Welcome Guest ( Log In | Register )

5 Pages < 1 2 3 4 5 >Bottom

Outline · [ Standard ] · Linear+

Virus/Malware eset nod32 stop working (ENHANCED PROTECTION MODE), virus!! help me urgently plzzzz....

views
     
lisieng
post Jul 20 2011, 09:56 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


what is CCleaner??

how u solve your problem?
TSPruneFace
post Jul 20 2011, 10:03 PM

Getting Started
**
Junior Member
279 posts

Joined: Jun 2009


QUOTE(lisieng @ Jul 20 2011, 10:56 PM)
what is CCleaner??

how u solve your problem?
*
1 - install malware & run it
2 - Run ur antivirus (any)
3 - Run CCleaner (usually included with windows 7)
- Otherwise just download it here


lisieng
post Jul 20 2011, 10:04 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


what will CCleaner do??
TSPruneFace
post Jul 20 2011, 10:10 PM

Getting Started
**
Junior Member
279 posts

Joined: Jun 2009


sweat.gif sweat.gif

You can find it yourself... icon_rolleyes.gif
lisieng
post Jul 20 2011, 10:14 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


will it delete my documents??
TSPruneFace
post Jul 20 2011, 10:19 PM

Getting Started
**
Junior Member
279 posts

Joined: Jun 2009


actually you can setting it.. Just clear your browser's data such history, cookies, temporary data etc... The issue here is the worm infected all your browser.. You just need to clear up your browsers.. Summore, you can fix your registry. tongue.gif


Added on July 20, 2011, 10:21 pm
QUOTE(lisieng @ Jul 20 2011, 11:14 PM)
will it delete my documents??
*
it will not delete your document.. dont worry...

This post has been edited by PruneFace: Jul 20 2011, 10:21 PM
lisieng
post Jul 20 2011, 10:52 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


done everything... still cannot ==
TSPruneFace
post Jul 20 2011, 11:20 PM

Getting Started
**
Junior Member
279 posts

Joined: Jun 2009


really?
lisieng
post Jul 20 2011, 11:27 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


yeap!
shamz78
post Jul 21 2011, 07:34 PM

New Member
*
Newbie
1 posts

Joined: Jul 2011


QUOTE(lisieng @ Jul 20 2011, 10:52 PM)
done everything... still cannot ==
*
This virus is new. Many of antivirus program still don't have the solution. This virus blocks you from accessing the facebook website. When you ping to facebook.com, you will get this reply 127.0.0.1 which is localhost. To solve this, firstly you must install the latest malwarebytes anti malware. The latest malwarebytes have the realtime scan feature which is able to disable the virus program. I also recommend you to replace your antivirus with another one. Probably u still cannot access the facebook website even after u have successfully removed this virus. To solve this, i suggest u to rename or change the hosts file which is located in C: > Windows > System32> Drivers> Etc. Rename or change the file type to text file. This will re enable you to access the facebook website. Hopefully this will solve your problem.. icon_idea.gif

This post has been edited by shamz78: Jul 21 2011, 08:49 PM
kingkingyyk
post Jul 21 2011, 09:48 PM

10k Club
Group Icon
Elite
15,694 posts

Joined: Mar 2008
http://forum.lowyat.net/index.php?showuser=91567
You can proceed to PM him to ask for help instead.
He is a trained people to deal with malware.

It is not a good idea on believing untrained person.

This post has been edited by kingkingyyk: Jul 21 2011, 09:57 PM
lisieng
post Jul 22 2011, 02:06 AM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


i ping fb b4, then it say cannot find host le
BlueWind
post Jul 22 2011, 11:15 AM

Sianzation
*******
Senior Member
2,901 posts

Joined: Jan 2007



Hi,

Are you installing two AV in your computer? Avira and ESET?

Also, can you provide the message from ESET?

I need you to run OTL for an in-depth scan. If you cannot paste the log here because it's too long(thanks to the cacated LYN) then upload those files as attachment.

Download OTL to your Desktop
  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • Click on Minimal Output at the top
  • Download the following file scan.txt to your Desktop. Click here to download it. You may need to right click on it and select "Save"
  • Double click inside the Custom Scan box at the bottom
  • A window will appear saying "Click OK to load a custom scan from a file or Cancel to cancel"
  • Click the OK button and navigate to the file scan.txt which we just saved to your desktop
  • Select scan.txt and click Open. Writing will now appear under the Custom Scan box
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan won't take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time and post them in your topic
===================================================

On your next reply please post :
OTL log
Extras log


Let me know if you have any problems in performing with the steps above or any questions you may have.

lisieng
post Jul 22 2011, 12:50 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


i clicked the custom scan at the bottom of ht OTL, but nothing happened.(why le)?? but i just run scan under standard output, and there is extra and otl log..

so, what shud i do? the log, can use or not?

i already uninstall eset and avira. the eset message is like this de before

Attention!
ESET Smart Security operates under enhanced protection mode.
This is a temporary measure necessary for immediate response to the threat from virus.
No action is required from you.
BlueWind
post Jul 22 2011, 01:17 PM

Sianzation
*******
Senior Member
2,901 posts

Joined: Jan 2007



Ok, go ahead and post the OTL log and the Extra log back here for review.

To me what I think the problem is just the ESET is blocking facebook. But I will look through the log to see anything else I can help you to clean up.
lisieng
post Jul 22 2011, 01:41 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


Attached File  OTL.Txt ( 360.03k ) Number of downloads: 40
Attached File  Extras.Txt ( 74.07k ) Number of downloads: 18



Added on July 22, 2011, 1:41 pmthanx ya! smile.gif

This post has been edited by lisieng: Jul 22 2011, 01:41 PM
BlueWind
post Jul 22 2011, 01:54 PM

Sianzation
*******
Senior Member
2,901 posts

Joined: Jan 2007



Ok, forget about what I said. Wait for further instructions.

This post has been edited by BlueWind: Jul 22 2011, 01:55 PM
BlueWind
post Jul 22 2011, 02:20 PM

Sianzation
*******
Senior Member
2,901 posts

Joined: Jan 2007



Here it is. Please follow the instructions CAREFULLY.

QUOTE
PLEASE TAKE NOTE THAT THIS FIX IS ONLY INTENDED FOR THIS COMPUTER. DOING SO WILL ONLY DO MORE DAMAGE THAN GOOD. I SHALL TAKE NO RESPONSIBILITY FOR ANY DATA LOST WHATSOEVER THAT MAY OCCUR. THANKS


Follow these steps to display hidden files and folders.
  • Open Folder Options by clicking the Start button user posted image, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options.
  • Click the View tab.
  • Under Advanced settings, click Show hidden files and folders
  • Click OK. (Remember to Hide files and folders once done)
Please go to one of the below sites to scan the following files:
Virus Total (Recommended)
jotti.org
VirScan


click on Browse, and upload the following file for analysis:
C:\Windows\geoiplist.rar
C:\Windows\unrar.exe
C:\Windows\loader2.exe_ok


Then click Submit. Allow the file to be scanned, and then please copy and paste the results link(for Virus Total) here for me to see.
If it says already scanned -- click "reanalyze now"
Please post the results in your next reply.

===================================================

Run OTL.exe
  • Copy/paste the following text written inside of the code box into the Custom Scans/Fixes box located at the bottom of OTL

    CODE
    :OTL
    DRV:64bit: - [2009-05-14 15:49:56 | 000,121,152 | ---- | M] (ESET) [Kernel | Auto | Running] -- C:\Windows\SysNative\drivers\epfwwfpr.sys -- (epfwwfpr)
    DRV:64bit: - [2009-05-14 15:47:16 | 000,134,024 | ---- | M] (ESET) [Kernel | System | Running] -- C:\Windows\SysNative\drivers\ehdrv.sys -- (ehdrv)
    DRV:64bit: - [2009-05-14 15:41:14 | 000,142,776 | ---- | M] (ESET) [File_System | Auto | Running] -- C:\Windows\SysNative\drivers\eamon.sys -- (eamon)
    O3:64bit: - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
    O4 - HKLM..\Run: [tray_ico] File not found
    O4 - HKLM..\Run: [tray_ico2] File not found
    O4 - HKLM..\Run: [tray_ico3] File not found
    O4 - HKLM..\Run: [tray_ico4] File not found
    O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20)
    O16 - DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20)
    O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20)
    O33 - MountPoints2\{2ac6b661-90be-11df-854c-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{2ac6b661-90be-11df-854c-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{2ac6b670-90be-11df-854c-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{2ac6b670-90be-11df-854c-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{2ac6b68a-90be-11df-854c-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{2ac6b68a-90be-11df-854c-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{44cbd2a8-b1ff-11e0-bd46-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{44cbd2a8-b1ff-11e0-bd46-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{44cbd2c5-b1ff-11e0-bd46-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{44cbd2c5-b1ff-11e0-bd46-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{5b11be41-f4ef-11de-9468-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{5b11be41-f4ef-11de-9468-002622788aa7}\Shell\AutoRun\command - "" = F:\setup_vmc_lite.exe /checkApplicationPresence
    O33 - MountPoints2\{5b11be4d-f4ef-11de-9468-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{5b11be4d-f4ef-11de-9468-002622788aa7}\Shell\AutoRun\command - "" = F:\setup_vmc_lite.exe /checkApplicationPresence
    O33 - MountPoints2\{5b11be4f-f4ef-11de-9468-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{5b11be4f-f4ef-11de-9468-002622788aa7}\Shell\AutoRun\command - "" = F:\setup_vmc_lite.exe /checkApplicationPresence
    O33 - MountPoints2\{6ed98391-7b9f-11e0-b47b-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{6ed98391-7b9f-11e0-b47b-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{6ed98394-7b9f-11e0-b47b-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{6ed98394-7b9f-11e0-b47b-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{8024f3f7-099c-11e0-9c3d-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{8024f3f7-099c-11e0-9c3d-002622788aa7}\Shell\AutoRun\command - "" = G:\LaunchU3.exe -a
    O33 - MountPoints2\{93e00a3e-d231-11df-be5b-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{93e00a3e-d231-11df-be5b-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{98f3b5db-4a37-11e0-b3ba-001e101f7f74}\Shell - "" = AutoRun
    O33 - MountPoints2\{98f3b5db-4a37-11e0-b3ba-001e101f7f74}\Shell\AutoRun\command - "" = H:\LaunchU3.exe -a
    O33 - MountPoints2\{a6c79fc6-a477-11df-bed5-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{a6c79fc6-a477-11df-bed5-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{c667bd71-6001-11e0-b312-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{c667bd71-6001-11e0-b312-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{d0c02023-bffc-11df-9b86-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{d0c02023-bffc-11df-9b86-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{fe5ab63d-b5b2-11df-9aa5-002622788aa7}\Shell - "" = AutoRun
    O33 - MountPoints2\{fe5ab63d-b5b2-11df-9aa5-002622788aa7}\Shell\AutoRun\command - "" = G:\AutoRun.exe
    O33 - MountPoints2\{fe5ab654-b5b2-11df-9aa5-001e101f1838}\Shell - "" = AutoRun
    O33 - MountPoints2\{fe5ab654-b5b2-11df-9aa5-001e101f1838}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\{fe5ab693-b5b2-11df-9aa5-001e101f1838}\Shell - "" = AutoRun
    O33 - MountPoints2\{fe5ab693-b5b2-11df-9aa5-001e101f1838}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\F\Shell - "" = AutoRun
    O33 - MountPoints2\F\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.)
    O33 - MountPoints2\G\Shell - "" = AutoRun
    O33 - MountPoints2\G\Shell\AutoRun\command - "" = G:\AutoRun.exe
    [2011-07-11 09:40:19 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{60619A2F-D25F-4E17-99CC-21291F48D4E6}
    [2011-07-09 22:41:50 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E61D9E84-8E6E-4FDC-9CB4-2EA3490B86A5}
    [2011-07-08 22:07:42 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{84CC0FAD-C599-4AF1-B0AA-945FF8471D0E}
    [2011-07-08 09:40:29 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{7899900F-67C7-481B-9BB8-FCEAB6F0DCCA}
    [2011-07-07 07:30:35 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{970E717B-29E0-430E-9CF1-0606FC755402}
    [2011-07-06 08:21:48 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E6CC7D60-3297-413B-986E-F321729B9F66}
    [2011-07-04 21:49:19 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{C331D310-3A09-4D5A-869A-B1EEF98C8791}
    [2011-07-03 21:37:10 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{60C5A4CE-2D59-4BC9-B9CE-24F2383DD33C}
    [2011-07-03 19:55:48 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E42823CD-E578-48AF-B742-D92E866C0F4D}
    [2011-07-02 23:29:32 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{B20C60C1-C44A-49FD-98B7-718C104870DF}
    [2011-07-02 22:38:41 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{C907D749-08D1-4059-A2F9-C700E4905C08}
    [2011-07-01 18:10:29 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{D714009D-2EFD-4FD3-92AF-78CBE03F8FE3}
    [2011-07-01 08:30:21 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{B55F37DD-9B9D-4337-A77C-0B6152726A0C}
    [2011-06-30 19:33:42 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{488EAF2D-8B20-4FB7-BDD3-02DFDC2CF313}
    [2011-06-30 16:41:59 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E1382485-ADDE-4704-B911-F99034642C38}
    [2011-06-30 11:25:26 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{0EEF99B5-DEF5-45D3-BAD6-9DD5BD1B06EE}
    [2011-06-30 11:18:47 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{9B9527A6-984F-46CA-A8E5-E4E7B8297887}
    [2011-06-30 09:37:41 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{B51ABEC6-A2B5-4985-AD40-55A98B512F9E}
    [2011-06-28 22:08:49 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{D264CA36-81B0-47CA-B8C1-74F54BC6CB7E}
    [2011-06-28 09:41:25 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{37963DE1-53B6-44E0-A9AD-64C9D0FDDCB9}
    [2011-06-27 22:23:40 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{7A938D57-EBE7-4E42-B6F0-C2521A069DBA}
    [2011-06-24 20:00:09 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{39A00FE4-2BED-40F5-B5C4-9C7DCC512951}
    [2011-06-24 11:40:26 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{F3DDB496-92B2-42D5-9972-86C913816979}
    [2011-06-23 21:30:22 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{75DDD531-093F-4EB7-A106-D6C00E0EB6FC}
    [2011-06-22 21:50:30 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{2C2D1D52-AFFD-4751-A5CB-CDDF02F615DC}

    :Reg
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
    "C:\Windows\update.1\svchost.exe" =-
    "C:\Windows\services32.exe" =-
    "C:\Windows\update.tray-8-0-lnk\svchost.exe" =-
    "C:\Windows\update.tray-8-0\svchost.exe" =-
    "C:\Windows\update.tray-2-0-lnk\svchost.exe" =-
    "C:\Windows\update.tray-2-0\svchost.exe" =-
    "C:\Windows\update.2\svchost.exe" =-
    "C:\Windows\update.1\svchost.exe" =-
    "C:\Windows\services32.exe" =-
    "C:\Windows\update.tray-8-0-lnk\svchost.exe" =-
    "C:\Windows\update.tray-8-0\svchost.exe" =-
    "C:\Windows\update.tray-2-0-lnk\svchost.exe" =-
    "C:\Windows\update.tray-2-0\svchost.exe" =-
    "C:\Windows\update.2\svchost.exe" =-

    :Files
    C:\Windows\update.1
    C:\Windows\update.2
    C:\Windows\services32.exe
    C:\Windows\update.tray-8-0-lnk
    C:\Windows\update.tray-8-0
    C:\Windows\update.tray-2-0-lnk
    C:\Windows\update.tray-2-0

    :Commands
    [EMPTYFLASH]
    [EMPTYTEMP]
    [RESETHOSTS]
    [CLEARALLRESTOREPOINTS]

  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot when it is done
  • Then post Fix OTL log as well as a new OTL log by rerunning it after reboot without custom scans script and( don't check the boxes beside LOP Check or Purity this time )
===================================================

On your next reply please post :
File scanner log
Fix OTL log
Fresh OTL log


Let me know if you have any problems in performing with the steps above or any questions you may have.

This post has been edited by BlueWind: Jul 23 2011, 11:32 AM
lisieng
post Jul 22 2011, 02:38 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


sorry u hv to wait, uploading file takes time.. smile.gif


Added on July 22, 2011, 2:49 pmgeoiplist

http://www.virustotal.com/file-scan/report...73c4-1311316787

unrar

http://www.virustotal.com/file-scan/report...87ad-1311316817

my loader2.exe.ok is empty file ler... 0kb...

This post has been edited by lisieng: Jul 22 2011, 02:49 PM
lisieng
post Jul 22 2011, 03:24 PM

New Member
*
Junior Member
40 posts

Joined: Jul 2011


Attached File  OTL2.Txt ( 338.69k ) Number of downloads: 20
Attached File  fix_otl.txt ( 43.54k ) Number of downloads: 21


wad u mean by file scanner log?

5 Pages < 1 2 3 4 5 >Top
 

Change to:
| Lo-Fi Version
0.0265sec    0.28    6 queries    GZIP Disabled
Time is now: 6th December 2025 - 03:00 PM