Dll/Exe/Sys files fixer download for free
Main Menu
Home Page RSS 2.0
Add News Register
Last Comments Contact Us
 
Dll
Files(A)
Files(B)
Files(C)
Files(D)
Files(E)
Files(F)
Files(G)
Files(H)
Files(I)
Files(J)
Files(K)
Files(L)
Files(M)
Files(N)
Files(O)
Files(P)
Files(Q)
Files(R)
Files(S)
Files(T)
Files(U)
Files(V)
Files(W)
Files(X)
Files(Y)
Files(Z)
Files(0-9)
Advanced Search
Calendar
«    December 2009    »
MoTuWeThFrSaSu
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
 
Vote
Archives
February 2016 (3)
June 2015 (1)
May 2015 (1)
April 2015 (5)
March 2015 (9)
February 2015 (3)
Information
Process files information for window 98/2000/xp/vista/windows 7 (32 bit / 64 bit win7). Fix your .exe/.dll/.ocx and other system files error, speed up your computer.
We Recommend:

We offer Free System Scan for .exe errors,.dll errors, ocx errors,and thousands of other frustrating Windows errors.Speed up your computer.Microsoft gold certified,winner of over 100 5-star awards. Repair computer errors now !
   

Know more about system files,fix windows file error. » Articles for December 2009 Year

A : AYDrvNT.sys
 
Company: ESTsoft Corp

Product: ALYac (Korea Anti-virus software)

Default path:
C:\Program Files\ESTsoft\ALYac\AYDrvNT.sys
 
 
Comments (0)  Read More...
 
 
A : Aydrvsp.sys
 
Company:
ESTsoft Corp (Seoul, Korea)

Product: ALYac (korea Anti-virus software)

Default path:
c:\program files\estsoft\alyac\AYDrvSP.sys
 
 
Comments (0)  Read More...
 
 
A : Aztw2320.sys
 
Product: Aztech WDM Audio Driver

Default path:
C:\WINDOWS\system32\drivers\aztw2320.sys

Company: Aztech Systems Ltd
 
 
Comments (0)  Read More...
 
 
A : aztw3328.sys
 
Product:Aztech AZTW3328 Adapter Driver

Default path:
c:\windows\system32\aztw3328.sys

Driver files:
aztw3328.sys,portcls.sys,stream.sys,ksuser.dll,wdmaud.drv
 
 
Comments (0)  Read More...
 
 
D : directout.sys
 
Name: Printer direct access driver, part of virus Trojan.Haxdoor-BR.

Default path:
%SYSDIR%\directout.sys

This virus adds a few items in the startup registry:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\directut\DllName, value directut.dll
 
 
Comments (1)  Read More...
 
 
R : Rinld.sys
 
File of spyware.

Default path:
C:\WINDOWS\SYSTEM32\DRIVERS\RINLD.SYS
%System%\Ravdm.exe
%System%\drivers\Rinld.sys

This virus adds a few items in the startup registry
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run]
"9"="%System%\Ravdm.exe"
 
 
Comments (0)  Read More...
 
 
Q : qo.sys
 
Spyware Backdoor.Win32.Haxdoor.hw

Default path:
%system32%\qo.sys

This virus adds a few items in the startup registry
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\yvpp01\
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\yvpp02\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\yvpp01\DllName
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\svcshare Value:"%WINDOWS%\system32\drivers\spoclsv.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run \System Value:"%Program Files%\Common Files\System\Updaterun.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\alsmt.exe Value:"%WINdir\system32\alsmt.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D3341007-C77C-4F1C-B2A5-D94D5BE55F7E}\InprocServer32\@
Value:"C:\WINDOWS\system32\ybzwkdjnrfvijev.dll"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D3341007-C77C-4F1C-B2A5- D94D5BE55F7E}\InprocServer32\ThreadingModel Value:"Apartment"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer \Browser Helper Objects\{D3341007-C77C-4F1C-B2A5-D94D5BE55F7E}\
 
 
Comments (0)  Read More...
 
 
S : satau325.sys
 
DisplayName : SATA bus driver.
Parts of spyware TR_Spy_Haxspy_AP.

Default path:
C:\WINDOWS\system32\satau325.sys
C:\Windows\System32\satau320.dll

Registry items:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\satau325
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\satau325
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\satau320
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\satau325
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_SATAU325
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_SATAU325
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SATAU325
 
 
Comments (0)  Read More...
 
 
H : hide_evr2.sys
 
File of spyware Win32.Ursnif.L, send user information to 81.95.147.107.

It will set the following registry entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ttool = "%Windows%\9129837.exe"

Default path:
C:\WINDOWS\hide_evr2.sys

File size:
5,376 Bytes
 
 
Comments (0)  Read More...
 
 
M : MSFramer.exe
 
Added by WORM_SDBOT.Q (PE-PACK,VC++). Delete it ASAP.

This virus adds a few items in the startup registry :
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
"MS Configuration"="%SYSDIR%\MSFramer.exe"

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
"MS Configuration"="%SYSDIR%\MSFramer.exe"

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
"MS Configuration"="%SYSDIR%\MSFramer.exe"

It will try to login intranet with follow passwords:
"passWord"
"passwd"
"pass"
"pwd"
"password1"
"pass1234"
"administrator"
"admin"
"adm"
"1"
"12"
"123"
"1234"
"12346"
"123467"
"1234678"
"12346789"
"123467890"
"121"
"007"
"test"
"guest"
"none"
"changeme"
"default"
"system"
"server"
"null"
"qwerty"
"teacher"
"staff"
"oeminstall"

Default path:
C:\WINNT\system32\MSFramer.exe (%SYSDIR%\MSFramer.exe)
 
 
Comments (0)  Read More...