Hjackthis exe
Author: m | 2025-04-24
HjackThis Log on Windows 98 - posted in Virus, Spyware Malware Removal: I run the HjackThis tool to discover the cause of a black screen with little red stripes that Hjackthis Log - posted in Virus, Trojan, Spyware, and Malware Removal Help: My computer has begun to have problems in the last 2 days or so. I have a series of .exe
Rapport Hjackthis VIRUS - forums.commentcamarche.net
- 07:02 PM I followed all the steps but am unable to run hiack this now! It's disabled m antivirus stuff as well....however I was able to run XOFTspy and it said it quarantined a number of problems that I knew were there and hopefully it has removed them....I'm trying to restart and run hjackthis.....here is my ewido log ....a side note i renamed one of the fixed files.--------------------------------------------------------- ewido anti-malware - Scan report--------------------------------------------------------- + Created on: 8:39:29 PM, 5/23/2006 + Report-Checksum: 1A314F9E + Scan result: [232] C:\Documents and Settings\All Users\Documents\Settings\20242402.dll -> Proxy.Xorpix.u : Error during cleaning C:\awcqywdq.exe -> Downloader.Small.ctf : Cleaned with backup C:\awuakqbw.exe -> Not-A-Virus.Hoax.Win32.Renos.bw : Cleaned with backup C:\Documents and Settings\Gary McCue\Local Settings\Temp\20233C6.tmp -> Proxy.Xorpix.u : Cleaned with backup C:\Documents and Settings\Gary McCue\Local Settings\Temp\202B2F3.tmp -> Proxy.Xorpix.u : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Application Data\3ad33ab6.exe -> Downloader.Small.csn : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temp\174.exe -> Downloader.Tiny.bw : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\37N3551C\bmlgjeg[1].txt -> Downloader.Small.csn : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\FBM0TFHA\kwvgb[1].txt -> Proxy.Small.bo : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\FBM0TFHA\plfeqcamh[1].txt -> Not-A-Virus.Hoax.Win32.Renos.bw : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\J6HAFLMK\bwitsrqbw[1].txt -> Downloader.Small.ctf : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\J6HAFLMK\rzhtsdpb[1].txt -> Trojan.Sinowal.q : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\J6HAFLMK\upbwlxiu[1].txt -> Hijacker.StartPage.adi : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\MNXFIJ0I\dpkjvts[1].txt -> Trojan.Regger.s : Cleaned with backup C:\hpdjyy.exe -> Trojan.Regger.s : Cleaned with backup C:\Program Files\ryads.exe -> Hijacker.StartPage.adi : Cleaned with backup C:\Program Files\SpySheriff -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\base.avd -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\base001.avd -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\base002.avd -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\found.wav -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur000.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur001.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur002.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur003.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\notfound.wav -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\removed.wav -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\SpySheriff.dvm -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\SpySheriff.exe -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\Uninstall.exe -> Adware.SpySheriff : Cleaned with backup C:\splp.exe -> Trojan.Sinowal.q : Cleaned with backup C:\tpjtsip.exe -> Downloader.Small.csn : Cleaned with backup C:\WINDOWS\system32\0mcamcap.exe -> Proxy.Small.bo : Cleaned with backup C:\WINDOWS\system32\3ad33ab6.exe -> Downloader.Small.csn : Cleaned Remover. Save it in the same folder you made earlier (c:\BFU).Do not do anything with these yet!Reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping F8 until a menu appears. Highlight Safe Mode and hit enter.4. Once in Safe Mode, Open Ewido:Click on scannerClick on Complete System Scan and the scan will begin.You will be prompted to clean the first infection.Select "Perform action on all infections", then proceed.Once the scan has completed, there will be a button located on the bottom of the screen named Save reportClick Save report.Save the report .txt file to your desktop or a location where you can find it easily.Close ewido anti-malware.5. Then, please go to Start > My Computer and navigate to the C:\BFU folder. Start the Brute Force Uninstaller by doubleclicking BFU.exe Behind the scriptline to execute field click the folder icon and select alcanshorty.bfu Press Execute and let the program do it’s job. (You ought to see a progress bar if you did this correctly.)Wait for the complete script execution box to pop up and press OK.Press exit to terminate the BFU program.Reboot into normal windows and post the contents of Ewido text report that you saved and a new HiJackThis log. 0 Back to top --> #9 jwoo0414 Posted 23 May 2006 - 03:38 PM Ewido just found an infection called: Worm.Monikey.m it is lovated in C:\windows\TEMPthe file is called pol3E40.tmp 0 Back to top --> #10 RiP Posted 23 May 2006 - 03:39 PM RiP Malware Expert Retired Staff 8,430 posts Hello, jwoo0414.It looks like we posted at the same time, I just posted instructions for you 0 Back to top --> Advertisements Register to Remove --> #11 jwoo0414 Posted 23 May 2006 - 04:27 PM The scan is almost done! Sorry it's taking sooo long....for some reason Ewido takes like an hour to complete 0 Back to top --> #12 jwoo0414 Posted 23 May 2006 - 05:37 PM Ok sorry.....went to go check on the scan and it somehow shut off the computer....not sure what is going on but I will try it again. Is there a way to speed up the scan? I'll post my hjackthis log asap. Sorry for holding you up....may need to take a break in between but I will post as soon as I can 0 Back to top --> #13 jwoo0414 Posted 23 May 2006Hjackthis - what is all this stuff!? - TechSpot
And I don't want to risk further infection. I have unplugged the internet cable. Thank you for your help! 0 Back to top --> Advertisements Register to Remove --> --> -- > #2 RiP Posted 23 May 2006 - 02:59 PM RiP Malware Expert Retired Staff 8,430 posts Hello, jwoo0414.I need you to do the following for me:Since you don't have internet access on the infected computer, you're going to need to transfer the files via usb, cd, floppy, etc... Please download WinsockFix here and do the following: Click the "ReG-Backup" button and follow the prompts. Click the "Fix" button and restart your computer.Click the START button > Select Run > type in "msconfig" (without the quotes) and press OK > Select Normal Startup - load all device drivers and services > Then click Apply and then OK. It will give you two options: Restart and Exit Without Restart, select Restart.Then please post back with a new HijackThis log. 0 Back to top --> #3 jwoo0414 Posted 23 May 2006 - 03:02 PM Do I do all of this in safe mode or regular? 0 Back to top --> #4 jwoo0414 Posted 23 May 2006 - 03:03 PM Do I do all of this in safe mode or regular? 0 Back to top --> #5 jwoo0414 Posted 23 May 2006 - 03:23 PM Here's my latest hjackthis log file. Looks like the sucker is still there errrrrLogfile of HijackThis v1.99.1Scan saved at 5:18:41 PM, on 5/23/2006Platform: Windows XP SP1 (WinNT 5.01.2600)MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)Running processes:C:\windows\System32\smss.exeC:\windows\system32\winlogon.exeC:\windows\system32\services.exeC:\windows\system32\lsass.exeC:\windows\system32\svchost.exeC:\windows\system32\svchost.exeC:\windows\System32\svchost.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Program Files\Internet Explorer\iexplore.exeC:\windows\system32\spoolsv.exeC:\windows\Explorer.EXEC:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exeC:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeC:\Program Files\ewido anti-malware\ewidoctrl.exeC:\Program Files\ewido anti-malware\ewidoguard.exeC:\WINDOWS\system32\HPConfig.exeC:\Program Files\HPQ\Notebook Utilities\HPWirelessMgr.exeC:\Program Files\Linksys\Wireless-G Notebook Adapter with SpeedBooster\NICServ.exeC:\Program Files\Synaptics\SynTP\SynTPLpr.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\WINDOWS\System32\hphmon05.exeC:\Program Files\Common Files\Symantec Shared\ccApp.exeC:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exeC:\windows\System32\carpserv.exeC:\windows\System32\svchost.exeC:\Program Files\ScanSoft\OmniPagePro14.0\OpScheduler.exeC:\Program Files\Real\RealPlayer\RealPlay.exeC:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exeC:\Program Files\Common Files\AOL\1129778967\ee\AOLSoftware.exeC:\Program Files\QuickTime\qttask.exeC:\windows\System32\funk.exeC:\windows\System32\manset.exeC:\Program Files\XoftSpySE\xoftspy.exeC:\Program Files\TrojanHunter 4.5\THGuard.exeC:\Program Files\ScanSoft\OmniPagePro14.0\Opware14.exeC:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exeC:\windows\System32\wuauclt.exeC:\Documents and Settings\Gary McCue.PC311047611813\Desktop\HijackThis\HijackThis.exeR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.htmlR0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = c:\secure32.htmlR0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.htmlR1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = - REG:system.ini: Shell=O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dllO2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocxO2 - BHO: (no name) - {196B9CB5-4C83-46F7-9B06-9672ECD9D99B} - C:\WINDOWS\system32\winbrume.dllO2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dllO2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dllO3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dllO3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocxO3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} -. HjackThis Log on Windows 98 - posted in Virus, Spyware Malware Removal: I run the HjackThis tool to discover the cause of a black screen with little red stripes thatHjackthis Log For Winantivius Thing - BleepingComputer
Wintrust.dll regsvr32.exe /s initpki.dll regsvr32.exe /s dssenh.dll regsvr32.exe /s rsaenh.dll regsvr32.exe /s gpkcsp.dll regsvr32.exe /s sccbase.dll regsvr32.exe /s slbcsp.dll regsvr32.exe /s cryptdlg.dll regsvr32.exe /s Urlmon.dll regsvr32.exe /s Oleaut32.dll regsvr32.exe /s msxml2.dll regsvr32.exe /s Browseui.dll regsvr32.exe /s shell32.dll regsvr32.exe /s Mssip32.dll regsvr32.exe /s atl.dll regsvr32.exe /s jscript.dll regsvr32.exe /s msxml3.dll regsvr32.exe /s softpub.dll regsvr32.exe /s wuapi.dll regsvr32.exe /s wuaueng.dll regsvr32.exe /s wuaueng1.dll regsvr32.exe /s wucltui.dll regsvr32.exe /s wups.dll regsvr32.exe /s wups2.dll regsvr32.exe /s wuweb.dll regsvr32.exe /s scrrun.dll regsvr32.exe /s msxml6.dll regsvr32.exe /s ole32.dll regsvr32.exe /s qmgr.dll regsvr32.exe /s qmgrprxy.dll regsvr32.exe /s wucltux.dll regsvr32.exe /s muweb.dll regsvr32.exe /s wuwebv.dll REM reset winsock netsh winsock reset REM reset proxy netsh winhttp reset proxy REM restart services sc.exe config wuauserv start= auto sc.exe config bits start= delayed-auto sc.exe config cryptsvc start= auto sc.exe config TrustedInstaller start= demand sc.exe config DcomLaunch start= auto net start bits net start wuauserv net start appidsvc net start cryptsvc REM Install the latest Windows Update Agent. REM start @echo off REM Script to Reset Windows Updates agent REM Stop Services net stop bits net stop wuauserv net stop appidsvc net stop cryptsvc taskkill /im wuauclt.exe /f REM Delete the qmgr*.dat files Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" REM Rename folders Ren %systemroot%\SoftwareDistribution SoftwareDistribution.bak Ren %systemroot%\system32\catroot2 catroot2.bak REM Reset services permissions sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) sc.exe sdset cryptsvc D:(A;;CCLCSWLOCRRC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLCRSDRCWDWO;;;SO)(A;;CCLCSWRPWPDTLOCRRC;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;WD) sc.exe sdset trustedinstaller D:(A;;CCLCSWLOCRRC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLCRSDRCWDWO;;;SO)(A;;CCLCSWRPWPDTLOCRRC;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;WD) REM ReRegister services cd /d %windir%\system32 regsvr32.exe /U /s vbscript.dll regsvr32.exe /U /s mshtml.dll regsvr32.exe /U /s msjava.dll regsvr32.exe /U /s msxml.dll regsvr32.exe /U /s actxprxy.dll regsvr32.exe /U /s shdocvw.dll regsvr32.exe /U /s Mssip32.dll regsvr32.exe /U /s wintrust.dll regsvr32.exe /U /s initpki.dll regsvr32.exe /U /s dssenh.dll regsvr32.exe /U /s rsaenh.dll regsvr32.exe /U /s gpkcsp.dll regsvr32.exe /U /s sccbase.dll regsvr32.exe /U /s slbcsp.dll regsvr32.exe /U /s cryptdlg.dll regsvr32.exe /U /s Urlmon.dll regsvr32.exe /U /s Oleaut32.dll regsvr32.exe /U /s msxml2.dll regsvr32.exe /U /s Browseui.dll regsvr32.exe /U /s shell32.dll regsvr32.exe /U /s atl.dll regsvr32.exe /U /s jscript.dll regsvr32.exe /U /s msxml3.dll regsvr32.exe /U /s softpub.dll regsvr32.exe /U /s wuapi.dll regsvr32.exe /U /s wuaueng.dll regsvr32.exe /U /s wuaueng1.dll regsvr32.exe /U /s wucltui.dll regsvr32.exe /U /s wups.dll regsvr32.exe /U /s wups2.dll regsvr32.exe /U /s wuweb.dll regsvr32.exe /U /s scrrun.dll regsvr32.exe /U /s msxml6.dll regsvr32.exe /U /s ole32.dll regsvr32.exe /U /s qmgr.dll regsvr32.exe /U /s qmgrprxy.dll regsvr32.exe /U /s wucltux.dll regsvr32.exe /U /s muweb.dll regsvr32.exe /U /s wuwebv.dll regsvr32.exe /s vbscript.dll regsvr32.exe /s mshtml.dll regsvr32.exe /s msjava.dll regsvr32.exe /s msxml.dll regsvr32.exe /s actxprxy.dll regsvr32.exe /s shdocvw.dll regsvr32.exe /s Mssip32.dll regsvr32.exe /sVirus bropia- hjackthis - Forum Virus
BittorrentArchivo EXE: E:\MP3Downloading\bindata.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\K-litePro\k-litepro.exe %1Identificación del programa: AzureusArchivo EXE: %ProgramFiles%\Azureus\Azureus.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\TrustyFiles\TrustyFiles.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Internet\Downloads P2P FTP\BitTorrent\bittorrent.exe --responsefile %1Identificación del programa: uTorrentArchivo EXE: %ProgramFiles%\utorrent.exeIdentificación del programa: uTorrentArchivo EXE: %ProgramFiles%\uTorrent\utorrent.exeIdentificación del programa: AzureusArchivo EXE: %ProgramFiles%\Azureus\Azureus.exeIdentificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\BitSpirit\BitSpirit.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BtDownload\gerbtdownloadgui.exe --responsefileIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\File Sharing Revolution\Shareaza.exeIdentificación del programa: uTorrentArchivo EXE: %ProgramFiles%\+ªTorrent\REDAUD-00825205-US.EXEIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Tribler\tribler.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\TrustyFilesPro\TrustyFiles.datIdentificación del programa: Torrent.DocumentArchivo EXE: %ProgramFiles%\TorrentStorm\TorrentStorm.exeIdentificación del programa: LimeWireArchivo EXE: %ProgramFiles%\LimeWire\LimeWire.exeIdentificación del programa: AzureusArchivo EXE: %ProgramFiles%\Azureus\Azureus.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitComet\BitCometBeta.exeIdentificación del programa: morphtorrentArchivo EXE: %ProgramFiles%\Morpheus\Morpheus.exeIdentificación del programa: Ares.TorrentArchivo EXE: %ProgramFiles%\Ares\Ares.exeIdentificación del programa: AresArchivo EXE: %ProgramFiles%\Ares\Ares.exeIdentificación del programa: SuperTorrentArchivo EXE: %ProgramFiles%\SuperTorrent\SuperTorrent.exe '%L'Identificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\FlashGet\flashget.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitLord\BitLord.exe /dummyIdentificación del programa: WarezArchivo EXE: %ProgramFiles%\Warez\warez.exe '%L'Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Lphant Plus\eLePhantClient.exeIdentificación del programa: BitDownloadArchivo EXE: %ProgramFiles%\BitDownload\BitDownload.exeIdentificación del programa: Democracy.Player.1Archivo EXE: %ProgramFiles%\Participatory Culture Foundation\Democracy Player\Democracy.exeIdentificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\FlashGet\flashget.exeIdentificación del programa: classtorrent1Archivo EXE: %ProgramFiles%\FileVOoM\FileVOoM.exeIdentificación del programa: Azureus 1Archivo EXE: %ProgramFiles%\Azureus\Azureus.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\GetRight\GetRight.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitLord2\BitLord.exeIdentificación del programa: uTorrentArchivo EXE: %ProgramFiles%\Downloads\net_tools\utorrent.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\lphant\eLePhantClient.exeIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitZip\BitZip.exeIdentificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\_wwwUtils\Apps\DwnLdMan\FlashGet\flashget.exeIdentificación del programa: Miro.1Archivo EXE: %ProgramFiles%\Participatory Culture Foundation\Miro\Miro.exeIdentificación del programa: Pando.DocumentArchivo EXE: %ProgramFiles%\Pando Networks\Pando\pando.exeIdentificación del programa: QvodbtArchivo EXE: %ProgramFiles%\QvodPlayer\QvodPlayer.exe -btfileIdentificación del programa: Miro.1Archivo EXE: %ProgramFiles%\Miro\Miro.exeIdentificación del programa: Retriever.Retriever.jar.HalogenWareArchivo EXE: javaw.exe -jar %ProgramFiles%\HalogenWare\Retriever\Retriever.jar %*Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Thunder Network\Thunder\Thunder.exe /openfileIdentificación del programa: Ares.TorrentArchivo EXE: %ProgramFiles%\Ares\Ares.exeIdentificación del programa: BitComet TurboArchivo EXE: %ProgramFiles%\BitComet Turbo\BitComet Turbo.exeIdentificación del programa: AzureusArchivo EXE: %ProgramFiles%\Vuze\Azureus.exeIdentificación del programa: FrostWireArchivo EXE: %ProgramFiles%\FrostWire\FrostWire.exeIdentificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\BITTOR~1\BITTOR~1.EXEIdentificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\FlashGet Network\FlashGet 3\Flashget3.exe Un archivo torrent descargar metadato es un formato de archivo especial de Rainberry y solo debe editarse y guardarse con el software apropiado.[Scan Hjackthis] Virus ? - Forum Virus
Category All Drivers and Applications,Windows Upgrade Model FZ-G1F (mk2) Series Operating System Windows 8.1 64bit Update / Windows 7 64bit SP1 Language MUI,English Release Date 8/31/16 File Name Win10_Clean_StepByStepGuide_en_AX3E_LX3E_LX3J_G1F_M1C.pdf 212,587 bytes sid_d20155083.exe 3,668,064 bytes phid_d20155104.exe 2,382,344 bytes pcommon_d20154080.exe 39,624,384 bytes pcomn64_d20154081.exe 42,054,840 bytes pcinfo_d20154997.exe 2,739,088 bytes bt_i7260_d20154860.exe 6,757,128 bytes cppc_d20154868.exe 1,671,184 bytes dptf_d20154278.exe 7,012,592 bytes sd_o2_d20154990.exe 15,304,760 bytes genericvideo_20_19_15_4390_64.exe 206,274,408 bytes vbd_d20154983.exe 1,334,408 bytes wlan_d20155117.exe 372,763,448 bytes gps_d2015xxxx.exe 269,856 bytes lan_d20155237.exe 88,110,304 bytes *IntelManagementEngineDriver_v11.0.0.1160_ss22234.exe 96,541,832 bytes *ChipsetDeviceSoftwareDriver_v10.1.1.13_ss21921.exe 3,083,032 bytes *BTupServiceApp_v1.00l12_ss16124.exe 1,901,056 bytes *USBLAN(Realtek)Driver_v10.5.1019.2015_ss22229.exe 9,742,408 bytes *USBSerialDriver_v2.12.06_ss20603.exe 2,327,976 bytes *RFIDDriver_v1.2.25.34_ss18489.exe 582,120 bytes *SystemInterfaceMgrApp_v12.01l12_ss16098.exe 5,790,384 bytes *SystemSessionManagerApp_v1.05l11_ss20609.exe 2,071,688 bytes *WirelessToolboxApp_v2.02l12_ss21609.exe 7,931,464 bytes *DisplayRotationTool_v7.17l14_ss16037.exe 2,346,224 bytes *PanasonicDashboardApp_v2.10l12g(forfz-g1non-jpn)_ss16108.exe 5,098,136 bytes *TouchScreenModeSettingUtil_v2.01l10_ss18467.exe 4,377,168 bytes *TouchScreenStabilizationUtil_v1.01l11_ss18504.exe 362,040 bytes *SoundDriver_v6.0.1.7233(64bit)_ss16125.exe 123,270,504 bytes rst_14.8.0.1042-installer_update.exe 13,703,192 bytes Index No 73452 Notes Please refer to "Windows 10 Upgrade Support Information" Web page.This file is self-expandable on any TOUGHBOOK/TOUGHPAD models, but the drivers can only be installed (available) on the applicable model number.Before upgrading, please confirm information such as restrictions after upgrading to Windows 10 in the web page of "Windows 10 Upgrade Support Information".In some cases, you should not upgrade to Windows 10.Read all the documentation before you start upgrading your OS.Windows 7 Service Pack (SP1) 64 bit** The “Windows 7 Service Pack (SP1) 32 bit” is ineligible.Recovery with Windows 7 (64 bit) is required when upgrading to Windows 10. File Description No. Soft Name Download File Name Version 1 Step-By-Step Gude Win10_Clean_StepByStepGuide_en_AX3E_LX3E_LX3J_G1F_M1C.pdf August 31, 2016 2 System Interface Device Driver sid_d20155083.exe 2.1.1501.0 3 HID Drivers for Panasonic PC phid_d20155104.exe 2.5.1800.0 4 Common Components for Panasonic PC pcommon_d20154080.exe V5.00L10 M01 5 Common Components for Panasonic PC (x64) pcomn64_d20154081.exe V5.00L10 M01 6 PC Information Viewer pcinfo_d20154997.exe V8.14L10 M00 7 Bluetooth software for Intel 7260 bt_i7260_d20154860.exe 17.1.1524.1353 8 Intel Collaborative Processor Performance Control (CPPC) cppc_d20154868.exe 1.0.0.1018-Win10 9 Intel Dynamic Platform and Thermal Framework(DPTF) for SharkBay/ChiefRiver dptf_d20154278.exe 7.1.0.2108 10 O2Micro SD Driver sd_o2_d20154990.exe 2.2.2.1076 Win10 WEB 11 Video Driver for Shark Bay genericvideo_20_19_15_4390_64.exe 20.19.15.4390 12 Virtual Buttons Driver (VBD) vbd_d20154983.exe 1.1.0.21 PV 13 WLAN Driver for Intel 6205/6250/6235/7265/7260 wlan_d20155117.exe 18.12.0.0-PV-AHWFW0979G for SfP2 WoWLAN Disabled 14 GPS Registry Patch gps_d2015xxxx.exe - 15 LAN Driver lan_d20155237.exe 12.13.17.4(20.2v2) -Win10Upgrade 16 Intel(R) Management Engine Component IntelManagementEngineDriver_v11.0.0.1160_G1F_W1064_ss22234.exe v11.0.0.1160 17 Intel(R) Chipset Device Software ChipsetDeviceSoftwareDriver_v10.1.1.13_G1F_W1064_ss21921.exe v10.1.1.13 18 Bluetooth Software for Intel 7265 BTupServiceApp_v1.00l12_G1F_W1064_ss16124.exe v1.00l12 19 USB LAN Driver USBLAN(Realtek)Driver_v10.5.1019.2015_G1F_W1064_ss22229.exe v10.5.1019.2015 20 USB Serial Driver USBSerialDriver_v2.12.06_G1F_W1064_ss20603.exe v2.12.06 21 RFID Driver RFIDDriver_v1.2.25.34_G1F_W1064_ss18489.exe v1.2.25.34 22 System Interface Manager SystemInterfaceMgrApp_v12.01l12_G1F_W1064_ss16098.exe v12.01l12 23 System Session Manager SystemSessionManagerApp_v1.05l11_G1F_W1064_ss20609.exe v1.05l11 24 Wireless Tool Box WirelessToolboxApp_v2.02l12_G1F_W1064_ss21609.exe v2.02l12 25 Display Rotation Tool DisplayRotationTool_v7.17l14_G1F_W1064_ss16037.exe v7.17l14 26 Dashboard for Panasonic PC PanasonicDashboardApp_v2.10l12g(forfz-g1non-jpn)_G1F_W1064_ss16108.exe v2.10l12g 27 Touch Screen Mode Setting Utility TouchScreenModeSettingUtil_v2.01l10_G1F_W1064_ss18467.exe v2.01l10 28 Touch Panel Stabilization Tool TouchScreenStabilizationUtil_v1.01l11_G1F_W1064_ss18504.exe v1.01l11 29 Sound Realtek SoundDriver_v6.0.1.7233(64bit)_G1F_W1064_ss16125.exe v6.0.1.7233 30 Intel(R) Rapid Storage Technology rst_14.8.0.1042-installer_update.exe v14.8.0.1042. HjackThis Log on Windows 98 - posted in Virus, Spyware Malware Removal: I run the HjackThis tool to discover the cause of a black screen with little red stripes that Hjackthis Log - posted in Virus, Trojan, Spyware, and Malware Removal Help: My computer has begun to have problems in the last 2 days or so. I have a series of .exeRapport Hjackthis - Virus / S curit
La siguiente lista está compilada a partir de la base de datos producida por el programa "Associate This!", datos seleccionados de la base de datos principal de FILExt e información de extensiones de archivos enviada por los usuarios. Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\ABC\ABC.exe %1Identificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\Azureus\Azureus.exe %1Identificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\Azureus\Azureus\Azureus.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitComet\BitComet.exe %1 /dummyIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitLord\BitLord.exe %1 /dummyIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitTornado\btdownloadgui.exe --responsefileIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitTornado\btdownloadgui.exe --responsefile %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitTorrent\btdownloadgui.exe --responsefileIdentificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitTorrent\btdownloadgui.exe --responsefile %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\eDonkey2000\eDonkey2000.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Etomi\Shareaza.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\FILESHAR\TORRENT\ABC\ABC.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Shareaza\Shareaza.exe %1Identificación del programa: morpheustorrentArchivo EXE: C:\Documents and Settings\Jimmy Son\Desktop\Media Downloads\Morpheus\morpheus.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitTorrent++\BT++.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\MP3Downloading\bindata.exe %1Identificación del programa: bittorrentArchivo EXE: C:\Documents and Settings\Gateway User\My Documents\SHAREAZA\Shareaza.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\MP3DOW~1\bindata.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\DVD BitTornado\BitTornado\btdownloadgui.exe --responsefile %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\MP3-Xtreme\Shareaza.exe %1Identificación del programa: morpheustorrentArchivo EXE: %ProgramFiles%\Morpheus\morpheus.exe %1Identificación del programa: morpheustorrentArchivo EXE: %ProgramFiles%\StreamCast\Morpheus\morpheus.exe %1Identificación del programa: bittorrentArchivo EXE: C:\Documents and Settings\Shira Spetner.SHIRA\Desktop\BitTornado\btdownloadgui.exe --responsefile %1Identificación del programa: TorrenTopia.DocumentArchivo EXE: %ProgramFiles%\TorrenTopia\TorrenTopia.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\BitComet\BitComet.exeIdentificación del programa: morphtorrentArchivo EXE: %ProgramFiles%\Morpheus\Morpheus.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\JVTorrent\btdownloadgui.exe --responsefile %1Identificación del programa: torrent fileArchivo EXE: %ProgramFiles%\eXeem\eXeem.exe %1Identificación del programa: Fulldls.torrentArchivo EXE: %ProgramFiles%\Fulldls Torrent\Fulldls.exe /ddeIdentificación del programa: bittorrentArchivo EXE: C:\Documents and Settings\All Users\Documents\eDonkey2000\edonkey2000.exe %1Identificación del programa: bittorrentArchivo EXE: %ProgramFiles%\Bit Lord 1.1\BitLord.exe %1 /dummyIdentificación del programa: morphtorrentArchivo EXE: %ProgramFiles%\Morpheus\New Folder\Morpheus\Morpheus.exe %1Identificación del programa: BitTorrentArchivo EXE: C:\Documents and Settings\Josh Allen\My Documents\MISC\Azureus\Azureus.exe %1Identificación del programa: uTorrentArchivo EXE: C:\Documents and Settings\Ana Maria Konga\Escritorio\utorrent.exe %1Identificación del programa: uTorrentArchivo EXE: C:\Documents and Settings\Sebastian\My Documents\Program Collection\Unsorted\utorrent.exe %1Identificación del programa: BitTorrentArchivo EXE: %ProgramFiles%\Ares Galaxy Professional\Ares Galaxy Professional.exe %1Identificación del programa:Comments
- 07:02 PM I followed all the steps but am unable to run hiack this now! It's disabled m antivirus stuff as well....however I was able to run XOFTspy and it said it quarantined a number of problems that I knew were there and hopefully it has removed them....I'm trying to restart and run hjackthis.....here is my ewido log ....a side note i renamed one of the fixed files.--------------------------------------------------------- ewido anti-malware - Scan report--------------------------------------------------------- + Created on: 8:39:29 PM, 5/23/2006 + Report-Checksum: 1A314F9E + Scan result: [232] C:\Documents and Settings\All Users\Documents\Settings\20242402.dll -> Proxy.Xorpix.u : Error during cleaning C:\awcqywdq.exe -> Downloader.Small.ctf : Cleaned with backup C:\awuakqbw.exe -> Not-A-Virus.Hoax.Win32.Renos.bw : Cleaned with backup C:\Documents and Settings\Gary McCue\Local Settings\Temp\20233C6.tmp -> Proxy.Xorpix.u : Cleaned with backup C:\Documents and Settings\Gary McCue\Local Settings\Temp\202B2F3.tmp -> Proxy.Xorpix.u : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Application Data\3ad33ab6.exe -> Downloader.Small.csn : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temp\174.exe -> Downloader.Tiny.bw : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\37N3551C\bmlgjeg[1].txt -> Downloader.Small.csn : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\FBM0TFHA\kwvgb[1].txt -> Proxy.Small.bo : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\FBM0TFHA\plfeqcamh[1].txt -> Not-A-Virus.Hoax.Win32.Renos.bw : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\J6HAFLMK\bwitsrqbw[1].txt -> Downloader.Small.ctf : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\J6HAFLMK\rzhtsdpb[1].txt -> Trojan.Sinowal.q : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\J6HAFLMK\upbwlxiu[1].txt -> Hijacker.StartPage.adi : Cleaned with backup C:\Documents and Settings\Gary McCue.PC311047611813\Local Settings\Temporary Internet Files\Content.IE5\MNXFIJ0I\dpkjvts[1].txt -> Trojan.Regger.s : Cleaned with backup C:\hpdjyy.exe -> Trojan.Regger.s : Cleaned with backup C:\Program Files\ryads.exe -> Hijacker.StartPage.adi : Cleaned with backup C:\Program Files\SpySheriff -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\base.avd -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\base001.avd -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\base002.avd -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\found.wav -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur000.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur001.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur002.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\heur003.dll -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\notfound.wav -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\removed.wav -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\SpySheriff.dvm -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\SpySheriff.exe -> Adware.SpySheriff : Cleaned with backup C:\Program Files\SpySheriff\Uninstall.exe -> Adware.SpySheriff : Cleaned with backup C:\splp.exe -> Trojan.Sinowal.q : Cleaned with backup C:\tpjtsip.exe -> Downloader.Small.csn : Cleaned with backup C:\WINDOWS\system32\0mcamcap.exe -> Proxy.Small.bo : Cleaned with backup C:\WINDOWS\system32\3ad33ab6.exe -> Downloader.Small.csn : Cleaned
2025-04-19Remover. Save it in the same folder you made earlier (c:\BFU).Do not do anything with these yet!Reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping F8 until a menu appears. Highlight Safe Mode and hit enter.4. Once in Safe Mode, Open Ewido:Click on scannerClick on Complete System Scan and the scan will begin.You will be prompted to clean the first infection.Select "Perform action on all infections", then proceed.Once the scan has completed, there will be a button located on the bottom of the screen named Save reportClick Save report.Save the report .txt file to your desktop or a location where you can find it easily.Close ewido anti-malware.5. Then, please go to Start > My Computer and navigate to the C:\BFU folder. Start the Brute Force Uninstaller by doubleclicking BFU.exe Behind the scriptline to execute field click the folder icon and select alcanshorty.bfu Press Execute and let the program do it’s job. (You ought to see a progress bar if you did this correctly.)Wait for the complete script execution box to pop up and press OK.Press exit to terminate the BFU program.Reboot into normal windows and post the contents of Ewido text report that you saved and a new HiJackThis log. 0 Back to top --> #9 jwoo0414 Posted 23 May 2006 - 03:38 PM Ewido just found an infection called: Worm.Monikey.m it is lovated in C:\windows\TEMPthe file is called pol3E40.tmp 0 Back to top --> #10 RiP Posted 23 May 2006 - 03:39 PM RiP Malware Expert Retired Staff 8,430 posts Hello, jwoo0414.It looks like we posted at the same time, I just posted instructions for you 0 Back to top --> Advertisements Register to Remove --> #11 jwoo0414 Posted 23 May 2006 - 04:27 PM The scan is almost done! Sorry it's taking sooo long....for some reason Ewido takes like an hour to complete 0 Back to top --> #12 jwoo0414 Posted 23 May 2006 - 05:37 PM Ok sorry.....went to go check on the scan and it somehow shut off the computer....not sure what is going on but I will try it again. Is there a way to speed up the scan? I'll post my hjackthis log asap. Sorry for holding you up....may need to take a break in between but I will post as soon as I can 0 Back to top --> #13 jwoo0414 Posted 23 May 2006
2025-04-16And I don't want to risk further infection. I have unplugged the internet cable. Thank you for your help! 0 Back to top --> Advertisements Register to Remove --> --> -- > #2 RiP Posted 23 May 2006 - 02:59 PM RiP Malware Expert Retired Staff 8,430 posts Hello, jwoo0414.I need you to do the following for me:Since you don't have internet access on the infected computer, you're going to need to transfer the files via usb, cd, floppy, etc... Please download WinsockFix here and do the following: Click the "ReG-Backup" button and follow the prompts. Click the "Fix" button and restart your computer.Click the START button > Select Run > type in "msconfig" (without the quotes) and press OK > Select Normal Startup - load all device drivers and services > Then click Apply and then OK. It will give you two options: Restart and Exit Without Restart, select Restart.Then please post back with a new HijackThis log. 0 Back to top --> #3 jwoo0414 Posted 23 May 2006 - 03:02 PM Do I do all of this in safe mode or regular? 0 Back to top --> #4 jwoo0414 Posted 23 May 2006 - 03:03 PM Do I do all of this in safe mode or regular? 0 Back to top --> #5 jwoo0414 Posted 23 May 2006 - 03:23 PM Here's my latest hjackthis log file. Looks like the sucker is still there errrrrLogfile of HijackThis v1.99.1Scan saved at 5:18:41 PM, on 5/23/2006Platform: Windows XP SP1 (WinNT 5.01.2600)MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)Running processes:C:\windows\System32\smss.exeC:\windows\system32\winlogon.exeC:\windows\system32\services.exeC:\windows\system32\lsass.exeC:\windows\system32\svchost.exeC:\windows\system32\svchost.exeC:\windows\System32\svchost.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Program Files\Internet Explorer\iexplore.exeC:\windows\system32\spoolsv.exeC:\windows\Explorer.EXEC:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exeC:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeC:\Program Files\ewido anti-malware\ewidoctrl.exeC:\Program Files\ewido anti-malware\ewidoguard.exeC:\WINDOWS\system32\HPConfig.exeC:\Program Files\HPQ\Notebook Utilities\HPWirelessMgr.exeC:\Program Files\Linksys\Wireless-G Notebook Adapter with SpeedBooster\NICServ.exeC:\Program Files\Synaptics\SynTP\SynTPLpr.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\WINDOWS\System32\hphmon05.exeC:\Program Files\Common Files\Symantec Shared\ccApp.exeC:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exeC:\windows\System32\carpserv.exeC:\windows\System32\svchost.exeC:\Program Files\ScanSoft\OmniPagePro14.0\OpScheduler.exeC:\Program Files\Real\RealPlayer\RealPlay.exeC:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exeC:\Program Files\Common Files\AOL\1129778967\ee\AOLSoftware.exeC:\Program Files\QuickTime\qttask.exeC:\windows\System32\funk.exeC:\windows\System32\manset.exeC:\Program Files\XoftSpySE\xoftspy.exeC:\Program Files\TrojanHunter 4.5\THGuard.exeC:\Program Files\ScanSoft\OmniPagePro14.0\Opware14.exeC:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exeC:\windows\System32\wuauclt.exeC:\Documents and Settings\Gary McCue.PC311047611813\Desktop\HijackThis\HijackThis.exeR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = c:\secure32.htmlR0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = c:\secure32.htmlR0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = c:\secure32.htmlR1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = - REG:system.ini: Shell=O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dllO2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocxO2 - BHO: (no name) - {196B9CB5-4C83-46F7-9B06-9672ECD9D99B} - C:\WINDOWS\system32\winbrume.dllO2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dllO2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dllO3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dllO3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocxO3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} -
2025-04-23Wintrust.dll regsvr32.exe /s initpki.dll regsvr32.exe /s dssenh.dll regsvr32.exe /s rsaenh.dll regsvr32.exe /s gpkcsp.dll regsvr32.exe /s sccbase.dll regsvr32.exe /s slbcsp.dll regsvr32.exe /s cryptdlg.dll regsvr32.exe /s Urlmon.dll regsvr32.exe /s Oleaut32.dll regsvr32.exe /s msxml2.dll regsvr32.exe /s Browseui.dll regsvr32.exe /s shell32.dll regsvr32.exe /s Mssip32.dll regsvr32.exe /s atl.dll regsvr32.exe /s jscript.dll regsvr32.exe /s msxml3.dll regsvr32.exe /s softpub.dll regsvr32.exe /s wuapi.dll regsvr32.exe /s wuaueng.dll regsvr32.exe /s wuaueng1.dll regsvr32.exe /s wucltui.dll regsvr32.exe /s wups.dll regsvr32.exe /s wups2.dll regsvr32.exe /s wuweb.dll regsvr32.exe /s scrrun.dll regsvr32.exe /s msxml6.dll regsvr32.exe /s ole32.dll regsvr32.exe /s qmgr.dll regsvr32.exe /s qmgrprxy.dll regsvr32.exe /s wucltux.dll regsvr32.exe /s muweb.dll regsvr32.exe /s wuwebv.dll REM reset winsock netsh winsock reset REM reset proxy netsh winhttp reset proxy REM restart services sc.exe config wuauserv start= auto sc.exe config bits start= delayed-auto sc.exe config cryptsvc start= auto sc.exe config TrustedInstaller start= demand sc.exe config DcomLaunch start= auto net start bits net start wuauserv net start appidsvc net start cryptsvc REM Install the latest Windows Update Agent. REM start
2025-04-18