I have 99.99% confidence that this will lead you to the source of the problem.
BTW, only re-add those that you are actually using. Adding the other serves no useful purpose (and it can be argued that doing this can decrease security by a tiny amount. Files that don't exist can't be used for exploitation :-)
If this *is* needed, then
1) I'd be VERY surprised.
2) There is more to the problem than the symptoms would suggest.
Cheers
RodG
Bookmarks