180 search & zango infection

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

hank1966

Thread Starter
Joined
Jul 8, 2006
Messages
93
i have got 180 search and zago please help

here is my hjtLogfile of HijackThis v1.99.1
Scan saved at 20:50:19, on 23/07/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Program Files\ewido anti-spyware 4.0\guard.exe
C:\Program Files\CA\eTrust Antivirus\InoRpc.exe
C:\Program Files\CA\eTrust Antivirus\InoRT.exe
C:\Program Files\CA\eTrust Antivirus\InoTask.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\VTTimer.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Thomson\SpeedTouch USB\Dragdiag.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\CA\ETRUST~1\realmon.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\Program Files\Lexmark 4300 Series\lxcemon.exe
C:\Program Files\Lexmark 4300 Series\ezprint.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\ewido anti-spyware 4.0\ewido.exe
C:\Program Files\Picasa2\PicasaMediaDetector.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\lxcecoms.exe
C:\Program Files\Yahoo!\Messenger\YPager.exe
C:\Program Files\LimeWire\LimeWire.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Webroot\Spy Sweeper\SSU.EXE
C:\Program Files\HijackThis 1.99.1\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.iqon.ie/
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [SpeedTouch USB Diagnostics] "C:\Program Files\Thomson\SpeedTouch USB\Dragdiag.exe" /icon
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [MCtrlA5-0.exe] "C:\Program Files\PixAlert\PixAlert @Home 2.0\MCtrlA5-0.exe"
O4 - HKLM\..\Run: [AntivirusRegistration] "C:\Program Files\CA\Etrust Antivirus\Register.exe"
O4 - HKLM\..\Run: [Realtime Monitor] "C:\PROGRA~1\CA\ETRUST~1\realmon.exe" -s
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [LXCECATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCEtime.dll,[email protected]
O4 - HKLM\..\Run: [lxcemon.exe] "C:\Program Files\Lexmark 4300 Series\lxcemon.exe"
O4 - HKLM\..\Run: [EzPrint] "C:\Program Files\Lexmark 4300 Series\ezprint.exe"
O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [!ewido] "C:\Program Files\ewido anti-spyware 4.0\ewido.exe" /minimized
O4 - HKLM\..\Run: [Picasa Media Detector] "C:\Program Files\Picasa2\PicasaMediaDetector.exe"
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintray
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\ypager.exe" -quiet
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\PROGRA~1\Yahoo!\Common\yhexbmesuk.dll
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\PROGRA~1\Yahoo!\Common\yhexbmesuk.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{C0AE0F35-2B1C-481B-BBC0-62B1627F6344}: NameServer = 212.158.248.6 83.146.21.5
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: eTrust Antivirus RPC Server (InoRPC) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust Antivirus\InoRpc.exe
O23 - Service: eTrust Antivirus Realtime Server (InoRT) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust Antivirus\InoRT.exe
O23 - Service: eTrust Antivirus Job Server (InoTask) - Computer Associates International, Inc. - C:\Program Files\CA\eTrust Antivirus\InoTask.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: lxby_device - Lexmark International, Inc. - C:\WINDOWS\system32\lxbycoms.exe
O23 - Service: lxce_device - Lexmark International, Inc. - C:\WINDOWS\system32\lxcecoms.exe
O23 - Service: TuneUp WinStyler Theme Service (TUWinStylerThemeSvc) - TuneUp Software GmbH - C:\Program Files\TuneUp Utilities 2006\WinStylerThemeSvc.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
 

dvk01

Derek
Retired Moderator Retired Malware Specialist
Joined
Dec 14, 2002
Messages
56,452
no sign of it in the HJT log & spysweeper & Ewido normally do a pretty good job of getting rid of it

what is telling you that you have it and where
 

dvk01

Derek
Retired Moderator Retired Malware Specialist
Joined
Dec 14, 2002
Messages
56,452
post teh spysweeper session log

on the options page press view session log, press save & post taht log back here please
 

dvk01

Derek
Retired Moderator Retired Malware Specialist
Joined
Dec 14, 2002
Messages
56,452
open spysweeper and select the options button
when the options page opens press view session log, press save & copy & post that log back here please
 

hank1966

Thread Starter
Joined
Jul 8, 2006
Messages
93
21:13: None
21:13: Traces Found: 0
21:13: Memory Sweep Complete, Elapsed Time: 00:02:24
21:13: Sweep Canceled
21:11: Starting Memory Sweep
21:11: Sweep initiated using definitions version 724
21:11: Spy Sweeper 5.0.5.1286 started
21:11: | Start of Session, 23 July 2006 |
********
21:11: | End of Session, 23 July 2006 |
21:11: None
21:11: Traces Found: 0
21:11: Memory Sweep Complete, Elapsed Time: 00:02:14
21:11: Sweep Canceled
21:08: Starting Memory Sweep
21:08: Sweep initiated using definitions version 724
21:08: Spy Sweeper 5.0.5.1286 started
21:08: | Start of Session, 23 July 2006 |
********
21:08: | End of Session, 23 July 2006 |
21:05: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.google.com/ Error: Failed to set data for 'Start Page'
21:05: IE Hijack Shield: Resetting Home Page value.
21:04: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.google.com/ Error: Failed to set data for 'Start Page'
21:04: IE Hijack Shield: Resetting Home Page value.
20:49: Removal process completed. Elapsed time 00:00:04
20:49: Quarantining All Traces: statcounter cookie
20:49: Removal process initiated
20:46: Traces Found: 1
20:46: Full Sweep has completed. Elapsed time 00:11:35
20:46: File Sweep Complete, Elapsed Time: 00:06:15
20:46: Warning: Failed to access drive I:
20:46: Warning: Failed to access drive H:
20:46: Warning: Failed to access drive G:
20:46: Warning: Failed to access drive F:
20:46: Warning: Failed to access drive E:
20:46: Warning: Failed to access drive D:
20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\local settings\temporary internet files\content.ie5\6d6lxzyj\server[2].gif". The operation completed successfully
20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\incomplete\t-15872-ewido_serials.exe". The operation completed successfully
20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt". The operation completed successfully
20:46: Warning: Failed to open file "c:\documents and settings\hank cronin\incomplete\t-186040448-my friends hot mom - mrs. raquel & mrs.jean (age 4240).mpg". The operation completed successfully
20:40: Starting File Sweep
20:40: Cookie Sweep Complete, Elapsed Time: 00:00:01
20:40: c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt (ID = 3447)
20:40: Found Spy Cookie: statcounter cookie
20:40: Starting Cookie Sweep
20:40: Registry Sweep Complete, Elapsed Time:00:00:49
20:39: Starting Registry Sweep
20:39: Memory Sweep Complete, Elapsed Time: 00:04:19
20:34: Starting Memory Sweep
20:34: Sweep initiated using definitions version 724
20:34: Spy Sweeper 5.0.5.1286 started
20:34: | Start of Session, 23 July 2006 |
********
20:34: | End of Session, 23 July 2006 |
20:26: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:26: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:26: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:26: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:24: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:24: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.google.comme Error: Failed to set data for 'Start Page'
20:23: Warning: Could not store new IE Hijack Setting value: HKLM\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:23: Warning: Could not store new IE Hijack Setting value: HKCU\Software\Microsoft\Internet Explorer\Main\Start Page\http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6ar=msnhome Error: Failed to set data for 'Start Page'
20:20: Removal process completed. Elapsed time 00:01:33
20:19: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST358.tmp". Reason: The system cannot find the file specified
20:19: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
20:19: Warning: Failed to delete profile shadow file "C:\WINDOWS\Temp\SST358.tmp". Reason: The system cannot find the file specified
20:19: Warning: Failed to delete profile shadow file ".log". Reason: The system cannot find the file specified
20:19: Quarantining All Traces: statcounter cookie
20:19: Quarantining All Traces: webtrends cookie
20:19: Quarantining All Traces: falkag cookie
20:19: Quarantining All Traces: websponsors cookie
20:19: Quarantining All Traces: tribalfusion cookie
20:19: Quarantining All Traces: serving-sys cookie
20:19: Quarantining All Traces: realmedia cookie
20:19: Quarantining All Traces: questionmarket cookie
20:19: Quarantining All Traces: fastclick cookie
20:19: Quarantining All Traces: zedo cookie
20:19: Quarantining All Traces: burstnet cookie
20:19: Quarantining All Traces: a cookie
20:19: Quarantining All Traces: atlas dmt cookie
20:19: Quarantining All Traces: advertising cookie
20:19: Quarantining All Traces: adrevolver cookie
20:19: Quarantining All Traces: yieldmanager cookie
20:19: Quarantining All Traces: 2o7.net cookie
20:19: Quarantining All Traces: starware toolbar
20:19: Quarantining All Traces: 180search assistant/zango
20:19: Removal process initiated
20:18: Traces Found: 23
20:18: Full Sweep has completed. Elapsed time 00:11:40
20:18: File Sweep Complete, Elapsed Time: 00:06:40
20:18: Warning: Failed to access drive I:
20:18: Warning: Failed to access drive H:
20:18: Warning: Failed to access drive G:
20:18: Warning: Failed to access drive F:
20:18: Warning: Failed to access drive E:
20:18: Warning: Failed to access drive D:
20:11: Starting File Sweep
20:11: Cookie Sweep Complete, Elapsed Time: 00:00:01
20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][2].txt (ID = 3447)
20:11: Found Spy Cookie: statcounter cookie
20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt (ID = 3235)
20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][2].txt (ID = 3669)
20:11: Found Spy Cookie: webtrends cookie
20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][2].txt (ID = 2650)
20:11: Found Spy Cookie: falkag cookie
20:11: c:\documents and settings\hank cronin\cookies\hank [email protected][1].txt (ID = 3665)
20:11: Found Spy Cookie: websponsors cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 3762)
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 2337)
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3589)
20:11: Found Spy Cookie: tribalfusion cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 3343)
20:11: Found Spy Cookie: serving-sys cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 3235)
20:11: Found Spy Cookie: realmedia cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3217)
20:11: Found Spy Cookie: questionmarket cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 1958)
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2651)
20:11: Found Spy Cookie: fastclick cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3763)
20:11: Found Spy Cookie: zedo cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2336)
20:11: Found Spy Cookie: burstnet cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 2027)
20:11: Found Spy Cookie: a cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2253)
20:11: Found Spy Cookie: atlas dmt cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][2].txt (ID = 2175)
20:11: Found Spy Cookie: advertising cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 2088)
20:11: Found Spy Cookie: adrevolver cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 3751)
20:11: Found Spy Cookie: yieldmanager cookie
20:11: c:\documents and settings\trudi\cookies\[email protected][1].txt (ID = 1957)
20:11: Found Spy Cookie: 2o7.net cookie
20:11: Starting Cookie Sweep
20:11: Registry Sweep Complete, Elapsed Time:00:00:38
20:11: HKU\WRSS_Profile_S-1-5-21-352208718-2397271575-3027016645-1008\software\zango\ (ID = 147919)
20:11: Found Adware: 180search assistant/zango
20:11: HKU\WRSS_Profile_S-1-5-21-352208718-2397271575-3027016645-1008\software\starware\ (ID = 142866)
20:11: Found Adware: starware toolbar
20:11: Starting Registry Sweep
20:11: Memory Sweep Complete, Elapsed Time: 00:04:06
20:06: Starting Memory Sweep
20:06: Sweep initiated using definitions version 724
20:06: Spy Sweeper 5.0.5.1286 started
20:06: | Start of Session, 23 July 2006 |
********
20:06: | End of Session, 23 July 2006 |
20:06: Your spyware definitions have been updated.
Operation: File Access
Target:
Source: C:\PROGRAM FILES\CA\ETRUST ANTIVIRUS\INORT.EXE
20:05: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
20:04: Shield States
20:04: Spyware Definitions: 691
20:04: Spy Sweeper 5.0.5.1286 started
20:04: Spy Sweeper 5.0.5.1286 started
20:04: | Start of Session, 23 July 2006 |
********
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top