Jump to content

Voracious hard drive and booting problems


Recommended Posts

Hello everyone,

 

I find that my C drive continues to fill up even though I clean it repeatedly! It also seems slow to boot up, and sometimes gets stuck on the "Verifying DMI Pool Data" screen and requires a hard reboot. Malware scans have all come up negative, but I believe I may be infected anyway with something quite stealthy. I have attached my Farbar logs to this post and would appreciate some help.

 

Thanks much!

 

NotMozart

Addition.txt

FRST.txt

Link to post
Share on other sites

Hello NotMozart! My name is Borislav and I will be glad to help you solve your malware problem.

Please note:

  • If you are a paying customer, you have the privilege to contact the help desk at Consumer Support. If you choose this option to get help, please let me know.
  • I recommend you to keep the instructions I will be giving you so that they are available to you at any time. You can save them in a text file or print them.
  • Make sure you read all of the instructions and fixes thoroughly before continuing with them.
  • Follow my instructions strictly and don’t hesitate to stop and ask me if you have any questions.
  • Post your log files, don't attach them. Every log file should be copy/pasted in your next reply.
  • Do not perform any kind of scanning and fixing without my instructions. If you want to proceed on your own, please let me know.
Step 1

Please uninstall the following programs: Ask Toolbar and PC Tools Registry Mechanic 11.0

Step 2

Download attached fixlist.txt file and save it to the Desktop.

NOTE. It's important that both files, FRST/FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST/FRST64 and press the Fix button just once and wait.

If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.

When finished FRST will generate a log on the Desktop (Fixlog.txt). Please post it to your reply.

Step 3

Download aswMBR.exe to your desktop.

Double click the aswMBR.exe to run it

Click the "Scan" button to start scan

aswMBR2-1.gif

On completion of the scan click save log, save it to your desktop and post in your next reply

aswMBR2.png

In your next reply, post the following log files:

  • FRST fix log
  • aswMBR log

fixlist.txt

Link to post
Share on other sites

Hello Borislav,

 

Thank you very much! I followed the directions you gave. Here are the log files:

 

Fixlog

 

Fix result of Farbar Recovery Scan Tool (x64) Version:20-08-2015
Ran by Evan the Composer (2015-08-20 14:08:19) Run:1
Running from C:\Users\Evan the Composer\Desktop
Loaded Profiles: Evan the Composer & UpdatusUser (Available Profiles: Evan the Composer & UpdatusUser)
Boot Mode: Normal
==============================================

fixlist content:
*****************
start
CreateRestorePoint:
CloseProcesses:
Task: {633FCCC2-4968-4D96-B477-0E22E05EA6F0} - \RMSchedule -> No File <==== ATTENTION
Task: {68C42C66-E1F7-4F4E-8A9C-A9BCD63A1D4D} - System32\Tasks\Scheduled Update for Ask Toolbar => C:\Program Files (x86)\Ask.com\UpdateTask.exe <==== ATTENTION
Task: {C3CC4FB9-8244-4BB8-9E34-6352C3AB248F} - System32\Tasks\RMAutoUpdate => C:\Program Files (x86)\PC Tools\PC Tools Registry Mechanic\SULauncher.exe [2012-03-21] (PC Tools)
Task: C:\Windows\Tasks\RMAutoUpdate.job => C:\Program Files (x86)\PC Tools\PC Tools Registry Mechanic\SULauncher.exe
AlternateDataStreams: C:\ProgramData\TEMP:D1B5B4F1
AlternateDataStreams: C:\Users\Evan the Composer\AppData\Local\9dzRSrJfrF:Jwt45QM8acaeQvIM1S
AlternateDataStreams: C:\Users\Evan the Composer\AppData\Local\Temporary Internet Files:4HGirwiguIL6vUYJgKU6PtfPTFt
C:\Program Files (x86)\Ask.com
C:\Program Files (x86)\PC Tools
Winsock: Catalog9 01 CESpy.dll File not found
Winsock: Catalog9 02 CESpy.dll File not found
Winsock: Catalog9 03 CESpy.dll File not found
Winsock: Catalog9 04 CESpy.dll File not found
Winsock: Catalog9 05 CESpy.dll File not found
Winsock: Catalog9 06 CESpy.dll File not found
Winsock: Catalog9 07 CESpy.dll File not found
Winsock: Catalog9 08 CESpy.dll File not found
Winsock: Catalog9 09 CESpy.dll File not found
Winsock: Catalog9 10 CESpy.dll File not found
Winsock: Catalog9 11 CESpy.dll File not found
Winsock: Catalog9 23 CESpy.dll File not found
Winsock: Catalog9-x64 01 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 02 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 03 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 04 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 05 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 06 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 07 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 08 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 09 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 10 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 11 CESpy.dll File Not ' & $found1 & '
Winsock: Catalog9-x64 23 CESpy.dll File Not ' & $found1 & '
CMD: netsh advfirewall reset
CMD: netsh advfirewall set allprofiles state ON
CMD: ipconfig /flushdns
CMD: netsh winsock reset catalog
CMD: ipconfig /release
CMD: ipconfig /renew
CMD: netsh int ipv4 reset
CMD: netsh int ipv6 reset
RemoveProxy:
CMD: bitsadmin /reset /allusers
EmptyTemp:
end
*****************

Restore point was successfully created.
Processes closed successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{633FCCC2-4968-4D96-B477-0E22E05EA6F0} => key not found.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\RMSchedule => key not found.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{68C42C66-E1F7-4F4E-8A9C-A9BCD63A1D4D} => key not found.
C:\Windows\System32\Tasks\Scheduled Update for Ask Toolbar not found.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Scheduled Update for Ask Toolbar => key not found.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C3CC4FB9-8244-4BB8-9E34-6352C3AB248F} => key not found.
C:\Windows\System32\Tasks\RMAutoUpdate not found.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\RMAutoUpdate => key not found.
C:\Windows\Tasks\RMAutoUpdate.job not found.
C:\ProgramData\TEMP => ":D1B5B4F1" ADS removed successfully.
C:\Users\Evan the Composer\AppData\Local\9dzRSrJfrF => ":Jwt45QM8acaeQvIM1S" ADS removed successfully.
"C:\Users\Evan the Composer\AppData\Local\Temporary Internet Files" => ":4HGirwiguIL6vUYJgKU6PtfPTFt" ADS not found.
"C:\Program Files (x86)\Ask.com" => File/Folder not found.
C:\Program Files (x86)\PC Tools => moved successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000009" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000023" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000001" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000002" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000003" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000004" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000005" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000006" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000007" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000008" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000009" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000010" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000011" => key removed successfully
"HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000023" => key removed successfully

=========  netsh advfirewall reset =========

Initialization Function InitHelperDll in NSHHTTP.DLL failed to start with error code 10107
Ok.

========= End of CMD: =========

=========  netsh advfirewall set allprofiles state ON =========

Initialization Function InitHelperDll in NSHHTTP.DLL failed to start with error code 10107
Ok.

========= End of CMD: =========

=========  ipconfig /flushdns =========

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========= End of CMD: =========

=========  netsh winsock reset catalog =========

Initialization Function InitHelperDll in NSHHTTP.DLL failed to start with error code 10107

Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.

========= End of CMD: =========

=========  ipconfig /release =========

Windows IP Configuration

No operation can be performed on Wireless Network Connection 2 while it has its media disconnected.
No operation can be performed on Local Area Connection while it has its media disconnected.

Wireless LAN adapter Wireless Network Connection 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . :
   Link-local IPv6 Address . . . . . : fe80::9cda:3e9f:634:4a44%17
   Default Gateway . . . . . . . . . :

Ethernet adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter isatap.{BD5DFDC6-B88D-462F-81DE-F76C45D0069B}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Reusable ISATAP Interface {56BAB604-7561-400E-9863-C5B231A56785}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Local Area Connection* 33:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter isatap.{109F5268-F488-4C17-9124-00E34919FDB3}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Local Area Connection* 34:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

========= End of CMD: =========

=========  ipconfig /renew =========

Windows IP Configuration

No operation can be performed on Wireless Network Connection 2 while it has its media disconnected.
No operation can be performed on Local Area Connection while it has its media disconnected.

Wireless LAN adapter Wireless Network Connection 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . :
   Link-local IPv6 Address . . . . . : fe80::9cda:3e9f:634:4a44%17
   IPv4 Address. . . . . . . . . . . : 192.168.1.7
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.1

Ethernet adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter isatap.{BD5DFDC6-B88D-462F-81DE-F76C45D0069B}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Reusable ISATAP Interface {56BAB604-7561-400E-9863-C5B231A56785}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Local Area Connection* 33:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Local Area Connection* 34:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

========= End of CMD: =========

=========  netsh int ipv4 reset =========

Reseting Global, OK!
Reseting Interface, OK!
Restart the computer to complete this action.

========= End of CMD: =========

=========  netsh int ipv6 reset =========

Reseting Interface, OK!
Restart the computer to complete this action.

========= End of CMD: =========

========= RemoveProxy: =========

HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\DefaultConnectionSettings => value removed successfully
HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\SavedLegacySettings => value removed successfully
HKU\S-1-5-21-1590420131-3285871837-2108242094-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\DefaultConnectionSettings => value removed successfully
HKU\S-1-5-21-1590420131-3285871837-2108242094-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\SavedLegacySettings => value removed successfully

========= End of RemoveProxy: =========

=========  bitsadmin /reset /allusers =========

BITSADMIN version 3.0 [ 7.5.7601 ]
BITS administration utility.
© Copyright 2000-2006 Microsoft Corp.

BITSAdmin is deprecated and is not guaranteed to be available in future versions of Windows.
Administrative tools for the BITS service are now provided by BITS PowerShell cmdlets.

0 out of 0 jobs canceled.

========= End of CMD: =========

EmptyTemp: => 4 GB temporary data Removed.

The system needed a reboot..

==== End of Fixlog 14:09:09 ====

 

aswMBR

 

aswMBR version 1.0.1.2252 Copyright© 2014 AVAST Software
Run date: 2015-08-20 14:23:43
-----------------------------
14:23:43.643    OS Version: Windows x64 6.1.7601 Service Pack 1
14:23:43.643    Number of processors: 4 586 0x1707
14:23:43.644    ComputerName: EVAN-PC  UserName:
14:23:52.738    Initialize success
14:23:52.900    VM: initialized successfully
14:23:52.901    VM: Intel CPU supported
14:24:04.778    VM: supported disk I/O ataport.SYS
14:28:05.050    AVAST engine defs: 15082001
14:28:37.832    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-4
14:28:37.834    Disk 0 Vendor: WDC_WD800JD-75MSA3 10.01E04 Size: 76292MB BusType: 3
14:28:37.837    Disk 1  \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP2T1L0-5
14:28:37.840    Disk 1 Vendor: WDC_WD5000AAKS-00YGA0 12.01C02 Size: 476938MB BusType: 3
14:28:37.843    Disk 2  \Device\Harddisk2\DR2 -> \Device\Ide\IdeDeviceP3T0L0-6
14:28:37.846    Disk 2 Vendor: Maxtor_6Y160M0 YAR51HW0 Size: 152587MB BusType: 3
14:28:37.850    Disk 3  \Device\Harddisk3\DR3 -> \Device\Ide\IdeDeviceP3T1L0-7
14:28:37.854    Disk 3 Vendor: WDC_WD5000AAKS-00YGA0 12.01C02 Size: 476938MB BusType: 3
14:28:37.858    Disk 4  \Device\Harddisk4\DR4 -> \Device\Ide\IdeDeviceP4T0L0-8
14:28:37.865    Disk 4 Vendor: WDC_WD5000AAKS-00YGA0 12.01C02 Size: 476940MB BusType: 3
14:28:37.870    Disk 5  \Device\Harddisk5\DR5 -> \Device\Ide\IdeDeviceP1T0L0-1
14:28:37.875    Disk 5 Vendor: WDC_WD6400AAKS-65A7B0 01.03B01 Size: 610480MB BusType: 3
14:28:37.880    Disk 6  \Device\Harddisk6\DR6 -> \Device\Ide\IdeDeviceP5T0L0-a
14:28:37.886    Disk 6 Vendor: WDC_WD5000AAKS-00YGA0 12.01C02 Size: 476940MB BusType: 3
14:28:38.033    Disk 0 MBR read successfully
14:28:38.039    Disk 0 MBR scan
14:28:38.057    Disk 0 Windows 7 default MBR code
14:28:38.066    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS          100 MB offset 2048
14:28:38.071    Disk 0 default boot code
14:28:38.089    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS        76190 MB offset 206848
14:28:38.115    Disk 0 scanning C:\Windows\system32\drivers
14:29:01.009    Service scanning
14:29:38.567    Modules scanning
14:29:38.575    Disk 0 trace - called modules:
14:29:38.593    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys ataport.SYS pciide.sys PCIIDEX.SYS hal.dll atapi.sys
14:29:38.599    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8007b7c060]
14:29:38.604    3 CLASSPNP.SYS[fffff880018aa43f] -> nt!IofCallDriver -> [0xfffffa80078c3520]
14:29:38.609    5 ACPI.sys[fffff88000f907a1] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-4[0xfffffa80075e7680]
14:29:39.729    AVAST engine scan C:\Windows
14:29:41.642    AVAST engine scan C:\Windows\system32
14:34:27.294    AVAST engine scan C:\Windows\system32\drivers
14:34:49.436    AVAST engine scan C:\Users\Evan the Composer
14:46:34.235    AVAST engine scan C:\ProgramData
14:57:10.198    Disk 0 statistics 7671874/0/0 @ 2.79 MB/s
14:57:10.212    Scan finished successfully
15:01:55.865    Disk 0 MBR has been saved successfully to "C:\Users\Evan the Composer\Desktop\MBR.dat"
15:01:55.880    The log file has been saved successfully to "C:\Users\Evan the Composer\Desktop\aswMBR.txt"

Thanks again,

 

NotMozart

Link to post
Share on other sites

Please scan your machine with ESET OnlineScan

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.

    ESET OnlineScan

  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer.

      Save it to your Desktop.

    • Double click on the esetsmartinstaller_enu.png to download the ESET Smart Installer. icon on your Desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under Scan Settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
Link to post
Share on other sites

Hello Borislav,

 

I have completed the scan. Here is the log:

 

ESETScan

 

H:\Downloads\ccsetup311.exe Win32/Bundled.Toolbar.Google.E potentially unsafe application deleted - quarantined
H:\Downloads\ccsetup313.exe Win32/Bundled.Toolbar.Google.E potentially unsafe application deleted - quarantined
H:\Downloads\CuteWriter (1).exe a variant of Win32/Bundled.Toolbar.Ask.G potentially unsafe application deleted - quarantined
H:\Downloads\CuteWriter.exe a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application deleted - quarantined

 

 

 

Thanks again!

 

NotMozart
 

Link to post
Share on other sites

This problem is not malware-related. Glad your system is fine!

Step 1

  • Please download Delfix.exe by Xplode and save it to your desktop.
  • Please start it and check the box next to "Remove disinfection tools" and click on the Run button.
  • The tool will delete itself once it finishes.
Step 2

Some malware preventions:

https://forums.malwarebytes.org/index.php?/topic/81386-so-how-did-i-get-infected-in-the-first-place/

Safe surfing! :)

Link to post
Share on other sites

Thank you so much! I have run the tool as you instructed, and everything seems to be running smoothly now.

 

I really appreciate the time you took to help me out. I also read the topic about avoiding infection; I didn't know that Internet Explorer was so vulnerable! I will definitely be more careful.

 

Thank you again. This has been such a big help.

 

NotMozart

Link to post
Share on other sites

  • 3 months later...
  • Root Admin

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.