Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Koobface Cleaned but Still Have Problems


  • Please log in to reply
11 replies to this topic

#1 pizzaandbeer

pizzaandbeer

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 21 February 2010 - 03:10 AM

MBAM detected koobface but was not able to clean it until I ran as Admin in SAFE mode. MBAM scans now say the compter is clean, but when logged in as a user the MBAM update button is grayed and not active. As Admin, the update button works, but the computer cannot connect to malwarebytes.org. I can get to other sites, like Google, so I know the internet conenction is working.

I donwloaded the latest MBAM engine (updated in January 2010) but the fingerprints file is also from then.

I don't believe the computer is completely clean. What should I try next?

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,386 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:33 PM

Posted 21 February 2010 - 07:50 AM

Some infections will alter the Proxy settings in Internet Explorer which can affect your ability to browse or download tools required for disinfection. You may also receive Error 732 when trying to update MBAM. If you are experiencing such a problem, check those settings. To do that, please refer to Steps 1-4 under the section Error 732 when trying to update Malwarebytes' Anti-Malware in this guide.

Then rescan again with Malwarebytes Anti-Malware (Quick Scan) in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

If you still cannot update through the program's interface and have already manually downloaded the latest definitions (mbam-rules.exe) shown on this page, be aware that mbam-rules.exe is not updated daily. Another way to get the most current database definitions if you're having problems updating, is to install MBAM on a clean computer, launch the program, update through MBAM's interface, copy the definitions (rules.ref) to a USB stick or CD and transfer that file to the infected machine. Copy rules.ref to the location indicated for your operating system. If you cannot see the folder, then you may have to Reconfigure Windows to show it.
  • XP: C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware
  • Vista: C:\Documents and Settings\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 pizzaandbeer

pizzaandbeer
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 21 February 2010 - 12:27 PM

Thanks so much for the quick response!

A few things:
  • The proxy settings were not the problem. I checked Firefox (the default browser) and IE and neither one was using a proxy server. If Firefox (or other browser) lan settings are used by MBAM, the way to check/change them should be included in your guide. (I might have missed it, so I apologize if this is already there.)

  • When I opened IE, the home page had been changed to what appeared to be a malicous site which caused pop-ups and re-directed to some bogus A-V site. Closed that one quickly and diconnected from the network, opened IE and re-set the home page to "Blank". You might want to add that the user should change the IE home page, and maybe should disconnect from the network when checking the LAN settings.

  • I had to update MBAM using the method of copying rules.ref. The location on Vista is not what you posted. (I don't think I changed this on purpose. I found it at:

    C:\ProgramData\Malwarebytes\Malwarebytes' Anti-Malware\rules.ref


  • MBAM is finding more items. I don't know if that's because the computer got re-infected when IE opened, or if it was the new database.
Here's the log:

Malwarebytes' Anti-Malware 1.44
Database version: 3770
Windows 6.0.6001 Service Pack 1
Internet Explorer 7.0.6001.18000

2/21/2010 9:10:35 AM
mbam-log-2010-02-21 (09-10-35).txt

Scan type: Quick Scan
Objects scanned: 125324
Time elapsed: 11 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\Windows\System32\oko6.dll (Worm.KoobFace) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\okosrv (Worm.KoobFace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\oko6 (Worm.KoobFace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OKO6 (Worm.KoobFace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\okogrp (Worm.KoobFace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Windows\System32\oko6.dll (Worm.KoobFace) -> Delete on reboot.
C:\Windows\System32\drivers\oko6.sys (Worm.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\downloads\setup(2).exe (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\Windows\rdr_1266457571.exe (Worm.KoobFace) -> Quarantined and deleted successfully.

Edited by pizzaandbeer, 21 February 2010 - 12:32 PM.


#4 pizzaandbeer

pizzaandbeer
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 21 February 2010 - 12:56 PM

By the way, I can now connect to malwarebytes.org and the MBAM update function works for Admin, but for a User, the Update button is still grayed out and cannot even be selected. Maybe I just need to do a clean install of MBAM, but I will await your reply before doing anything.

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,386 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:33 PM

Posted 21 February 2010 - 03:30 PM

To uninstall/reinstall Malwarebytes' Anti-Malware, please do the following?
  • First uninstall Malwarebytes' Anti-Malware using
    Add/Remove Programs in the Control Panel.
  • Restart the computer.
  • Download the mbam-clean.exe (Cleanup Utility) and save it to your Desktop.
  • Double-click on mbamclean.exe to start the utility.
  • When the cleanup routine has finished, it will ask to reboot your computer. Please allow the reboot.
  • After the computer restarts, download and install the latest version of Malwarebytes' Anti-Malware (v1.44) from here.
If using the Pro version, you will need to reactivate the program using the license key you were sent. If using the free version, then just ignore that part.

Now rescan again with Malwarebytes Anti-Malware, but this time perform a Full Scan in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

Please download TFC (Temp File Cleaner) by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • TFC will clear out all temp folders for all user accounts (temp, IE temp, Java, FF, Opera, Chrome, Safari), including Administrator, All Users, LocalService, NetworkService, and any other accounts in the user folder.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
Note: It is normal for the computer to be slow to boot after running TFC cleaner the first time.

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
-- If you cannot boot into safe mode or complete a scan, then perform your scan in normal mode.

-- If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 pizzaandbeer

pizzaandbeer
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 21 February 2010 - 07:15 PM

Here's the MBAM log -- more junk found. I'll do the TFC and SAS next.

Malwarebytes' Anti-Malware 1.44
Database version: 3772
Windows 6.0.6001 Service Pack 1
Internet Explorer 7.0.6001.18000

2/21/2010 4:04:51 PM
mbam-log-2010-02-21 (16-04-51).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 286752
Time elapsed: 1 hour(s), 16 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 10

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FA1HKR6F\v2prx[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JI5P0PCI\v2prx[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JI5P0PCI\pp.14[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R0QNN4Q0\go[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R0QNN4Q0\go[2].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R0QNN4Q0\Setup_312s1[2].exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z0TLGYDQ\go[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z0TLGYDQ\v2prx[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z0TLGYDQ\pp.14[1].exe (Trojan.Koobface) -> Quarantined and deleted successfully.
C:\Users\Max\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z0TLGYDQ\pp.14[2].exe (Trojan.Koobface) -> Quarantined and deleted successfully.

#7 pizzaandbeer

pizzaandbeer
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 22 February 2010 - 08:45 AM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/21/2010 at 11:44 PM

Application Version : 4.34.1000

Core Rules Database Version : 4606
Trace Rules Database Version: 2418

Scan type : Complete Scan
Total Scan Time : 01:05:26

Memory items scanned : 292
Memory threats detected : 0
Registry items scanned : 6202
Registry threats detected : 0
File items scanned : 133711
File threats detected : 35

Adware.Tracking Cookie
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@atdmt[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@247realmedia[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@a1.interclick[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@account.live[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@ad.yieldmanager[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@adlegend[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@adopt.euroclick[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@advertising[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@apmebf[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@atdmt[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@casalemedia[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@doubleclick[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@eyewonder[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@insightexpressai[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@interclick[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@media.photobucket[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@mediaplex[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@msnaccountservices.112.2o7[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@msnportal.112.2o7[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@questionmarket[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@stat.onestat[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\Low\max@zedo[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@2o7[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@ads.pointroll[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@adultfriendfinder[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@apmebf[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@atdmt[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@doubleclick[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@ehg-wizardsofthecoast.hitbox[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@mediaplex[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@perf.overture[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@smartadserver[2].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@www.allrealitypass[1].txt
C:\Users\Max\AppData\Roaming\Microsoft\Windows\Cookies\max@youporn[1].txt
C:\Users\Mom\AppData\Roaming\Microsoft\Windows\Cookies\Low\mom@doubleclick[2].txt

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,386 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:33 PM

Posted 22 February 2010 - 11:40 AM

How is your computer running now? Are there any more reports/alerts, signs of infection or issues with your browser?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 pizzaandbeer

pizzaandbeer
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 23 February 2010 - 09:12 AM

It seems to be running OK now. Is it normal for the MBAM update function to be grayed out? I can only update as Admin now, but used to be able to do this under the user account.

Thanks again for your help and quick response!!

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,386 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:33 PM

Posted 23 February 2010 - 09:50 AM

You are quite welcome.

My notes for Malwarebytes' say it is not necessary to "Run as Administrator" in Vista because it auotmatically elevates. However, the developers may have made a change I am not aware of, or you are encountering some type of quirk. I checked at the Malwarebytes Anti-Malware Support Forum and only found one related topic in this thread but it was not answered by any of the developers. I don't have access to a Vista machine so I cannot test.

You may want to report this issue in the forum or E-mail the Malwarebytes Support Help Desk for individual assistance. If they provide an adequate explanation, please let me know.

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Posted Image > Run... and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista and Windows 7 users can refer to these links: Create a New Restore Point in Vista or Windows 7 and Disk Cleanup in Vista.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 pizzaandbeer

pizzaandbeer
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:07:33 PM

Posted 24 February 2010 - 10:06 AM

According to the Malwarebytes consumer helpdesk, "Limited user accounts are not permitted to update, you must be logged in as admin."

I did find one thing that helped. I had User Account Control turned off. After I turned it back on (required a restart) I could run MBAM as Admin and was prompted for the password. Check for Updates works now. At least this saves having to switch user every time.

UAC (must be changed by the Admin) can be accessed via Start : Control Panel : User Accounts and Family Safety : User Accounts : Turn User Account Control on or off

Edited by pizzaandbeer, 24 February 2010 - 02:26 PM.


#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,386 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:33 PM

Posted 24 February 2010 - 12:58 PM

That's what I thought but I don't use Vista and wanted to confirm. Thanks for letting me know.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users