Suspicious .exe files in Task Manager

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Vantage_Point, Apr 4, 2005.

  1. Vantage_Point

    Vantage_Point Private E-2

    I've got a couple of .exe files that have cropped up in my Task Manager that I have not seen before. All of this started when I rebooted my machine one day and as soon as I logged into Windows a black window popped up on my desktop. It opened and closed so fast all I could read was "shutdown".

    I went into msconfig and disabled the suspected problem and have not had any trouble with that since (about 2 days ago). But I've got some uninvited guests running now. Here they are:

    csrss.exe
    ntsrv.exe
    ntuser.exe
    LSASS.EXE
    CSRSS.EXE
    SMSS.EXE

    I suspect there are more that I just have not noticed. I'm running and have done scans with: Microsoft AntiSpyware, Norton SystemWorks 2005, Ad-Aware 6.0, CWShredder, Spybot, and the whole bundle prescribed in the "things to try before posting".

    My Zone Alarm 5.5 keeps telling me that ntuser.exe is trying to access the internet. I deny it every time because I'm not sure what it is.

    Just curious....are key logging bugs picked up by spyware/adware programs?

    Thanks for your advice.
    Michael
     
  2. Seconal

    Seconal Private E-2

    Have you tried googling for instance, "spyware, lsass" and looking for a description? I have the LSASS.exe in my processes for quite a while now. I don't think it's harmful. But yeah, try googling the process names.
     
  3. solaris89

    solaris89 First Sergeant

  4. Vantage_Point

    Vantage_Point Private E-2

    I've cross-checked my concerns with the website provided, but I don't find my specific ones on the list. Great resource though, thanks!

    After I "googled" each of the processes I see that each of them CAN be legit. Since I've never noticed any of them before and they all appeared at the same time makes me think something is going on.
     
  5. Vantage_Point

    Vantage_Point Private E-2

    There is a new program that is trying to gain access...LexBce Service is trying to use LEXPPS.EXE to act as a server. I haven't downloaded any Lexmark programs or hardware. I'm sure I have issues, and they seem to be multiplying.

    Thanks for any advice.
    Michael
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you have a Lexmark printer? Did you enable printer sharing?

    lexpps.exe - For Lexmark printers. From Lexmark: "This enables bi-directional printing over a peer to peer network. If the printer is connected directly to your PC, the file is not used, (or should not be used) at all". It is known that firewalls can however alert you to "lexpps.exe" requesting server privileges
     
  7. Vantage_Point

    Vantage_Point Private E-2

    That is my biggest concern. Like I said.....I have no Lexmark hardware. I'm not sure why this is coming up on my system. The only printers I have are Brother MFC 8420 and Dell 720 color printer.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Was there ever a Lexmark printer install on this PC or in the network if the PC has been used on a network.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you are concerned that you may have malware problems, run the steps below.


    - Run ALL the steps in this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan And Virus Removal Make sure you check version numbers and get all updates.

    - Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.


    After doing ALL of the above you still have a problem:

    - Download HijackThis 1.99.1

    - Unzip the hijackthis.exe file to a folder you create named C:\Program Files\HJT

    - Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file.

    - Before running HijackThis: You must close each of the following:your web browser, e-mail client, instant messenger, and programs like notepad, wordpad, MS Word etc. And any other unnecessary running programs.

    - Run HijackThis and save your log file.

    - Post your log as an ATTACHMENT to your next message. (Do NOT copy/paste the log into your post).
     
  10. Vantage_Point

    Vantage_Point Private E-2

    This is a new computer purchased in December 2004. There has never been any Lexmark printer or other device installed on the system. The computer is not on a network. It is a single computer for the family.

    I will run all scans and cleaners again, and then run HJT and attach to the next post. Thanks for your patience.
     
    Last edited: Apr 5, 2005
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No problem! Just make sure your follow the steps properly for HJT to avoid any further delays.
     
  12. Vantage_Point

    Vantage_Point Private E-2

    Here is the HJT log as requested. All scans yielded no infections except SpyBot. Netsys was singled out as a "problem" in the Spybot search.

    Symantec's security check showed that my computer is protected in all 5 categories. I hope there's something in the log that can point us to a solution. Thanks again for your guidance.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you install NTUser? Here is a short blurb about it:

    The NTUser application is designed to be run on a daily basis and collect Windows NT user account information. The application stores this information in a Microsoft® Access® database in daily tables.

    What I am questioning is the below three services (and processes)

    O23 - Service: NTBOOTMGR (NTBOOT) - Unknown owner - C:\WINDOWS\SYSTEM\DRIVER\ntuser.exe
    O23 - Service: NTLOAD - Unknown owner - C:\WINDOWS\SYSTEM\DRIVER\ntsrv.exe
    O23 - Service: NTSVCMGR - Unknown owner - C:\WINDOWS\SYSTEM\DRIVER\ntsrv.exe


    The NTsrv.exe process is also known to be added by a variant of the SERVU-O TROJAN!

    I'm also worried about the below.
    C:\WINDOWS\system\driver\csrss.exe
    csrss.exe is normally only found running from c:\windows\system32

    I would like answers to the NTuser question before suggesting any fixes. There is a good chance that the ntuser stuff and csrss.exe are related.


    Also have you looked in Add/Remove programs for anything related to Lexmark. And since you say you do not have a Lexmark printer, uninstall it if found.
     
  14. Vantage_Point

    Vantage_Point Private E-2

    Let's put it this way...I did not knowingly download NTUser. It's not something I see a need for. I've never used Microsoft Access either.

    There was no sign of any Lexmark files either in my Add/Remove programs or under Program Files. Just for kicks, I searched for any files or folders with that name and the search yielded no results.

    On a side note...when I go into my Task Manager and try to end processes for csrss.exe, SMSS.EXE, CSRSS.EXE (I've got 2 of these running) and LSASS.EXE, a dialog window pops up titled "Unable to Terminate Process" and the messages says "This is a critical system process. Task Manager cannot end this process."
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You cannot use Task Manager to do this since it cannot distinguish where the process is running from. You needed to end the one that I was questioning and not the one that would be running from the system32 folder. This can be don with HijackThis's built in Process Manager becaue it shows the full path to the process.

    Check for uninstall for this NTUser stuff too. If there are none we will have to use manual procedures.

    According to your HJT log the Lexmark process are not in a Lexmark folder. That is why search showed nothing. The files are:

    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\LEXPPS.EXE

    You may be able to delete them after booting in safe mode. One of them is an NT Service and may not be so easily deleted without first stopping and disabling the service.
     
  16. Vantage_Point

    Vantage_Point Private E-2

    Before I delete anything, do you want me to boot into safe mode and delete the following two files:

    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\LEXPPS.EXE

    There is no option to uninstall NTUser nor can I find a program. I searched for file names and came up with these three locations (all are DAT files):

    C:\WINDOWS\SYSTEM32\CONFIG\systemprofile
    C:\I386
    C:\Documents and Settings\All Users
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes delete the LEXBCES.EXE and LEXPPS.EXE files after booting to safe mode.

    DO NOT touch those DAT files! They are for your registry.
    The files we are questioning are given in the O23 lines in your HJT log. The files are:
    C:\WINDOWS\SYSTEM\DRIVER\ntuser.exe
    C:\WINDOWS\SYSTEM\DRIVER\ntsrv.exe

    While in safe mode see if you can rename these two files:
    ntuser.exe rename to ntuser.xxx
    ntsrv.exe rename to ntsrv.xxx

    I'm guessing you will not be able to do this rename as we may have to stop and the disable the NT services that are running.
     
  18. Vantage_Point

    Vantage_Point Private E-2

    The files LEXBCES.EXE and LEXPPS.EXE have been deleted, and I was able to rename ntuser.exe and ntsrv.exe to .xxx extensions.

    There are still two unfamiliar .exe files in the DRIVER folder:

    services.exe
    csrss.exe

    I no longer see ntuser or ntsrv in the Task manager. However,
    CSRSS.EXE, LSASS.EXE, and SMSS.EXE, WINLOGON.EXE are still present. Can we tell if these are authentic or if they are masking something else?
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your HijackThis log showed the following earlier:
    C:\WINDOWS\System32\smss.exe <--- valid Windows process
    C:\WINDOWS\system32\winlogon.exe <--- valid Windows process
    C:\WINDOWS\system32\services.exe <--- valid Windows process
    C:\WINDOWS\system32\lsass.exe <--- valid Windows process
    C:\WINDOWS\SYSTEM\DRIVER\ntuser.exe <-- what we were questioning
    C:\WINDOWS\SYSTEM\DRIVER\ntsrv.exe <-- what we were questioning
    C:\WINDOWS\system\driver\csrss.exe <--- not where it normally runs from so this is questionable. It should be in the system32 folder. Check to see if you have one in system32.
    C:\WINDOWS\system\driver\services.exe <--- not where it normally runs from -- should be in system32 and you did have one in system32.

    Is your PC running OK now with those NT files renamed? Post a HJT log.
     
  20. anontm

    anontm Private E-2

    hey guys, I just joined up here and been reading around the virus portion of this large forum. I have an information site that could help most of you out, it has info on the specific trojan/virus that you're infected with. as well as the location in the registry where you can manually delete it. also have software for download that detect & delete malicious scripts on your HD. my site does NOT have trojans on it, nor any for download, merely an information website. hope it's of some help, please let me know :) the URL is in my profile. good luck
     
  21. Vantage_Point

    Vantage_Point Private E-2

    The PC seems to be running fine. However the LEXBCES.EXE and LEPPS.EXE that I deleted seemed to screw up my Print Spooler, so I'm in conversation with Dell tech support to remedy that.

    CSRSS.EXE and SERVICES.EXE are both present in the system32 folder.

    HJT log from this morning is attached.
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Perhaps you had something related to LexMark afterall and did not know it?

    Try renaming:
    C:\WINDOWS\system\driver\csrss.exe to csrss.xxx
    C:\WINDOWS\system\driver\services.exe to services.xxx
     
  23. Vantage_Point

    Vantage_Point Private E-2

    That was easier than expected.

    C:\WINDOWS\system\driver\csrss.exe has been renamed to csrss.xxx
    and
    C:\WINDOWS\system\driver\services.exe has been renamed to services.xxx
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes that is easy! We do need to fix the 023 lines in your HJT log too:

    O23 - Service: NTBOOTMGR (NTBOOT) - Unknown owner - C:\WINDOWS\SYSTEM\DRIVER\ntuser.exe (file missing)
    O23 - Service: NTLOAD - Unknown owner - C:\WINDOWS\SYSTEM\DRIVER\ntsrv.exe (file missing)
    O23 - Service: NTSVCMGR - Unknown owner - C:\WINDOWS\SYSTEM\DRIVER\ntsrv.exe (file missing)

    But I want to wait to be sure you do not need these for something you do not know about.

    Is everything working OK! What about your print spooler problem?
     
  25. Vantage_Point

    Vantage_Point Private E-2

    I just needed to reinstall the print drivers. Things seem to be back to normal.

    How do I know if I need the 3 lines in the HJT log?
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's just give it a couple days! Running thru most of your normal daily processes with your PC for a reasonable amount of time should be a good indication of whether you need them or not. Right now they are harmless since we disabled them.

    Also go to the C:\WINDOWS\SYSTEM\DRIVER folder (using Windows Explorer) and right click on the files we renamed and select Properties then select the Version tab (if it has one) and then work you way thru the list of Item names and see if we can find out the company that made the programs. The files as we renamed them are:
    ntuser.xxx
    ntsrv.xxx
    csrss.xxx
    services.xxx
     
  27. Vantage_Point

    Vantage_Point Private E-2

    Sure. I'll give it a couple of days, but I got up this morning to 5 Zone Alarm high alerts of blocked port scans and 110 medium alerts of blocked access to various ports through the night. (I heightened all my alert logs since all this started.) Is this something that could be related to spyware or is it just commonplace?

    As for the files:

    ntuser.xxx - 11.5KB, file type "Panorama", Summary page was blank, no version

    ntsrv.xxx - 16.5KB, file type "Panorama", Summary page was blank, no version

    services.xxx - 80.5KB, file type "Panorama", Summary page was blank, no version

    csrss.xxx - 682KB, file type "Panorama", version 5.1.2600.0, Description: Client Server Runtime Process, Copyright: Microsoft Corporation

    Thanks again for all your help.
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Were the ZoneAlarm alerts incoming or outgoing? Incoming is probably not too unusal especially considering the fact that you had some problems here before and some bad sites may be looking for you. Some of these could also be form your ISP. Check out exactly where ZoneAlarm said they were from.

    Well the services.xxx file was definitely not from Microsoft!
    And that csrss.xxx file (even though it says Microsoft) is not from them either. The real csrss.exe file is in system32 and is only about 4k in size.

    Are things still running OK?
     
  29. Vantage_Point

    Vantage_Point Private E-2

    The Zone Alarm alerts were all incoming...If I recall they were from some place called ChinaNet I think. An IP address was given but there was also a disclaimer saying that it could have been a bogus address for someone trying to mask their true location.

    For some reason I can't see any logs before 1:30 pm today.

    That's good to know about the csrss.xxx file. I didn't realize someone could forge details like that. Thanks again.
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    So are things still running OK?
     
  31. Vantage_Point

    Vantage_Point Private E-2

    Sorry. Yes. Things seem to be working fine.
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Great!

    Can you put the ntuser.xxx file into a ZIP file and upload it here. I would like to look at it to see if I can find anymore out about it.
     
  33. Vantage_Point

    Vantage_Point Private E-2

    Here is the ntuser.xxx file. Hope it's helpful.
     

    Attached Files:

  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well I took a quick look at that file. I could not get any additional info on it. I even ran it thru more than a dozen virus scanners and they found not problems in it. I still have to wonder what this was doing on your PC and where it came from. But since you are not having any problems using your PC, it would still appear that it was not needed.
     
  35. Vantage_Point

    Vantage_Point Private E-2

    What about the "csrss.xxx" that was labled as a Microsoft .exe file? Any clue what that was or where it came from?
     
  36. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No but it is probably related to the rest of the items we renamed.

    This one is really strange! It really seems like it was part of some application that you would have installed and would be using. But why they would put a services.exe and a csrss.exe file there is strange. Are you sure the csrss.exe (now csrss.xxx) file was 682 kb in size?
     
  37. Vantage_Point

    Vantage_Point Private E-2

    csrss.xxx - Size: 682 KB (968,368 bytes)
    in folder: C:\WINDOWS\SYSTEM\DRIVER

    I'd be happy to send you the other 3 files we renamed if you've got the time to check them out.
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The csrss.exx file would be too larger to post here (even if zipped). It does not really matter too much right now. Have you tried running all of the applications on your PC to make sure they all work?
     
  39. Vantage_Point

    Vantage_Point Private E-2

    All programs have been working fine. But something else has cropped up. Let me know if I should start another post.

    My wife noticed something called "buddy" asking for permission to access the internet. She denied it each time, but she said another window would pop up in the task bar. It was titled "Aurora".

    I opened the task manager and found two .exe files that I'd never seen before. They were vuvqerckb.exe and azbnyi.exe.

    I could either close the Aurora box in the task bar by right-clicking and closing or I could close it from the task manager. There was no visible window on the desktop...just in the bar at the bottom of the screen.

    On the other hand, the azbnyi.exe file is more of a problem. When I end that process another one pops up with a seemingly random name. For instance: conqqhc.exe, hlimdyg.exe, yuivqk.exe, zakblkr.exe.....etc. I could close them all night and they'll keep coming back different.

    I've run all the standard cleaning tools again, and that cleaned up the about:blank problem that hit me today. Norton found something about "abetterinternet" as adware and deleted 2 files. I even went into msconfig and took two items off the startup menu that seemed new.

    One was just a blank line and the other was in C:\WINDOWS\SYSTEM32 named jwqhghg. After I unchecked it I rebooted and there was a different filename in its place...zakblkr. Coincidently, that is one of the names that crops up in the Task Manager when I try to end the process.

    I've got to have a heart-to-heart with my wife about what's going on, but in the meantime........any suggestions?
     
  40. Vantage_Point

    Vantage_Point Private E-2

    Spyware Doctor is dectecting cookies from "abetterinternet[2].txt" every couple of minutes. I delete them, but I'm not sure where they're coming from to stop them.
     
  41. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Have you re-run any of the cleaning steps. It may be a good idea to do that. And then post a new HJT log here so we can see what you have picked up.
     
  42. Vantage_Point

    Vantage_Point Private E-2

    Scans have been run and here is the HJT log from this evening. Something called "TODO <file description>" has been asking for internet access.
     

    Attached Files:

  43. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you configure the below three items?
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.woot.com/
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.woot.com/
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\about.htm


    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.

    c:\windows\system32\oivutrd.exe

    After killing all the above processes, click "Back".

    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: BolgerObj Class - {302A3240-4805-4a34-97D7-1645A0B08410} - C:\WINDOWS\Bolger.dll
    O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
    O4 - HKLM\..\Run: [ttrngt] c:\windows\system32\oivutrd.exe
    O15 - Trusted Zone: *.musicmatch.com (HKLM)

    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\Bolger.dll
    c:\windows\system32\oivutrd.exe

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now run Ccleaner (installed while running the READ ME FIRST).

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  44. Vantage_Point

    Vantage_Point Private E-2

    I did configure http://www.woot.com as my home page, but not C:\WINDOWS\about.htm.

    I tried to delete the file c:\windows\system32\oivutrd.exe, but it was not present when I when into the folder. So I could not "FIX" it in HJT or delete it while in safe mode.

    As you will see in the log, another file c:\windows\system32\eulzvbd.exe has taken it's place. I can close the process or kill it and it just gets replaced by another file.

    I'm still having issues with the Aurora pop-up. I'm noticing it pop up when I visit pages that require a login....mail, banking, forums, etc.
     

    Attached Files:

  45. Vantage_Point

    Vantage_Point Private E-2

    I looked through the last scan log of AdAware and found this. Any suggestions on where to go or how to get rid of it?

    VX2 Object Recognized!
    Type : RegValue
    Data :
    Category : Malware
    Comment :
    Rootkey : HKEY_CURRENT_USER
    Object : software\aurora
    Value : AUS3t5atusOfSInst
     
  46. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Have you run the VX2 Cleaner plugin for Ad-Aware? If not, please do so (it is in the READ ME FIRST).

    Please reboot your PC and post a new HJT log immediately after reboot. Do not kill any bad processes you notice and do not reboot after posting your log. Wait for a reply.
     
  47. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    By the way, you had the order wrong. That is not how I requested you to fix it.

    You first kill the process!
    Then you fix the line in HJT!
    Then you boot to safe mode to delete the file!

    This file may be renaming on each reboot so be sure to follow steps exactly as written.
     
  48. Vantage_Point

    Vantage_Point Private E-2

    I ran the VX2 Cleaner plugin and the result was "System Clean". After I ran the plugin, I rebooted and ran this HJT scan. Here are the results.

    I'll wait for further instructions before I reboot again.
     

    Attached Files:

  49. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The only item showing in your log is:

    O4 - HKLM\..\Run: [imxoch] c:\windows\system32\eulzvbd.exe

    Did you already terminate any strange or similarly names processes? Is this HJT log from immediately after a reboot?

    First just have HJT fix the above O4 line.
    Then reboot to safe mode and delete: c:\windows\system32\eulzvbd.exe
    Tell me if you have any problems finding that file. Also sort the Windows Explorer view by selecting a detailed view and then click on the Date column. Look for an other randomly named files that appear to be new. Tell me if you find any and what they are named.

    Reboot normal mode. Get a new HJT log. If the problem line is back (proabably with a different name), then run the steps below:

    Download the following: Generic Detection Tool - NT/2000/XP


    Extract all the files from the Generic Detection Tool into its own folder. And look for and run the find.bat file in that folder. Post the log it creates back here as an attachment. Make sure you wait long enough for it to complete. It will popup a notepad window with the log when finished.
     
  50. Vantage_Point

    Vantage_Point Private E-2

    The previous HJT log was immediately run after a reboot. I did not terminate any process before running it.

    As per your instructions, I ran HJT and fixed O4 - HKLM\..\Run: [imxoch] c:\windows\system32\eulzvbd.exe. When I rebooted in safe mode there was no file with that name in the folder, nor did I find any other "randomly" named files in there.

    After rebooting in normal mode, there was no sign of that file or any other with a random name in the folder..

    I do have msmsgs.exe running in my Task Manager, but I don't have the windows messenger program installed. Should this concern me? I've attached the General Detection Tool results for good measure.
     

    Attached Files:


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds