Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google redirect and win32Trojan.tdss


  • Please log in to reply
36 replies to this topic

#1 Tincan01

Tincan01

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 16 July 2009 - 02:35 AM

Hi,

i seem to have cought this virus/malaware the other day and im having real problems getting rid of it. AVG and Adaware both remove said virus but upon reboot the virus is reinstalled. Having read a few post within this forum i have tried the ComboFix solution by downloading and renaming the program Combo-Fix.exe and disabling AVG and AdAware and also my firewall(whilst being disconnected from the internet by means of pulling the plug). The program runs ok but before it starts its run i get a BSOD and a total computer restart. i have also tried downloading from another computer and transfering it to the infected computer with no luck.

Is there anything else i could try or is it going to need a full format and reinstall?

If you need any further info please feel free to ask,

Thanks for the help

Mod Edit: Topic moved to more appropriate forum~ TMacK

Edited by TMacK, 16 July 2009 - 02:52 AM.


BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 17 July 2009 - 01:07 AM

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 17 July 2009 - 02:18 AM

Hi thanks for the advice,

i managed to run Malwarebytes last night, i have included the log below. i hade difficulty in removing

C:\WINDOWS\system32\uacinit.dll (Trojan.Agent)

Malware asked to reboot which i did but the computer froze on shutdown had to do a manual restart, upon reboot a popup came up saying that mdam.exe could not be found. i had to rename the file to get it to launch. i have also ran a dds scan and a hijackthis scan which i can upload if you wish. i was unable to ran the update as my internet is not working at the moment not sure when its getting fixed.

Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 3

17/07/2009 00:14:40
mbam-log-2009-07-17 (00-14-40).txt

Scan type: Full Scan (C:\|E:\|)
Objects scanned: 291019
Time elapsed: 59 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 13

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Cognac (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ColdWare (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\all users\application data\16181094\16181094.exe (Rogue.SystemSecurity) -> Quarantined and deleted successfully.
c:\documents and settings\matthew russell\local settings\Temp\awnmcorxse.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\matthew russell\local settings\Temp\db.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\documents and settings\matthew russell\local settings\Temp\msrcnowxea.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\matthew russell\local settings\Temp\tfhs3xrjdr6djkrserz44.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\sopidkc.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\tpsaxyd.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\comsa32.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msxml71.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{783AF354-B514-42d6-970E-3E8BF0A5279C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wiawow32.sys (Backdoor.Bot) -> Quarantined and deleted successfully.

i am currently at work so i wont be able to run any scans until i get home this evening

Thanks

#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 17 July 2009 - 02:51 AM

Reboot, run another Malwarebytes scan and post the new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 18 July 2009 - 09:21 AM

Ok i rebooted computer and rescaned using malware as requested here is the log:

Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 3

18/07/2009 15:02:18
mbam-log-2009-07-18 (15-02-18).txt

Scan type: Quick Scan
Objects scanned: 113148
Time elapsed: 3 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.


Upon reboot i rescanned again to check to see if it worked and here is the log:


Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 3

18/07/2009 15:14:52
mbam-log-2009-07-18 (15-14-52).txt

Scan type: Quick Scan
Objects scanned: 113145
Time elapsed: 3 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.


As u can see i still seem to be having a problem removing this single file :thumbsup:

#6 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 18 July 2009 - 04:18 PM

Please download RootRepeal Rootkit Detector and save it to your Desktop.

* Close all programs and temporarily disable your anti-virus, Firewall and any anti-malware real-time protection before performing a scan.
* Click this link to see a list of such programs and how to disable them.
* Create a new folder on your hard drive called RootRepeal (C:\RootRepeal) and extract (unzip) RootRepeal.zip. (click here if you're not sure how to do this. Vista users refer to this link.)
* Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the Files tab, then click the Scan button.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Note: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#7 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 18 July 2009 - 04:44 PM

sorry but do you have another link to the download. The one you posted doesnt seem to work. i get the following msg on the website

The bandwidth or page view limit for this site has been exceeded and the page cannot be viewed at this time. Once the site is below the limit, it will once again begin serving as normal.

this is from a seperate machine. not the infected one.

Thanks

#8 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 18 July 2009 - 05:03 PM

Ok sorry i managed to find an alternative download.

i extracted it to the folder specified and executed the file but i get a error which reads:

Could not read the boot sector. Try adjusting the Disk Access level in the options dialog.

So i tried all the options and it still says the same error. this is both in safe mode and normal.

Is this normal? If not what should i try next?

Thanks.

Edited by Tincan01, 18 July 2009 - 05:28 PM.


#9 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 18 July 2009 - 06:52 PM

Let's try a different scan:

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
  • Make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#10 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 19 July 2009 - 08:13 AM

Ok here is the log from Sophos, none of the objects found were tagged as Removable: Yes (clean up recommended) are marked for removal by default. so i just closed the program:


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 19/07/2009 at 01:03:32
User "Matthew Russell" on computer "STUDENT-BEQP5P7"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x100 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\UAC
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\UACd.sys
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\UACd.sys
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default WaveOut Device
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012007101320071014
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012007101420071015
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Documents and Settings\Matthew Russell\Local Settings\Temp\UACa94f.tmp
Hidden: file C:\Documents and Settings\All Users\Application Data\Lavasoft\Ad-Aware\Quarantine\uacbpixmuerfoaxxewte.dll.f376ca4a672e76102b96ef6c3247e0.aawqff
Hidden: file C:\WINDOWS\system32\uacinit.dll
Hidden: file C:\WINDOWS\system32\UACbwwxnpfjpuxmftjmy.dat
Hidden: file C:\WINDOWS\system32\UACfjtkhshghtfjtseim.db
Hidden: file C:\WINDOWS\system32\UACbpixmuerfoaxxewte.dll
Hidden: file C:\WINDOWS\system32\UACorbwogvdevmwqltiv.dll
Hidden: file C:\WINDOWS\system32\drivers\UACipxdulrdkridmixgr.sys
Hidden: file C:\WINDOWS\system32\UACyqhxrbpptpepobwxy.dll
Hidden: file C:\WINDOWS\system32\UACvinhjlkmraihucrmr.dll
Hidden: file C:\WINDOWS\system32\UACyqxfmqipmkbsiuyav.dll
Info: Starting disk scan of E: (FAT).
Info: Starting disk scan of H: (FAT).
Stopped logging on 19/07/2009 at 02:39:22

What is my next step?

#11 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 19 July 2009 - 04:17 PM

Rerun Sophos and remove this file:

C:\WINDOWS\system32\drivers\UACipxdulrdkridmixgr.sys

Then reboot and run another Malwarebytes scan.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#12 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 20 July 2009 - 04:53 AM

ok as requested, i deleted the file and rerun Malawarebytes. Here is the Log:

Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 3

20/07/2009 10:47:24
mbam-log-2009-07-20 (10-47-24).txt

Scan type: Quick Scan
Objects scanned: 113105
Time elapsed: 4 minute(s), 33 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\UACbpixmuerfoaxxewte.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\UACvinhjlkmraihucrmr.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\UACyqhxrbpptpepobwxy.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\UACorbwogvdevmwqltiv.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\UACyqxfmqipmkbsiuyav.dll (Trojan.Agent) -> Quarantined and deleted successfully.


What next?

PS: i can now run Rootrepeal fully without any problems.

Thanks

Edited by Tincan01, 20 July 2009 - 04:56 AM.


#13 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 20 July 2009 - 04:03 PM

Reboot, run another Malwarebytes quick-scan and post the new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#14 Tincan01

Tincan01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 20 July 2009 - 05:33 PM

Ok as requested, here is the latest malawarbytes log:

Malwarebytes' Anti-Malware 1.39
Database version: 2421
Windows 5.1.2600 Service Pack 3

20/07/2009 23:27:45
mbam-log-2009-07-20 (23-27-45).txt

Scan type: Quick Scan
Objects scanned: 113086
Time elapsed: 3 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Looking better?

Whats next?

Thanks

#15 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:10 AM

Posted 20 July 2009 - 05:47 PM

Looks good. If you’re clean, you should create a new Restore Point to prevent possible re-infection from an old one.

Go Start > Programs > Accessories > System Tools and click System Restore. Choose the radio button marked Create a Restore Point on the first screen then click Next. Give the Restore Point a name and then click Create. Then use Disk Cleanup to remove all but the most recently created Restore Point. Go Start > Run and type: "Cleanmgr" (without the quotes). Click Ok > More Options tab > Clean Up in the System Restore section to remove all previous restore points except the newly created one.

Also, go Start > Control Panel and double-click Add or Remove Programs. Post back and report any Java entries that you have.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users