Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I AM INFECTED


  • Please log in to reply
5 replies to this topic

#1 kymberly

kymberly

  • Banned
  • 387 posts
  • OFFLINE
  •  
  • Local time:05:53 PM

Posted 10 June 2011 - 10:04 PM

I CAN NOT GETTING ANY UPDATES, SOMETHING IS KEEPING ME FROM DOWNLOADING. i HAVE USE THE DISK THAT CAME WITH THE COMPUTER TO REINSTALL SO MANY TIMES. CAN I PLEASE GET SOME ONE TO LOOK INTO MY SYSTEM. I HAVE DOWNLOAD SPYBOT AND IT IS TELLING ME THAT I HAVE TROJANS.

--- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) ---

2009-01-26 blindman.exe (1.0.0.8)
2009-01-26 SDFiles.exe (1.6.1.7)
2009-01-26 SDMain.exe (1.0.0.6)
2009-01-26 SDShred.exe (1.0.2.5)
2009-01-26 SDUpdate.exe (1.6.0.12)
2009-01-26 SDWinSec.exe (1.0.0.12)
2009-01-26 SpybotSD.exe (1.6.2.46)
2009-01-26 TeaTimer.exe (1.6.4.26)
2011-06-10 unins000.exe (51.49.0.0)
2009-01-26 Update.exe (1.6.0.7)
2009-01-26 advcheck.dll (1.6.2.15)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2009-01-26 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2009-01-26 Tools.dll (2.1.6.10)
2009-01-16 UninsSrv.dll (1.0.0.0)
2011-03-18 Includes\Adware.sbi
2011-05-17 Includes\AdwareC.sbi
2010-08-12 Includes\Cookies.sbi
2010-12-14 Includes\Dialer.sbi
2011-03-08 Includes\DialerC.sbi
2011-02-24 Includes\HeavyDuty.sbi
2011-03-29 Includes\Hijackers.sbi
2011-05-15 Includes\HijackersC.sbi
2010-09-15 Includes\iPhone.sbi
2010-12-14 Includes\Keyloggers.sbi
2011-03-08 Includes\KeyloggersC.sbi
2004-11-29 Includes\LSP.sbi
2011-04-05 Includes\Malware.sbi
2011-06-07 Includes\MalwareC.sbi
2011-02-24 Includes\PUPS.sbi
2011-05-24 Includes\PUPSC.sbi
2010-01-25 Includes\Revision.sbi
2011-02-24 Includes\Security.sbi
2011-05-03 Includes\SecurityC.sbi
2008-06-03 Includes\Spybots.sbi
2008-06-03 Includes\SpybotsC.sbi
2011-02-24 Includes\Spyware.sbi
2011-05-31 Includes\SpywareC.sbi
2010-03-08 Includes\Tracks.uti
2011-05-17 Includes\Trojans.sbi
2011-05-11 Includes\TrojansC-02.sbi
2011-05-11 Includes\TrojansC-03.sbi
2011-06-06 Includes\TrojansC-04.sbi
2011-06-06 Includes\TrojansC-05.sbi
2011-06-07 Includes\TrojansC.sbi
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll

Located: HK_LM:Run, AVG_TRAY
command: C:\Program Files\AVG\AVG10\avgtray.exe
file: C:\Program Files\AVG\AVG10\avgtray.exe
size: 2334560
MD5: 140F771CADA8724200434C39918F2EA0

Located: HK_LM:Run, hpsysdrv
command: c:\hp\support\hpsysdrv.exe
file: c:\hp\support\hpsysdrv.exe
size: 65536
MD5: 85B8925F1A477DF7AEC93CABBEB04F1F

Located: HK_LM:Run, KBD
command: C:\HP\KBD\KbdStub.EXE
file: C:\HP\KBD\KbdStub.EXE
size: 65536
MD5: 7088B136BB58A5F95CF0DE8386CA6C0F

Located: HK_LM:Run, NvCplDaemon
command: RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup (trojan is located here per spybot)
file: C:\Windows\system32\NvCpl.dll
size: 8429568
MD5: 96227E643741C93E4AA66A39C77F4172

Located: HK_LM:Run, NvMediaCenter
command: RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
file: C:\Windows\system32\NvMcTray.dll
size: 81920
MD5: 4A39B077F1621BD7FC5D4D9823A73714

Located: HK_LM:Run, NvSvc
command: RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart-(trojan located here as well)
file: C:\Windows\system32\nvsvc.dll
size: 90192
MD5: DCFC1A6E1034DC9CCCA199C3EB63C72F

Located: HK_LM:Run, OsdMaestro
command: "C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe"
file: C:\Program Files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe
size: 118784
MD5: B1361669BDC6ED612C35B7C67ADA2240

Located: HK_LM:Run, RtHDVCpl
command: RtHDVCpl.exe
file: C:\Windows\RtHDVCpl.exe
size: 4390912
MD5: F3B864BF39CDB3A71F2774DD02FC1090

Located: HK_LM:Run, Windows Defender
command: %ProgramFiles%\Windows Defender\MSASCui.exe -hide
file: C:\Program Files\Windows Defender\MSASCui.exe
size: 1004136
MD5: 10B5BFBDB6717B58EEAB927CFD1CED25

Located: HK_LM:RunOnce, Launcher
command: %WINDIR%\SMINST\launcher.exe
file: C:\Windows\SMINST\launcher.exe
size: 44168
MD5: 31539595F006DAE39F719735F30C3570

Located: HK_LM:RunOnce, Malwarebytes' Anti-Malware
command: C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
file: C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
size: 443728
MD5: 87FFC1FF3B269FD8E0BB010294B697F6

Located: HK_CU:Run, HPADVISOR
where: S-1-5-21-659491374-702450955-918714321-1001...
command: C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe autoRun
file: C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!

Edited by kymberly, 10 June 2011 - 10:07 PM.


BC AdBot (Login to Remove)

 


#2 kymberly

kymberly
  • Topic Starter

  • Banned
  • 387 posts
  • OFFLINE
  •  
  • Local time:05:53 PM

Posted 11 June 2011 - 12:17 AM

Type: File
Source: D:\hp\apps\APP04435\src\install\games\wheeloffortune-setup.exe
Status: Infected
Quarantine object: 4d86b0fc.qua
Restored: NO
Uploaded to Avira: NO
Operating System: Windows 2000/XP/VISTA Workstation
Search engine: 8.02.05.14
Virus definition file: 7.11.09.156
Detection: Contains recognition pattern of the DR/Mail.Blen.YS dropper
Date/Time: 6/11/2011, 0:06 --------------------This was detected by Avira


kbdstub.exe;c:\hp\kbd;Trojan.PWS.Vkontakte.341;Incurable.Moved.;
toolbarbroker.exe;c:\program files\avg\avg10\toolbar;Probably DLOADER.Trojan;; ---------This was detected by Dr. Web Cure it, uncureable and the other one can't be deleted










#3 Oz Steve

Oz Steve

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:08:53 AM

Posted 11 June 2011 - 02:53 AM

Hi Kymberly
What do you own that is from hewlett Packard,
Is it your Computer or printer?
i used to own both a computer from Hp, it can with spyware loaded as new, the same with the printer,
Someone more knowledgable will be along soon, and hopefully help you
Steve

#4 kymberly

kymberly
  • Topic Starter

  • Banned
  • 387 posts
  • OFFLINE
  •  
  • Local time:05:53 PM

Posted 12 June 2011 - 12:07 AM

a crazy infected computer, that constantly plagued with trojans, they came with the computer??? I need help!!!

#5 kymberly

kymberly
  • Topic Starter

  • Banned
  • 387 posts
  • OFFLINE
  •  
  • Local time:05:53 PM

Posted 17 June 2011 - 12:23 AM

Avira AntiVir Personal
Report file date: Thursday, June 16, 2011 21:13

Scanning for 2788165 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows Vista
Windows version : (plain) [6.0.6000]
Boot mode : Normally booted
Username : SYSTEM
Computer name : KIDS-PC

Version information:
BUILD.DAT : 10.0.0.648 31823 Bytes 4/1/2011 18:36:00
AVSCAN.EXE : 10.0.4.2 442024 Bytes 4/2/2011 00:07:43
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/2/2011 00:07:57
LUKE.DLL : 10.0.3.2 104296 Bytes 4/2/2011 00:07:53
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 07:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 17:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 23:15:47
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 23:15:47
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 05:28:27
VBASE004.VDF : 7.11.8.178 2354176 Bytes 5/31/2011 05:28:37
VBASE005.VDF : 7.11.8.179 2048 Bytes 5/31/2011 05:28:38
VBASE006.VDF : 7.11.8.180 2048 Bytes 5/31/2011 05:28:38
VBASE007.VDF : 7.11.8.181 2048 Bytes 5/31/2011 05:28:38
VBASE008.VDF : 7.11.8.182 2048 Bytes 5/31/2011 05:28:38
VBASE009.VDF : 7.11.8.183 2048 Bytes 5/31/2011 05:28:39
VBASE010.VDF : 7.11.8.184 2048 Bytes 5/31/2011 05:28:39
VBASE011.VDF : 7.11.8.185 2048 Bytes 5/31/2011 05:28:39
VBASE012.VDF : 7.11.8.186 2048 Bytes 5/31/2011 05:28:39
VBASE013.VDF : 7.11.8.222 121856 Bytes 6/2/2011 05:28:40
VBASE014.VDF : 7.11.9.7 134656 Bytes 6/4/2011 05:28:41
VBASE015.VDF : 7.11.9.42 136192 Bytes 6/6/2011 05:28:42
VBASE016.VDF : 7.11.9.72 117248 Bytes 6/7/2011 05:28:43
VBASE017.VDF : 7.11.9.107 130560 Bytes 6/9/2011 05:28:44
VBASE018.VDF : 7.11.9.143 132096 Bytes 6/10/2011 05:28:45
VBASE019.VDF : 7.11.9.172 141824 Bytes 6/14/2011 04:04:09
VBASE020.VDF : 7.11.9.214 144896 Bytes 6/15/2011 04:06:07
VBASE021.VDF : 7.11.9.244 196608 Bytes 6/16/2011 04:06:10
VBASE022.VDF : 7.11.9.245 2048 Bytes 6/16/2011 04:06:10
VBASE023.VDF : 7.11.9.246 2048 Bytes 6/16/2011 04:06:10
VBASE024.VDF : 7.11.9.247 2048 Bytes 6/16/2011 04:06:10
VBASE025.VDF : 7.11.9.248 2048 Bytes 6/16/2011 04:06:10
VBASE026.VDF : 7.11.9.249 2048 Bytes 6/16/2011 04:06:11
VBASE027.VDF : 7.11.9.250 2048 Bytes 6/16/2011 04:06:11
VBASE028.VDF : 7.11.9.251 2048 Bytes 6/16/2011 04:06:11
VBASE029.VDF : 7.11.9.252 2048 Bytes 6/16/2011 04:06:11
VBASE030.VDF : 7.11.9.253 2048 Bytes 6/16/2011 04:06:11
VBASE031.VDF : 7.11.9.255 17920 Bytes 6/17/2011 04:06:12
Engineversion : 8.2.5.20
AEVDF.DLL : 8.1.2.1 106868 Bytes 3/28/2011 23:15:27
AESCRIPT.DLL : 8.1.3.65 1606010 Bytes 6/11/2011 05:29:06
AESCN.DLL : 8.1.7.2 127349 Bytes 3/28/2011 23:15:27
AESBX.DLL : 8.2.1.34 323957 Bytes 6/11/2011 05:29:07
AERDL.DLL : 8.1.9.9 639347 Bytes 3/25/2011 19:21:38
AEPACK.DLL : 8.2.6.9 557429 Bytes 6/17/2011 04:06:34
AEOFFICE.DLL : 8.1.1.25 205178 Bytes 6/11/2011 05:29:02
AEHEUR.DLL : 8.1.2.128 3547512 Bytes 6/17/2011 04:06:32
AEHELP.DLL : 8.1.17.2 246135 Bytes 6/11/2011 05:28:53
AEGEN.DLL : 8.1.5.6 401780 Bytes 6/11/2011 05:28:52
AEEMU.DLL : 8.1.3.0 393589 Bytes 3/28/2011 23:15:19
AECORE.DLL : 8.1.21.1 196983 Bytes 6/11/2011 05:28:51
AEBB.DLL : 8.1.1.0 53618 Bytes 3/28/2011 23:15:19
AVWINLL.DLL : 10.0.0.0 19304 Bytes 3/28/2011 23:15:31
AVPREF.DLL : 10.0.0.0 44904 Bytes 4/2/2011 00:07:42
AVREP.DLL : 10.0.0.10 174120 Bytes 6/11/2011 05:29:09
AVREG.DLL : 10.0.3.2 53096 Bytes 4/2/2011 00:07:42
AVSCPLR.DLL : 10.0.4.2 84840 Bytes 4/2/2011 00:07:43
AVARKT.DLL : 10.0.22.6 231784 Bytes 4/2/2011 00:07:38
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 4/2/2011 00:07:41
SQLITE3.DLL : 3.6.19.0 355688 Bytes 6/17/2010 22:27:22
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/28/2011 23:15:30
NETNT.DLL : 10.0.0.0 11624 Bytes 3/28/2011 23:15:39
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 4/2/2011 00:07:58
RCTEXT.DLL : 10.0.58.0 97128 Bytes 3/28/2011 23:15:52

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: on
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+PFS,+SPR,

Start of the scan: Thursday, June 16, 2011 21:13

Starting search for hidden objects.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot16\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000007\00000000\type
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot16\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000007\00000000\data
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot16\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000008\00000000\type
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot16\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000008\00000000\data
[NOTE] The registry entry is invisible.

The scan of running processes will be started
Scan process 'TrustedInstaller.exe' - '47' Module(s) have been scanned
Scan process 'taskeng.exe' - '24' Module(s) have been scanned
Scan process 'svchost.exe' - '30' Module(s) have been scanned
Scan process 'vssvc.exe' - '48' Module(s) have been scanned
Scan process 'plugin-container.exe' - '71' Module(s) have been scanned
Scan process 'avscan.exe' - '78' Module(s) have been scanned
Scan process 'avcenter.exe' - '64' Module(s) have been scanned
Scan process 'avgsrmax.exe' - '33' Module(s) have been scanned
Scan process 'mobsync.exe' - '35' Module(s) have been scanned
Scan process 'avgcsrvx.exe' - '6' Module(s) have been scanned
Scan process 'avgscanx.exe' - '28' Module(s) have been scanned
Scan process 'avgcsrvx.exe' - '6' Module(s) have been scanned
Scan process 'avgrsx.exe' - '4' Module(s) have been scanned
Scan process 'avshadow.exe' - '33' Module(s) have been scanned
Scan process 'avguard.exe' - '64' Module(s) have been scanned
Scan process 'firefox.exe' - '109' Module(s) have been scanned
Scan process 'avgcsrvx.exe' - '6' Module(s) have been scanned
Scan process 'avgidsmonitor.exe' - '21' Module(s) have been scanned
Scan process 'rundll32.exe' - '29' Module(s) have been scanned
Scan process 'avgnt.exe' - '53' Module(s) have been scanned
Scan process 'RtHDVCpl.exe' - '49' Module(s) have been scanned
Scan process 'OSD.exe' - '18' Module(s) have been scanned
Scan process 'hpsysdrv.exe' - '13' Module(s) have been scanned
Scan process 'Explorer.EXE' - '123' Module(s) have been scanned
Scan process 'Dwm.exe' - '37' Module(s) have been scanned
Scan process 'taskeng.exe' - '77' Module(s) have been scanned
Scan process 'taskeng.exe' - '48' Module(s) have been scanned
Scan process 'avgemcx.exe' - '27' Module(s) have been scanned
Scan process 'avgnsx.exe' - '32' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '34' Module(s) have been scanned
Scan process 'SDWinSec.exe' - '47' Module(s) have been scanned
Scan process 'xaudio.exe' - '14' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '61' Module(s) have been scanned
Scan process 'svchost.exe' - '27' Module(s) have been scanned
Scan process 'svchost.exe' - '43' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '20' Module(s) have been scanned
Scan process 'svchost.exe' - '56' Module(s) have been scanned
Scan process 'sched.exe' - '56' Module(s) have been scanned
Scan process 'spoolsv.exe' - '82' Module(s) have been scanned
Scan process 'svchost.exe' - '89' Module(s) have been scanned
Scan process 'svchost.exe' - '71' Module(s) have been scanned
Scan process 'SLsvc.exe' - '23' Module(s) have been scanned
Scan process 'svchost.exe' - '149' Module(s) have been scanned
Scan process 'svchost.exe' - '113' Module(s) have been scanned
Scan process 'svchost.exe' - '61' Module(s) have been scanned
Scan process 'svchost.exe' - '35' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'winlogon.exe' - '30' Module(s) have been scanned
Scan process 'lsm.exe' - '22' Module(s) have been scanned
Scan process 'lsass.exe' - '60' Module(s) have been scanned
Scan process 'services.exe' - '33' Module(s) have been scanned
Scan process 'csrss.exe' - '14' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '14' Module(s) have been scanned
Scan process 'avgchsvx.exe' - '6' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Initiating scan of system files:
Signed -> 'C:\Windows\system32\svchost.exe'
Signed -> 'C:\Windows\system32\winlogon.exe'
Signed -> 'C:\Windows\explorer.exe'
Signed -> 'C:\Windows\system32\smss.exe'
Signed -> 'C:\Windows\system32\wininet.DLL'
Signed -> 'C:\Windows\system32\wsock32.DLL'
Signed -> 'C:\Windows\system32\ws2_32.DLL'
Signed -> 'C:\Windows\system32\services.exe'
Signed -> 'C:\Windows\system32\lsass.exe'
Signed -> 'C:\Windows\system32\csrss.exe'
Signed -> 'C:\Windows\system32\drivers\kbdclass.sys'
Signed -> 'C:\Windows\system32\spoolsv.exe'
Signed -> 'C:\Windows\system32\alg.exe'
Signed -> 'C:\Windows\system32\wuauclt.exe'
Signed -> 'C:\Windows\system32\advapi32.DLL'
Signed -> 'C:\Windows\system32\user32.DLL'
Signed -> 'C:\Windows\system32\gdi32.DLL'
Signed -> 'C:\Windows\system32\kernel32.DLL'
Signed -> 'C:\Windows\system32\ntdll.DLL'
Signed -> 'C:\Windows\system32\ntoskrnl.exe'
Signed -> 'C:\Windows\system32\ctfmon.exe'
The system files were scanned ('21' files)

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
Master boot sector HD2
[INFO] No virus was found!
Master boot sector HD3
[INFO] No virus was found!
Master boot sector HD4
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '339' files ).


Starting the file scan:

Begin scan in 'C:\' <COMPAQ>
Begin scan in 'D:\' <Recovery>


End of the scan: Thursday, June 16, 2011 22:20
Used time: 1:06:37 Hour(s)

The scan has been done completely.

13800 Scanned directories
351419 Files were scanned
0 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
351419 Files not concerned
4806 Archives were scanned
0 Warnings
4 Notes
408056 Objects were scanned with rootkit scan
4 Hidden objects were found

#6 Oz Steve

Oz Steve

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:08:53 AM

Posted 21 June 2011 - 03:06 AM

Hi Kimberly
Has anyone helped yet,
I can see up the top of your message, if you have not recieved help after 3 days to repost
The word HERE is in red
Steve




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users