Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan.Riern keeps showing up on my scans


  • This topic is locked This topic is locked
6 replies to this topic

#1 juice2222

juice2222

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:05:57 PM

Posted 19 May 2010 - 07:50 PM

Hey all,

Trojan.Riern keeps showing up on my malwarebytes scan logs. Is this a rootkit or something? Please help.

MB Logs:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4052

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

5/17/2010 10:10:52 PM
mbam-log-2010-05-17 (22-10-52).txt

Scan type: Full scan (C:\|)
Objects scanned: 210470
Time elapsed: 1 hour(s), 10 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\config\systemprofile\Application Data\Adobe\Update\cliat.exe (Trojan.Riern) -> Quarantined and deleted successfully.

Edited by Orange Blossom, 19 May 2010 - 08:42 PM.
Move to AII as this is an MBAM log. ~ OB


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,190 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:57 PM

Posted 20 May 2010 - 11:16 AM

Ok try updating to MBAM and seeing if it gets removed.
Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 juice2222

juice2222
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:05:57 PM

Posted 21 May 2010 - 05:14 PM

Scan cameback clean. Did the new update address this trojan? Should i be concerned about rootkits?

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4125

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

5/21/2010 6:13:32 PM
mbam-log-2010-05-21 (18-13-32).txt

Scan type: Quick scan
Objects scanned: 139694
Time elapsed: 13 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,190 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:57 PM

Posted 22 May 2010 - 02:08 PM

Hello ,we got it on the first run. But needed to be sure.. We can scan for rootkits now.

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 juice2222

juice2222
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:05:57 PM

Posted 23 May 2010 - 09:48 PM

Ok here is the GMER scan log

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-23 22:44:29
Windows 5.1.2600 Service Pack 3
Running: f4tddswo.exe; Driver: C:\DOCUME~1\Zach\LOCALS~1\Temp\uxlcikob.sys


---- System - GMER 1.0.15 ----

SSDT splq.sys ZwCreateKey [0xF74290E0]
SSDT splq.sys ZwEnumerateKey [0xF7441DA4]
SSDT splq.sys ZwEnumerateValueKey [0xF7442132]
SSDT splq.sys ZwOpenKey [0xF74290C0]
SSDT splq.sys ZwQueryKey [0xF744220A]
SSDT splq.sys ZwQueryValueKey [0xF744208A]
SSDT splq.sys ZwSetValueKey [0xF744229C]

INT 0x62 ? 86F6BBF8
INT 0x73 ? 86F6BBF8
INT 0x82 ? 86F6BBF8
INT 0x83 ? 86F6BBF8
INT 0xB4 ? 86DCDBF8

---- Kernel code sections - GMER 1.0.15 ----

? splq.sys The system cannot find the file specified. !
.text USBPORT.SYS!DllUnload F58518AC 5 Bytes JMP 86DCD1D8
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xF4F97360, 0x307F47, 0xE8000020]
.text a6ms9m17.SYS F4F4A386 35 Bytes [00, 00, 00, 00, 00, 00, 20, ...]
.text a6ms9m17.SYS F4F4A3AA 24 Bytes [00, 00, 00, 00, 00, 00, 00, ...]
.text a6ms9m17.SYS F4F4A3C4 3 Bytes [00, 80, 02]
.text a6ms9m17.SYS F4F4A3C9 1 Byte [30]
.text a6ms9m17.SYS F4F4A3C9 11 Bytes [30, 00, 00, 00, 5E, 02, 00, ...] {XOR [EAX], AL; ADD [EAX], AL; POP ESI; ADD AL, [EAX]; ADD [EAX], AL; ADD [EAX], AL}
.text ...
.text C:\WINDOWS\system32\drivers\oreans32.sys section is writeable [0xF14E3280, 0x7B04, 0xE8000020]

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT atapi.sys[HAL.dll!READ_PORT_UCHAR] [F742A042] splq.sys
IAT atapi.sys[HAL.dll!READ_PORT_BUFFER_USHORT] [F742A13E] splq.sys
IAT atapi.sys[HAL.dll!READ_PORT_USHORT] [F742A0C0] splq.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_BUFFER_USHORT] [F742A800] splq.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_UCHAR] [F742A6D6] splq.sys
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!KfAcquireSpinLock] 18C4830E
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!READ_PORT_UCHAR] 1C959E88
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!KeGetCurrentIrql] 9E880000
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!KfRaiseIrql] 00001CB1
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!KfLowerIrql] 0E798366
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!HalGetInterruptVector] 74AAB000
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!HalTranslateBusAddress] 8986C636
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!KeStallExecutionProcessor] 1A00001C
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!KfReleaseSpinLock] 1C8B86C6
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!READ_PORT_BUFFER_USHORT] C6020000
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!READ_PORT_USHORT] 001C9686
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!WRITE_PORT_BUFFER_USHORT] 86C60200
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[HAL.dll!WRITE_PORT_UCHAR] 00001CB2
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[WMILIB.SYS!WmiSystemControl] 8800001C
IAT \SystemRoot\System32\Drivers\a6ms9m17.SYS[WMILIB.SYS!WmiCompleteRequest] 001CB99E
IAT \SystemRoot\system32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [F7439B90] splq.sys

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 86F6A1F8
Device \FileSystem\Fastfat \FatCdrom 86A65500
Device \Driver\usbohci \Device\USBPDO-0 86DCC1F8
Device \Driver\dmio \Device\DmControl\DmIoDaemon 86F6C1F8
Device \Driver\dmio \Device\DmControl\DmConfig 86F6C1F8
Device \Driver\dmio \Device\DmControl\DmPnP 86F6C1F8
Device \Driver\dmio \Device\DmControl\DmInfo 86F6C1F8
Device \Driver\usbehci \Device\USBPDO-1 86DC21F8
Device \Driver\Ftdisk \Device\HarddiskVolume1 86FDA1F8
Device \Driver\Cdrom \Device\CdRom0 86DDE1F8
Device \Driver\Cdrom \Device\CdRom1 86DDE1F8
Device \Driver\Cdrom \Device\CdRom2 86DDE1F8
Device \Driver\sptd \Device\930494998 splq.sys
Device \Driver\NetBT \Device\NetBt_Wins_Export 86B00500
Device \Driver\NetBT \Device\NetbiosSmb 86B00500
Device \Driver\NetBT \Device\NetBT_Tcpip_{E55CC120-6B1E-4E30-B18D-D230E121184B} 86B00500
Device \Driver\USBSTOR \Device\00000086 8541C1F8
Device \Driver\PCI_PNP9998 \Device\0000005b splq.sys
Device \Driver\USBSTOR \Device\00000088 8541C1F8
Device \Driver\usbohci \Device\USBFDO-0 86DCC1F8
Device \Driver\usbehci \Device\USBFDO-1 86DC21F8
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 8543D1F8
Device \FileSystem\MRxSmb \Device\LanmanRedirector 8543D1F8
Device \Driver\Ftdisk \Device\FtControl 86FDA1F8
Device \Driver\a6ms9m17 \Device\Scsi\a6ms9m171Port3Path0Target1Lun0 86D251F8
Device \Driver\a6ms9m17 \Device\Scsi\a6ms9m171Port3Path0Target0Lun0 86D251F8
Device \Driver\a6ms9m17 \Device\Scsi\a6ms9m171 86D251F8
Device \FileSystem\Fastfat \Fat 86A65500
Device \FileSystem\Cdfs \Cdfs 86A8D500

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij@imagepath \systemroot\system32\drivers\geyekrrudkmblk.sys
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main@aid 10002
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main@sid 0
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main\delete (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main\delete@C:\DOCUME~1\Zach\LOCALS~1\Temp\geyekrkstnemnwhx.tmp
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main\injector (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main\injector@* geyekrwsp.dll
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\main\tasks (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\modules@geyekrrk.sys \systemroot\system32\drivers\geyekrrudkmblk.sys
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\modules@geyekrcmd.dll \systemroot\system32\geyekrhtyusvde.dll
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\modules@geyekrlog.dat \systemroot\system32\geyekrsbvuikyx.dat
Reg HKLM\SYSTEM\ControlSet001\Services\geyekrrhyegfij\modules@geyekrwsp.dll \systemroot\system32\geyekrrmroelnk.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACabpysinbigywnqlfb.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACd
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACc
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacbbr
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacsr
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacmal
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacrem
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacmask
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacserf
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Pro\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0xED 0x04 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xCC 0x4B 0xE1 0x86 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xCD 0xA7 0x0C 0x72 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x9A 0xDF 0x36 0xB5 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1@hdf12 0x81 0x60 0x91 0xC8 ...
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Pro\
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0xED 0x04 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xCC 0x4B 0xE1 0x86 ...
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xCD 0xA7 0x0C 0x72 ...
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x9A 0xDF 0x36 0xB5 ...
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1@hdf12 0x81 0x60 0x91 0xC8 ...

---- EOF - GMER 1.0.15 ----

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,190 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:57 PM

Posted 23 May 2010 - 11:15 PM

Hello again,seems we havea possible active rootkit here in geyekrwsp.dll
Let's get a better look. Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
Include the GMER logs you posted earlier.
Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,946 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:05:57 PM

Posted 24 May 2010 - 05:25 PM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/318945/possible-rootkit-in-geyekrwspdll-from-trojanriern-infection/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users