noupjaf Posted March 7, 2015 Report Share Posted March 7, 2015 I currently have Emsisoft on my Computer (Vista Home Premium 32 Bit) but an having problems with my Windows Vista applications. 1)I keep getting Windows Command prompts being closed, 2) Multiple "Default IME" showing in Task Manager 3) Multiple "Internet Explorer" in Task manager 4) Emsisoft Full scan will not completely run to conclusion. 5)The computer is running extremely slow. I attached the Text files your website requested from Emsisoft Emergency Kit and Farbar Recovery Scan Tool. (I had to download them to a USB flash drive because my computer was running too slow. a2scan_150306-225258.txt Addition.txt FRST.txt Shortcut.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 9, 2015 Report Share Posted March 9, 2015 Do the following: Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply. If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer. Download Junkware Removal Tool and save it on your desktop. Shut down your anti-virus, anti-spyware, and firewall software now to avoid potential conflicts. Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click it and select Run as administrator. The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications. On completion, a log is saved to your desktop and will automatically open. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply. Copy the below code to Notepad; Save As fixlist.txt to your Desktop. HKLM\...\Run: [PackageTracer EPM Support] => "C:\PROGRA~1\PACKAG~2\bar\1.bin\69medint.exe" T8EPMSUP.DLL,S HKLM\...\Run: [PackageTracer AppIntegrator 32-bit] => C:\PROGRA~1\PACKAG~2\bar\1.bin\AppIntegrator.exe HKLM\...\Run: [PackageTracer Search Scope Monitor] => "C:\PROGRA~1\PACKAG~2\bar\1.bin\69srchmn.exe" /m=2 /w /h HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox] fastprox.dll ATTENTION! ====> ZeroAccess? HKLM\...\Policies\Explorer: [NoSetActiveDesktop] 0 HKU\S-1-5-19\...\Policies\Explorer: [NoSetActiveDesktop] 0 HKU\S-1-5-20\...\Policies\Explorer: [NoSetActiveDesktop] 0 HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Run: [Utkgmedia] => regsvr32.exe C:\Users\Administrator\AppData\Local\Utkgmedia\PCommonWeb16.dll <===== ATTENTION HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Run: [BarzeTjigd] => regsvr32.exe "C:\ProgramData\BarzeTjigd\WuboYqaj.puf" HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Policies\Explorer: [NoSetActiveDesktop] 0 HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Policies\Explorer: [HideSCAHealth] 1 HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Winlogon: [Shell] C:\Windows\explorer.exe [2926592 2009-04-11] (Microsoft Corporation) <==== ATTENTION HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...409d6c4515e9\InprocServer32: [Default-shell32] C:\$Recycle.Bin\S-1-5-21-1888392662-1405933057-3862161106-500\$304064af4c6e2371af2a766cf69caa1d\n. ATTENTION! ====> ZeroAccess? AppInit_DLLs: c:\progra~1\optimi~1\optpro~2.dll => c:\progra~1\optimi~1\optpro~2.dll File Not Found HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION HKU\S-1-5-21-1888392662-1405933057-3862161106-500\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION SearchScopes: HKU\S-1-5-21-1888392662-1405933057-3862161106-500 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = SearchScopes: HKU\S-1-5-21-1888392662-1405933057-3862161106-500 -> {171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E} URL = Toolbar: HKLM - No Name - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File Toolbar: HKLM - PackageTracer - {ff343558-d5a5-454a-bdd8-c5c81e179fed} - C:\Program Files\PackageTracer_69\bar\1.bin\69bar.dll No File Toolbar: HKU\S-1-5-21-1888392662-1405933057-3862161106-500 -> No Name - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File Winsock: Catalog5 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll" Winsock: Catalog5 05 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll" Winsock: Catalog9 01 mswsock.dll File Not found () Winsock: Catalog9 02 mswsock.dll File Not found () Winsock: Catalog9 03 mswsock.dll File Not found () Winsock: Catalog9 04 mswsock.dll File Not found () Winsock: Catalog9 05 mswsock.dll File Not found () Winsock: Catalog9 06 mswsock.dll File Not found () Winsock: Catalog9 07 mswsock.dll File Not found () Winsock: Catalog9 08 mswsock.dll File Not found () Winsock: Catalog9 09 mswsock.dll File Not found () Winsock: Catalog9 10 mswsock.dll File Not found () Winsock: Catalog9 11 mswsock.dll File Not found () Winsock: Catalog9 12 mswsock.dll File Not found () Winsock: Catalog9 13 mswsock.dll File Not found () Winsock: Catalog9 14 mswsock.dll File Not found () Winsock: Catalog9 15 mswsock.dll File Not found () Winsock: Catalog9 16 mswsock.dll File Not found () Winsock: Catalog9 17 mswsock.dll File Not found () Winsock: Catalog9 18 mswsock.dll File Not found () Winsock: Catalog9 19 mswsock.dll File Not found () Winsock: Catalog9 20 mswsock.dll File Not found () Winsock: Catalog9 21 mswsock.dll File Not found () Winsock: Catalog9 22 mswsock.dll File Not found () FF Plugin: @PackageTracer_69.com/Plugin -> C:\Program Files\PackageTracer_69\bar\1.bin\NP69Stub.dll No File S2 PackageTracer_69Service; C:\PROGRA~1\PACKAG~2\bar\1.bin\69barsvc.exe [X] S2 Winmgmt; C:\PROGRA~2\b34btbztdb0vavaw.exe [X] 2015-03-03 16:48 - 2015-03-03 16:48 - 00000000 ____D () C:\ProgramData\BarzeTjigd 2015-02-28 15:17 - 2015-03-06 22:41 - 00000000 ___HD () C:\ProgramData\{49A0BAC7-3326-4433-9373-4AA8793ABB5C} 2014-04-17 16:35 - 2014-04-17 16:35 - 0142694 _____ () C:\Users\Administrator\AppData\Roaming\9C85456D59874AD586B23529FC859BE1.jpg 2013-05-19 12:19 - 2013-05-19 12:19 - 0030784 _____ () C:\Users\Administrator\AppData\Roaming\fd_ck588.dat 2013-11-10 21:57 - 2013-11-17 14:32 - 0000004 _____ () C:\Users\Administrator\AppData\Roaming\icon.ico 2013-09-20 13:48 - 2013-09-20 22:24 - 0000004 _____ () C:\Users\Administrator\AppData\Roaming\settings.ini 2011-01-16 17:17 - 2009-03-02 17:48 - 0076407 _____ () C:\Users\Administrator\AppData\Roaming\Smiley.ico 2013-05-15 05:47 - 2013-05-15 05:47 - 0076627 _____ () C:\Users\Administrator\AppData\Roaming\Smiley.ico.html 2010-01-11 16:50 - 2015-03-07 10:01 - 0008484 _____ () C:\Users\Administrator\AppData\Local\d3d9caps.dat 2011-12-23 12:36 - 2011-12-23 12:55 - 0012828 ___SH () C:\Users\Administrator\AppData\Local\d426srv353477028r6374sqs35m8d 2010-01-11 21:06 - 2013-10-05 11:08 - 0018432 _____ () C:\Users\Administrator\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini 2012-01-22 10:44 - 2012-01-22 10:44 - 0000000 _____ () C:\Users\Administrator\AppData\Local\{7A39D6E2-8A64-49DD-947A-F1D6962D06AA} 2011-05-19 04:23 - 2011-10-15 07:26 - 0001940 _____ () C:\Users\Administrator\AppData\Local\{96C87F53-AC72-4604-A9CC-186A49F17F3C}.ini 2013-12-25 15:07 - 2013-12-25 15:07 - 95025368 ____T () C:\ProgramData\0qfr70od.fee 2013-12-25 15:07 - 2013-12-25 15:07 - 0000000 _____ () C:\ProgramData\0qfr70od.odd 2013-08-21 04:58 - 2013-08-21 04:58 - 2250054 _____ () C:\ProgramData\1.bmp 2013-08-21 04:58 - 2013-08-21 04:58 - 0350795 _____ () C:\ProgramData\1.jpg 2011-12-23 12:36 - 2011-12-23 12:55 - 0012828 ___SH () C:\ProgramData\d426srv353477028r6374sqs35m8d 2013-10-17 09:44 - 2013-10-17 09:44 - 0000000 _____ () C:\ProgramData\e3lcjbnw.ctrl 2013-10-17 09:44 - 2013-10-17 09:46 - 95025368 ____T () C:\ProgramData\e3lcjbnw.pff 2013-06-27 16:16 - 2013-06-27 18:37 - 0000000 _____ () C:\ProgramData\g252qs.txt 2010-02-16 20:13 - 2010-02-16 20:21 - 0000773 ____H () C:\ProgramData\hpzinstall.log 2012-04-15 11:35 - 2015-02-22 14:11 - 0001177 _____ () C:\ProgramData\Microsoft.SqlServer.Compact.400.32.bc 2013-06-27 16:16 - 2013-06-27 18:37 - 95023320 ____T () C:\ProgramData\mjv0t.pad 2010-01-11 17:03 - 2012-01-19 18:29 - 0071607 ____H () C:\ProgramData\nvModes.001 2010-01-11 17:03 - 2012-01-19 18:29 - 0071607 ____H () C:\ProgramData\nvModes.dat 2013-06-27 16:16 - 2013-06-27 16:16 - 0044544 _____ (Microsoft Corporation) C:\ProgramData\sdaksda.txt 2012-01-19 18:21 - 2012-01-19 18:31 - 0000448 ____H () C:\ProgramData\tqTWd4O40bP6RL 2012-01-19 19:07 - 2012-01-19 19:15 - 0000448 ____H () C:\ProgramData\wtoYRgJxAMQF8Z 2012-01-19 18:21 - 2012-01-19 18:31 - 0000296 ____H () C:\ProgramData\~tqTWd4O40bP6RL 2012-01-19 18:21 - 2012-01-19 18:31 - 0000176 ____H () C:\ProgramData\~tqTWd4O40bP6RLr 2012-01-19 19:16 - 2012-01-19 19:16 - 0000296 ____H () C:\ProgramData\~wtoYRgJxAMQF8Z 2012-01-19 19:16 - 2012-01-19 19:16 - 0000176 ____H () C:\ProgramData\~wtoYRgJxAMQF8Zr C:\$Recycle.Bin\S-1-5-21-1888392662-1405933057-3862161106-500\$304064af4c6e2371af2a766cf69caa1d C:\$Recycle.Bin\S-1-5-18\$304064af4c6e2371af2a766cf69caa1d C:\Users\Administrator\28478578.bat C:\Users\Administrator\acrobatreader.exe C:\Users\Administrator\flashplayer.exe C:\Users\Administrator\googleupdate.exe C:\Users\Administrator\java.exe C:\Users\Administrator\jucheck.exe C:\Users\Administrator\notepad.exe C:\Users\Administrator\skype.exe C:\Users\Administrator\udownload.dat C:\Users\Administrator\AppData\Roaming\settings.ini C:\ProgramData\0qfr70od.fee C:\ProgramData\0qfr70od.odd C:\ProgramData\e3lcjbnw.ctrl C:\ProgramData\e3lcjbnw.pff C:\ProgramData\mjv0t.pad C:\Users\Administrator\AppData\Local\Temp\HitmanPro.exe C:\Users\Administrator\AppData\Local\Temp\ose00000.exe CustomCLSID: HKU\S-1-5-21-1888392662-1405933057-3862161106-500_Classes\CLSID\{7a55cbb2-2b2e-4a41-9de1-6ac5d2c2be0a}\InprocServer32 -> C:\Program Files\UtilityChest_49\bar\1.bin\49SrcAs.dll No File CustomCLSID: HKU\S-1-5-21-1888392662-1405933057-3862161106-500_Classes\CLSID\{97ef77e6-97be-4204-a890-2485903c5624}\InprocServer32 -> C:\Program Files\PackageTracer_69\bar\1.bin\69SrcAs.dll No File Task: {09B9D893-AF81-4C36-B332-F3DE4B0D0148} - System32\Tasks\{C908FEDB-978B-4EEF-8621-90C289D38390} => pcalua.exe -a D:\Setup.exe -d D:\ Task: {8115D67C-2528-440E-AEED-2324E42E84DA} - \Scheduled Update for Ask Toolbar No Task File <==== ATTENTION Task: {812891A2-904C-441D-8FE1-E21429A5B002} - System32\Tasks\IHUninstallTrackingTASK => CMD Task: {D6596889-A150-485D-ABFB-E905E013E8DC} - System32\Tasks\REGSERVO => C:\Program Files\REGSERVO\RegSERVO.exe <==== ATTENTION Task: C:\Windows\Tasks\REGSERVO.job => C:\Program Files\REGSERVO\RegSERVO.exe-t C:\Program Files\REGSERVO\REGSERVO.exe <==== ATTENTION HKU\.DEFAULT\Software\Classes\.exe: exefile => "%1" %* <===== ATTENTION! HKU\.DEFAULT\Software\Classes\exefile: "%1" %* <===== ATTENTION! HKU\S-1-5-21-1888392662-1405933057-3862161106-500\Software\Classes\.exe: exefile => "%1" %* <===== ATTENTION! HKU\S-1-5-21-1888392662-1405933057-3862161106-500\Software\Classes\exefile: "%1" %* <===== ATTENTION!Close Notepad.NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating systemRun FRST and press the Fix button just once and wait.If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.Note: If the tool warns you about an outdated version please download and run the updated version. Link to comment Share on other sites More sharing options...
noupjaf Posted March 11, 2015 Author Report Share Posted March 11, 2015 I followed your instructions with the following issues: 1) I have a shortcut to some application called cryptolocker and my screen saver is the information in HELP_TO_SAVE_YOUR_FILES txt document attached. This all happened while I was running the JRT application. I turned off my emsisoft anti-malware protection as instructed during the JRT scan. Not sure what happened. Still need assistance. Thank You Additional Information: I re-ran JRT and did get the JRT log I will attach. I re-ran the FRST and will attach the new fixlist.txt file. I still have the cryptlocker shortcut on my desktop and the same issues I reported above. HELP_TO_SAVE_YOUR_FILES.txt HELP_TO_SAVE_YOUR_FILES.bmp Shortcut.txt Fixlog.txt Link to comment Share on other sites More sharing options...
noupjaf Posted March 11, 2015 Author Report Share Posted March 11, 2015 Here are the files when I re-ran JRT and FRST. Thanks Fixlog (2).txt JRT.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 11, 2015 Report Share Posted March 11, 2015 Changing tools: Download RogueKiller from one of the following links and save it to your desktop: Link 1 Link 2Close all programs and disconnect any USB or external drives before running the tool. Double-click RogueKiller.exe to run the tool (Vista or 7 users: Right-click and select Run As Administrator). Once the Prescan has finished, click Scan. Once the Status box shows "Scan Finished", just close the program. <--Don't fix anything! Attach the RogueKiller report to your next reply. The log can also be found on your desktop labeled (RKreport[X]_S_xxdatexx_xtimex) The highest number of [X], is the most recent Scan Link to comment Share on other sites More sharing options...
noupjaf Posted March 12, 2015 Author Report Share Posted March 12, 2015 I completed your instructions and attached the RK report. Thanks RKreport_SCN_03122015_091306.log Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 12, 2015 Report Share Posted March 12, 2015 Close all programs and disconnect any USB or external drives before running the tool. Double-click RogueKiller.exe to run the tool again (Vista or 7 users: Right-click and select Run As Administrator). Once the Prescan has finished, click Scan. Once the Status box shows "Scan Finished".Click the Registry Tab and select the following items:[Suspicious.Path] HKEY_USERS\S-1-5-21-1888392662-1405933057-3862161106-500\Software\Microsoft\Windows\CurrentVersion\Run | BarzeTjigd : regsvr32.exe "C:\ProgramData\BarzeTjigd\WuboYqaj.puf" -> Found [PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found [PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found Click the Files Tab and select the following items:[ZeroAccess][Junction] $NtUninstallKB64629$ -- C:\Windows\$NtUninstallKB64629$ [[email protected] 0] >> ERROR 5 -> Found Click the Delete button. Attach the RogueKiller report to your next reply.The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex) The highest number of [X], is the most recent Delete Copy the below code to Notepad; Save As fixlist.txt to your Desktop.C:\ProgramData\BarzeTjigd\WuboYqaj.puf C:\ProgramData\BarzeTjigd C:\Windows\$NtUninstallKB64629$Close Notepad.NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to comment Share on other sites More sharing options...
noupjaf Posted March 13, 2015 Author Report Share Posted March 13, 2015 I have completed your instructions and attached the test files requested. Thanks Fixlog.txt RKreport_DEL_03122015_220111.log Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 13, 2015 Report Share Posted March 13, 2015 Since, your logs showed what appears to be a rather old ZeroAccess infection I would like to check the system with a tool that specifically targets that RootKit family. Read carefully and follow these steps. Download TDSSKiller and save it to your Desktop. Double-click on TDSSKiller.exe to run the application. Click Change parameters Check the boxes next to Verify Driver Digital Signature and Detect TDLFS file system, then click OK Click on the Start Scan button to begin the scan and wait for it to finish. NOTE: Do not use the computer during the scan! During the scan it will look similar to the image below: When it finishes, you will either see a report that no threats were found like below: If no threats are found at this point, just click the Report selection on the top right of the form to generate a log. A log file report will pop which you can just close since the report file is already saved. If any infection or suspected items are found, you will see a window similar to below: If you have files that are shown to fail signature check do not take any action on these. Make sure you select Skip. I will tell you what to do with these later. They may not be issues at all. If Suspicious objects are detected, the default action will be Skip. Leave the default set to Skip. If Malicious objects are detected, they will show in the Scan results. TDSSKiller automatically selects an action (Cure or Delete) for malicious objects Make sure that Cure is selected. Important! - If Cure is not available, please choose Skip instead. Do not choose Delete unless instructed to do so. Click Continue to apply selected actions. A reboot may be required to complete disinfection. A window like the below will appear: Reboot immediately if TDSSKiller states that one is needed. Whether an infection is found or not, a log file should have already been created on your C: drive (or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Attach this log to your next reply. Link to comment Share on other sites More sharing options...
noupjaf Posted March 13, 2015 Author Report Share Posted March 13, 2015 I completed your instructions and had 2 suspicious objects. Software advised "skip" and I did. No reboot instructed by the software. I attached the TDSSKiller text file. Another issue: I can't open my Turbo Tax program as my computer dosen't recognise the proper program to open the application. Does this hace something to do with that Cryptolocker Ransome ware I noticed earlier? Thanks TDSSKiller.3.0.0.44_13.03.2015_15.02.28_log.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 16, 2015 Report Share Posted March 16, 2015 The TDSSKiller log looks fine. Yes, the CyptoLocker may have affected Turbo Tax. Let's reset some areas of Windows to their defaults. Download Windows Repair by Tweaking.com to your desktop. Use the direct download link for the Portable version of Windows Repair by Tweaking.com Double-click tweaking.com_windows_repair_aio.zip and extract the Tweaking.com - Windows Repair folder to your desktop. Now open this folder and double-click Repair_Windows.exe. Click the Repairs tab on the far right. Click the Start button (bottom right) Note: When asked if you would like to create a restore point. It is recommended just in-case something does not go as planned. Click Unselect All Put a checkmark in the following items:Reset Registry Permissions Reset File Permissions Remove Policies Set By Infections Repair Winsock & DNS Cache Repair Proxy Settings Repair Volume Shadow Copy Service Repair File AssociationsRepair bat Association Repair cmd Association Repair com Association Repair Directory Association Repair Drive Association Repair exe Association Repair Folder Association Repair inf Association Repair lnk (Shortcuts) Association Repair msc Association Repair reg Association Repair scr Association Restore Important Windows Services Set Windows Services To Default Startup Note: Leave everything else unchecked Put a checkmark in Restart System When Finished Now click the Start button (bottom right) Link to comment Share on other sites More sharing options...
noupjaf Posted March 19, 2015 Author Report Share Posted March 19, 2015 I still can"t open the Turbo Tax but the computer is running fine. The text files I saved on my desktop are now showing ecc files and will not open. Is this still a problem? Also should I retain the downloads you requested on my desktop? I'am running Emsisolft Anti-Malware and the Online Armor Firewall Thanks for your support. Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 19, 2015 Report Share Posted March 19, 2015 Unfortunately, we are not able to decrypt encrypted files without the private encryption key. You may need to reinstall Turbo Tax. Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted March 23, 2015 Report Share Posted March 23, 2015 Thread Closed Reason: Lack of Response PM either Kevin, Elise, or Arthur to have this thread reopened. The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread. Link to comment Share on other sites More sharing options...
Recommended Posts