Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Mirar


  • Please log in to reply
29 replies to this topic

#1 lsan

lsan

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 27 December 2008 - 05:19 PM

When I boot in normal mode I get a Data Execution Prevention window. All the folders on the desktop are gone, including the windows start taskbar. I could only see my wallpaper. I ran malwarebytes, spydoctor, spysweeper, avg etc. It got rid of the TDSS and vundo but I'm stuck with Mirar. It won't remove when I go to ADD/Remove programs. Just get a window that pops up saying getmirar.com.

computer works ok in safe mode, but programs open very slowly. Here's the HijackThis log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:16, on 2008-12-27
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\WINDOWS\system32\taskmgr.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wscntfy.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://my.netzero.net/s/search?r=minisearch
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.netzero.net/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=193.63.75.19:3127
R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\NetZero\SearchEnh1.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL (file missing)
O2 - BHO: (no name) - {EF833112-E7C0-4438-AA95-65F1F444476D} - (no file)
O3 - Toolbar: NetZero DSL - {8E613EAF-E16E-415C-BD39-F71D6A3B5518} - C:\Program Files\NetZero DSL\Toolbar.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL (file missing)
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [PAC7302_Monitor] C:\WINDOWS\PixArt\PAC7302\Monitor.exe
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKLM\..\Run: [SpySweeper] C:\Program Files\Webroot\WebrootSecurity\SpySweeperUI.exe /startintray
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [SpyHunter Security Suite] C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter3.exe
O4 - HKLM\..\RunOnce: [SDFix] C:\SDFix\RunThis.bat /second
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKLM\..\RunOnce: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKLM\..\RunOnce: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" /autocheck
O4 - HKLM\..\RunOnce: [Cleanup] C:\cleanup.exe
O4 - HKLM\..\RunOnce: [InnoSetupRegFile.0000000001] "C:\WINDOWS\is-1AI22.exe" /REG
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: NCProTray.lnk = ?
O8 - Extra context menu item: Display All Images with Full Quality - res://C:\PROGRA~1\NetZero\qsacc\appres.dll/228
O8 - Extra context menu item: Display Image with Full Quality - res://C:\PROGRA~1\NetZero\qsacc\appres.dll/227
O8 - Extra context menu item: Download all by Net Transport - C:\Program Files\Xi\NetTransport 2\NTAddList.html
O8 - Extra context menu item: Download by Net Transport - C:\Program Files\Xi\NetTransport 2\NTAddLink.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O18 - Protocol: schmap-help - (no CLSID) - (no file)
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: qawsgm.dll,avgrsstx.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: efqmqwns - efqmqwns.dll (file missing)
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Adobe LM Service - Unknown owner - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
O23 - Service: Gmsilhvviw - GEAR Software Inc. - (no file)
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. (www.webroot.com) - C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe
O23 - Service: Webroot Client Service (WRConsumerService) - Webroot Software, Inc. - C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe

--
End of file - 8157 bytes

BC AdBot (Login to Remove)

 


#2 KoanYorel

KoanYorel

    Bleepin' Conundrum


  • Members
  • 19,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:65 miles due East of the "Logic Free Zone", in Md, USA
  • Local time:06:53 PM

Posted 07 January 2009 - 03:40 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine. If you have not done so, include a description of your problem, along with any steps you may have performed so far.

Upon completing the steps below a staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results, click no to the Optional_Scan
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet. Information on A/V control HERE

This may seem repetitive, but we need to see the current status of your system, please.
Please Hold on it may take us a day or so to get back with you.

R,
K
The only easy day was yesterday.

...some do, some don't; some will, some won't (WR)

#3 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 07 January 2009 - 09:46 PM

hi,

i haven't touched my infected computer since i uploaded the hijack this file. i'll try to get that scan in tonight, if not by tomorrow night. thanks so much for responding!

#4 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 08 January 2009 - 12:17 AM

Here are the requested files. I hope I followed the instructions correctly. If not, I'll run it again. I think it ran the scan. I'm not sure. thanks.

Attached Files


Edited by lsan, 08 January 2009 - 12:18 AM.


#5 Rosty

Rosty

    Skydive junkie


  • Malware Response Team
  • 1,220 posts
  • OFFLINE
  •  
  • Local time:12:53 AM

Posted 08 January 2009 - 02:58 AM

Hi,

open HijackThis, click do a scan only and place a check next to the following entries:

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\NetZero\SearchEnh1.dll
O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL (file missing)
O2 - BHO: (no name) - {EF833112-E7C0-4438-AA95-65F1F444476D} - (no file)
O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL (file missing)
O4 - HKLM\..\RunOnce: [SDFix] C:\SDFix\RunThis.bat /second
O4 - HKLM\..\RunOnce: [InnoSetupRegFile.0000000001] "C:\WINDOWS\is-1AI22.exe" /REG
O18 - Protocol: schmap-help - (no CLSID) - (no file)
O20 - AppInit_DLLs: qawsgm.dll,avgrsstx.dll
O20 - Winlogon Notify: efqmqwns - efqmqwns.dll (file missing)
O23 - Service: Gmsilhvviw - GEAR Software Inc. - (no file)

Close all other windows and browsers, except HijackThis, and click Fix Checked. Close HijackThis.

Please download Malwarebytes' Anti-Malware to your desktop.

Double-click mbam-setup.exe and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select Perform full scan (Full scan is optional. According to the program's creator Quick Scan will do just fine.).
Click Scan.
When the scan is complete, click OK, then Show Results to view the results.

If Malware is found...
Be sure that everything is checked, and click Remove Selected.
When completed, a log will open in Notepad.
Please save it to your desktop.

NOTE: Logs can be retrieved at a later date from the Malwarebytes' Anti-Malware main screen:

Launch Malwarebytes' Anti-Malware.
Click the Logs tab.
Double-click log-mm.dd.yyyy [xxxxxx].txt.

In your next reply, please include:
-The log from Malwarebytes' Anti-Malware.
- A new HijackThis log
- How things are running
Posted Image
Proud member of ASAP since 2007

#6 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 08 January 2009 - 10:44 PM

Hi,

Ok followed all instructions. I noticed that although hijack this removed these files, they came back:

O18 - Protocol: schmap-help - (no CLSID) - (no file)
O23 - Service: Gmsilhvviw - GEAR Software Inc. - (no file)


The computer is still acting the same--no folders, start taskbar etc. Just the wallpaper. It did take forever to shut down though--maybe virus was reinstalling the bad files. I had to manually shut it down. I did have Zlob on my system, that's what Spysweeper said a month ago. Also, i ran a Quick Scan with Malwarebytes. If u prefer the full scan let me know. I ran the full scan of Malwarebytes back in December but it didn't detect the mirar...many thanks

Attached Files


Edited by lsan, 08 January 2009 - 10:46 PM.


#7 Rosty

Rosty

    Skydive junkie


  • Malware Response Team
  • 1,220 posts
  • OFFLINE
  •  
  • Local time:12:53 AM

Posted 09 January 2009 - 02:16 AM

Download ComboFix from Here or Here to your Desktop.
  • Double click combofix.exe and follow the prompts.
  • When finished, it shall produce a log for you. Post that log and a HiJackthis log in your next reply
Note: Do not mouseclick combofix's window while its running. That may cause it to stall
Posted Image
Proud member of ASAP since 2007

#8 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 09 January 2009 - 09:40 PM

ok. I ran combofix, it said it deleted some files win32.ping.dll it ran for less than 10 min, restarted but nothing happened. Everything stayed the same. It didn't do a log file after rebooting. I was still connected to the internet while combofix ran if that helps. I ran hijackthis and uploaded the log.

also, spybot ran and under settings, startup programs there are several dll files that seem suspicious. Oh, the computer shows the folders, start taskbar on my desktop in safemode. The malicious files don't seem to be running while in safe mode--only in normal mode. in normal mode i'm pressing cntr-alt-delete to open a window and run programs.

should i run combofix again?

thanks

Attached Files


Edited by lsan, 09 January 2009 - 09:43 PM.


#9 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 09 January 2009 - 10:24 PM

ran combfix again, here is the logfile

Attached Files

  • Attached File  log.txt   15.05KB   9 downloads


#10 Rosty

Rosty

    Skydive junkie


  • Malware Response Team
  • 1,220 posts
  • OFFLINE
  •  
  • Local time:12:53 AM

Posted 10 January 2009 - 04:04 PM

Hi,

can you please Visit Microsoft's Windows Update Site and download and install all
the update's, especailly SP3. Reboot your system and do another scan with Combofix. Please post that log here for me.
Posted Image
Proud member of ASAP since 2007

#11 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 10 January 2009 - 08:06 PM

ok, downloaded the windows updates and it fixed a lot of things. I can see everything on my desktop again! Folders, start taskbar, etc. The only thing that keeps popping up now is this Data Execution Prevention Window "Generic Host Process for Win 32 Services" Every time I press ok it still pops up.

ran combofix again here is the log. I also pasted the names of the 2 files that show up on the data exec window--it's at the top of the combofix file. Mirar is still there. many thanks!

Attached Files

  • Attached File  log2.txt   414.13KB   5 downloads


#12 Rosty

Rosty

    Skydive junkie


  • Malware Response Team
  • 1,220 posts
  • OFFLINE
  •  
  • Local time:12:53 AM

Posted 11 January 2009 - 02:13 AM

Hi,

so things are running better already. Let's check for the next!!

Boot into Safe Mode:
Restart your computer and immediately begin tapping the F8 key on your keyboard.
If done right a Windows Advanced Options menu will appear.
Select the Safe Mode option and press Enter.

Please remove these files using Windows Explorer(if present):

C:\DOCUME~1\lsan~1\LOCALS~1\Temp\WERf2fa.dir00\svchost.exe.mdmp <-- file
C:\DOCUME~1\lsan~1\LOCALS~1\Temp\WERf2fa.dir00\appcompat.txt <-- file

Please perform another scan with MBAM and post that log here for me.
Posted Image
Proud member of ASAP since 2007

#13 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 11 January 2009 - 12:38 PM

hi,

i tried finding the files but couldn't find them. I used the search feature and then manually tried to look for the files. I don't know how to find a location with this "DOCUME~1" name. the search couldn't find this directory, WERf2fa.dir00, but it found these two WERdf2e.dir00, WER5cf7.dir00. maybe it's hidden or remote? I'm including their location at the top of the malwarebytes report.

ran the malwarebytes quick scan, here it is. Btw, i did run spyhunter a while back and it said i had the Zlob trojan. I must have been infected with a 'bundle' of malware, zlob, mirar, etc. many thanks.

Attached Files


Edited by lsan, 11 January 2009 - 12:42 PM.


#14 Rosty

Rosty

    Skydive junkie


  • Malware Response Team
  • 1,220 posts
  • OFFLINE
  •  
  • Local time:12:53 AM

Posted 12 January 2009 - 01:53 PM

hi,

i tried finding the files but couldn't find them. I used the search feature and then manually tried to look for the files. I don't know how to find a location with this "DOCUME~1" name. the search couldn't find this directory, WERf2fa.dir00, but it found these two WERdf2e.dir00, WER5cf7.dir00. maybe it's hidden or remote? I'm including their location at the top of the malwarebytes report.

ran the malwarebytes quick scan, here it is. Btw, i did run spyhunter a while back and it said i had the Zlob trojan. I must have been infected with a 'bundle' of malware, zlob, mirar, etc. many thanks.


Hi,

the location with this "DOCUME~1" name is the "documents and settings" folder! Name is lsan, Temp is Temporary.

Can you do another search wit this info please? Your MBAM log is clean.
Posted Image
Proud member of ASAP since 2007

#15 lsan

lsan
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:02:53 PM

Posted 12 January 2009 - 10:05 PM

oh, ok. In that case i do believe i went into the doc/settings folder and found the other two files mentioned before. I didn't see the folder containing apps.text or the other one. Maybe I should delete these other files? many thanks.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users