Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Messenger spamming


  • Please log in to reply
9 replies to this topic

#1 Target1

Target1

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:54 PM

Posted 05 June 2009 - 03:49 PM

Ok, I got the same problem and I followed all the steps you guys gave me. Since I've been looking all over the internet to find a solution, but could not find one I thought I should make an account.

So, I have the same virus as the thread starter, though mine won't go away.

I did download some files using frostwire lately, including some videos with pornographic material.

The trojans in the log keep returning, every time I reboot my pc.

Well, here is the log:
Malwarebytes' Anti-Malware 1.37
Database version: 2234
Windows 6.0.6000

5-6-2009 22:43:31
mbam-log-2009-06-05 (22-43-31).txt

Scan type: Quick Scan
Objects scanned: 98774
Time elapsed: 8 minute(s), 35 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
c:\program Files\MicPhone\antit.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shv (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\MicPhone (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\program files\MicPhone\antit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\MicPhone\antit.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Any other tips on how to remove this virus?

Thanks in advance
-Target1

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:54 AM

Posted 05 June 2009 - 03:54 PM

Hello and welcome. I have split you to your own topic,, Eaier for all involved..

Please do this next.
Next run ATF and SAS:
From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Target1

Target1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:54 PM

Posted 06 June 2009 - 12:40 AM

Ok, heres the new log.

I got two of them, wanted to make sure if they were still there. So it seems..
Thanks for the help so far!

Since I forgot to post it in my first post: I am running vista home edition.

First:

Malwarebytes' Anti-Malware 1.37
Database version: 2236
Windows 6.0.6000

6-6-2009 7:20:49
mbam-log-2009-06-06 (07-20-49).txt

Scan type: Quick Scan
Objects scanned: 97166
Time elapsed: 7 minute(s), 35 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
c:\program Files\MicPhone\antit.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shv (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Agent) -> Data: c:\progra~1\micphone\antit.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\MicPhone (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\program files\MicPhone\antit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\MicPhone\antit.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Second:
Malwarebytes' Anti-Malware 1.37
Database version: 2236
Windows 6.0.6000

6-6-2009 7:37:36
mbam-log-2009-06-06 (07-37-36).txt

Scan type: Quick Scan
Objects scanned: 96940
Time elapsed: 8 minute(s), 9 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
c:\program Files\MicPhone\antit.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shv (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\MicPhone (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\program files\MicPhone\antit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\MicPhone\antit.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Edited by Target1, 06 June 2009 - 01:06 AM.


#4 Target1

Target1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:54 PM

Posted 06 June 2009 - 11:43 AM

Sorry, almost forgot:

I did that last scan (Mwam) not in safe mode but in normal mode. Don't know if that changes anything.

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:54 AM

Posted 06 June 2009 - 09:18 PM

Hi,,good MBAM is stronger in Normal mode wheras SAS is stronger in Safe. Did you run SAS? If not please do and post the log if it contained malware entries.. Also Update and runn MBAM once more,I'd like to see if comes back alll 0's.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 Target1

Target1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:54 PM

Posted 07 June 2009 - 05:29 AM

Here is the SAS log that I had:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/06/2009 at 02:04 AM

Application Version : 4.26.1004

Core Rules Database Version : 3926
Trace Rules Database Version: 1870

Scan type : Complete Scan
Total Scan Time : 01:36:14

Memory items scanned : 284
Memory threats detected : 0
Registry items scanned : 8245
Registry threats detected : 0
File items scanned : 148904
File threats detected : 16

Trojan.Dropper/Gen
C:\USERS\J.TROMP\APPDATA\LOCAL\TEMP\TEMP1_SECUREW2_TTLS_333.ZIP\SECUREW2_TTLS_333.EXE

Adware.Tracking Cookie
C:\Users\J.tromp\AppData\Roaming\Microsoft\Windows\Cookies\Low\j.tromp@account.live[1].txt
C:\Users\J.tromp\AppData\Roaming\Microsoft\Windows\Cookies\Low\j.tromp@ad.zanox[1].txt
C:\Users\J.tromp\AppData\Roaming\Microsoft\Windows\Cookies\Low\j.tromp@imrworldwide[2].txt
C:\Users\J.tromp\AppData\Roaming\Microsoft\Windows\Cookies\Low\j.tromp@stats.ilsemedia[1].txt
C:\Users\J.tromp\AppData\Roaming\Microsoft\Windows\Cookies\Low\j.tromp@teenpinkvideos[2].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@adtech[2].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@atdmt[1].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@bluemango.solution.weborama[2].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@bt.ilsemedia[2].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@doubleclick[1].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@ehg-advertisementbv.hitbox[2].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@eyewonder[1].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@stat.onestat[2].txt
C:\Users\Susanne\AppData\Roaming\Microsoft\Windows\Cookies\susanne@stats.ilsemedia[1].txt

Trojan.Agent/Gen-ImageDocFake
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEMPROFILE\APPDATA\LOCAL\MICROSOFT\WINDOWS\TEMPORARY INTERNET FILES\CONTENT.IE5\CED78SJ3\0[1].JPG

And here the MBAM log Before removing:

Malwarebytes' Anti-Malware 1.37
Database version: 2236
Windows 6.0.6000

7-6-2009 12:27:16
mbam-log-2009-06-07 (12-27-14).txt

Scan type: Quick Scan
Objects scanned: 97253
Time elapsed: 7 minute(s), 43 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
c:\program Files\MicPhone\antit.exe (Trojan.Agent) -> No action taken.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shv (Trojan.Agent) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Agent) -> Data: c:\progra~1\micphone\antit.dll -> No action taken.

Folders Infected:
C:\Program Files\MicPhone (Trojan.Agent) -> No action taken.

Files Infected:
c:\program files\MicPhone\antit.dll (Trojan.Agent) -> No action taken.
c:\program files\MicPhone\antit.exe (Trojan.Agent) -> No action taken.


And last but not least, the MBAM log from removing:
Malwarebytes' Anti-Malware 1.37
Database version: 2236
Windows 6.0.6000

7-6-2009 12:27:28
mbam-log-2009-06-07 (12-27-28).txt

Scan type: Quick Scan
Objects scanned: 97253
Time elapsed: 7 minute(s), 43 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
c:\program Files\MicPhone\antit.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shv (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Agent) -> Data: c:\progra~1\micphone\antit.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\MicPhone (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\program files\MicPhone\antit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\MicPhone\antit.exe (Trojan.Agent) -> Quarantined and deleted successfully.

And strange enough, After I updated it, this is the log:
Malwarebytes' Anti-Malware 1.37
Database version: 2242
Windows 6.0.6000

7-6-2009 12:43:08
mbam-log-2009-06-07 (12-43-08).txt

Scan type: Quick Scan
Objects scanned: 97523
Time elapsed: 8 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Now I am confused, How come it does not find anything after a update.... It removed the other stuff before the update? :thumbsup:

So far I'm on msn without sending any links.
Thanks guys! Will keep you up to date how it works over the next few days.

Edited by Target1, 07 June 2009 - 06:04 AM.


#7 Target1

Target1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:54 PM

Posted 07 June 2009 - 10:46 AM

Aah, There it is again. Just rebooted my pc to see if it was still there!

MBAM log:

Malwarebytes' Anti-Malware 1.37
Database version: 2242
Windows 6.0.6000

7-6-2009 17:45:36
mbam-log-2009-06-07 (17-45-36).txt

Scan type: Quick Scan
Objects scanned: 97508
Time elapsed: 8 minute(s), 8 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
c:\program Files\MicPhone\antit.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shv (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Agent) -> Data: c:\progra~1\micphone\antit.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\MicPhone (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\program files\MicPhone\antit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\MicPhone\antit.exe (Trojan.Agent) -> Quarantined and deleted successfully.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:54 AM

Posted 07 June 2009 - 11:40 AM

Hello I have somebad news.. you have an active VIRUT infection,, The file ANTIT.EXE (Trojan.Agent/Gen-Virut)

Your system is infected with a nasty variant of Virut, a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer. According to this Norman White Paper Assessment of W32/Virut, some variants can infect the HOSTS file and block access to security related web sites. Virux is an even more complex file infector which can embed an iframe into the body of web-related files and infect script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable.

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.

AVG Overview of W32/VirutThis kind of infection is contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 Target1

Target1
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:54 PM

Posted 08 June 2009 - 04:53 PM

Thats bad news indeed. Will I be able to put some stuff on a usb stick or will I have to rely on back ups for my important stuff?

Anyways, will be formatting all in 2 days... Then I got time to do it right.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:54 AM

Posted 08 June 2009 - 09:28 PM

Yes sorry but VIrut is incureable.
Before you use that Flash drive or connect it to another PC ...
Download and Run FlashDisinfector

You have a flash drive infection. These worms travel through your portable drives. If they have been connected to other machines, they may now be infected.
Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone. Please do so and allow the utility to clean up those drives as

well.
Wait until it has finished scanning and then exit the program.
Reboot your computer when done.

Note: Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive plugged in when you ran it. Don't delete

this folder. It will help protect your drives from future infection.

Then run it again after you format.


Not an unwise decision to make. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.

2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe's, .scr, .com, .pif etc... as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.

Download Belarc Advisor - builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser.
Run it and then print out the results, they may be handy.

Reinstall Windows Vista

Edited by boopme, 08 June 2009 - 09:32 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users