Device connected to wireless (Wi-Fi) but no internet

The following may help if you are having an issue with your laptop, iPhone, iPad, or other device which shows it is connected to your wireless (Wi-Fi) network, but you are unable to access the internet. This may be due to a new device, new wireless router, or simply a different day where nothing seems to be going right.

Try these steps:

· Power off wireless router
· Power off internet modem (Cox, etc.)
· Wait at least 10 seconds
· Power on internet modem, and wait for lights to settle (about 20-30 seconds)
· Power on wireless router, and wait for lights to settle (about 20-30 seconds)
· Try device (laptop, iPhone, iPad, or other)

If the above fails to work or you have changed your wireless router, continue:

· Go to the settings of device (laptop, iPhone, iPad, or other)
· Wireless (Wi-Fi) settings
· Locate current wireless Network
· Delete/Forget wireless Network
· Turn off/turn on wireless (settings, not device)
· Reconnect to wireless Network
· Try device (laptop, iPhone, iPad, or other)

If no devices can use your wireless network, it could be a settings or faulty modem or wireless router. If some devices can use your wireless network and others cannot, it could be a problem with the device you are trying to connect.

vml.exe aka XP Internet Security 2012

Here we have a FAKE internet security tool called XP Internet Security 2012 (which also goes by different aliases), which infected a Windows XP machine causing it to become unable to run .exe file types. This creates a serious issue when most every application you want to run – or need to run to clean up the Virus/Malware – will be an .exe file type. Below I have listed what I did to clean the infected system.

The “shield” that looks similar to the Windows Update and some antivirus shields, was located in the task manager near the clock to the bottom right of the screen. This was even after the user had run Malwarebytes and thought the Virus/Malware had already been completely removed.

REMEMBER: If you believe that your computer is infected, not only do you need to run a full system scan with your antivirus software – and/or Malwarebytes – you also need to perform a search of your (a) hard drive and (b) registry for other Virus/Malware that may not have been detected.

Virus/Malware name: vml.exe

Hard Drive:
C:\Documents and Settings\%username%\Local Settings
C:\Windows\Prefetch (as VML.EXE-074511AD.pf)

Registry values .exe and exefile were corrupt:
HKEY_CLASSES_ROOT
This caused the computer to no longer be able to execute .exe file types, even after the Virus/Malware had been removed.

Click here or review Microsoft’s article to see what actions I performed to remedy the infection.

Unable to run EXE file types Resolution

If you find your system is unable to run executable (.exe) files, the following steps may help.

First, you should ensure you have an antivirus program installed and running on your computer, because your issue could be due to Virus/Malware. If you do have an antivirus program, make sure it is updated with the latest virus definitions and run a full system scan. If you do not have an antivirus program, consider downloading AVG Free (or something similar) from cnet.com or their direct website.

Of course, if you cannot execute any .exe files, you most likely will not be able to perform the above; but, should remember to do so after you complete the steps below.

Per Microsoft (article)
• Boot/reboot computer into Safe Mode
• Click Start – Run – type: command /c copy %Windir%\regedit.exe regedit.com
• Click Ok
This will create a copy of regedit.exe (which you cannot open), and name the file regedit.com.
• Click Start – Run – type: regedit
• Click Ok
This will run regedit.com (which is the identical copy of regedit.exe).

Once in the Registry Editor, access the following:
HKEY_CLASSES_ROOT\.exe
Click .exe
You should ONLY see the following:
o Name: (Default)
o Type: REG_SZ
o Data: exefile
o Name: Content Type
o Type: REG_SZ
o Data: application/x-msdownload
Note: (Data: exefile) is pointing to the location of exefile as you scroll down in the registry (remaining under HKEY_CLASSES_ROOT), so if this has any other input than “exefile” it is incorrect and should be changed. Also, if there are any other (Name) besides (Default) and Content Type, they can be deleted.

Click the diamond in front of .exe
You should ONLY see the following:
• PersistentHandler
o Name: (Default)
o Type: REG_SZ
o Data: {will have a set of numbers, letters, dashes}
Note: If there are any other items under .exe besides PersistentHandler, they should be deleted.

Scroll down the list of items under .exe, until you come to exefile. Note: this is the location in which the (Default) name within .exe was pointing.

• Click the diamond in front of exefile
• Click the diamond in front of shell
• Click the diamond in front of open
o Click command
o Data of both (Default) and IsolatedCommand should be: “%1” %*
• Click diamond in front of runas (located under shell)
o Click command
o Data of both (Default) and IsolatedCommand should be: “%1” %*

Exit the Registry Editor and restart computer.
You should now be able to once again run your executable (exe) files.

Suggested Tools

Here are some suggested tools you might could use to combat the Virus/Malware attacks on your computer(s). I cannot guarantee anything about them - so I cannot be held responsible for incorrect use or problems they may cause your system. All fault has to remain with you and the application developers. I am merely sharing the applications I have used myself or those I know have used.






ms0cfg32.exe

Here we have more Virus/Malware parading around on a computer within the Windows XP operating system and its registry. Again, Malwarebytes’ Anti-Malware located and either deleted or quarantined the infections.

IPH.Trojan.Blueinit
File: desktopwisvcs.dll
Location:
C:\Documents and Settings\%username%\Local Settings\Application Data\odbcmouseport\
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopWISvcs


Exploit.Drop.CFG
File: ms0cfg32.exe
Location: C:\Documents and Settings\%username%\Local Settings\Temp\


Hijack.Shell.Gen
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogin\Shell


Always remember to search the registry and hard drive for other possible Virus/Malware related infections; especially when you find one on your computer at any time.


Click here: to see how to run a full search of your hard drive
Click here: to see how to run a full search of your registry

desktopwisvcs.dll

Here we have more Virus/Malware parading around on a computer within the Windows XP operating system and its registry. Again, Malwarebytes’ Anti-Malware located and either deleted or quarantined the infections.

IPH.Trojan.Blueinit
File: desktopwisvcs.dll
Location:
C:\Documents and Settings\%username%\Local Settings\Application Data\odbcmouseport\
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopWISvcs


Exploit.Drop.CFG
File: ms0cfg32.exe
Location: C:\Documents and Settings\%username%\Local Settings\Temp\


Hijack.Shell.Gen
Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogin\Shell


Always remember to search the registry and hard drive for other possible Virus/Malware related infections; especially when you find one on your computer at any time.


Click here: to see how to run a full search of your hard drive
Click here: to see how to run a full search of your registry