Device connected to wireless (Wi-Fi) but no internet

The following may help if you are having an issue with your laptop, iPhone, iPad, or other device which shows it is connected to your wireless (Wi-Fi) network, but you are unable to access the internet. This may be due to a new device, new wireless router, or simply a different day where nothing seems to be going right.

Try these steps:

· Power off wireless router
· Power off internet modem (Cox, etc.)
· Wait at least 10 seconds
· Power on internet modem, and wait for lights to settle (about 20-30 seconds)
· Power on wireless router, and wait for lights to settle (about 20-30 seconds)
· Try device (laptop, iPhone, iPad, or other)

If the above fails to work or you have changed your wireless router, continue:

· Go to the settings of device (laptop, iPhone, iPad, or other)
· Wireless (Wi-Fi) settings
· Locate current wireless Network
· Delete/Forget wireless Network
· Turn off/turn on wireless (settings, not device)
· Reconnect to wireless Network
· Try device (laptop, iPhone, iPad, or other)

If no devices can use your wireless network, it could be a settings or faulty modem or wireless router. If some devices can use your wireless network and others cannot, it could be a problem with the device you are trying to connect.

vml.exe aka XP Internet Security 2012

Here we have a FAKE internet security tool called XP Internet Security 2012 (which also goes by different aliases), which infected a Windows XP machine causing it to become unable to run .exe file types. This creates a serious issue when most every application you want to run – or need to run to clean up the Virus/Malware – will be an .exe file type. Below I have listed what I did to clean the infected system.

The “shield” that looks similar to the Windows Update and some antivirus shields, was located in the task manager near the clock to the bottom right of the screen. This was even after the user had run Malwarebytes and thought the Virus/Malware had already been completely removed.

REMEMBER: If you believe that your computer is infected, not only do you need to run a full system scan with your antivirus software – and/or Malwarebytes – you also need to perform a search of your (a) hard drive and (b) registry for other Virus/Malware that may not have been detected.

Virus/Malware name: vml.exe

Hard Drive:
C:\Documents and Settings\%username%\Local Settings
C:\Windows\Prefetch (as VML.EXE-074511AD.pf)

Registry values .exe and exefile were corrupt:
HKEY_CLASSES_ROOT
This caused the computer to no longer be able to execute .exe file types, even after the Virus/Malware had been removed.

Click here or review Microsoft’s article to see what actions I performed to remedy the infection.

Unable to run EXE file types Resolution

If you find your system is unable to run executable (.exe) files, the following steps may help.

First, you should ensure you have an antivirus program installed and running on your computer, because your issue could be due to Virus/Malware. If you do have an antivirus program, make sure it is updated with the latest virus definitions and run a full system scan. If you do not have an antivirus program, consider downloading AVG Free (or something similar) from cnet.com or their direct website.

Of course, if you cannot execute any .exe files, you most likely will not be able to perform the above; but, should remember to do so after you complete the steps below.

Per Microsoft (article)
• Boot/reboot computer into Safe Mode
• Click Start – Run – type: command /c copy %Windir%\regedit.exe regedit.com
• Click Ok
This will create a copy of regedit.exe (which you cannot open), and name the file regedit.com.
• Click Start – Run – type: regedit
• Click Ok
This will run regedit.com (which is the identical copy of regedit.exe).

Once in the Registry Editor, access the following:
HKEY_CLASSES_ROOT\.exe
Click .exe
You should ONLY see the following:
o Name: (Default)
o Type: REG_SZ
o Data: exefile
o Name: Content Type
o Type: REG_SZ
o Data: application/x-msdownload
Note: (Data: exefile) is pointing to the location of exefile as you scroll down in the registry (remaining under HKEY_CLASSES_ROOT), so if this has any other input than “exefile” it is incorrect and should be changed. Also, if there are any other (Name) besides (Default) and Content Type, they can be deleted.

Click the diamond in front of .exe
You should ONLY see the following:
• PersistentHandler
o Name: (Default)
o Type: REG_SZ
o Data: {will have a set of numbers, letters, dashes}
Note: If there are any other items under .exe besides PersistentHandler, they should be deleted.

Scroll down the list of items under .exe, until you come to exefile. Note: this is the location in which the (Default) name within .exe was pointing.

• Click the diamond in front of exefile
• Click the diamond in front of shell
• Click the diamond in front of open
o Click command
o Data of both (Default) and IsolatedCommand should be: “%1” %*
• Click diamond in front of runas (located under shell)
o Click command
o Data of both (Default) and IsolatedCommand should be: “%1” %*

Exit the Registry Editor and restart computer.
You should now be able to once again run your executable (exe) files.

Suggested Tools

Here are some suggested tools you might could use to combat the Virus/Malware attacks on your computer(s). I cannot guarantee anything about them - so I cannot be held responsible for incorrect use or problems they may cause your system. All fault has to remain with you and the application developers. I am merely sharing the applications I have used myself or those I know have used.






ms0cfg32.exe

Here we have more Virus/Malware parading around on a computer within the Windows XP operating system and its registry. Again, Malwarebytes’ Anti-Malware located and either deleted or quarantined the infections.

IPH.Trojan.Blueinit
File: desktopwisvcs.dll
Location:
C:\Documents and Settings\%username%\Local Settings\Application Data\odbcmouseport\
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopWISvcs


Exploit.Drop.CFG
File: ms0cfg32.exe
Location: C:\Documents and Settings\%username%\Local Settings\Temp\


Hijack.Shell.Gen
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogin\Shell


Always remember to search the registry and hard drive for other possible Virus/Malware related infections; especially when you find one on your computer at any time.


Click here: to see how to run a full search of your hard drive
Click here: to see how to run a full search of your registry

desktopwisvcs.dll

Here we have more Virus/Malware parading around on a computer within the Windows XP operating system and its registry. Again, Malwarebytes’ Anti-Malware located and either deleted or quarantined the infections.

IPH.Trojan.Blueinit
File: desktopwisvcs.dll
Location:
C:\Documents and Settings\%username%\Local Settings\Application Data\odbcmouseport\
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopWISvcs


Exploit.Drop.CFG
File: ms0cfg32.exe
Location: C:\Documents and Settings\%username%\Local Settings\Temp\


Hijack.Shell.Gen
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogin\Shell


Always remember to search the registry and hard drive for other possible Virus/Malware related infections; especially when you find one on your computer at any time.


Click here: to see how to run a full search of your hard drive
Click here: to see how to run a full search of your registry

enkai.exe

Here we have a Rootkit.0Access.XGen Virus/Malware attack, which kept sending out requests to websites (most likely to continue the malicious attacks on the host computer). We made a change in the TrendMicro settings to now block automatic access of certain websites, so we are being notified of Unauthorized URL’s.

Virus/Malware: enkai.exe

Hard Drive Location:
C:\Documents and Settings\%username%\Application Data\Yvqouw
Remember to always look for bogus folders in the Application Data directory. Yvgouw is definitely bogus.

There was also a variant bogus folder with the files xono.oco and xono.tmp:
C:\Documents and Settings\%username%\Application Data\Ungue

Also remember to take this time to clean out:
C:\Documents and Settings\%username%\Local Settings\Temp

Registry Location:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

The blocked websites:
http://nahwisohch.ru/bin/xxl.bin
http://munaeghohz.ru/bin/xxl.bin
http://jupaizeuph.ru/bin/xxl.bin

Microsoft Update Error 0×80070424

Found this little tidbit if you are receving an error message when trying to update Windows XP via Microsoft Update.

Error: 0×80070424

Fix: (thanks to
here)

· Click Start
· Click Run
· Type/Paste the following:
%SYSTEMROOT%\SYSTEM32\REGSVR32.EXE %SYSTEMROOT%\SYSTEM32\WUAUENG.DLL
· Click OK


By this, you will be reregistering the WUAUENG.DLL file.

Other errors causing similiar Microsoft Update issues can be referenced in this Microsoft article.

How to view/hide hidden files in Windows XP and Windows 7

How to view/hide hidden files in Windows XP and Windows 7:

· Open Windows Explorer
· Alt+F to display menu (if not already present)
· Click Tools
· Click Folder Options
· Click View
· Click Show hidden files, folders, and drives
· Click OK

kb00045929.exe

Today we came across another Trojan.Agent according to Malwarebytes Anti-Malware.

Filename: kb00045929.exe

The filename and entry were located in the following of a Windows 7 computer.

Hard drive: C:\Users\%username%\AppData\Roaming\

Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Please note that although we are posting these by filename, the filename may be merely variants and randomly generated by the actual Virus/Malware. For this reason, when you do detect Virus/Malware on your computer, you should also take a moment to look in the same locations for other oddly named files/folders such as those named with only a few numbers or mixed numbers/characters.

While you are viewing the C:\Users\%username%\AppData\Roaming\ you should also check:
· C:\Users\%username%\AppData\Local\
· C:\Users\%username%\AppData\Local\Temp (delete items you can in here)
· C:\Users\%username%\AppData\Roaming\LocalLow

** %username% ** replace with the actual username(s) folders within the C:\Users directory on the specific computer you are working on, as this will change with each computer by user.

To do the above, you must first enable the option to view hidden files, if not already enabled. Click here to see how to do that.

Here are the similar folders to check in Windows XP.
· C:\Documents and Settings\%username%\Application Data
· C:\Documents and Settings\%username%\Local Settings
· C:\Documents and Settings\%username%\Local Settings\Temp (delete items you can in here)

How to perform a search of your Registry in Windows XP and Windows 7

How to perform a search of your registry for a particular file/entry you believe may be infected or suspected Virus/Malware:

Windows XP
· Click Start
· Click Run
· Type Regedit
· Press Enter

Windows 7
· Click Start
· Type Regedit
· Press Enter

Regedit
· Click Edit on the menu
· Click Find
· Enter file name
· Click Find Next
· You can press F3 to find the next entry

WARNING: The Registry is an important component of Windows and any incorrect changes could affect your entire system in a negative way; from causing applications to fail to work properly or even keep Windows from being able to load.

If you know for sure a particular file is infected by Virus/Malware, you can find its location and where it has infiltrated your registry and remove it from here. But this is just a pointer to the actual file(s), which must also be removed from within the file structure of your hard drive. You can see the steps to perform a search of your hard drive here.

How to perform a search of your hard drive in Windows XP and Windows 7

How to perform a search of your hard drive for a particular file you believe may be infected or suspected Virus/Malware:

Windows XP (Microsoft Documentation)
· Click Start
· Click Search
· Click All files and folders
· Click More advanced options
· Check Search system folders and Search hidden files and folders
· Type the file you are looking for in the Search box
· Click Search

Windows 7 (Microsoft Documentation)
· Open Windows Explorer
· Type the file you are looking for in the Search box to the top right
· Click Computer directly under the Search Again In options

You can right click the file(s) and choose delete, but make sure to ensure it is infected or a virus and not a necessary file for your system or application software to run correctly.

If the system will not allow you to delete the file, please read here for possible solutions.

21D.tmp

We recently had a Virus/Malware attack on our network by the names of TROJ_GEN.R28C7KB and TROJ_KAZY.SMO which were infecting the bogus files named 018.exe and 21D.tmp within C:\Program Files\LP\E650\ on a Windows XP machine.

TrendMicro found and cleaned three (3) in which these same files were located on the hard drive. Malwarebytes Anti-Malware also removed five (5) which TrendMicro did not find. Malwarebytes is free, but TrendMicro also has a free antivirus (here) which can be run from a web browser.

Even so, we had to manual search the registry and hard drive to find and delete a few more instances of similar files with number and mixed number/character names elsewhere on the hard drive. Sorry, did not manage to note these before they were removed.

Click here: to see how to run a full search of your hard drive
Click here: to see how to run a full search of your registry

018.exe

We recently had a Virus/Malware attack on our network by the names of TROJ_GEN.R28C7KB and TROJ_KAZY.SMO which were infecting the bogus files named 018.exe and 21D.tmp within C:\Program Files\LP\E650\ on a Windows XP machine.

TrendMicro found and cleaned three (3) in which these same files were located on the hard drive. Malwarebytes Anti-Malware also removed five (5) which TrendMicro did not find. Malwarebytes is free, but TrendMicro also has a free antivirus (here) which can be run from a web browser.

Even so, we had to manual search the registry and hard drive to find and delete a few more instances of similar files with number and mixed number/character names elsewhere on the hard drive. Sorry, did not manage to note these before they were removed.

Click here: to see how to run a full search of your hard drive
Click here: to see how to run a full search of your registry

Welcome!

Welcome to PC Regeneration.

By definition, regeneration means the state of being made over into a better form, or revived. In theology it is considered a spiritual rebirth. It is not the discarding or destroying of the old and replacing or creating of a new, but rather a quickening or revitalizing of something which has been corrupt or useless to make it into something that is cleansed and useful.

Just as those who repent of sin and put faith in Jesus Christ for salvation are not destroyed and recreated through regeneration – but are made new through Him unto good works – so can your computer quite often be cleansed of its Virus/Malware issues and put back into productivity without having to be replaced before it’s time. Of course, as with man, we are appointed once to die, but after this the judgment.

With this site, we hope to simply give people some information and links to tools that will hopefully help you perform the needed cures on your own computer, while saving you money from having to bring it into a computer shop or purchase a new system before you really need to.

Thanks for the visit.