UAC Consent Elevation Prompt Causing Account Lockouts
Looking for some explainataion here. I've have through local (yes local not domain) group policy configured the allowed bad logon attempts to 3, requiring an administrator to unlock. But i have noticed that when i trigger the UAC elevation prompt for consent, it triggers a bad logon attempt (evt id 4625) on all user accounts. potentially leading to locking out all acounts if its three times within the period. Could someone enlightment me on the interworkings of UAC and why it attempts logons on all accounts? and if i'm lucky, how to make it stop? Update: the events don't seem to get created for elevating a cmd prompt with "run as administrator" or opening up the event viewer. They do get created with add/remove user accounts and setup parental controls.
June 20th, 2012 1:48pm

Hi , From your description, I know that a bad logon attempt will be triggered once you trigger the UAC elevation prompt for consent. Does the issue only occur when you enable this group policy? Have you tried to disable UAC? Did you enable Account Lockout Threshold policy? Generally, UAC will not cause this issue. Please test it on another computer and see the result. Tracy Cai TechNet Community Support
Free Windows Admin Tool Kit Click here and download it now
June 25th, 2012 3:29am

Hi , From your description, I know that a bad logon attempt will be triggered once you trigger the UAC elevation prompt for consent. Does the issue only occur when you enable this group policy? Have you tried to disable UAC? Did you enable Account Lockout Threshold policy? Generally, UAC will not cause this issue. Please test it on another computer and see the result. Tracy Cai TechNet Community Support
June 25th, 2012 3:29am

Hi , From your description, I know that a bad logon attempt will be triggered once you trigger the UAC elevation prompt for consent. Does the issue only occur when you enable this group policy? Have you tried to disable UAC? Did you enable Account Lockout Threshold policy? Generally, UAC will not cause this issue. Please test it on another computer and see the result. Tracy Cai TechNet Community Support
Free Windows Admin Tool Kit Click here and download it now
June 25th, 2012 3:33am

From your description, I know that a bad logon attempt will be triggered once you trigger the UAC elevation prompt for consent. Are you confirming that by design, UAC will trigger a bad logon attempt on all accounts when the elevation prompt for consent comes up? I'm sure disabling UAC altogether would probably make it this go away, but that is not a solution for me. In the following test i did not modify the default UAC settings. I left them to the default of "Prompt for consent for non-windows binaries". 1) Clean install of Windows 7 Pro into a hyper-v vm. 2) Created 3 additional users. User, User2,User3,User4. User and User2 are admins. Gave them all passwords. 3) Edit Local Group Policy: Enable Auditing Sucess and Failure on all items in ComputerConfiguration->Windows Settings->Security Settings->Local Policies->Audit Policy 4) Rebooted 5) Log in as User. 6) Open Event Viewer, Windows Logs -> Security. Filter on Event ID 4625 7) Click on Control Panel -> Add or Remove user accounts 8) Back in Event Viewer, Refresh. There are now additional audit failure for each account failing to log on, one for each username. Now adding in the lockout policies. 9) Edit Local Group Policy: Enabling the Account Lockout Policies as follows ComputerConfiguration->Windows Settings->Security Settings->Account Policies -> Account Lockout Policy Account Lockout Duration: 0 (Requires Administrator) Account lockout threshold: 3 invalid attempts Reset account lockout counter after: 60 minutes 10) shutdown/restart 11) log on as user 12) open "Computer Management" (to be able to unlock accounts later on) 13) Open Event Viewer, Windows Logs -> Security. Filter on Event ID 4625 14) Click on Control Panel -> Add or Remove user accounts 15) Back in Event Viewer, Refresh. There are now additional audit failure for each account failing to log on, one for each username. (#1) 16) Close Control Panel -> Manage User acccounts 17) Click on Control Panel -> Add or Remove user accounts 18) Back in Event Viewer, Refresh. There are now additional audit failure for each account failing to log on, one for each username.(#2) 19) Close Control Panel -> Manage User acccounts 20) Click on Control Panel -> Add or Remove user accounts 21) Back in Event Viewer, Refresh. There are now additional audit failure for each account failing to log on, one for each username.(#3) 22) Close Control Panel -> Manage User acccounts 23) In Computer Management that was opened earlier, navigate to Local Users and Groups -> Users. 24) Right click on all Users and examine properties. User, User2, User3, and User4 all have "[X] Account is locked out". The Accounts are all locked out.
June 25th, 2012 8:47am

HI , UAC is a new feature for WinVista and latest version OS. In WinVista, When an administrator logs on, the user is granted two access tokens: a full administrator access token and a "filtered" standard user access token. By default, when a member of the local Administrators group logs on, the administrative Windows privileges are disabled and elevated user rights are removed, resulting in the standard user access token Understanding and Configuring User Account Control in Windows Vista: http://technet.microsoft.com/en-us/library/cc709628(WS.10).aspx Anyway, i will made a test as yours for and will update with you soon .                                Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 26th, 2012 7:55am

HI , UAC is a new feature for WinVista and latest version OS. In WinVista, When an administrator logs on, the user is granted two access tokens: a full administrator access token and a "filtered" standard user access token. By default, when a member of the local Administrators group logs on, the administrative Windows privileges are disabled and elevated user rights are removed, resulting in the standard user access token Understanding and Configuring User Account Control in Windows Vista: http://technet.microsoft.com/en-us/library/cc709628(WS.10).aspx Anyway, i will made a test as yours for and will update with you soon .                                Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
June 26th, 2012 7:55am

HI , UAC is a new feature for WinVista and latest version OS. In WinVista, When an administrator logs on, the user is granted two access tokens: a full administrator access token and a "filtered" standard user access token. By default, when a member of the local Administrators group logs on, the administrative Windows privileges are disabled and elevated user rights are removed, resulting in the standard user access token Understanding and Configuring User Account Control in Windows Vista: http://technet.microsoft.com/en-us/library/cc709628(WS.10).aspx Anyway, i will made a test as yours for and will update with you soon .                                Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 26th, 2012 7:59am

HI, i cannot reproduce this symptom as yours, so UAC cannot caused such issue as yours. Anyway, please send me the event 4625 for the further troubleshooting. Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
June 27th, 2012 7:10am

HI, i cannot reproduce this symptom as yours, so UAC cannot caused such issue as yours. Anyway, please send me the event 4625 for the further troubleshooting. Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 27th, 2012 7:10am

HI, i cannot reproduce this symptom as yours, so UAC cannot caused such issue as yours. Anyway, please send me the event 4625 for the further troubleshooting. Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
June 27th, 2012 7:10am

Jason, I am quite surprised that you were not able to reproduce the issue. I followed the steps again and had no problem reproducing it. I followed it a third time recording the hyper-v window and reproduced it a third time. See the run through at http://www.youtube.com/watch?v=WA1j1Q2JHyM as Requested here is the last events that record the lockout Keywords Date and Time Source Event ID Task Category Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Account Lockout "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user4 Account Domain: Failure Information: Failure Reason: Account locked out. Status: 0xc0000234 Sub Status: 0x0 Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Account Lockout "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user3 Account Domain: Failure Information: Failure Reason: Account locked out. Status: 0xc0000234 Sub Status: 0x0 Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Account Lockout "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user2 Account Domain: Failure Information: Failure Reason: Account locked out. Status: 0xc0000234 Sub Status: 0x0 Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Logon "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user Account Domain: Failure Information: Failure Reason: Unknown user name or bad password. Status: 0xc000006d Sub Status: 0xc000006a Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Free Windows Admin Tool Kit Click here and download it now
June 27th, 2012 11:13am

Jason, I am quite surprised that you were not able to reproduce the issue. I followed the steps again and had no problem reproducing it. I followed it a third time recording the hyper-v window and reproduced it again without fail. See the run through at http://www.youtube.com/watch?v=WA1j1Q2JHyM as Requested here is the last events that record the lockout Keywords Date and Time Source Event ID Task Category Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Account Lockout "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user4 Account Domain: Failure Information: Failure Reason: Account locked out. Status: 0xc0000234 Sub Status: 0x0 Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Account Lockout "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user3 Account Domain: Failure Information: Failure Reason: Account locked out. Status: 0xc0000234 Sub Status: 0x0 Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Account Lockout "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user2 Account Domain: Failure Information: Failure Reason: Account locked out. Status: 0xc0000234 Sub Status: 0x0 Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested." Audit Failure 6/27/2012 10:33:55 AM Microsoft-Windows-Security-Auditing 4625 Logon "An account failed to log on. Subject: Security ID: user-PC\user Account Name: user Account Domain: user-PC Logon ID: 0x1d2c4 Logon Type: 2 Account For Which Logon Failed: Security ID: NULL SID Account Name: user Account Domain: Failure Information: Failure Reason: Unknown user name or bad password. Status: 0xc000006d Sub Status: 0xc000006a Process Information: Caller Process ID: 0x694 Caller Process Name: C:\Windows\System32\dllhost.exe Network Information: Workstation Name: USER-PC Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
June 27th, 2012 11:17am

Hi, I have reproduced the issue in my lab and it seems an known issue. below is a workaround: Open Applet->Click manage another account->Choose an account->Click manage another account->Choose an account->etc Do not use "back" and dont click on "Go to main User Account page". Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
July 3rd, 2012 1:37am

Jason, Thank you for acknowledging and taking the time to reproduce the issue. Since you said that is is a known issue, would you be able to point me to a kb article number or some other reference that i could continue to track this issue as well as reference in my own documentation. I don't consider the work around to be an actual solution so i'd like to continue to track the issue. An all accounts lockout should never be the result of a valid and successful UAC elevation.
July 3rd, 2012 8:59am

Hi, I have reproduced the issue in my lab and it seems an known issue. below is a workaround: Open Applet->Click manage another account->Choose an account->Click manage another account->Choose an account->etc Do not use "back" and dont click on "Go to main User Account page". Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
July 4th, 2012 12:42am

HI, Our Dev team has considered this issue to be worthy of getting fixed in windows8 and it has already been filed for windows 8. To fix this issue in windows 7 , I am not sure whether it will be considered or not for windows 7. hope you are understanding. Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
July 4th, 2012 6:43am

HI, Our Dev team has considered this issue to be worthy of getting fixed in windows8 and it has already been filed for windows 8. To fix this issue in windows 7 , I am not sure whether it will be considered or not for windows 7. hope you are understanding. Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
July 4th, 2012 6:43am

Jason, Thank you for acknowledging and taking the time to reproduce the issue. Since you said that is is a known issue, would you be able to point me to a kb article number or some other reference that i could continue to track this issue as well as reference in my own documentation. I don't consider the work around to be an actual solution so i'd like to continue to track the issue. An all accounts lockout should never be the result of a valid and successful UAC elevation.
July 4th, 2012 9:12am

Jason, Will this issue be listed anywhere in public documentation other than this page as a Known Issue? If so can i get that reference?
Free Windows Admin Tool Kit Click here and download it now
July 5th, 2012 12:02pm

HI, Based on my research, it seems there is no public documentation described this issue. Hope you are understanding! Thanks !Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
July 6th, 2012 5:39am

HI, Based on my research, it seems there is no public documentation described this issue. Hope you are understanding! Thanks !Best regards, Jason Mei Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
July 6th, 2012 5:39am

Jason, Will this issue be listed anywhere in public documentation other than this page as a Known Issue? If so can i get that reference?
July 6th, 2012 2:28pm

Hi, I have the same issue - all accounts get the 'audit failure event 4625' triggered. And no, "I am not understanding" why there is no public reference nor why "it is not considered for windows 7". Hope you are understanding that I am not understanding.
Free Windows Admin Tool Kit Click here and download it now
August 28th, 2012 11:01am

Hi, I have the same issue - all accounts get the 'audit failure event 4625' triggered. And no, "I am not understanding" why there is no public reference nor why "it is not considered for windows 7". Hope you are understanding that I am not understanding.
August 28th, 2012 11:05am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics