Jump to content

i think a mouse sharing program (barrier) got used maliciously


Recommended Posts

So i just opened task manager and noticed that a mouse sharing program (barrier) was on for some reason. i dont remember toying with it on this computer but i had used it on another computer back in march. i opened the program and it was hosting server, i opened the logs and saw (desktop-███████ is this computers host name)

[2022-08-23T08:46:57] INFO: connecting to service...
[2022-08-23T08:46:58] INFO: connection established
[2022-08-23T04:40:34] INFO: using last known command: "C:/Program Files/Barrier/barriers.exe" -f --no-tray --debug INFO --name DESKTOP-███████ --ipc --enable-drag-drop --profile-dir "C:\Users\███████\AppData\Local\Barrier" -c "C:/Users/███████/AppData/Local/Temp/Barrier.PUbAJG" --address :24800
[2022-08-23T04:40:34] INFO: service command updated
[2022-08-23T04:40:34] INFO: starting new process as privileged user
server status: active
[2022-08-23T04:40:34] INFO: drag and drop enabled
[2022-08-23T04:40:34] ERROR: failed to get desktop path, no drop target available, error=2
started server (IPv4/IPv6), waiting for clients
server status: active

i see that barrier has apparently connected to somewhere, then recieved a command to start barrierS which is the server executable, and all those shady modifiers like no tray icon and --enable-drag-drop for file transfer
(not sure if i interpeted that correctly, i think i did but not exactly the super techy type)

i instantly stopped the server, which added to the logs, it was 8:51 at the time

[2022-08-23T08:51:10] INFO: service command updated
[2022-08-23T08:51:10] INFO: process started but command is empty, shutting down
[2022-08-23T08:51:10] INFO: got ipc shutdown message
[2022-08-23T08:51:10] NOTE: stopped server
[2022-08-23T08:51:11] INFO: process 5528 was shutdown gracefully

so i go around digging and find a BarrierSetup-2.3.4-release.exe in one of my desktop folder containing media

image.png.3025836a350ab1bfcb19276b7581bedc.png

created and modified on 12/04/2022 19:10
with the installation folder being in program files, created on 12/04/2022 19:11

i check "C:\Users\███████\AppData\Local\Barrier"
it contained a ssl folder with a pgp private key and a fingerprints folder that had .txt file called local.txt
inside that local text was a ssh key i think

 

then i checked what is Barrier.PUbAJG 

section: screens
	DESKTOP-███████:
		halfDuplexCapsLock = false
		halfDuplexNumLock = false
		halfDuplexScrollLock = false
		xtestIsXineramaUnaware = false
		preserveFocus = false
		switchCorners = none 
		switchCornerSize = 0
	LAPTOP1:
		halfDuplexCapsLock = false
		halfDuplexNumLock = false
		halfDuplexScrollLock = false
		xtestIsXineramaUnaware = false
		preserveFocus = false
		switchCorners = none 
		switchCornerSize = 0
end

section: aliases
end

section: links
	DESKTOP-███████:
		right = LAPTOP1
	LAPTOP1:
		left = DESKTOP-███████
end

section: options
	relativeMouseMoves = false
	screenSaverSync = true
	win32KeepForeground = false
	clipboardSharing = true
	switchCorners = none 
	switchCornerSize = 0
end

Ok so i do have 1 laptop but im pretty sure its not called LAPTOP1 

and i dont really know how to interpert those settings but clipboard sharing true, preserve focus false. seems like it wants to be in the backround and just collect data.

 

okay so i figure, maybe checking event viewer will help

so i look into windows logs/ application and notice that starting from 12/04/2022  at 19:11 theres lots of events from bonjour

image.thumb.png.b6b8855ac2c132ea19e1c8e3cf987b4e.png

and those events have been going on until this day and theres like 1 to 4 days in between a series of events which is weird because i turn my computer on almost every single day

image.png.51afa2d61f6e90376deb396c58b3735d.png

okay so i look at todays events which correspond with barrier log timestamps

and from top to bottom the events are 

8.46.57 Bad service type in ._barrierClientZeroconf._tcp.local. Application protocol name must be underscore plus 1-15 characters. See <http://www.dns-sd.org/ServiceTypes.html>
8.46.57 Bad service type in 192.168.1.102._barrierServerZeroconf._tcp.local. Application protocol name must be underscore plus 1-15 characters. See <http://www.dns-sd.org/ServiceTypes.html>
8.46.57 Bad service type in ._barrierServerZeroconf._tcp.local. Application protocol name must be underscore plus 1-15 characters. See <http://www.dns-sd.org/ServiceTypes.html>
8.46.57 Bad service type in 192.168.1.102._barrierServerZeroconf._tcp.local. Application protocol name must be underscore plus 1-15 characters. See <http://www.dns-sd.org/ServiceTypes.html>

4.40.40 Local Hostname DESKTOP-7TV735L.local already in use; will try DESKTOP-███████-2.local instead
4.40.40 mDNSCoreReceiveResponse: ProbeCount 0; will deregister    4 DESKTOP-███████.local. Addr 192.168.1.102
4.40.40 mDNSCoreReceiveResponse: Received from 192.168.1.102:5353   16 DESKTOP-███████.local. AAAA 2001:████:████:████:████:████:████:████ (my ipv6 address)

23/08/2022 4.40.34 Service started
23/08/2022 4.40.34 Service initialized
23/08/2022 4.40.34 Service initializing

all of the event logs for bonjour are like this. sometimes mDNSCoreReceiveResponse: Received from is not my 192.168.1.102 adress but it is instead my link-local ipv6 address
sometimes theres a PTR record instead of a A record 

sometimes theres like many consecutive "mDNSCoreReceiveResponse: Resetting to Probing: -> mDNSCoreReceiveResponse: Received from -> mDNSCoreReceiveResponse: Resetting to Probing: ->" chains but they all end in "ProbeCount 0; will deregister "

i remember doing a malwarebytes scan on 30/07/2022 but that didnt bring up anything

heres the latest scan i just did 

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 23/08/2022
Scan Time: 10:18
Log File: d572df04-22b3-11ed-af03-040e3c3ae5f9.json

-Software Information-
Version: 4.5.13.208
Components Version: 1.0.1740
Update Package Version: 1.0.59033
Licence: Free

-System Information-
OS: Windows 10 (Build 19043.1889)
CPU: x64
File System: NTFS
User: DESKTOP-███████\███████

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 400384
Threats Detected: 14
Threats Quarantined: 0
Time Elapsed: 3 min, 3 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 3
PUP.Optional.PushNotifications.Generic, C:\USERS\███████\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, No Action By User, 175, 838845, , , , , , 
PUP.Optional.PushNotifications.Generic, C:\USERS\███████\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, No Action By User, 175, 838845, , , , , , 
PUP.Optional.PushNotifications.Generic, C:\USERS\███████\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, No Action By User, 175, 838845, , , , , , 

File: 11
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000005.ldb, No Action By User, 175, 838845, , , , , 1126E353C4A0DF12BA9D2716DC0071D9, 02A5058A3C62F3044847E96B7FFAA9FAC1A784F661BA86AF1992DDD3905C519E
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000578.log, No Action By User, 175, 838845, , , , , FE5D35CCE8D1F43EA3282275CCD2B80F, 444222098750FB05898C0EC745BB8F679F92FB61E0FE62246E54C270EFCA7582
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000580.ldb, No Action By User, 175, 838845, , , , , 05170C136AC0FB74F5A4BF2585591042, C6017CA0BBE6D8FBDA50A7184A447346C4BE5830AD935BF8504536EE39667FB7
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT, No Action By User, 175, 838845, , , , , 46295CAC801E5D4857D09837238A6394, 0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOCK, No Action By User, 175, 838845, , , , , , 
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG, No Action By User, 175, 838845, , , , , D3021FF081FE0D71107D33FDEDF92A84, 2282492CB47395A2A2486B3E5097FB42A752C99E7F4AD998D57EB3F1A0E1033B
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old, No Action By User, 175, 838845, , , , , F6E01C486CF2F4387AC000E2E909D91A, A78A9C0753A75F0995CC59D32DFA5175899A7F495DFF16C337E3F756DB6F17A7
PUP.Optional.PushNotifications.Generic, C:\Users\███████\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000001, No Action By User, 175, 838845, , , , , 88DAB6CB114174BF41EA2156AFA6409D, E59B7EEBB16B6A58237464E969D7E2EBAED96880EE8E53F84FA5DDEE303D22D0
PUP.Optional.PushNotifications.Generic, C:\USERS\███████\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, No Action By User, 175, 838845, 1.0.59033, , ame, , D037D8E0DEB44AD9DEC604118BC3CC65, DA92EEEE6575F8784271C8CEAF47FD72579E4BE3C6FAF847C5B0B0DEBD7AA114
PUP.Optional.PushNotifications.Generic, C:\USERS\███████\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, No Action By User, 175, 838845, 1.0.59033, , ame, , D037D8E0DEB44AD9DEC604118BC3CC65, DA92EEEE6575F8784271C8CEAF47FD72579E4BE3C6FAF847C5B0B0DEBD7AA114
PUP.Optional.PushNotifications.Generic, C:\USERS\███████\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, No Action By User, 175, 838845, 1.0.59033, , ame, , D037D8E0DEB44AD9DEC604118BC3CC65, DA92EEEE6575F8784271C8CEAF47FD72579E4BE3C6FAF847C5B0B0DEBD7AA114

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)



and thats where im at. Any clues as what this could be? did i just download barrier, throw the installation executable into a random folder on my desktop, installed it and then forgot about it and now just finding out that its still on?
or is this probably malware and my clipboard has been compromised for the past 4 months?
advice on what to do other than delete all program files relating to barrier and probably delete bonjour also since i dont really use apple stuff
 

Link to post
Share on other sites

  • Root Admin

Hello  and  :welcome:      @tosscase

 

My screen name is AdvancedSetup and I will assist you with your system issues.
 

Let's keep these principles as we proceed. Make sure to read the entire post below first.

  • Please follow all steps in the provided order and post back all requested logs
  • Please attach all log files to your post, unless otherwise requested
  • Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans have been completed.
  • Temporarily disable Microsoft SmartScreen to download the software below if needed. Make sure to turn it back on once the scans are completed.
  • Searching, detecting, and removing malware isn't instantaneous and there is no guarantee to repair every system.
  • Before we start, please make sure that you have an external backup, not connected to this system, of all private data.
  • Do not run online games while the case is ongoing. Do not do any free-wheeling or risky web-surfing.
  • Only run the tools I guide you to use. Please don't run any other scans, download, install or uninstall any programs while I'm working with you.
  • Cracked, Hacked, or Pirated programs are not only illegal but also can make a computer a malware victim. Having such programs installed is the easiest way to get infected. It is the leading cause of ransomware encryption. It is at times also a big source of current Trojan infections. If there are any on the system you should uninstall them before we proceed.
  • Please be patient and stick with me until I give you the "all clear". We don't want to waste your time, please don't waste ours.
  • If your system is running Discord, please be sure to Exit it while this case is ongoing.

 

To begin, please do the following so that we may take a closer look at your installation for troubleshooting. This is a report only.

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to your desktop, please upload that file on your next reply

Thank you

 

Link to post
Share on other sites

  • Root Admin

Please note: I do not see an obvious infection on the system. We do not provide forensic services to determine why or how something got onto the box. If that is important to you then I would  suggest you stop now and do not use the computer anymore and seek the services of a Forensic team. That type of work can exceed $1K depending on who does the work.

We can help you to provide some general clean up advise and do some security scans to look deeper for an issue.

Please let us know how you'd like to proceed

Thanks @tosscase

 

 

Link to post
Share on other sites

  • Root Admin

Okay, let's go ahead and run an ESET antivirus scan to start off.

 

Let me have you run a different scanner to double-check.

I would suggest a free scan with the ESET Online Scanner

Go to https://download.eset.com/com/eset/tools/online_scanner/latest/esetonlinescanner.exe

  • It will start a download of "esetonlinescanner.exe"
  • Save the file to your system, such as the Downloads folder, or else to the Desktop.
  • Go to the saved file, and double click it to get it started. 
  • When presented with the initial ESET options, click on "Computer Scan".
  • Next, when prompted by Windows, allow it to start by clicking Yes 
  • When prompted for scan type, Click on Full scan 
  • Look at & tick  ( select )   the radio selection "Enable ESET to detect and quarantine potentially unwanted applications"   and click on the Start scan button.
  • Have patience.  The entire process may take an hour or more. There is an initial update download.
  • There is a progress window display.
  • You should ignore all prompts to get the ESET antivirus software program.   ( e.g. their standard program).   You do not need to buy or get or install anything else.
  • When the scan is completed, if something was found, it will show a screen with the number of detected items.  If so, click the button marked “View detected results”.
  • Click The blue “Save scan log” to save the log.
  • If something was removed and you know it is a false finding, you may click on the blue ”Restore cleaned files”  ( in blue, at the bottom).
  • Press Continue when all done.  You should click to off the offer for “periodic scanning”.

 

Note: If you do need to do a File Restore from ESET please follow the directions below

[KB2915] Restore files quarantined by the ESET Online Scanner version 3

https://support.eset.com/en/kb2915-restore-files-quarantined-by-the-eset-online-scanner

 

Link to post
Share on other sites

  • Root Admin

No problem. Let me have you run the following please.

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 
Spoiler

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

missed attaching the log for this 

  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.

    step. here malwarebytes 25.08 report from det history.txt
Link to post
Share on other sites

  • Root Admin

Please go to Control Panel, Programs, Programs and Features and uninstall the following @tosscase

Java 8 Update 311 (64-bit)
 

Then let me have you run the following clean up script. Once the script has completed, please attach the FIXLOG.TXT file.

 

 

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.
NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

Please make sure you disable any real-time antivirus or security software before running this script. Once completed, make sure you re-enable it.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1:  This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The use of an external password manager is highly recommended instead of using your browser to store passwords.

NOTE-3: As part of this fix it will also reset the network to default settings including the firewall. If you have custom firewall rules you need to save please export or save them first before running this fix.

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome, and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Discord cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.

fixlist.txt

Thanks

 

Link to post
Share on other sites

hey btw do you have any links or copypastas explaining why is this free, 1 to 1 support available at all? 

gathering data must be a part of it. probably mostly on what malware is out there and identifying/gathering new signatures etc. 
then you guys probably get tons of data on what kind of setups people have. what versions of software are people running.
also this is a pretty sweet way to market the product. mouth to mouth advertising by creating good experiences. 

so whats up with the philanthropy. i love it but im not used to seeing this kind of charity. whats the catch :D?

Link to post
Share on other sites

  • Root Admin

No catch. I really enjoy helping others and the owner of the company truly believes that everyone should have access to a malware free system. We do have Premium software for sale that allows us to offer the free services as many customers do purchase our program.

https://www.malwarebytes.com/premium

 

How is the computer running now?

 

It's quite late for me so I'm headed out, but will check on you tomorrow. Please run the following and I'll check on it tomorrow too.

 

 

 

Microsoft Safety Scanner

Please make sure you Exit out of any other program you might have open so that the sole task is to run the following scan.   
That goes especially for web browsers, make sure all are fully exited out of and messenger programs are exited and closed as well
 

STEP 1

Please set File Explorer to SHOW ALL folders, all files, including hidden ones.  Use OPTION ONE or TWO of this article

https://www.tenforums.com/tutorials/7078-turn-off-show-all-folders-windows-10-navigation-pane.html

STEP 2

I suggest a new scan for viruses & other malware. This may take several hours, depending on the number of files on the system and the speed of the computer.

The Microsoft Safety Scanner is a free Microsoft stand-alone virus scanner that can be used to scan for & remove malware or potentially unwanted software from a system. 

The download links & the how-to-run-the tool are at this link at Microsoft 

https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download

 

Look on the Scan Options & select the FULL scan.

Then start the scan. Have lots of patience. It may take several hours.

  • Once you see it has started, take a long long break;  walk away.  Do not pay credence if you see some intermediate early flash messages on the screen display.  The only things that count are the End result at the end of the run.
  • The scan will take several hours.  Leave it alone. It will remove any other remaining threats as it goes along.  Take a very long break, do your normal personal errands .....just do not use the computer during this scan.

This is likely to run for many hours as previously mentioned  ( depending on the number of files on your machine & the speed of the hardware.)

The log is named MSERT.log  and the log will be at C:\Windows\debug\msert.log

Please attach that log with your next reply.

 

 

It is normal for the Microsoft Safety Scanner to show detections during the scan process. It is scanning for basically all bread crumbs or traces of files and registry entries that "might" be or have been part of some infection or previous infection.

That DOES NOT mean the computer is infected. Once the scan has been completed it uploads the log to their Cloud service which then uses Artificial Intelligence to determine if in fact any of the traces are an infection or not.

Then it writes into the log on your computer what it found.

 

 

Link to post
Share on other sites

  • 4 weeks later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.