Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


rootkit.trace removal help

  • This topic is locked This topic is locked
3 replies to this topic

#1 eripj1


  • Members
  • 6 posts
  • Local time:08:22 AM

Posted 12 March 2009 - 08:52 PM

Please help me remove this security issue:

I have some kind of root kit in hkeylocalmachine/software/UAC rootkit.trace

I have scanned in safe mode with malwarebytes and it "removed it " but I rebooted in normal and it is still there everytime I reboot, please help me get rid of this nasty pest.

I have recently removed a host of other issues today but this is left over.

I have heard that this rootkit business is nasty and may require reformatting ( I read about it online) but...

please, I need this computer for school online and I would like to avoid reformatting if at all possible, last resort, this machine and my copy of XP is used( bought from reputable used computer store 3 years ago) have had little problems with it up until this week, I also have no backup or cd for it.

I have windows XP I run mcafee security center virus scan and firewall, window defender, windows firewall (thats on),malwarebytes (recently installed) which removed a host of other problems for me. I have also tried a few after market programs as well, none of them thrill me and here is my log:

DDS (Ver_09-02-01.01) - NTFSx86
Run by Owner at 19:26:49.43 on Thu 03/12/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1278.596 [GMT -6:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated)
FW: McAfee Personal Firewall *enabled*

============== Running Processes ===============

C:WINDOWSsystem32svchost -k DcomLaunch
C:Program FilesWindows DefenderMsMpEng.exe
C:WINDOWSSystem32svchost.exe -k netsvcs
C:Program FilesLavasoftAd-Awareaawservice.exe
C:Program FilesCommon FilesAppleMobile Device SupportbinAppleMobileDeviceService.exe
C:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe
C:WINDOWSSystem32svchost.exe -k HTTPFilter
c:program filescommon filesmcafeemnamcnasvc.exe
C:Program FilesMcAfeeVirusScanMcShield.exe
C:Program FilesMcAfeeMPFMPFSrv.exe
C:Program FilesCommon FilesNew BoundaryPrismXLPRISMXL.SYS
C:WINDOWSSystem32svchost.exe -k imgsvc
C:Program FilesRoxioEasy CD Creator 6AudioCentralRxMon.exe
C:Program FilesQuickTimeqttask.exe
C:Program FilesSiteAdvisor6172SiteAdv.exe
C:Program FilesWindows DefenderMSASCui.exe
C:Program FilesCommon FilesRealUpdate_OBrealsched.exe
C:Program FilesRoxioEasy CD Creator 6AudioCentralPlaylist.exe
C:Program FilesSpyNoMoreSNM.exe
C:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
C:Program FilesWindows Media PlayerWMPNSCFG.exe
C:Program FilesHewlett-PackardDigital Imagingbinhpohmr08.exe
C:Program FilesHewlett-PackardDigital Imagingbinhpotdd01.exe
C:Program FilesMicrosoft OfficeOffice1033OLFSNT40.EXE
C:Program FilesHewlett-PackardDigital Imagingbinhpoevm08.exe
C:Program FilesInternet Exploreriexplore.exe
C:Program FilesInternet Exploreriexplore.exe
C:Program FilesInternet Exploreriexplore.exe
C:Program FilesInternet Exploreriexplore.exe
C:Program FilesInternet Exploreriexplore.exe
C:Program FilesInternet Exploreriexplore.exe
C:Documents and SettingsOwnerDesktopdds.scr

============== Pseudo HJT Report ===============

uSearch Bar = hxxp://searchmsn.com/spbasic.htm
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uStart Page = hxxp://www.charter.net/
uInternet Settings,ProxyOverride =
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:program filesadobeacrobat 7.0activexAcroIEHelper.dll
BHO: {089fd14d-132b-48fc-8861-0048ae113215} - c:program filessiteadvisor6253SiteAdv.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:program filesrealrealplayerrpbrowserrecordplugin.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:program filesmcafeevirusscanscriptsn.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:program filesgooglegoogletoolbar1.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:program filesgooglegoogletoolbarnotifier5.0.926.3450swg.dll
TB: McAfee SiteAdvisor: {0bf43445-2f28-4351-9252-17fe6e806aa0} - c:program filessiteadvisor6253SiteAdv.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:program filesgooglegoogletoolbar1.dll
uRun: [swg] c:program filesgooglegoogletoolbarnotifierGoogleToolbarNotifier.exe
uRun: [ctfmon.exe] c:windowssystem32ctfmon.exe
uRun: [WMPNSCFG] c:program fileswindows media playerWMPNSCFG.exe
mRun: [IgfxTray] c:windowssystem32igfxtray.exe
mRun: [HotKeysCmds] c:windowssystem32hkcmd.exe
mRun: [RoxioEngineUtility] "c:program filescommon filesroxio sharedsystemEngUtil.exe"
mRun: [RoxioAudioCentral] "c:program filesroxioeasy cd creator 6audiocentralRxMon.exe"
mRun: [QuickTime Task] "c:program filesquicktimeqttask.exe" -atboottime
mRun: [SiteAdvisor] c:program filessiteadvisor6172SiteAdv.exe
mRun: [Windows Defender] "c:program fileswindows defenderMSASCui.exe" -hide
mRun: [mcagent_exe] c:program filesmcafee.comagentmcagent.exe /runkey
mRun: [masqform.exe] c:program filespureedgeviewer 6.1masqform.exe /RegServer -UpdateCurrentUser
mRun: [TkBellExe] "c:program filescommon filesrealupdate_obrealsched.exe" -osboot
mRun: [SNM] c:program filesspynomoreSNM.exe /startup
StartupFolder: c:documents and settingsownerstart menuprogramsstartuphpothb07.dat
StartupFolder: c:documents and settingsownerstart menuprogramsstartuphpothb07.tif
StartupFolder: c:docume~1alluse~1startm~1programsstartupadober~1.lnk - c:program filesadobeacrobat 7.0readerreader_sl.exe
StartupFolder: c:docume~1alluse~1startm~1programsstartuphppsc1~1.lnk - c:program fileshewlett-packarddigital imagingbinhpohmr08.exe
StartupFolder: c:docume~1alluse~1startm~1programsstartuphpoddt~1.lnk - c:program fileshewlett-packarddigital imagingbinhpotdd01.exe
StartupFolder: c:docume~1alluse~1startm~1programsstartupmicros~1.lnk - c:program filesmicrosoft officeofficeOSA9.EXE
StartupFolder: c:docume~1alluse~1startm~1programsstartupsymant~1.lnk - c:program filesmicrosoft officeoffice1033OLFSNT40.EXE
uPolicies-explorer: NoStartMenuEjectPC = 1 (0x1)
uPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%Network Diagnosticxpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:program filesmessengermsmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - c:windowssystem32msjava.dll
Trusted Zone: internet
Trusted Zone: mcafee.com
Trusted Zone: microsoft.com*.update
Trusted Zone: microsoft.comupdate
Trusted Zone: windowsupdate.comdownload
DPF: Microsoft XML Parser for Java - file://c:windowsjavaclassesxmldso.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {3DC2E31C-371A-4BD3-9A27-CDF57CE604CF} - hxxp://moneycentral.msn.com/cabs/pmupd806.exe
DPF: {41F17733-B041-4099-A042-B518BB6A408C} - hxxp://a1540.g.akamai.net/7/1540/52/20031216/qtinstall.info.apple.com/mickey/us/win/QuickTimeInstaller.exe
DPF: {4B48D5DF-9021-45F7-A240-60304302A215} - hxxp://download.microsoft.com/download/5/c/2/5c2fc4b7-3875-4eec-946b-ffe15472cabc/WebCleaner.cab
DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - hxxp://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase6662.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1137084310843
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1145441664703
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} - hxxp://www.crucial.com/controls/cpcScanner.cab
DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - hxxp://download.mcafee.com/molbin/shared/mcgdmgr/1,0,0,26/mcgdmgr.cab
DPF: {CAFEEFAC-0014-0002-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {EB387D2F-E27B-4D36-979E-847D1036C65D} - hxxp://h30043.www3.hp.com/aio/en/check/qdiagh.cab?326
Filter: text/html - {03c8f15e-1a45-494d-b647-91ac84387934} - c:windowssystem32mst123.dll
Handler: siteadvisor - {3A5DC592-7723-4EAA-9EE6-AF4222BCF879} - c:program filessiteadvisor6253SiteAdv.dll
Notify: igfxcui - igfxsrvc.dll
AppInit_DLLs: c:progra~1googlegoogle~1goec62~1.dll c:windowssystem32wivatema.dll c:windowssystem32kafunero.dll c:windowssystem32fuhayuwu.dll c:windowssystem32begorupe.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:windowssystem32WPDShServiceObj.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:progra~1wifd1f~1MpShHook.dll
LSA: Notification Packages = scecli c:windowssystem32wivatema.dll c:windowssystem32kafunero.dll

============= SERVICES / DRIVERS ===============

R1 mfehidk;McAfee Inc. mfehidk;c:windowssystem32driversmfehidk.sys [2006-8-19 201320]
R2 aawservice;Lavasoft Ad-Aware Service;c:program fileslavasoftad-awareaawservice.exe [2008-9-10 611664]
R2 McProxy;McAfee Proxy Service;c:progra~1common~1mcafeemcproxymcproxy.exe [2007-8-1 359248]
R2 McShield;McAfee Real-time Scanner;c:program filesmcafeevirusscanMcshield.exe [2006-8-19 144704]
R2 WinDefend;Windows Defender;c:program fileswindows defenderMsMpEng.exe [2006-11-3 13592]
R3 McSysmon;McAfee SystemGuards;c:progra~1mcafeeviruss~1mcsysmon.exe [2006-8-19 695624]
R3 mfeavfk;McAfee Inc. mfeavfk;c:windowssystem32driversmfeavfk.sys [2006-8-19 79304]
R3 mfebopk;McAfee Inc. mfebopk;c:windowssystem32driversmfebopk.sys [2006-8-19 35240]
R3 mfesmfk;McAfee Inc. mfesmfk;c:windowssystem32driversmfesmfk.sys [2006-8-19 40488]
R3 USB_NDISXP;RCA USB Digital Cable Modem Driver;c:windowssystem32driversNetRcaCmXP.sys [2008-10-11 14336]
S1 Start1Driver;Start1Driver; [x]
S2 Start2Driver;Start2Driver; [x]
S3 BEFCMU10V4XP;Linksys BEFCMU10 ver. 4 Cable Modem;c:windowssystem32driversBEFCMU10V4XP.sys [2006-4-7 14336]
S3 IKFileSec;File Security Driver;c:windowssystem32driversikfilesec.sys [2008-12-16 40840]
S3 IKSysFlt;System Filter Driver;c:windowssystem32driversiksysflt.sys [2008-12-16 66952]
S3 IKSysSec;System Security Driver;c:windowssystem32driversiksyssec.sys [2008-12-16 81288]
S3 mferkdk;McAfee Inc. mferkdk;c:windowssystem32driversmferkdk.sys [2006-8-19 33832]
S3 sdAuxService;PC Tools Auxiliary Service;c:program filesspyware doctorpctsAuxs.exe [2008-12-16 356920]
S3 sdCoreService;PC Tools Security Service;c:program filesspyware doctorpctsSvc.exe [2008-12-16 1079176]

=============== Created Last 30 ================

2009-03-11 10:07 <DIR> --d----- c:docume~1ownerapplic~1Malwarebytes
2009-03-11 01:59 15,504 a------- c:windowssystem32driversmbam.sys
2009-03-11 01:59 38,496 a------- c:windowssystem32driversmbamswissarmy.sys
2009-03-11 01:59 <DIR> --d----- c:docume~1alluse~1applic~1Malwarebytes
2009-03-11 01:33 <DIR> --d----- c:program filesMalwarebytes' Anti-Malware
2009-03-09 16:25 274,432 a------- c:windowsTLCUninstall.exe
2009-03-09 16:24 <DIR> --d----- c:program filesThe Learning Company
2009-03-09 16:24 0 a------- c:windowsSETUP32.INI
2009-03-08 17:51 33,280 a------- c:windowssyssvc.exe
2009-02-27 04:40 <DIR> --d----- c:program filesCommon

==================== Find3M ====================

2009-02-09 05:13 1,846,784 a------- c:windowssystem32win32k.sys
2008-12-20 17:15 826,368 a------- c:windowssystem32wininet.dll
2008-12-17 20:22 61,440 a------- c:windowssystem32ScanAtStartup.dll
2008-08-24 20:18 164 a---h--- c:documents and settingsall usershpothb07.dat
2008-08-24 20:17 154 a---h--- c:program fileshpothb07.dat
2008-08-24 17:42 322 a---h--- c:documents and settingsownerhpothb07.dat
2008-08-24 17:41 263 a---h--- c:program fileshpothb07.tif
2008-08-24 17:37 356 a---h--- c:docume~1ownerapplic~1hpothb07.dat
2006-05-30 01:25 1,542,039 a------- c:docume~1ownerapplic~1Install.dat
2006-05-06 11:42 774,144 a------- c:program filesRngInterstitial.dll
1998-12-08 20:53 186,368 a------- c:program filescommon filesIRAREG.DLL
1998-12-08 20:53 99,840 a------- c:program filescommon filesIRAABOUT.DLL
1998-12-08 20:53 70,144 a------- c:program filescommon filesIRAMDMTR.DLL
1998-12-08 20:53 48,640 a------- c:program filescommon filesIRALPTTR.DLL
1998-12-08 20:53 31,744 a------- c:program filescommon filesIRAWEBTR.DLL
1998-12-08 20:53 17,920 a------- c:program filescommon filesIRASRIAL.DLL
2008-09-15 12:18 4,096 a--sh--- c:windowssystem32hebiyeva.dll
2008-05-19 21:43 32,768 a--sh--- c:windowssystem32configsystemprofilelocal settingshistoryhistory.ie5mshist012008051920080520index.dat

============= FINISH: 19:27:26.90 ===============

thanks so much,

forgot to attach other log here it is..

thanks Eripj1

Attached Files

Edited by boopme, 12 March 2009 - 09:12 PM.

BC AdBot (Login to Remove)


#2 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:10:22 AM

Posted 20 March 2009 - 07:30 PM


If you don't want to format that's fine but you should be warned of what infection you have right now.

Posted ImageRootkit Threat

Unfortunatly One or more of the identified infections is a Rootkit/backdoor trojan.

IMPORTANT NOTE: Rootkits and backdoor Trojans are very dangerous because they use advanced techniques (backdoors) as a means of accessing a computer system that bypasses security mechanisms and steal sensitive information which they send back to the hacker. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoor Trojans and rootkits as part of an exploit to gain unauthorized access to a computer and take control of it without your knowledge.

If your computer was used for online banking, has credit card information or other sensitive data on it, you should immediately disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the rootkit has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because this malware has been removed the computer is now secure. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy.

Install Recovery Console and Run ComboFix

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
Link 3
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.

Note: Please Do NOT mouseclick combofix's window while its running because it may call it to stall.

Download and Run Scan with GMER

We will use GMER to scan for rootkits.
  • Double-click on Gmer.exe to start the program.
  • Allow the gmer.sys driver to load if asked.
  • If it gives you a warning at program start about rootkit activity and asks if you want to run a scan...click NO.
  • Click the >>>
  • Click on Settings, then check the first five settings:
    • System Protection and Tracing
    • Processes
    • Save created processes to the log
    • Drivers
    • Save loaded drivers to the log
  • You will be prompted to restart your computer. Please do so.
  • After the reboot, run Gmer again and click on the Rootkit tab.[list]
  • Look at the right hand side (under Files) and uncheck all drives with the exception of your C drive.
  • Make sure all other boxes on the right of the screen are checked, EXCEPT for Show All.
  • Click on the Scan and wait for the scan to finish.
    Note: Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while this scan completes. Also do not use your computer during the scan. You will know that the scan is done when the Stop buttons turns back to Scan.
  • When completed, click on the Copy button and right-click on your Desktop, choose New>Text document. Once the file is created, open it and right-click again and choose Paste. Save the file as gmer.txt and copy the information in your next reply.
If GMER doesn't work in Normal Mode try running it in Safe Mode

Important!:Please do not select the Show all checkbox during the scan..

With Regards,
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#3 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:10:22 AM

Posted 23 March 2009 - 03:24 PM


Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 5-7 days the topic will need to be closed.

Thanks for understanding. :thumbup2:

With Regards,
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#4 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:10:22 AM

Posted 25 March 2009 - 02:34 PM


Due to Lack of feedback, this topic is now Closed.

If you need this topic reopened, please Send Me a Message. In your message please include the address of this thread in your request.
This applies only to the original topic starter.

Everyone else please start a new topic in the Hijackthis-Malware Removal forum.

With Regards,

Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users