annie

Ransomware .ciphered

Recommended Posts

Got hit by this last week...think it was an RDP attack...all files encypted to .ciphered...windows still boots , just about

 

message added to files ..

 

 

Hello. Bad news!
All your files was encrypted with strong algorithm AES256 and unique key.
To recover all files you need to get special decryption software and personal key.

You can contact me via email: [email protected]

 

You can contact me via email: [email protected]
Your ID: 95*******

Please use public mail service like gmail or yahoo to contact me, because your messages can be not delivered.
You have a 72 hours to contact me, otherwise recovering may be harder for you.

Regards,
Kevin Robinson.

 

Any body else had this, any decryption software...tried Trend+ Kaspersky tools no joy

 

help

Share this post


Link to post
Share on other sites

Hello Annie.

Welcome to the Emsisoft Support Forums. My name is Kevin, and I will be helping you with fixing your problems.

All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below:

NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.

The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or any time on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.

Take note of some guidelines for this support request:

  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Do not start a new topic.
  • The logs that you post should be attached to the reply.
  • Set your system to show all files.

    Click Start, open My Computer, select the Tools menu and click Folder Options.

    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.

    Uncheck: Hide file extensions for known file types

    Uncheck the Hide protected operating system files (recommended) option.

    Click Yes to confirm.

Download to your Desktop:

- Emsisoft Emergency Kit

- Farbar Recovery Scan Tool

  • NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.

All scans are to be run in Normal Mode. Do not run anything in "Safe Mode", unless you are instructed to do so by the Malware Removal Specialist handling your case.

Do not force Safe Mode. Instructions on How to Boot to "Safe Mode" can be found at: http://www.malwarete...kb/SafeMode.php

Let's get started:

  • Install and Run Emsisoft Emergency Kit (EEK):
    • Double click EmergencyKitScanner.exe to install EEK
    • When the installation of EEK is complete the Emergency Kit scanner will run.

      NOTE: Make sure to enable PUPs detection.

    • Click "Yes" to Update Emsisoft Emergency Kit
    • Under "Scan" click-on "Malware Scan".

      IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.

    • Save the scan log somewhere that you can find it.
    • Exit Emsisoft Emergency Kit.
  • Run Farbar Recovery Scan Tool (FRST):
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • Farbar Recovery Scan Tool will produce the following logs:
    • FRST.txt
    • Addition.txt
  • Create a new topic in our Help, my PC is infected! forum and attach the following logs to your post:
    • Emsisoft Emergency Kit log (C:\EEK\Reports\)
    • FRST.txt
    • Addition.txt
    (NOTE: if you need to attach the logs to a reply to an existing topic, then you will need to use the More Reply Options button to the lower-right of where you type in your reply in order to see the controls for attaching files)
The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

Share this post


Link to post
Share on other sites

hi was contacted in a private message by someone called    lukasz90   

 

he or she said that they had had the same attack and paid 3 BTC for the decryption prog...so I said if they helped me I would pay 1BTC ...so I sent a few files and they were successfully decrypted with the key in the ransom note...however when I said can I have the decryption program....the conversation was abruptly ended...scam?

 

however the program exists to decrypt my server and I need to find out what 'brand' of encryption was used.....have tried most of the available tools and alnamrood seems to be the closest

 

the code in the ransom note is   Your ID: 958A6CA2GB

 

I can send an encypted file to anyone that might be able to help

 

yes you guessed it ...no recent backup...

 

help anyone?

Share this post


Link to post
Share on other sites

lukasz90 is most likely a member of the criminal enterprise behind the ransomware infecting your system.

Annie, I would need the logs I asked for in my previous post in order to know where to start.

Share this post


Link to post
Share on other sites

The server was very likely compromised via a successful RDP attack. Make sure that RDP is secured and you should change all the passwords on this server.

This does appear to be Apocalypse/Al-Namrood family of ransomware. Both Apocalypse and Al-Namrood implement the Windows CryptoAPI is a flawed manner resulting in a 1-in-3 chance the encrypted files are encoded with garbage data, resutling in files that cannot be decrypted.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

HKLM\...\Winlogon: [LegalNoticeCaption] Attention!
HKLM\...\Winlogon: [LegalNoticeText] Hello. Bad news!
All your files was encrypted with strong algorithm AES256 and unique key.
To recover all files you need to get special decryption software and personal key.

You can contact me via email: [email protected]
Your ID: 958A6CA2GB

Please use public mail service like gmail or yahoo to contact me, because your messages can be not delivered.
You have a 72 hours to contact me, otherwise recovering may be harder for you.

Regards,
Kevin Robinson.

HKLM\...\Policies\Explorer: [ShowSuperHidden] 1
HKLM\...\Policies\Explorer: [noviewcontextmenu] 0
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\system: [DisableLockWorkstation] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoFileMenu] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoHardwareTab] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoManageMyComputerVerb] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoSharedDocuments] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoNetConnectDisconnect] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoSecurityTab] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoShellSearchButton] 1
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoViewContextMenu] 0
HKU\S-1-5-21-4259978448-2647837507-15390962-500\...\Policies\Explorer: [NoComputersNearMe] 1
ShellIconOverlayIdentifiers: [ SkyDrivePro1 (ErrorConflict)] -> {8BA85C75-763B-4103-94EB-9470F12FE0F7} => C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\GROOVEEX.DLL No File
ShellIconOverlayIdentifiers: [ SkyDrivePro2 (SyncInProgress)] -> {CD55129A-B1A1-438E-A425-CEBC7DC684EE} => C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\GROOVEEX.DLL No File
ShellIconOverlayIdentifiers: [ SkyDrivePro3 (InSync)] -> {E768CD3B-BDDC-436D-9C13-E1B39CA257B1} => C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\GROOVEEX.DLL No File
GroupPolicy\User: Restriction <======= ATTENTION
GroupPolicyScripts: Restriction <======= ATTENTION
GroupPolicyScripts\User: Restriction <======= ATTENTION
SearchScopes: HKU\S-1-5-21-4259978448-2647837507-15390962-500 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
BHO: Lync Browser Helper -> {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} -> C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\OCHelper.dll => No File
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\URLREDIR.DLL => No File
BHO: Microsoft SkyDrive Pro Browser Helper -> {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} -> C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\GROOVEEX.DLL => No File
BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office 15\root\Office15\URLREDIR.DLL => No File
Handler: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files\Microsoft Office 15\root\Office15\MSOSB.DLL No File
FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> C:\Program Files\Microsoft Office 15\root\Office15\NPSPWRAP.DLL [No File]
2016-11-29 19:33 - 2016-11-29 19:33 - 00000123 _____ C:\Users\Administrator\AppData\Local\Temp\CFG2CEE.tmp
2016-11-29 19:29 - 2016-11-29 20:04 - 00000000 ____D C:\Users\Administrator\AppData\Local\Temp\1
2016-11-15 21:07 - 2016-11-15 21:07 - 00000000 _____ C:\Users\Administrator\AppData\Local\Temp\DMIA7A5.tmp
2016-11-15 20:26 - 2014-09-18 10:51 - 00000000 ____D C:\Users\mark\AppData\Local\Temp\7
2016-11-15 04:46 - 2015-05-29 08:47 - 00000000 ____D C:\Users\warehouse\AppData\Local\Temp\14
2016-11-15 04:46 - 2015-04-07 07:47 - 00000000 ____D C:\Users\warehouse\AppData\Local\Temp\4
2016-11-15 04:46 - 2014-04-08 07:41 - 00000000 ____D C:\Users\warehouse\AppData\Local\Temp\6
2016-11-15 04:46 - 2013-11-26 12:46 - 00000000 ____D C:\Users\warehouse\AppData\Local\Temp\10
2016-11-15 04:46 - 2013-09-17 13:49 - 00000000 ____D C:\Users\warehouse\AppData\Local\Temp\12
2016-11-15 04:46 - 2013-08-15 10:39 - 00000000 ____D C:\Users\warehouse\AppData\Local\Temp\8
2016-11-15 04:45 - 2015-05-29 14:53 - 00000000 ____D C:\Users\tom\AppData\Local\Temp\4
2016-11-15 04:45 - 2015-05-09 09:07 - 00000000 ____D C:\Users\victoria\AppData\Local\Temp\6
2016-11-15 04:45 - 2015-05-06 07:26 - 00000000 ____D C:\Users\tom\AppData\Local\Temp\15
2016-11-15 04:42 - 2015-05-29 17:22 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\7
2016-11-15 04:42 - 2015-04-10 10:05 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\10
2016-11-15 04:42 - 2014-10-08 14:31 - 00000000 ____D C:\Users\steve\AppData\Local\Temp\16
2016-11-15 04:42 - 2014-09-30 09:37 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\11
2016-11-15 04:42 - 2014-09-05 09:15 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\2
2016-11-15 04:42 - 2014-05-14 10:09 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\9
2016-11-15 04:42 - 2014-04-05 18:40 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\3
2016-11-15 04:42 - 2014-03-25 15:02 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\6
2016-11-15 04:42 - 2014-02-20 10:39 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\12
2016-11-15 04:42 - 2014-02-06 09:35 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\10
2016-11-15 04:42 - 2014-01-20 13:39 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\11
2016-11-15 04:42 - 2013-10-14 08:09 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\8
2016-11-15 04:42 - 2013-10-13 12:32 - 00000000 ____D C:\Users\steve\AppData\Local\Temp\3
2016-11-15 04:42 - 2013-10-09 18:07 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\4
2016-11-15 04:42 - 2013-09-05 09:59 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\8
2016-11-15 04:42 - 2013-09-05 08:11 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\7
2016-11-15 04:42 - 2013-09-05 07:43 - 00000000 ____D C:\Users\steve\AppData\Local\Temp\5
2016-11-15 04:42 - 2013-08-16 09:23 - 00000000 ____D C:\Users\sophie\AppData\Local\Temp\12
2016-11-15 04:42 - 2013-08-15 10:41 - 00000000 ____D C:\Users\steve\AppData\Local\Temp\9
2016-11-15 04:42 - 2013-08-15 10:34 - 00000000 ____D C:\Users\simon\AppData\Local\Temp\6
2016-11-15 04:41 - 2016-05-10 12:58 - 00000000 ____D C:\Users\showroom\AppData\Local\Temp\5
2016-11-15 04:41 - 2016-04-14 10:57 - 00000000 ____D C:\Users\showroom\AppData\Local\Temp\11
2016-11-15 04:41 - 2015-07-20 08:33 - 00000000 ____D C:\Users\showroom\Downloads\64
2016-11-15 04:41 - 2015-02-18 09:43 - 00000000 ____D C:\Users\showroom\AppData\Local\Temp\3
2016-11-15 04:41 - 2014-03-17 12:17 - 00000000 ____D C:\Users\showroom\AppData\Local\Temp\14
2016-11-15 04:40 - 2015-04-10 09:13 - 00000000 ____D C:\Users\scott\AppData\Local\Temp\3
2016-11-15 04:40 - 2015-02-17 09:49 - 00000000 ____D C:\Users\scott\AppData\Local\Temp\8
2016-11-15 04:40 - 2014-04-07 07:53 - 00000000 ____D C:\Users\scott\AppData\Local\Temp\7
2016-11-15 04:40 - 2014-03-25 15:05 - 00000000 ____D C:\Users\scott\AppData\Local\Temp\9
2016-11-15 04:40 - 2013-10-10 12:07 - 00000000 ____D C:\Users\scott\AppData\Local\Temp\11
2016-11-15 04:38 - 2015-07-28 08:25 - 00000000 ____D C:\Users\sam.johnson\AppData\Local\Temp\16
2016-11-15 04:38 - 2013-08-15 10:15 - 00000000 ____D C:\Users\salesadmin6\AppData\Local\Temp\2
2016-11-15 04:37 - 2015-07-27 12:11 - 00000000 ____D C:\Users\mark.johnson\AppData\Local\Temp\17
2016-11-15 04:37 - 2014-03-25 15:05 - 00000000 ____D C:\Users\mark\AppData\Local\Temp\8
2016-11-15 04:06 - 2015-05-25 09:06 - 00000000 ____D C:\Users\mark\AppData\Local\Temp\4
2016-11-15 04:06 - 2014-09-12 07:12 - 00000000 ____D C:\Users\mark\AppData\Local\Temp\6
2016-11-15 04:06 - 2014-02-20 07:52 - 00000000 ____D C:\Users\mark\AppData\Local\Temp\3
2016-11-15 04:06 - 2014-01-20 13:06 - 00000000 ____D C:\Users\mark\AppData\Local\Temp\10
2016-11-15 04:05 - 2015-12-09 09:26 - 00000000 ____D C:\Users\kerry\AppData\Local\Temp\7
2016-11-15 04:05 - 2015-10-05 10:36 - 00000000 ____D C:\Users\kerry\AppData\Local\Temp\6
2016-11-15 04:05 - 2015-06-05 08:45 - 00000000 ____D C:\Users\kerry\AppData\Local\Temp\12
2016-11-15 04:03 - 2015-07-27 09:12 - 00000000 ____D C:\Users\joannu\AppData\Local\Temp\15
2016-11-15 04:03 - 2015-07-01 12:54 - 00000000 ____D C:\Users\joannu\AppData\Local\Temp\13
2016-11-15 04:03 - 2013-09-24 12:36 - 00000000 ____D C:\Users\katie\AppData\Local\Temp\13
2016-11-15 04:01 - 2016-10-11 06:48 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\5
2016-11-15 04:01 - 2016-05-19 08:18 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\8
2016-11-15 04:01 - 2016-04-07 19:00 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\3
2016-11-15 04:01 - 2015-07-01 08:31 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\11
2016-11-15 04:01 - 2015-06-01 07:30 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\9
2016-11-15 04:01 - 2014-09-22 14:22 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\15
2016-11-15 04:01 - 2014-08-04 07:20 - 00000000 ____D C:\Users\jim\AppData\Local\Temp\10
2016-11-15 04:00 - 2016-04-20 15:43 - 00000000 ____D C:\Users\gurvinder\AppData\Local\Temp\6
2016-11-15 04:00 - 2016-04-01 08:24 - 00000000 ____D C:\Users\gurvinder\AppData\Local\Temp\12
2016-11-15 04:00 - 2015-08-05 14:01 - 00000000 ____D C:\Users\gurvinder\AppData\Local\Temp\19
2016-11-15 04:00 - 2014-09-02 14:19 - 00000000 ____D C:\Users\cory\AppData\Local\Temp\5
2016-11-15 04:00 - 2014-02-20 08:29 - 00000000 ____D C:\Users\cory\AppData\Local\Temp\6
2016-11-15 04:00 - 2014-01-20 12:10 - 00000000 ____D C:\Users\cory\AppData\Local\Temp\4
2016-11-15 04:00 - 2013-08-15 10:26 - 00000000 ____D C:\Users\cory\AppData\Local\Temp\3
2016-11-15 03:59 - 2014-11-27 12:19 - 00000000 ____D C:\Users\chris\AppData\Local\Temp\17
2016-11-15 03:59 - 2014-09-05 09:25 - 00000000 ____D C:\Users\chris\AppData\Local\Temp\5
2016-11-15 03:59 - 2014-08-28 07:57 - 00000000 ____D C:\Users\chris\AppData\Local\Temp\2
2016-11-15 03:59 - 2014-02-07 08:28 - 00000000 ____D C:\Users\chris\AppData\Local\Temp\6
2016-11-15 03:59 - 2013-11-15 09:38 - 00000000 ____D C:\Users\chris\AppData\Local\Temp\7
2016-11-15 03:59 - 2013-09-13 13:10 - 00000000 ____D C:\Users\chris\AppData\Local\Temp\11
2016-11-15 03:57 - 2016-09-19 07:46 - 00000000 ____D C:\Users\Andy\AppData\Local\Temp\3
2016-11-15 03:57 - 2016-09-05 08:05 - 00000000 ____D C:\Users\Andy\AppData\Local\Temp\6
2016-11-15 03:57 - 2016-03-14 08:43 - 00000000 ____D C:\Users\Andy\AppData\Local\Temp\5
2016-11-15 03:57 - 2015-12-10 16:37 - 00000000 ____D C:\Users\beccah\AppData\Local\Temp\1
2016-11-15 03:55 - 2014-10-01 10:25 - 00000000 ____D C:\Users\alan\AppData\Local\Temp\12
2016-11-15 03:55 - 2014-09-22 13:35 - 00000000 ____D C:\Users\alan\AppData\Local\Temp\11
2016-11-15 03:41 - 2015-06-29 21:22 - 00000000 ____D C:\Users\Administrator\AppData\Local\Temp\2
2016-11-15 03:41 - 2014-03-25 15:06 - 00000000 ____D C:\Users\Administrator\AppData\Local\Temp\10
2016-11-15 03:41 - 2014-02-18 13:36 - 00000000 ____D C:\Users\Administrator\AppData\Local\Temp\3
2016-11-15 03:38 - 2016-09-05 07:49 - 00000000 ____D C:\Users\adam\AppData\Local\Temp\3
2016-11-15 03:38 - 2015-12-03 09:07 - 00000000 ____D C:\Users\adam\AppData\Local\Temp\6
2016-11-15 03:38 - 2015-05-11 07:28 - 00000000 ____D C:\Users\adam\AppData\Local\Temp\13
2016-11-15 03:38 - 2015-04-07 07:10 - 00000000 ____D C:\Users\adam\AppData\Local\Temp\1
Reg: reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\PROTECTOR_DLL.PROTECTORBHO" /f
Reg: reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\PROTECTOR_DLL.PROTECTORBHO.1" /f
Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Share this post


Link to post
Share on other sites

Kevin I have got, from the original attacker and the guy on the forums unencypted files back so they are 'unencyptable' ...the Alnamrood decrypter has a good go and if fact produces a positive result...however although the file is 'processed' the resulting file cannot be opened and is still encypted.  I assume that the key (958a6ca2GB)  is incorrect.  I have tried many combination of the key in the options box to no avail. (have tried different numbers of digits etc)

Share this post


Link to post
Share on other sites

Some files will decrypt others may not. Al-Namrood/Apocalypse encryption is flawed and results in some files being encrypted with garbage code, resulting in files that cannot be decrypted even when the decryption tool states that it successfully decrypted the files.

The developers are only interested in the money, they really could care less if the victim gets their files back or not.

Let's take a fresh look.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Be sure to let me know how things are running.

Share this post


Link to post
Share on other sites

Since the forum has been under attack for the past few days, I am extending the response deadline by another 48 hours.

Share this post


Link to post
Share on other sites

Thread Closed

Reason: Lack of Response

PM either Kevin, Elise, or Arthur to have this thread reopened.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.