Jump to content

Exclusion list does not work


albesp77

Recommended Posts

Hello @RaSch and :welcome:

It is disappointing to read your testing system is having MBARW Beta issues but each computer is unique.  Problems that seem "the same" frequently are not.

The same is true for solutions.  Solutions may often need to be individualized for your unique testing system.

It is less confusing for everyone if a "One Member Per Topic" policy is adhered to instead of posting to the topic of another member.

Development Team Members, Staffers, and Helpers will be able to more easily provide both you and the OP/Topic Starter, with individualized assistance.

Please start a NEW, and SEPARATE topic by left-clicking this >>Start New Topic<< link now.

Thank you always for your patience and understanding.

Link to post
Share on other sites

Hello albesp77 and :welcome:

As soon as a resolution has been implemented for the forum software's current -200 upload error issue, please follow the instructions below:

Please carefully read the locked and pinned topic in this sub-forum, How to report a False Positive and for developer analysis, kindly attach the 3 requested .zip archives to your next reply in this thread.

If an exclusion has not already been entered, a temporary exclusion entry might then be made available to prevent a re-occurrence for your individual system.

Thank you for beta testing MBARW and your feedback.

Link to post
Share on other sites

Hello albesp77:

It is likely the MBARW Beta developers are aware of the issue, but it would be best if the system's logs were made available for analysis.  Please create the following zipped archives for MBARW developer team analysis:

Create a .zip archive of the directory C:\ProgramData\Malwarebytes\Malwarebytes Anti-Ransomware\
Create another .zip archive of the directory C:\ProgramData\Malwarebytes\MBAMService\logs\

Please attach the above zipped archives to your next reply.  Thank you for beta testing MBARW and your valuable feedback.

Link to post
Share on other sites

i don't like my computer to be inspected from unknow peoples, anywhere here an extraction from log and a screenshot of configuration, seems that you check if whitelisted from your online database but don't work as internal exclusion list.

02/05/16    " 07:59:06.269"    34798097    AntiRansomwareControllerImpl    0d04    1914    mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback    "ArwControllerImplHelper.cpp"    621    INFO    "Received threat detection callback from ARW SDK, ObjectPath=C:\totalcmd\TOTALCMD64.EXE, MD5=00"
02/05/16    " 07:59:06.301"    34798144    MbCommonSigVerify    0d04    1914    VerifyFile    "FileVerify.cpp"    479    INFO    "Opening C:\totalcmd\TOTALCMD64.EXE for verification"
02/05/16    " 07:59:06.322"    34798160    MbCommonSigVerify    0d04    1914    ParseForIndirectData    "FileVerify.cpp"    5597    ERROR    "Certificate Indirect hash mismatch. 5597, ??"
02/05/16    " 07:59:06.322"    34798160    MbCommonSigVerify    0d04    1914    VerifyCertData    "FileVerify.cpp"    3506    ERROR    "Certificate indirect data error 3506, ??"
02/05/16    " 07:59:06.322"    34798160    MbCommonSigVerify    0d04    1914    VerifyFile    "FileVerify.cpp"    526    INFO    "C:\totalcmd\TOTALCMD64.EXE verification status - c000000d - IsMbam = 0"
02/05/16    " 07:59:06.413"    34798253    AntiRansomwareControllerImpl    0d04    1914    mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed    "WhiteListManager.cpp"    211    DEBUG    "MEPS WL request: {
   ""channel"" : """",
   ""detections"" : [
      {
         ""filepath"" : ""C:\\totalcmd\\TOTALCMD64.EXE"",
         ""filesize"" : 8151936,
         ""md5"" : ""49F64C8C9B8D08CB517E01AD491C029F"",
         ""sha1"" : ""04D6298E1B78F1C5DC9E75384C3B6C3BC340AE17"",
         ""sha256"" : ""0C257845918798CA2D8C2AD9724A8CAAAC86D12EF872CC821BD6062357A9BE00""
      }
   ],
   ""installation_token"" : ""GvDgs7Kx__DKjYaUMvx81454528565"",
   ""product_build"" : ""consumer"",
   ""product_code"" : ""MBRW-C"",
   ""product_version"" : ""0.9.9""
}"
02/05/16    " 07:59:07.186"    34799018    HttpConnection    0d04    1914    mb::common::net::HttpConnection::SendRequest    "HttpConnection.cpp"    169    DEBUG    "HTTP request success"
02/05/16    " 07:59:07.186"    34799018    AntiRansomwareControllerImpl    0d04    1914    mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed    "WhiteListManager.cpp"    221    DEBUG    "HTTP status code: 200, response body: {""results"":[]}
"
02/05/16    " 07:59:07.186"    34799018    AntiRansomwareControllerImpl    0d04    1914    mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback    "ArwControllerImplHelper.cpp"    661    DEBUG    "The detected file is NOT whitelisted, sending an action request to the SDK to kill this process. ObjectPath=C:\totalcmd\TOTALCMD64.EXE."
02/05/16    " 07:59:08.909"    34800749    AntiRansomwareControllerImpl    0d04    1910    mb::arwcontrollerimpl::ArwCleanupScheduler::RemediateThreatObjects    "ArwCleanupScheduler.cpp"    247    INFO    "Received a results callback from ARW SDK - ObjectPath = C:\totalcmd\TOTALCMD64.EXE, ActionTaken=ARW_ACTION_KILL_THREAD, Result = ARW_RESULT_SUCCESS, RebootRequired = No"
02/05/16    " 07:59:08.909"    34800749    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    320    DEBUG    "Before call to GetLicenseConfig"
02/05/16    " 07:59:08.909"    34800749    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    324    DEBUG    "After call to GetLicenseConfig"
02/05/16    " 07:59:08.909"    34800749    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    328    DEBUG    "After call to GetRansomwareSamplesURL"
02/05/16    " 07:59:08.955"    34800796    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    340    DEBUG    "After call to AddClientFieldsToARWDetectionData, URL = https://mbarw.mb-cosmos.com/samples"
02/05/16    " 07:59:08.955"    34800796    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    350    DEBUG    "Created HTTP connection"
02/05/16    " 07:59:08.970"    34800812    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    358    DEBUG    "About to write to temp file: C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\arw_f42c7ed2-cbd5-11e5-9b0c-f46d0439d4a7.tmp"
02/05/16    " 07:59:08.970"    34800812    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    364    DEBUG    "Wrote JSON data to temp file"
02/05/16    " 07:59:08.970"    34800812    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    376    DEBUG    "Before call to UploadFile"
02/05/16    " 08:00:02.882"    34854710    AntiRansomwareControllerImpl    0d04    10c0    mb::arwcontrollerimpl::ArwControllerImpl::AddExclusion    "ArwControllerImplHelper.cpp"    342    INFO    "Successfully added exclusion of type=0, path=C:\totalcmd\TOTALCMD64.EXE."
02/05/16    " 08:00:36.752"    34888594    AntiRansomwareControllerImpl    0d04    1914    mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback    "ArwControllerImplHelper.cpp"    621    INFO    "Received threat detection callback from ARW SDK, ObjectPath=C:\Windows\explorer.exe, MD5=00"
02/05/16    " 08:00:36.778"    34888609    AntiRansomwareControllerImpl    0d04    1914    mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback    "ArwControllerImplHelper.cpp"    656    INFO    "The detected file is whitelisted, ignoring this detection! ObjectPath=C:\Windows\explorer.exe."
02/05/16    " 08:00:38.916"    34890746    AntiRansomwareControllerImpl    0d04    1910    mb::arwcontrollerimpl::ArwCleanupScheduler::RemediateThreatObjects    "ArwCleanupScheduler.cpp"    247    INFO    "Received a results callback from ARW SDK - ObjectPath = C:\Windows\explorer.exe, ActionTaken=ARW_ACTION_ALLOW, Result = ARW_RESULT_SUCCESS, RebootRequired = No"
02/05/16    " 08:00:47.510"    34899342    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    380    DEBUG    "After call to UploadFile, status: 200"
02/05/16    " 08:00:47.511"    34899342    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    385    DEBUG    "Deleted JSON temp file"
02/05/16    " 08:00:47.511"    34899342    ArwController    0d04    0bbc    CArwController::SendThreatFileToServerCallback    "ArwController.cpp"    550    INFO    "Successfully sent the detected file and info to server."
02/05/16    " 08:00:47.511"    34899342    TelemCtrlImpl    0d04    0bbc    TelemetryControllerImpl::SendRansomwareStreamData    "TelemetryControllerImplHelper.cpp"    1108    DEBUG    "Sending JSON data to BAMBI ransomware stream: {
   ""client"" : {
      ""architecture"" : ""x64"",
      ""build"" : ""consumer"",
      ""caller"" : {
         ""name"" : ""ARWController"",
         ""trigger"" : ""Detection""
      },
      ""filesystem"" : ""ntfs"",
      ""os_version"" : ""Windows 7 Service Pack 1"",
      ""program"" : ""MBRW-C"",
      ""version"" : ""0.9.9.314""
   },
   ""header"" : {
      ""request_id"" : ""2ee8c17acbd611e5ab8cf46d0439d4a7"",
      ""time"" : ""2016-02-05T07:00:47Z"",
      ""uuid"" : ""083a9fdacb8611e5adc4f46d0439d4a7""
   },
   ""license"" : {
      ""license_state"" : ""licensed""
   },
   ""ransomware"" : {
      ""detections"" : [
         {
            ""disposition"" : ""ARW_ACTION_KILL_THREAD"",
            ""md5hash"" : ""00"",
            ""pid"" : 5716,
            ""proc_path"" : ""C:\\totalcmd\\TOTALCMD64.EXE""
         }
      ]
   }
}"
02/05/16    " 08:00:48.125"    34899966    ArwController    0d04    0bbc    CArwController::TelemetryDataCallback    "ArwController.cpp"    642    INFO    "Successfully sent the ransomware data to telemetry server."
02/05/16    " 08:00:48.134"    34899966    ArwController    0d04    0bbc    CArwController::SubmitToCleanNotification    "ArwController.cpp"    511    INFO    "Successfully submitted detection results for cleaning."
02/05/16    " 08:00:48.134"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    320    DEBUG    "Before call to GetLicenseConfig"
02/05/16    " 08:00:48.134"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    324    DEBUG    "After call to GetLicenseConfig"
02/05/16    " 08:00:48.134"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    328    DEBUG    "After call to GetRansomwareSamplesURL"
02/05/16    " 08:00:48.134"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    340    DEBUG    "After call to AddClientFieldsToARWDetectionData, URL = https://mbarw.mb-cosmos.com/samples"
02/05/16    " 08:00:48.134"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    350    DEBUG    "Created HTTP connection"
02/05/16    " 08:00:48.135"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    358    DEBUG    "About to write to temp file: C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\arw_2f47f9e2-cbd6-11e5-afef-f46d0439d4a7.tmp"
02/05/16    " 08:00:48.135"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    364    DEBUG    "Wrote JSON data to temp file"
02/05/16    " 08:00:48.135"    34899966    CloudCtrlImpl    0d04    0bbc    CloudControllerImplHelper::SubmitRansomwareDetection    "CloudControllerImplHelper.cpp"    376    DEBUG    "Before call to UploadFile"
02/05/16    " 08:00:48.167"    34899997    CleanControllerImpl    0d04    18f4    Cleaner::Clean    "Cleaner.cpp"    49    INFO    "Start clean of client , detection resultsC:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\ArwDetections\2f469a48-cbd6-11e5-afef-f46d0439d4a7.json"
02/05/16    " 08:00:48.188"    34900028    CleanController    0d04    18ec    CCleanController::FireCleanStateChanged    "CleanController.cpp"    587    DEBUG    "Firing clean state changed, results ID = C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\ArwDetections\2f469a48-cbd6-11e5-afef-f46d0439d4a7.json, cleanState = 1"
02/05/16    " 08:00:50.845"    34902680    MbCommonSigVerify    0d04    18f4    VerifyFile    "FileVerify.cpp"    479    INFO    "Opening C:\totalcmd\TOTALCMD64.EXE for verification"
02/05/16    " 08:00:50.864"    34902696    MbCommonSigVerify    0d04    18f4    ParseForIndirectData    "FileVerify.cpp"    5597    ERROR    "Certificate Indirect hash mismatch. 5597, ??"
02/05/16    " 08:00:50.864"    34902696    MbCommonSigVerify    0d04    18f4    VerifyCertData    "FileVerify.cpp"    3506    ERROR    "Certificate indirect data error 3506, ??"
02/05/16    " 08:00:50.864"    34902696    MbCommonSigVerify    0d04    18f4    VerifyFile    "FileVerify.cpp"    526    INFO    "C:\totalcmd\TOTALCMD64.EXE verification status - c000000d - IsMbam = 0"
02/05/16    " 08:00:50.957"    34902790    CleanControllerImpl    0d04    18f4    mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed    "WhiteListManager.cpp"    211    DEBUG    "MEPS WL request: {
   ""channel"" : """",
   ""detections"" : [
      {
         ""filepath"" : ""C:\\totalcmd\\TOTALCMD64.EXE"",
         ""filesize"" : 8151936,
         ""md5"" : ""49F64C8C9B8D08CB517E01AD491C029F"",
         ""sha1"" : ""04D6298E1B78F1C5DC9E75384C3B6C3BC340AE17"",
         ""sha256"" : ""0C257845918798CA2D8C2AD9724A8CAAAC86D12EF872CC821BD6062357A9BE00""
      }
   ],
   ""installation_token"" : ""GvDgs7Kx__DKjYaUMvx81454528565"",
   ""product_build"" : ""consumer"",
   ""product_code"" : ""MBRW-C"",
   ""product_version"" : ""0.9.9""
}"
02/05/16    " 08:00:51.689"    34903523    HttpConnection    0d04    18f4    mb::common::net::HttpConnection::SendRequest    "HttpConnection.cpp"    169    DEBUG    "HTTP request success"
02/05/16    " 08:00:51.689"    34903523    CleanControllerImpl    0d04    18f4    mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed    "WhiteListManager.cpp"    221    DEBUG    "HTTP status code: 200, response body: {""results"":[]}
"
02/05/16    " 08:00:56.397"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::AddAsLinkedTrace    "LinkingEngine.cpp"    608    DEBUG    "Added new linked trace C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::AddAsLinkedTrace    "LinkingEngine.cpp"    608    DEBUG    "Added new linked trace C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::AddAsLinkedTrace    "LinkingEngine.cpp"    608    DEBUG    "Added new linked trace C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::AddAsLinkedTrace    "LinkingEngine.cpp"    608    DEBUG    "Added new linked trace C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::AddAsLinkedTrace    "LinkingEngine.cpp"    608    DEBUG    "Added new linked trace C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::AddAsLinkedTrace    "LinkingEngine.cpp"    608    DEBUG    "Added new linked trace C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.398"    34908234    CleanControllerImpl    0d04    18f4    LinkingEngine::GetLinkedTraces    "LinkingEngine.cpp"    556    DEBUG    "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.409"    34908250    CleanControllerImpl    0d04    18f4    DOREngine::PreCleanIsRebootRequired    "DOREngine.cpp"    87    INFO    "Must reboot, special file C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.410"    34908250    CleanControllerImpl    0d04    18f4    QuarantineEngine::QuarantineFile    "QuarantineEngine.cpp"    275    INFO    "Quarantining C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.430"    34908265    CleanControllerImpl    0d04    18f4    RemovalEngine::RemoveFile    "RemovalEngine.cpp"    1351    INFO    "Cleaning file C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.655"    34908484    CleanControllerImpl    0d04    18f4    RemovalEngine::DeleteFileAPI    "RemovalEngine.cpp"    1453    INFO    "Deleting file C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.996"    34908827    CleanControllerImpl    0d04    18f4    RemovalEngine::DeleteFileAPI    "RemovalEngine.cpp"    1531    ERROR    "Verification of deleting file C:\totalcmd\TOTALCMD64.EXE failed!"
02/05/16    " 08:00:56.996"    34908827    CleanControllerImpl    0d04    18f4    RemovalEngine::RemoveFile    "RemovalEngine.cpp"    1438    INFO    "Scheduling DOR cleaning for file C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.996"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::QuarantineFile    "QuarantineEngine.cpp"    323    INFO    "Succeeded quarantining file C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.997"    34908827    CleanController    0d04    18ec    CCleanController::FireQuarantineItemAdded    "CleanController.cpp"    627    DEBUG    "Firing quarantine item added, id=30e55c40-cbd6-11e5-b4b0-f46d0439d4a7, path=C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.997"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::Quarantine    "QuarantineEngine.cpp"    238    DEBUG    "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.997"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::Quarantine    "QuarantineEngine.cpp"    238    DEBUG    "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.997"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::Quarantine    "QuarantineEngine.cpp"    238    DEBUG    "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.997"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::Quarantine    "QuarantineEngine.cpp"    238    DEBUG    "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.998"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::Quarantine    "QuarantineEngine.cpp"    238    DEBUG    "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"
02/05/16    " 08:00:56.998"    34908827    CleanControllerImpl    0d04    18f4    QuarantineEngine::Quarantine    "QuarantineEngine.cpp"    238    DEBUG    "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"

 

Snap1.png

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.