Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Blue Screen Of Death


  • This topic is locked This topic is locked
17 replies to this topic

#1 novocaine

novocaine

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 18 February 2011 - 01:45 PM

I have been encountering a problem with the dreaded blue screen of death. From the crashes that have happened i have gotten IRQL_NOT_LESS_OR_EQUAL WINDOWS_SERVICE_EXCEPTION and IRQL_NOT_HANDLED_EXCEPTION (unsure of the last one). I know I downloaded a program, I remember what program it was, and I am positive it was that program that did it. I do not know what it was it infected but if you can offer help I would highly appreciate it. Just tell me what logs you need and I'll get them to you asap.
Thanks, Randy.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 18 February 2011 - 11:12 PM

Is this XP or another?
Have you tried removing the program to see if things straightened out?

Let's start with an MBAM log.

Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 25 February 2011 - 02:20 PM

Sorry for the long reply. The crashes stopped and then started back up. I was hoping id get an email when there was a response but nope. Anyhow I will run malwarebytes now and post up a log for you. And im using Windows 7 on a toshiba satellite laptop. And I believe that I have. I have ran malwarebytes many times in the past but it kept happening so I came here.

Edited by novocaine, 25 February 2011 - 02:22 PM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 25 February 2011 - 02:31 PM

Rats... click the Watch Topic button at the top right so you do not miss any replies
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 25 February 2011 - 02:32 PM

Here is the log.


Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5876

Windows 6.1.7600 (Safe Mode)
Internet Explorer 8.0.7600.16385

2/25/2011 2:30:26 PM
mbam-log-2011-02-25 (14-30-26).txt

Scan type: Quick scan
Objects scanned: 191555
Time elapsed: 9 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 40

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Windows\Temp\mrt2589.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt8C76.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt8E3A.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt8FEF.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9194.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt91E2.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt955B.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt977D.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9819.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9829.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt98B5.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9A99.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9BA2.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9BD1.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9E51.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrt9E8F.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA19B.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA38E.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA38F.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA3AD.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA469.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA46A.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA46B.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA765.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtA9B6.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtAA52.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtAA71.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtAB99.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtAEF3.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtAF13.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtAF32.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtB125.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtB1B1.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtB598.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtB940.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtC62B.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtC84D.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtCB69.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtCE65.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Windows\Temp\mrtE629.tmp\stdrt.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.

I've been trying to understand what that stdrt.exe thing is. I looked it up and places said it was a part of microsoft or something and that it was harmless. What would you like next? Would you like a BlueScreenView report as well? Thank you for the help.
~Randy

p.s. That stdrt.exe was there before the problem occurred.

Edited by novocaine, 25 February 2011 - 02:39 PM.


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 25 February 2011 - 02:53 PM

Hello, hello many malware use legitimate name of other files to hide. It appears yours hide in the TEMP filder.

Run this Temp file cleaner
TFC by OT
Please download TFC by Old Timer and save it to your desktop.
alternate download link

Save any unsaved work. TFC will close ALL open programs including your browser!
Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
Then an Online scan
Please perform a scan with Eset Online Antiivirus Scanner.
This scan requires Internet Explorer,Opera or Firefox to work. Vista/Windows 7 users need to run Internet Explorer as Administrator.
To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.
  • Click the green Posted Image button.
  • Read the End User License Agreement and check the box:
  • Check Posted Image.
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Check Remove found threats and Scan potentially unwanted applications. (If given the option, choose "Quarantine" instead of delete.)
  • Click the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer.
  • If offered the option to get information or buy software at any point, just close the window.
  • The scan will take a while so be patient and do NOT use the computer while the scan is running. Keep all other programs and windows closed.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop as ESETScan.txt.
  • Push the Posted Image button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply.
Note: A log.txt file will also be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
If you did not save the ESETScan log, click Posted Image > Run..., then type or copy and paste everything in the code box below into the Open dialogue box:

C:\Program Files\ESET\EsetOnlineScanner\log.txt
  • Click Ok and the scan results will open in Notepad.
  • Copy and paste the contents of log.txt in your next reply.
-- Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.

NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 25 February 2011 - 03:34 PM

Well. I did the TFC. It now seems that my comp slowed down really bad and crashes in safe mode as well. I'll do the online scan now.

#8 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 25 February 2011 - 07:27 PM

C:\Program Files (x86)\FlyForEmeka\Neuz.exe probably a variant of Win32/Spy.Banker.KPVTNYR trojan cleaned by deleting - quarantined
C:\RUNUP_TW\FS\XenoFiesta.bin a variant of Win32/Packed.Themida application cleaned by deleting - quarantined
C:\Users\Randy\Downloads\MICROSOFT_OFFICE_crack.zip a variant of Win32/Nebuler.CP trojan deleted - quarantined <--(this is what caused the virus)
C:\Windows\system\regsrv.exe Win32/Agent.QTP trojan cleaned by deleting - quarantined
C:\Windows\Temp\mrt1341.tmp\stdrt.exe Win32/Agent.QTP trojan cleaned by deleting - quarantined
C:\Windows\Temp\mrt2A3A.tmp\stdrt.exe Win32/Agent.QTP trojan cleaned by deleting - quarantined
C:\Windows\Temp\mrt36A9.tmp\stdrt.exe Win32/Agent.QTP trojan cleaned by deleting - quarantined

Edited by novocaine, 25 February 2011 - 07:45 PM.


#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 25 February 2011 - 07:46 PM

Hello, there it is an open door to malware and why the machine went nuts. There is a crack software. If they are not removed we are wasting our time.

The Win32/Spy.Bankeris a trojan that steals passwords and other sensitive information. The trojan can send the information to a remote machine.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

><><>><<><><>

IMPORTANT NOTE: The practice of using cracking tools, keygens, warez or any pirated software is not only considered illegal activity but it is a serious security risk.

Cracking applications are used for illegally breaking (cracking) various copy-protection and registration techniques used in commercial software. These programs may be distributed via Web sites, Usenet, and P2P networks.

trendmicro.com/vinfo

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

...warez/piracy sites ranked the highest in downloading spyware...just opening the web page usually sets off an exploit, never mind actually downloading anything. And by the time the malware is finished downloading, often the machine is trashed and rendered useless.

University of Washington spyware study

...One of the most aggressive and intrusive of all bad websites on the Internet are serial, warez, software cracking type sites...they sneak malware onto your system...Where do trojan viruses originate? One of the biggest malware distributors on the Internet are serial/warez/code cracking sites.

Bad Web Sites: Malware

When you use these kind of programs, be forewarned that some of the worst types of malware infections can be contracted and spread by visiting crack, keygen, warez and other pirated software sites. In many cases, those sites are infested with a smörgåsbord of malware and an increasing source of system infection. Those who attempt to get software for free can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

Before we can continue, I need you to remove all cracks and keygens immediately to reduce the risk of infection/reinfection. If not, then we are just wasting time trying to clean your system. Further, other tools used during the disinfection process may detect crack and keygens so we need to ensure they have been removed.

Using these types of programs or the websites you visited to get them is almost a guaranteed way to get yourself infected!!

><><>><>><>><><>

Update and run a FULL MBAM scan now.
Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 25 February 2011 - 08:21 PM

Cleaning it will be fine enough. This isn't really anything but a computer I use to run mmo games on. I don't make any purchases, deposits, withdrawls and such from my computer. Is there a way to go about formatting and reinstalling windows without having to spend $100+ for the disk? Running malwarebytes full scan now.

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 25 February 2011 - 09:37 PM

HI, sorry I am not sure. You can ask in WIN7

This may help How to use the Windows 7 Recovery Environment Command Prompt
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 25 February 2011 - 10:40 PM

MBAM log


Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5876

Windows 6.1.7600 (Safe Mode)
Internet Explorer 8.0.7600.16385

2/25/2011 10:39:01 PM
mbam-log-2011-02-25 (22-39-01).txt

Scan type: Full scan (C:\|)
Objects scanned: 694336
Time elapsed: 2 hour(s), 21 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 25 February 2011 - 10:52 PM

I see no more malware. If you need an Officetype application ,;ook at this
OpenOffice
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 novocaine

novocaine
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:11 PM

Posted 26 February 2011 - 01:10 AM

My computer is still having problems. It says something about IaStor.sys. Any ideas? And tomarrow I'm going to ask the school if I can borrow a windows 7 disk to do a restore. Thanks for all of the help.

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:11 PM

Posted 26 February 2011 - 10:30 AM

This means we still have hidden backdoors and/or rootkits. We will need to move you to the Malware rmoval section to get these out. This will take several days.
Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9,which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If Gmer won't run,skip it and move on.
Let me know if that went well.



But if you are going to reformat you may want to just do that. Not an unwise decision to make. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.

2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe/.scr/.htm/.html/.xml/.zip/.rar files as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users