Jump to content

JarrodAR

Members
  • Posts

    15
  • Joined

  • Last visited

Reputation

0 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hi axe0, Its definitely odd that it says the last crash was so far off as what pushed me to make this post was two crashes the day of posting. I have freed up space by resetting my PC but keeping personal files but plenty of BSODs have occurred since then. The only "cleaning" software I had was avast which I no longer use and I only have malwarebytes for antivirus. -Jarrod
  2. Hi, I had a thread over in the Malware forum but was not able to find the issue causing crashing of my graphics drivers (and subsequently any games or programs I'm running at the time of the crash) and occasionally BSOD'ing [BAD_POOL_CALLER & SYSTEM_THREAD_EXCEPTION_NOT_HANDLED] . I have now been referred to this forum and have attached the zip below and will have additional details. · Windows 10· x64· Original OS is the current windows 10 install· OS is OEM, bought prebuilt from iBuyPower with minor part modification (RAM) from me· Age of system is about 4 or 5 years old· Reinstalled OS around 2 or 3 months ago (kept personal files)· Intel Core i7 7700K @ 4.20GHz· 4095MB NVIDIA GeForce GTX 1070 (EVGA)· Gigabyte Technology Co. Ltd. Z270XP-SLI-CF (U3E1)· Desktop Any help would be much appreciated! Thanks! -JarrodAR SysnativeFileCollectionApp.zip
  3. Apologies for the delay. So I followed the chrome cleanup and so far there seems to be drastically less crashes. Also additionally I upped my fan curve to keep the graphics card cooler (as it would be around 84c when playing games. There still has been a few crashed and 1 or 2 bsods. If you would like me to go into detail of the bsods I can!
  4. So Kapersky found one thing to quarantine and I attached a screenshot below. Also as an update on my computer performance. It seems the other monitor lag that would be caused with a game being open seems to have minimized (but not completely disappeared). As for the graphics drivers and computer fully crashing has remained the same if not gotten worse. Again I appreciate all the help! Jarrod
  5. Alright Ron, followed everything and the files are attached below! One thing I wanted to add was before you initially responded to this post I ran Malwarebytes again but this time I did a custom scan scanning for rootkits as well and some items were found and quarantined as well. I included this log as Malwbyte backlog CUSTOM. The log for your most recent reply is Malwbyte backlog NEW. Thanks! Malwbyte Backlog NEW.txt Addition.txt AdwCleaner[C00].txt Malwbyte Backlog custom.txt
  6. Okay FRST64 has been ran with the fixlist and the log is attached below! I uninstalled avast as requested as well. Thank you so much in advance Ron! Fixlog.txt
  7. My current computer is still relatively new (within the last 5 years) and is acting like it is on its last leg. I share this computer with my little brother who is in high school and do not monitor his activity. I don't know if I am infected for sure but it shows the few signs that I am aware of and would like to at least confirm it is NOT infected (unless it is) before investigating hardware. From time to time the entire system will crash entirely, graphics driver crashing constantly, entire system crashing during scans/targeted scans, Peripherals not receiving signal on startup, black screen start up, bsods etc. The graphics drivers have crashed 5 times and the entire system has crashed 2 times during the writing of this post. Any help would be much appreciated as a new computer simply is not an option for me right now Logs posted below. Thanks! JarrodAR (Jarrod) FRST.txt Addition.txt Malwbyte Backlog.txt
  8. Hi Yoan, Apologies I did not notice my reply did not go through! Here is the fixlog. Also my system as been exponentially faster! The slowdowns seem very very rare now, the only problem I have seen that whenever I have an application (normally a game) open along with YouTube, the audio of YouTube will begin to de-sync with the video. Not sure if this problem has arisen because of a process we went through. My first guess is going to be a ram problem but it could be various things. Fix result of Farbar Recovery Scan Tool (x64) Version: 21.01.2018 Ran by Jarro (22-01-2018 13:25:06) Run:2 Running from C:\Users\Jarro\Downloads Loaded Profiles: Jarro (Available Profiles: defaultuser0 & Jarro) Boot Mode: Normal ============================================== fixlist content: ***************** CloseProcesses: CreateRestorePoint: GroupPolicy: Restriction <==== ATTENTION GroupPolicyUsers\S-1-5-21-1158492532-2269048465-4009228000-1002\User: Restriction <==== ATTENTION Task: {0D19A206-E200-4432-91F9-64586A3A6DF0} - \Microsoft\Windows\UNP\RunCampaignManager -> No File <==== ATTENTION AlternateDataStreams: C:\Users\Jarro\AppData\Local\Temp:$DATA [16] AlternateDataStreams: C:\Users\Jarro\AppData\Local\Temp:RKNnIkWznq9c4Qr5tuh59 [2358] AlternateDataStreams: C:\Users\Jarro\AppData\Local\Temp:VBhIMEhYIdadyNoTOLn [2108] AlternateDataStreams: C:\Users\Jarro\AppData\Local\Temp:yksaVYSdqyyKVuZhkXIH7o [2256] AlternateDataStreams: C:\Users\Jarro\AppData\Local\Temporary Internet Files:Z91nxdP2z0TYB0b9o7AWtj82PIZ [2484] C:\ProgramData\ntuser.pol C:\Users\Jarro\AppData\Local\iSNpA7xcdkQL C:\Users\Jarro\AppData\Local\schogkr C:\Users\Jarro\AppData\Local\pwdbgua C:\Users\Jarro\AppData\Local\cwnmhao C:\Users\Jarro\AppData\Local\ebsch C:\Users\Jarro\AppData\Roaming\et C:\WINDOWS\system32\usszctd C:\WINDOWS\system32\Drivers\32360670.sys C:\WINDOWS\system32\Drivers\56267720.sys C:\WINDOWS\SysWOW64\usszctd EmptyTemp: ***************** Processes closed successfully. Restore point was successfully created. C:\WINDOWS\system32\GroupPolicy\Machine => moved successfully C:\WINDOWS\system32\GroupPolicy\GPT.ini => moved successfully C:\WINDOWS\system32\GroupPolicyUsers\S-1-5-21-1158492532-2269048465-4009228000-1002\User => moved successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{0D19A206-E200-4432-91F9-64586A3A6DF0} => could not remove key. ErrorCode1: 0x00000002 "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{0D19A206-E200-4432-91F9-64586A3A6DF0}" => removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UNP\RunCampaignManager => key not found C:\Users\Jarro\AppData\Local\Temp => ":$DATA" ADS removed successfully C:\Users\Jarro\AppData\Local\Temp => ":RKNnIkWznq9c4Qr5tuh59" ADS removed successfully C:\Users\Jarro\AppData\Local\Temp => ":VBhIMEhYIdadyNoTOLn" ADS removed successfully C:\Users\Jarro\AppData\Local\Temp => ":yksaVYSdqyyKVuZhkXIH7o" ADS removed successfully C:\Users\Jarro\AppData\Local\Temporary Internet Files => ":Z91nxdP2z0TYB0b9o7AWtj82PIZ" ADS removed successfully C:\ProgramData\ntuser.pol => moved successfully C:\Users\Jarro\AppData\Local\iSNpA7xcdkQL => moved successfully C:\Users\Jarro\AppData\Local\schogkr => moved successfully C:\Users\Jarro\AppData\Local\pwdbgua => moved successfully C:\Users\Jarro\AppData\Local\cwnmhao => moved successfully C:\Users\Jarro\AppData\Local\ebsch => moved successfully C:\Users\Jarro\AppData\Roaming\et => moved successfully C:\WINDOWS\system32\usszctd => moved successfully C:\WINDOWS\system32\Drivers\32360670.sys => moved successfully C:\WINDOWS\system32\Drivers\56267720.sys => moved successfully C:\WINDOWS\SysWOW64\usszctd => moved successfully =========== EmptyTemp: ========== BITS transfer queue => 9199616 B DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 16104115 B Java, Flash, Steam htmlcache => 199997827 B Windows/system/drivers => 229024538 B Edge => 4798636 B Chrome => 486775645 B Firefox => 19843290 B Opera => 0 B Temp, IE cache, history, cookies, recent: Default => 0 B Users => 0 B ProgramData => 0 B Public => 0 B systemprofile => 0 B systemprofile32 => 0 B LocalService => 5742 B NetworkService => 134117136 B defaultuser0 => 0 B Jarro => 256325011 B OVRLibraryService => 0 B RecycleBin => 0 B EmptyTemp: => 1.3 GB temporary data Removed. ================================ The system needed a reboot. ==== End of Fixlog 13:25:33 ====
  9. Okay great thanks for addressing my concerns! Here is the Adw Log: # AdwCleaner 7.0.6.0 - Logfile created on Wed Jan 17 01:06:49 2018 # Updated on 2017/21/12 by Malwarebytes # Running on Windows 10 Home (X64) # Mode: clean # Support: https://www.malwarebytes.com/support ***** [ Services ] ***** No malicious services deleted. ***** [ Folders ] ***** Deleted: C:\Users\Jarro\AppData\Local\vghd Deleted: C:\Program Files (x86)\S5 Deleted: C:\Users\All Users\Documents\Downloaded Installers Deleted: C:\Users\Public\Documents\Downloaded Installers Deleted: C:\Users\Jarro\AppData\Local\slimware utilities inc Deleted: C:\Users\Jarro\AppData\Local\SlimWare Utilities Inc ***** [ Files ] ***** Deleted: C:\Windows\SysNative\drivers\swdumon.sys ***** [ DLL ] ***** No malicious DLLs cleaned. ***** [ WMI ] ***** No malicious WMI cleaned. ***** [ Shortcuts ] ***** No malicious shortcuts cleaned. ***** [ Tasks ] ***** No malicious tasks deleted. ***** [ Registry ] ***** Deleted: [Key] - HKLM\SOFTWARE\SlimWare Utilities Inc ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries deleted. ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries deleted. ************************* ::Tracing keys deleted ::Winsock settings cleared ::Additional Actions: 0 ************************* C:/AdwCleaner/AdwCleaner[S0].txt - [1409 B] - [2018/1/17 1:6:20] ########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ########## And here is the RogueKiller Log: RogueKiller V12.12.0.0 (x64) [Jan 15 2018] (Free) by Adlice Software mail : http://www.adlice.com/contact/ Feedback : https://forum.adlice.com Website : http://www.adlice.com/download/roguekiller/ Blog : http://www.adlice.com Operating System : Windows 10 (10.0.16299) 64 bits version Started in : Normal mode User : Jarro [Administrator] Started from : C:\Users\Jarro\Desktop\RogueKiller_portable64.exe Mode : Delete -- Date : 01/16/2018 17:11:53 (Duration : 00:23:24) ¤¤¤ Processes : 0 ¤¤¤ ¤¤¤ Registry : 13 ¤¤¤ [PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\SlimWare Utilities Inc -> Deleted [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-1158492532-2269048465-4009228000-1002\Software\Microsoft\Internet Explorer\Main | Start Page : http://msi13.msn.com/ -> Replaced (http://go.microsoft.com/fwlink/p/?LinkId=255141) [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-1158492532-2269048465-4009228000-1002\Software\Microsoft\Internet Explorer\Main | Start Page : http://msi13.msn.com/ -> Replaced (http://go.microsoft.com/fwlink/p/?LinkId=255141) [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{2943C9DB-28D4-40B0-BE94-E8A4532DE959}C:\programdata\oracle\java\javapath_target_69659015\java.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\programdata\oracle\java\javapath_target_69659015\java.exe|Name=Java(TM) Platform SE binary|Desc=Java(TM) Platform SE binary|Defer=User| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{5348CDC3-281E-4E2E-9AB9-66EB06A5A7EA}C:\programdata\oracle\java\javapath_target_69659015\java.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\programdata\oracle\java\javapath_target_69659015\java.exe|Name=Java(TM) Platform SE binary|Desc=Java(TM) Platform SE binary|Defer=User| [x] -> Deleted [PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{2EDBF4D0-0F7A-4EDF-B42A-297B87EFEB4C}C:\users\jarro\appdata\local\vghd\bin\vghd.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\users\jarro\appdata\local\vghd\bin\vghd.exe|Name=vghd.exe|Desc=vghd.exe|Defer=User| [x] -> Deleted [PUP.Gen1] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{6AA2F896-FB57-4637-A270-23A1525C7B6D}C:\users\jarro\appdata\local\vghd\bin\vghd.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\users\jarro\appdata\local\vghd\bin\vghd.exe|Name=vghd.exe|Desc=vghd.exe|Defer=User| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {836CA6AF-A93C-4DE8-B59D-19A1923C20F1} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\Jarro\AppData\Local\Temp\7zS1BFA\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {0362AC2E-91AC-4B74-87DF-329141DA72C2} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\Jarro\AppData\Local\Temp\7zS1BFA\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {BD209FE7-D04F-48C1-BA64-8BE7BFA3C345} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\Jarro\AppData\Local\Temp\7zS1D33\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {712F3701-5B1F-466B-BAFE-71568456FE94} : v2.26|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\Jarro\AppData\Local\Temp\7zS1D33\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {99EEA7D1-298C-4542-A47B-C4338B1EF987} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\Jarro\AppData\Local\Temp\7zS6B13\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Deleted [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {FB6A1186-0A79-48CD-A715-55B8ECC5CD2D} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\Jarro\AppData\Local\Temp\7zS6B13\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Deleted ¤¤¤ Tasks : 0 ¤¤¤ ¤¤¤ Files : 0 ¤¤¤ ¤¤¤ WMI : 0 ¤¤¤ ¤¤¤ Hosts File : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤ ¤¤¤ Web browsers : 2 ¤¤¤ [PUM.HomePage][Chrome:Config] Default [SecurePrefs] : homepage [https://www.youtube.com/] -> Deleted [PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [https://www.youtube.com/feed/subscriptions] -> Deleted ¤¤¤ MBR Check : ¤¤¤ +++++ PhysicalDrive0: TOSHIBA DT01ACA200 +++++ --- User --- [MBR] 382be7eae6d72a1ae98c32e5af67d52c [BSP] 4c559d26b360c410c08f4c660f4bf065 : Windows Vista/7/8|VT.Unknown MBR Code Partition table: 0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 1907727 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] User = LL1 ... OK User = LL2 ... OK +++++ PhysicalDrive1: WDC WDS250G1B0A-00H9H0 +++++ --- User --- [MBR] 967c9fd01e6411fd98ec4e986c99f097 [BSP] df4f83c1f72e36823a12b0dfc7617313 : Empty MBR Code Partition table: 0 - EFI system partition | Offset (sectors): 2048 | Size: 200 MB 1 - Microsoft reserved partition | Offset (sectors): 411648 | Size: 128 MB 2 - Basic data partition | Offset (sectors): 673792 | Size: 237694 MB 3 - [SYSTEM][MAN-MOUNT] | Offset (sectors): 487473152 | Size: 451 MB User = LL1 ... OK User = LL2 ... OK +++++ PhysicalDrive2: Seagate BUP Slim BK SCSI Disk Device +++++ --- User --- [MBR] 76fbf7a80fe9bb98d5850cb0facc6dd4 [BSP] 5c2e672eb4a7d4002603f4496f729aa6 : Empty|VT.Unknown MBR Code Partition table: 0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 1907726 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] User = LL1 ... OK Error reading LL2 MBR! ([1] Incorrect function. ) +++++ PhysicalDrive3: USB Flash Disk USB Device +++++ --- User --- [MBR] 4877f66a541979e407199a40c2b22b7e [BSP] 3f56dd7fa477540f14cb76c4101ef64d : Windows XP|VT.Unknown MBR Code Partition table: 0 - [ACTIVE] FAT32 (0xb) [VISIBLE] Offset (sectors): 32 | Size: 1900 MB User = LL1 ... OK Error reading LL2 MBR! ([32] The request is not supported. )
  10. Alright it is done! And the summary is below. A couple things I think I should note that I am not sure about: 1. My computer has started to load into "Windows Boot Manager" as of Sunday whenever I boot up my computer and has me choose a OS. It has never done that nor do I know why, 2. M computer has been getting stuck when restarting as of late, just now when malwarebytes restarted my computer it got stuck on the restarting screen and I left it for a good 30 minutes and it just continued to say restarting. Summary: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 1/15/18 Scan Time: 10:16 AM Log File: 322e79ae-fa20-11e7-aff3-1c1b0da31503.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.262 Update Package Version: 1.0.3701 License: Trial -System Information- OS: Windows 10 (Build 16299.125) CPU: x64 File System: NTFS User: DESKTOP-S3AF3L3\Jarro -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 362538 Threats Detected: 5 Threats Quarantined: 5 Time Elapsed: 0 min, 39 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 3 PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STEAM.EXE, Quarantined, [8549], [239347],1.0.3701 PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STEAM.EXE, Quarantined, [8549], [239347],1.0.3701 Trojan.Clicker, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\msidntfs, Quarantined, [20], [433331],1.0.3701 Registry Value: 2 PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STEAM.EXE|DEBUGGER, Quarantined, [8549], [239347],1.0.3701 PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STEAM.EXE|DEBUGGER, Quarantined, [8549], [239347],1.0.3701 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 0 (No malicious items detected) Physical Sector: 0 (No malicious items detected) (end)
  11. Alright Yoan here you go! Had to get my hands on a usb first so it took a quick minu te to complete this process. The FRST file is attached below and I followed the instructions! FRST.txt
  12. Wow Yoan, thank you so much for the speedy reply! I am 100% for listening to any instructions word for word up until the end (and I agree to every statement provided above) and thank you so much in advance for any help you have provided! Here is the fixlog! Fixlog.txt
  13. Also something I forgot to add is that I did run malwarebytes and it did find 3 trojans and deleted/removed them and it seems Windows Process Manager (32 bit) shows up less often but clearly still exists as these screenshots are from today 1/12/18. Another aspect is this infection crashes my Avast Antivirus. Again any help is appreciated!!
  14. Recently my computer has been infected through I'm sure something I have downloaded yet I was not fast enough to catch it and my computer is suffering. This seems to be a similar situation to a forum post I read up on to find out what is happening to my computer. I have a fairly high end computer in which I should not have any lag whatsoever no matter what application(s) I am running but as of late my computer struggles simply with google chrome. I checked out my task manager to see what process was taking up almost 100% of my CPU and RAM and it was "Windows Process Manager (32 bit)" and when I expand it its about 6 processes all under the same name and when I open details it is a process sbaeouh.exe that cannot be stopped no matter what and when I try to open file location I am denied access. Screenshots are attatched below as are my FRST and Addition txts. Please help! Thanks! -Jarrod FRST.txt Addition.txt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.