can anybody help me with this problem???

Deploying to Windows? Utilizing VB Script execution? This is the place to ask Windows-specific questions.

Moderators: FourthWorld, heatherlaine, Klaus, kevinmiller, robinmiller

Post Reply
shadowslash
Posts: 344
Joined: Tue Feb 24, 2009 6:14 pm
Contact:

can anybody help me with this problem???

Post by shadowslash » Sat Mar 28, 2009 9:17 pm

can anybody help me? i got this message from revolution and now it wont open Runtime Revolution Image... anybody have an idea how to resolve this???

Image
Parañaque, Philippines
Image
Image

sturgis
Livecode Opensource Backer
Livecode Opensource Backer
Posts: 1685
Joined: Sat Feb 28, 2009 11:49 pm

Post by sturgis » Sun Mar 29, 2009 4:07 am

Did some reasearch on this and found:
* The program was compiled or linked with an option, such as /FPi87, that requires a coprocessor, but the program was run on a machine that did not have a coprocessor installed.
* A format string for a printf or scanf function contained a floating-point format specification and the program did not contain any floating-point values or variables.
* The compiler minimizes a program's size by loading floating-point support only when necessary. The compiler cannot detect floating-point format specifications in format strings, so it does not load the necessary floating-point routines.
* Use a floating-point argument to correspond to the floating-point format specification, or perform a floating-point assignment elsewhere in the program. This causes floating-point support to be loaded.
* In a mixed-language program, a C library was specified before a FORTRAN library when the program was linked. Relink and specify the C library last.
Helpful huh?
Backup all your important files before trying anything drastic. (remove and reinstall the non-functional software package is usually the best, safest step, do that first)
I'd suggest trying a few things, and would like a couple questions answered also.

Questions first. You're not using an ancient machine with no coprocessor right (IE an old 486sx) I'm sure the answer to this is no, but gotta ask.

edited to change 386 to 486. 386sx had a crippled datapath, 486sx is the one with the dead coprocessor.

You haven't setup any disk encryption either right?

Your antivirus is up to date yes?

You've scanned for malware also?

If it were me what i'd do, is confirm my av is up to date and scan everything, remove the installation of runrev, scan again, download a fresh copy of runrev and re-install it.

If it still does the same thing, i'd be wondering if some of the system libraries were corrupt. Specifically the runtime that handles floating point support. If thats the case, I'm not sure how one would re-install them, and am not sure if the library in question is included with runrev or not. If you reload runrev and it doesn't fix it, its most likely a library thats NOT included.

Depending on your os version you might be able to run the system file checker (sfc.exe) but depending on how long your installation has been up, and updating, it tends to find files that don't need fixing, and when you replace the files from your install cd, end up causing more problems than you had to begin with. However, you can run SFC and NOT extract replacements. The names of the files it finds might give a hint as to whats wrong.

Worst case, you can run hijackthis and dump a whole passle of information that I'm not qualified to interpret. Which unless you know what it all means might be pointless.

Wish I could be more help, but the standard virus check, uninstall/re-install mantra is the most likely to solve the problem short of reloading your whole system. *gag*

shadowslash
Posts: 344
Joined: Tue Feb 24, 2009 6:14 pm
Contact:

Post by shadowslash » Sun Mar 29, 2009 11:06 am

um i don't think the problem is with Runtime Revolution itself, not just runtime revolution stopped working but so did my other programs (e.g. Media Player Classic)... those programs didn't have anything 2 do w/ runtime revolution... note that Media Player Classic is a standalone that doesn't need to be installed... just the single application so it shouldn't be the problem of the corrupt installation....
Parañaque, Philippines
Image
Image

SparkOut
Posts: 2944
Joined: Sun Sep 23, 2007 4:58 pm

Post by SparkOut » Sun Mar 29, 2009 2:00 pm

In a development environment http://support.microsoft.com/kb/37507 indicates that you need to ensure that floating point libraries are initiated before making a call. Have you actually tried wrapping external dlls in Visual C++ Studio or something?
Another answer is that it seems to be an issue largely associate with a virus. WoW players have noticed this and it's possible that the W32 Parite B virus is responsible. Near the end of this thread http://forums.worldofwarcraft.com/threa ... 1&pageNo=2 there is one other post indicating a possible non-viral cause. Do you have Intel or AMD chips? Perhaps try updating the chipset firmware. You can only hope for the best, but prepare for the worst (virus seems likely).

sturgis
Livecode Opensource Backer
Livecode Opensource Backer
Posts: 1685
Joined: Sat Feb 28, 2009 11:49 pm

Post by sturgis » Sun Mar 29, 2009 3:19 pm

SparkOut wrote:In a development environment http://support.microsoft.com/kb/37507 indicates that you need to ensure that floating point libraries are initiated before making a call. Have you actually tried wrapping external dlls in Visual C++ Studio or something?
Another answer is that it seems to be an issue largely associate with a virus. WoW players have noticed this and it's possible that the W32 Parite B virus is responsible. Near the end of this thread http://forums.worldofwarcraft.com/threa ... 1&pageNo=2 there is one other post indicating a possible non-viral cause. Do you have Intel or AMD chips? Perhaps try updating the chipset firmware. You can only hope for the best, but prepare for the worst (virus seems likely).
Agree with sparkOut, virus is the most likely. Could still be a corrupt dll somewhere, but either way, yep. Prepare for the worst.

maverickalex
Posts: 108
Joined: Sun Mar 15, 2009 11:51 pm

Post by maverickalex » Mon Mar 30, 2009 7:51 pm

I was given some excellent information and instructions on how to thoroughly clean some Virus that had gotten past my AV software (mcafee and Spywaredoctor)

I will paste the advice and instructions.It worked excelently and even speeded up my pc)
# Please print out or copy this page to Notepad since you will can not have any of browsers open while you are fixing this and try to follow it as closely as possible taking it step by step.

Download a copy of HijackThis and save it to your desktop in a folder. Do a scan and save the HijackThis logfile. Do not remove anything. Post your log file here.

http://www.trendsecure.com/portal/en-US ... ckThis.zip


# Update your Antivirus program.



# Please download Spybot Search and Destroy install it and update the program.


http://www.safer-networking.org/en/mirrors/index.html





# Please download VundoFix.exe to your desktop. Ignore the AntiVirus warnings and download it anyway because you need to run it. Wait on installation and running.


http://www.atribune.org/ccount/click.php?id=4





# Download CleanUp! and install it. Wait on installation and running.


http://www.stevengould.org/downloads/cl ... nUp452.exe





# Please download following program CWSHREDDER. Wait on installation and running.


http://www.trendmicro.com/ftp/products/ ... redder.exe





# Download about:Buster and save it to your desktop. When it has finished downloading, unzip the folder to your desktop as well. You should now be left with an aboutbuster folder on your desktop.Wait on installation and running.


http://www.malwarebytes.org/AboutBuster.zip





# I would suggest though that you download CCleaner. It is a great little program that I use every time I close my browser to get rid of temporary files. I usually just run the cleaner part every time I'm done with the browser.During the install there will be check marks for checking for updates that part I do not use and also to install a tool bar for yahoo or something. Make sure those are unchecked unless you want another tool bar, It is a very safe program and it is free.(CCleaner Quick Setup: Go to > Options > Advanced > Uncheck "Only delete files in Windows Temp folders older than 48 hours" for cleaning malware. files!)


http://www.ccleaner.com/



_____________________________________________________________

# Now make sure no files are hidden. To do this:
For XP go to My Computer->Tools->Folder Options->View tab:
* Under the Hidden files and folders heading:
* select Show hidden files and folders.
For Vista go to the Control Panel->Appearance and Personalization
Under the Folder Options, click Show Hidden files and folders.
* Uncheck Hide protected operating system files (recommended) option.
* Click Yes to confirm and then click OK.
You may change the above options back after your log is clean.



# Turn off system restore.

Steps to turn off System Restore for XP:
1. Click Start, right-click My Computer, and then click Properties.
2. In the System Properties dialog box, click the System Restore tab.
3. Click to select the Turn off System Restore check box. Or, click to select the Turn off System Restore on all drives check box.
4. Click OK.
5. When you receive the following message, click Yes to confirm that you want to turn off System Restore:
You have chosen to turn off System Restore. If you continue, all existing restore points will be deleted, and you will not be able to track or undo changes to your computer.
After a few moments, the System Properties dialog box closes.

Steps to turn off System Restore for Vista:
1. Control Panel -> System Maintenance -> Back Up and Restore Center
2. On the right column, click on "create a restore point or change settings" (this requires administrator's password if set)
3. Uncheck all drives.
4. Click OK.
5. When you receive the following message, click Yes to confirm that you want to turn off System Restore:
You have chosen to turn off System Restore. If you continue, all existing restore points will be deleted, and you will not be able to track or undo changes to your computer.
After a few moments, the System Properties dialog box closes.



# Do all steps below in safe mode except for at the end when you generate a new HiJackThis log.



# Next, please reboot your computer in Safe Mode by doing the following:

1) Restart your computer

2) After hearing your computer beep once during startup, but before the Windows icon appears, press F8 (Repeatedly).

3) Instead of Windows loading as normal, a menu should appear

4) Use the up arrow key to highlight Safe Mode and press Enter.




# Please run HijackThis and click "Scan". Place checks next to the following entries if still present in the code and close all browser and other windows except for HijackThis, and click "Fix Checked".
# Run your Antivirus and do a full scan remember this is all in safe mode.



# Run Spybot Search and Destroy and do a full scan remember this is all in safe mode.



# Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu). Set the program up as follows:

*Click "Options..."

*Move the arrow down to "Custom CleanUp!"

*Only Check the following for now:

-Empty Recycle Bins

-Delete Cookies

-Delete Prefetch Files

-Clean up All Users

*Uncheck the following:

-Delete Newsgroup cache

-Delete Newsgroup Subscriptions

*Press the Temporary Files Tab and check.

-Scan drives for files matching

Click OK

Press the CleanUp! button to start the program. Reboot/logoff when prompted.

Note: CleanUp! deletes EVERYTHING out of your temp/temporary folders, it does not make backups. If you have any documents or programs that are saved in any Temporary Folders, please make a backup or MOVE THEM out of the Temp folder before running CleanUp! If you have a 64 bit Operating System do NOT run Cleanup and let me know as we will use another utility.



# Install and run CWSHREDDER

Close all browser windows, open cwshredder.exe then click "Fix" and let it run.



# Double-click on the AbouBuster.exe icon.

Click Begin scan. Close when completed.

It is advised that you run the AbouBuster twice in a row to make sure you get all the infections.

_______________________________________________________________________________________________________________________



# Double-click VundoFix.exe to run it(Do this a few times until nothing shows up).



# Then install CCleaner but note it installs the Yahoo Toolbar as an option which IS check marked by default during the installation. IF you do NOT want it, REMOVE the checkmark when provided with the option.

Before first use, select Options > Advanced and UNCHECK Only delete files in Windows Temp folder older than 48 hours

Then select the items you wish to clean up.



In the Windows Tab:

* Clean all entries in the "Internet Explorer" section except Cookies.
* Clean all the entries in the "Windows Explorer" section.
* Clean all entries in the "System" section.
* Clean all entries in the "Advanced" section.
* Clean any others that you choose.

In the Applications Tab:

* Clean all except cookies in the Firefox/Mozilla section if you use it.
* Clean all in the Opera section if you use it.
* Clean Sun Java in the Internet Section.
* Clean any others that you choose.

Click the "Run Cleaner" button.

A pop-up box will appear advising this process will permanently delete files from your system.
Click "OK" and it will scan and clean your system.
Click the "Issues" button.
Click the "Scan For Issues" button.
Click the "Fix Selected Issues" button.
Click the "Fix All Selected Issues" button.
Click "OK"
Click "Close" when done.

# Reboot into Normal Mode. Turn System Restore back on and create a restore point.

Steps to turn on System Restore For XP:
1. Click Start, right-click My Computer, and then click Properties.
2. In the System Properties dialog box, click the System Restore tab.
3. Click to clear the Turn off System Restore check box. Or, click the Turn off System Restore on all drives check box.
4. Click OK.

After a few moments, the System Properties dialog box closes.

To create a new restore point, click on Start – All Programs – Accessories – System Tools and then select System Restore.

In the System Restore wizard, select Create a restore point and click the Next button.

Type a name for your new restore point then click on Create.

To create a Restore point for Vista:
1.Control Panel – System Maintenance – Back Up and Restore Center. On the right column, click on "Create A Restore Point Or Change Settings" (This requires Administrator's password if set.) Put a check on the drive your OS is on. Then click on the Create button. Type in a name and then click OK.



# Do another scan with HiJackThis in normal windows mode and post your new log file here for final verification. Make sure it is a new log file.

Also let us know how the systems overall condition is now.
Hope it helps if you decide to follow the advice

FourthWorld
VIP Livecode Opensource Backer
VIP Livecode Opensource Backer
Posts: 10045
Joined: Sat Apr 08, 2006 7:05 am
Contact:

Post by FourthWorld » Mon Mar 30, 2009 8:37 pm

maverickalex wrote:I was given some excellent information and instructions on how to thoroughly clean some Virus that had gotten past my AV software (mcafee and Spywaredoctor)
When I had a virus issue I got even simpler advice on reducing risk: use Linux. ;)

(Sorry, couldn't resist)
Richard Gaskin
LiveCode development, training, and consulting services: Fourth World Systems
LiveCode Group on Facebook
LiveCode Group on LinkedIn

shadowslash
Posts: 344
Joined: Tue Feb 24, 2009 6:14 pm
Contact:

Post by shadowslash » Tue Mar 31, 2009 12:59 am

i got it! when i did an extensive research i got these information
Win32/Tanatos

Names,aliases:

Win32/Kashu (AhnLab-V3), W32/Kashu.A (AntiVir), W32/Sality.AE (Authentium), Win32.Kashu.A (BitDefender), W32.Sality.R (CAT-QuickHeal), Win32.Sector.4 (DrWeb), Win32/Sality.V (eTrust-Vet), W32/Sality.AM@mm (Fortinet), W32/Sality.AE (F-Prot), W32/Kashu.A (F-Secure), Trojan-Dropper.Win32.Microjoin.R (Ikarus), Virus.Win32.Sality.v (Kaspersky), W32/Sality.ad (McAfee), Virus:Win32/Sality.AH (Microsoft), probably a variant of Win32/Sality.AB (NOD32v2), W32/Kashu.A (Norman), W32/Sality-AM (Sophos), W32.Sality.AB (Symantec), Trojan.Win32.KillAV.nh (VBA32), Win32.Sality.AI (VirusBuster), Win32.Kashu.A (Webwasher-Gateway)

Behavior:

PE-file infector. After dissables firewall and antivirus software, it downloads additional components.

Description:

When executed, Win32/Tanatos drops the following files:

[RANDOM] is a random number.

%System%\[RANDOM].dll
%System%\[RANDOM].dl_
%System%\drivers\[RANDOM].sys
%Temp%\[RANDOM].tmp
Adds the following entries to the registry:

HKLM\SYSTEM\CurrentControlSet\Services\MCIDRV_2600_6_0
Type=dword:00000001
Start=dword:00000002
ErrorControl=dword:00000001
ImagePath=\??\C:\WINDOWS\system32\drivers\[RANDOM].sys
DisplayName=MCIDRV_2600_6_0

Alters the following registry entries:

HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Setting\"GlobalUserOffline = "0"
HKLM\Software\Microsoft\Windows\CurrentVersion\policies\system\"EnableLUA = "0"

It also enumerates and deletes entries in the following registry subkeys:

HKCU\System\CurrentControlSet\Control\SafeBoot
HKLM\System\CurrentControlSet\Control\SafeBoot
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
HKLM\Software\Microsoft\Windows\CurrentVersion\Ext\Stats

Win32/Tanatos stores it's personal data in the [MCIDRV_VER] section of SYSTEM.INI file.

The Trojan also stops and deletes the following services:

aswUpdSv
avast! Antivirus
avast! Mail Scanner
avast! Web Scanner
BackWeb Plug-in - 4476822
bdss
BGLiveSvc
BlackICE
CAISafe
ccEvtMgr
ccProxy
ccSetMgr
F-Prot Antivirus Update Monitor
fsbwsys
FSDFWD
F-Secure Gatekeeper Handler Starter
fshttps
FSMA
InoRPC
InoRT
InoTask
ISSVC
KPF4
LavasoftFirewall
LIVESRV
McAfeeFramework
McShield
McTaskManager
navapsvc
NOD32krn
NPFMntor
NSCService
Outpost Firewall main module
OutpostFirewall
PAVFIRES
PAVFNSVR
PavProt
PavPrSrv
PAVSRV
PcCtlCom
PersonalFirewal
PREVSRV
ProtoPort Firewall service
PSIMSVC
RapApp
SmcService
SNDSrvc
SPBBCSvc
Symantec Core LC
Tmntsrv
TmPfw
tmproxy
UmxAgent
UmxCfg
UmxLU
UmxPol
vsmon
VSSERV
WebrootDesktopFirewallDataService
WebrootFirewall
XCOMM
AVP

Connects to the following URLs from where it downloads and executes additional files:

makemegood24.com
perfectchoice1.com
cash-ddt.net
ddr-cash.net
trn-cash.net
money-frn.net
clr-cash.net
xxxl-cash.net

It deletes files with the following extensions:

*.VDB
*.AVC
*.KEY (but only if first three letters are "drw")

Deletes executable files whose name contains any of the following strings:

_AVPM.
A2GUARD.
AAVSHIELD.
AVAST
ADVCHK.
AHNSD.
AIRDEFENSE
ALERTSVC
ALMON.
ALOGSERV
ALSVC.
AMON.
ANTI-TROJAN.
AVZ.
ANTIVIR
ANTS.
APVXDWIN.
ARMOR2NET.
ASHAVAST.
ASHDISP.
ASHENHCD.
ASHMAISV.
ASHPOPWZ.
ASHSERV.
ASHSIMPL.
ASHSKPCK.
ASHWEBSV.
ASWUPDSV.
ATCON.
ATUPDATER.
ATWATCH.
AUPDATE.
AUTODOWN.
AUTOTRACE.
AUTOUPDATE.
AVCIMAN.
AVCONSOL.
AVENGINE.
AVGAMSVR.
AVGCC.
AVGCC32.
AVGCTRL.
AVGEMC.
AVGFWSRV.
AVGNT.
AVGNTDD
AVGNTMGR
AVGSERV.
GUARD.
AVGUPSVC.
AVINITNT.
AVKSERV.
AVKSERVICE.
AVKWCTL.
AVP.
AVP32.
AVPCC.
AVPM.
AVPUPD.
AVSCHED32.
AVSYNMGR.
AVWUPD32.
AVWUPSRV.
AVXMONITOR9X.
AVXMONITORNT.
AVXQUAR.
BACKWEB-4476822.
BDMCON.
BDNEWS.
BDOESRV.
BDSS.
BDSUBMIT.
BDSWITCH.
BLACKD.
BLACKICE.
CAFIX.
CCAPP.
CCEVTMGR.
CCPROXY.
CCSETMGR.
CFIAUDIT.
CLAMTRAY.
CLAMWIN.
CLAW95.
CLAW95CF.
CLEANER.
CLEANER3.
CLISVC.
CMGRDIAN.
CUREIT
DEFWATCH.
DOORS.
DRVIRUS.
DRWADINS.
DRWEB32W.
DRWEBSCD.
DRWEBUPW.
ESCANH95.
ESCANHNT.
EWIDOCTRL.
EZANTIVIRUSREGISTRATIONCHECK.
F-AGNT95.
FAMEH32.
FAST.
FCH32.
FILEMON
FIRESVC.
FIRETRAY.
FIREWALL.
FPAVUPDM.
F-PROT95.
FRESHCLAM.
FRW.
FSAV32.
FSAVGUI.
FSBWSYS.
F-SCHED.
FSDFWD.
FSGK32.
FSGK32ST.
FSGUIEXE.
FSM32.
FSMA32.
FSMB32.
FSPEX.
FSSM32.
F-STOPW.
GCASDTSERV.
GCASSERV.
GIANTANTISPYWAREMAIN.
GIANTANTISPYWAREUPDATER.
GUARDGUI.
GUARDNT.
HREGMON.
HRRES.
HSOCKPE.
HUPDATE.
IAMAPP.
IAMSERV.
ICLOAD95.
ICLOADNT.
ICMON.
ICSSUPPNT.
ICSUPP95.
ICSUPPNT.
IFACE.
INETUPD.
INOCIT.
INORPC.
INORT.
INOTASK.
INOUPTNG.
IOMON98.
ISAFE.
ISATRAY.
ISRV95.
ISSVC.
KAV.
KAVMM.
KAVPF.
KAVPFW.
KAVSTART.
KAVSVC.
KAVSVCUI.
KMAILMON.
KPFWSVC.
KWATCH.
LOCKDOWN2000.
LOGWATNT.
LUALL.
LUCOMSERVER.
LUUPDATE.
MCAGENT.
MCMNHDLR.
MCREGWIZ.
MCUPDATE.
MCVSSHLD.
MINILOG.
MYAGTSVC.
MYAGTTRY.
NAVAPSVC.
NAVAPW32.
NAVLU32.
NAVW32.
NOD32.
NEOWATCHLOG.
NEOWATCHTRAY.
NISSERV
NISUM.
NMAIN.
NOD32
NORMIST.
NOTSTART.
NPAVTRAY.
NPFMNTOR.
NPFMSG.
NPROTECT.
NSCHED32.
NSMDTR.
NSSSERV.
NSSTRAY.
NTRTSCAN.
NTXCONFIG.
NUPGRADE.
NVC95.
NVCOD.
NVCTE.
NVCUT.
NWSERVICE.
OFCPFWSVC.
OUTPOST.
PAV.
PAVFIRES.
PAVFNSVR.
PAVKRE.
PAVPROT.
PAVPROXY.
PAVPRSRV.
PAVSRV51.
PAVSS.
PCCGUIDE.
PCCIOMON.
PCCNTMON.
PCCPFW.
PCCTLCOM.
PCTAV.
PERSFW.
PERTSK.
PERVAC.
PNMSRV.
POP3TRAP.
POPROXY.
PREVSRV.
PSIMSVC.
QHM32.
QHONLINE.
QHONSVC.
QHPF.
QHWSCSVC.
RAVMON.
RAVTIMER.
REALMON.
REALMON95.
RFWMAIN.
RTVSCAN.
RTVSCN95.
RULAUNCH.
SAVADMINSERVICE.
SAVMAIN.
SAVPROGRESS.
SAVSCAN.
SCAN32.
SCANNINGPROCESS.
SCHED.
SDHELP.
SHSTAT.
SITECLI.
SPBBCSVC.
SPHINX.
SPIDERML.
SPIDERNT.
SPIDERUI.
SPYBOTSD.
SPYXX.
SS3EDIT.
STOPSIGNAV.
SWAGENT.
SWDOCTOR.
SWNETSUP.
SYMLCSVC.
SYMPROXYSVC.
SYMSPORT.
SYMWSC.
SYNMGR.
TAUMON.
TBMON.
TC.
TCA.
TCM.
TDS-3.
TEATIMER.
TFAK.
THAV.
THSM.
TMAS.
TMLISTEN.
TMNTSRV.
TMPFW.
TMPROXY.
TNBUTIL.
TRJSCAN.
UP2DATE.
VBA32ECM.
VBA32IFS.
VBA32LDR.
VBA32PP3.
VBSNTW.
VCHK.
VCRMON.
VETTRAY.
VIRUSKEEPER.
VPTRAY.
VRFWSVC.
VRMONNT.
VRMONSVC.
VRRW32.
VSECOMR.
VSHWIN32.
VSMON.
VSSERV.
VSSTAT.
WATCHDOG.
WEBPROXY.
WEBSCANX.
WEBTRAP.
WGFE95.
WINAW32.
WINROUTE.
WINSS.
WINSSNOTIFY.
WRADMIN.
WRCTRL.
XCOMMSVR.
ZATUTOR.
ZAUINST.
ZLCLIENT.
ZONEALARM.

Executables files are infected by appending the code of the virus to the last section. Win32/Tanatos searches for executables on local drives and on the network, however it does not infect files in the following folders:

SYSTEM
AHEAD
So in other words, it's a really mean virus to deal with... That's why I've decided I'm going to dedicate my remaining days before I turn 18 in figuring out who made this hell of a virus then i'm gonna smack him in the face with my own! more than half of my HD is now infected and i'm not gonna let that pass easily! it's war! Image
Parañaque, Philippines
Image
Image

Post Reply