a dialogue box called Secure Antivirus Pro pops up telling me my computer may be at risk, so I close it each time. Even though mbam is telling me there's nothing on my computer, I still cannot open the programs like Spybot and Adaware, and mbam and SAS still require their names to be changed, so I'm pretty sure there's still something left on my computer.

Any suggestions?

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:38 PM

Posted 15 May 2009 - 08:37 PM

Hello it appears you are still infected.. We should do a couple of things..

First disable SpyBot from the System tray.

First that file, hpqhtb08.exe,this is the HP image zone fast start program. Have you recently Uninstalled or reinstalled some Photo app or camera? You can dis able this program without affecting the HP Image Zone application. Just
Click Start then Run
Type msconfig and uncheck the program listed under the startup tab.
Reboot.


Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Edited by boopme, 15 May 2009 - 08:38 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 wat1

wat1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 15 May 2009 - 09:08 PM

When I try to update MBAM I get a message saying that the update has failed. When I try to go to websites of major programs like spybot or adaware the page times out and says page not found, so I'm assuming whatever is infecting me is blocking MBAM from updating too.

Here's the log from scanning without the update:

Malwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 2

5/15/2009 9:08:05 PM
mbam-log-2009-05-15 (21-08-05).txt

Scan type: Quick Scan
Objects scanned: 73721
Time elapsed: 2 minute(s), 39 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:38 PM

Posted 15 May 2009 - 10:07 PM

Manually Downloading Updates:
Manually download them from HERE and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.

See if you can also run part 1 of S!Ri's SmitfraudFix

Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 wat1

wat1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 15 May 2009 - 10:31 PM

When I try to download the update for MBAM at the link you provided it just says page not found. I tried looking for the update elsewhere, but I couldn't really find one.

Here's the SmitFraud log:

SmitFraudFix v2.416

Scan done at 22:19:05.62, Fri 05/15/2009
Run from C:\Documents and Settings\Will\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\a-squared Free\a2service.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Nexon\MapleStory\npkcmsvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\AV.EXE
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Will\SmitfraudFix\Policies.exe
C:\WINDOWS\system32\cmd.exe

hosts


C:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32


C:\Documents and Settings\Will


C:\DOCUME~1\Will\LOCALS~1\Temp


C:\Documents and Settings\Will\Application Data


Start Menu


C:\DOCUME~1\Will\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"


o4Patch
!!!Attention, following keys are not inevitably infected!!!

o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri



IEDFix
!!!Attention, following keys are not inevitably infected!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



Agent.OMZ.Fix
!!!Attention, following keys are not inevitably infected!!!

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


VACFix
!!!Attention, following keys are not inevitably infected!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix
!!!Attention, following keys are not inevitably infected!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"="gjhmrz.dll osqddc.dll klvqgc.dll zgurff.dll nljtsy.dll ocjkgj.dll rifpmr.dll wheecl.dll"


Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"

RK

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""




DNS

Description: Intel® 82562V 10/100 Network Connection - Packet Scheduler Miniport
DNS Server Search Order: 76.85.229.110
DNS Server Search Order: 76.85.229.111

HKLM\SYSTEM\CCS\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS1\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS2\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS3\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111


Scanning for wininet.dll infection


End

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:38 PM

Posted 15 May 2009 - 11:06 PM

Please run part 2 now,then tell me how it's runniing.

You should print out these instructions, or copy them to a Notepad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, double-click SmitfraudFix.exe
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart anyway into normal Windows. A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
The report can also be found at the root of the system drive, usually at C:\rapport.txt
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 wat1

wat1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 15 May 2009 - 11:42 PM

After running part two I don't notice a difference aside from my desktop being changed to a basic blue.

Here's the report:

SmitFraudFix v2.416

Scan done at 23:34:03.09, Fri 05/15/2009
Run from C:\Documents and Settings\Will\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

Killing process


hosts

127.0.0.1 jL.chura.pl

127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
...

VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


Generic Renos Fix

GenericRenosFix by S!Ri


Deleting infected files


IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



Agent.OMZ.Fix

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


RK


DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS1\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS2\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS3\Services\Tcpip\..\{7161736C-D01F-4CCD-B96D-2B59115E4FC5}: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=76.85.229.110 76.85.229.111


Deleting Temp Files


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

"System"=""


RK.2



Registry Cleaning

Registry Cleaning done.

SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


End

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:38 PM

Posted 16 May 2009 - 09:12 AM

Go to Start > Control Panel > Display. Click on the "Desktop" tab, then the "Customize Desktop..." button.
Click on the "Web" tab, then under Web Pages, uncheck and delete everything you find (except "My Current Home page").

These are some common malware related entries you may see:
Security Info
Warning Message
Security Desktop
Warning Homepage
Privacy Protection
Desktop Uninstall
If present, select each entry and click the Delete button.

Also, make sure the Lock desktop items box is unchecked. Click "Ok", then "Apply" and "Ok".

When done, go back into your Desktop Settings and you should be able to change the color/theme to whatever you want.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 wat1

wat1
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 16 May 2009 - 02:22 PM

There was nothing under the web tab to delete. I'm able to change my desktop, but there's still something infecting my computer. Starting today I'm now being redirected to different advertising sites when I click on links from google. If I copy/paste the addresses it works fine, it's just something is interfering when I try to go through google.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:38 PM

Posted 16 May 2009 - 11:26 PM

Let;s check for Goored and then some rootkits.

Please download GooredFix and save it to your Desktop. Double-click Goored.exe to run it. Select 1. Find Goored (no fix) by typing 1 and pressing Enter. A log will open, please post the contents of that log in your next reply (it can also be found on your desktop, called Goored.txt). Note: Do not run Option #2 yet.


Now run SDFix:
Please print out and follow these instructions: "How to use SDFix". <- This program is for Windows 2000/XP ONLY.
When using this tool, you must use the Administrator's account or an account with "Administrative rights"
  • Disconnect from the Internet and temporarily disable your anti-virus, script blocking and any real time protection programs before performing a scan.
  • When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt.
  • If SDFix is unable to run after rebooting from Safe Mode, run SDFix in either Mode, and type F, then press Enter for it to finish the final stage and produce the report.
  • Please copy and paste the contents of Report.txt in your next reply.
  • Be sure to renable you anti-virus and and other security programs before connecting to the Internet.
-- If the computer has been infected with the VirusAlert! malware warning from the clock and the Start Menu icons or drives are not visible, open the SDFix folder, right-click on either the XP_VirusAlert_Repair.inf or W2K VirusAlert_Repair.inf (depending on your version of Windows) and select Install from the Context menu. Then reboot to apply the changes.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users