SlideShare a Scribd company logo
Aplore

1.Click Start>Run, type Regedit then hit the Enter key.
2.In the left panel, double click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>CurrentVersion>Run
3.In the right panel, look for and then delete this registry entry:
Explorer=%SYSTEM%explorer.exe
4.Close the registry.
5.Restart your system.
6.Open your Windows System directory, which is usually at C:WindowsSystem. Click
Start>Run, type C:WindowsSystem or your Windows System directory then hit the
Enter key.
7.In the Windows System directory, look for and then delete these files:
 ¦EXPLORER.EXE (copy of itself)
 ¦PSECURE20X-CGI-INSTALL.VERSION6.01.BIN.HX.COM (copy of itself)
 ¦EMAIL.VBS (detected as VBS_PSECURE.A)
 ¦INDEX.HTML (detected as HTML_PSECURE.A)
 ¦APHEX.JPG (image)
 ¦HWND32.DLL (program usually truncates to 0 byte)
8.Scan your system
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WRONG!!!
WELL DONE!!!

More Related Content

What's hot

Remove trojanwin64 patched.az.gen!dll virus from windows
Remove trojanwin64 patched.az.gen!dll virus from windowsRemove trojanwin64 patched.az.gen!dll virus from windows
Remove trojanwin64 patched.az.gen!dll virus from windows
haroNaroum
 
1234mokuit
1234mokuit1234mokuit
1234mokuit
dadabah
 
Training module 1
Training module 1Training module 1
Training module 1
a-aron
 
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
jesicasruma
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_sality
Gustav Kato
 
Exploring Microsoft Office Getting Started with Windows 7
Exploring Microsoft Office  Getting Started with Windows 7Exploring Microsoft Office  Getting Started with Windows 7
Exploring Microsoft Office Getting Started with Windows 7
Raj Alam
 

What's hot (6)

Remove trojanwin64 patched.az.gen!dll virus from windows
Remove trojanwin64 patched.az.gen!dll virus from windowsRemove trojanwin64 patched.az.gen!dll virus from windows
Remove trojanwin64 patched.az.gen!dll virus from windows
 
1234mokuit
1234mokuit1234mokuit
1234mokuit
 
Training module 1
Training module 1Training module 1
Training module 1
 
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_sality
 
Exploring Microsoft Office Getting Started with Windows 7
Exploring Microsoft Office  Getting Started with Windows 7Exploring Microsoft Office  Getting Started with Windows 7
Exploring Microsoft Office Getting Started with Windows 7
 

Viewers also liked

Policy Pathway on Energy Management Programmes for Industry Mandarin version
Policy Pathway on Energy Management Programmes for Industry Mandarin versionPolicy Pathway on Energy Management Programmes for Industry Mandarin version
Policy Pathway on Energy Management Programmes for Industry Mandarin versionInstitute for Industrial Productivity
 
Ma Bedrijfsfolder 2011
Ma Bedrijfsfolder 2011Ma Bedrijfsfolder 2011
Ma Bedrijfsfolder 2011kuiper70
 
Yerbuddy 18
Yerbuddy 18Yerbuddy 18
Yerbuddy 18
ben_shanks
 
3D Matters1
3D Matters13D Matters1
3D Matters1
marklim86
 
WH Tech Forum
WH Tech ForumWH Tech Forum
Maronne carlo kuiper.pdf1
Maronne carlo kuiper.pdf1Maronne carlo kuiper.pdf1
Maronne carlo kuiper.pdf1kuiper70
 
Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...
Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...
Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...
Institute for Industrial Productivity
 
Experience from Energy Management Systems Implementation
Experience from Energy Management Systems ImplementationExperience from Energy Management Systems Implementation
Experience from Energy Management Systems Implementation
Institute for Industrial Productivity
 
Flamingo Architect Kutch Profile
Flamingo Architect Kutch ProfileFlamingo Architect Kutch Profile
Flamingo Architect Kutch Profile
Jay Shah
 

Viewers also liked (9)

Policy Pathway on Energy Management Programmes for Industry Mandarin version
Policy Pathway on Energy Management Programmes for Industry Mandarin versionPolicy Pathway on Energy Management Programmes for Industry Mandarin version
Policy Pathway on Energy Management Programmes for Industry Mandarin version
 
Ma Bedrijfsfolder 2011
Ma Bedrijfsfolder 2011Ma Bedrijfsfolder 2011
Ma Bedrijfsfolder 2011
 
Yerbuddy 18
Yerbuddy 18Yerbuddy 18
Yerbuddy 18
 
3D Matters1
3D Matters13D Matters1
3D Matters1
 
WH Tech Forum
WH Tech ForumWH Tech Forum
WH Tech Forum
 
Maronne carlo kuiper.pdf1
Maronne carlo kuiper.pdf1Maronne carlo kuiper.pdf1
Maronne carlo kuiper.pdf1
 
Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...
Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...
Pathways to Energy Management Programmes – Gaining through Saving, Amelie Gol...
 
Experience from Energy Management Systems Implementation
Experience from Energy Management Systems ImplementationExperience from Energy Management Systems Implementation
Experience from Energy Management Systems Implementation
 
Flamingo Architect Kutch Profile
Flamingo Architect Kutch ProfileFlamingo Architect Kutch Profile
Flamingo Architect Kutch Profile
 

Similar to Yerbuddy18

How to Fix Windows 8 Crashes
How to Fix Windows 8 CrashesHow to Fix Windows 8 Crashes
How to Fix Windows 8 Crashes
Vikas Medhekar
 
Close backgrown program
Close backgrown programClose backgrown program
Close backgrown program
wasim liam
 
Error 1068
Error 1068Error 1068
Error 1068
Rob Builder
 
Fix sshnas21.dll error
Fix sshnas21.dll errorFix sshnas21.dll error
Fix sshnas21.dll error
alisana
 
Virus Elimination Course
Virus Elimination Course Virus Elimination Course
Virus Elimination Course
Thach Moniroth
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
Shah Mamun Kabir
 
While playing game getting explorer stop working
While playing game getting explorer stop workingWhile playing game getting explorer stop working
While playing game getting explorer stop working
Alex Christana
 
Revo Uninstaller Pro Help
Revo Uninstaller Pro HelpRevo Uninstaller Pro Help
Revo Uninstaller Pro Help
guestd9ca37
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructions
itwebresources
 
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyHow to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
haroNaroum
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
securesolutionusa
 
Mingwm10.dll is missing from your computer
Mingwm10.dll is missing from your computerMingwm10.dll is missing from your computer
Mingwm10.dll is missing from your computer
Vikas Medhekar
 
Complete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pcComplete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pc
haroNaroum
 
Remove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyRemove search shield.com pop-ups manually
Remove search shield.com pop-ups manually
haroNaroum
 
How to remove Backdoor.Streamex
How to remove Backdoor.StreamexHow to remove Backdoor.Streamex
How to remove Backdoor.Streamex
deniallorance65
 
Solve Stop Code Memory Management on Windows.pptx
Solve Stop Code Memory Management on Windows.pptxSolve Stop Code Memory Management on Windows.pptx
Solve Stop Code Memory Management on Windows.pptx
GevitaChinnaiah
 
Windows 8.1 registry
Windows 8.1 registryWindows 8.1 registry
Windows 8.1 registry
scarlet christer
 
Fix windows 8 bsod
Fix windows 8 bsodFix windows 8 bsod
Fix windows 8 bsod
alisana
 
About_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_LogsAbout_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_Logs
Eric Roberson
 
How to Delete All Junk Files from Computer
How to Delete All Junk Files from ComputerHow to Delete All Junk Files from Computer
How to Delete All Junk Files from Computer
elitey123
 

Similar to Yerbuddy18 (20)

How to Fix Windows 8 Crashes
How to Fix Windows 8 CrashesHow to Fix Windows 8 Crashes
How to Fix Windows 8 Crashes
 
Close backgrown program
Close backgrown programClose backgrown program
Close backgrown program
 
Error 1068
Error 1068Error 1068
Error 1068
 
Fix sshnas21.dll error
Fix sshnas21.dll errorFix sshnas21.dll error
Fix sshnas21.dll error
 
Virus Elimination Course
Virus Elimination Course Virus Elimination Course
Virus Elimination Course
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
While playing game getting explorer stop working
While playing game getting explorer stop workingWhile playing game getting explorer stop working
While playing game getting explorer stop working
 
Revo Uninstaller Pro Help
Revo Uninstaller Pro HelpRevo Uninstaller Pro Help
Revo Uninstaller Pro Help
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructions
 
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyHow to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
 
Mingwm10.dll is missing from your computer
Mingwm10.dll is missing from your computerMingwm10.dll is missing from your computer
Mingwm10.dll is missing from your computer
 
Complete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pcComplete working guide to uninstall piesearch.com from pc
Complete working guide to uninstall piesearch.com from pc
 
Remove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyRemove search shield.com pop-ups manually
Remove search shield.com pop-ups manually
 
How to remove Backdoor.Streamex
How to remove Backdoor.StreamexHow to remove Backdoor.Streamex
How to remove Backdoor.Streamex
 
Solve Stop Code Memory Management on Windows.pptx
Solve Stop Code Memory Management on Windows.pptxSolve Stop Code Memory Management on Windows.pptx
Solve Stop Code Memory Management on Windows.pptx
 
Windows 8.1 registry
Windows 8.1 registryWindows 8.1 registry
Windows 8.1 registry
 
Fix windows 8 bsod
Fix windows 8 bsodFix windows 8 bsod
Fix windows 8 bsod
 
About_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_LogsAbout_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_Logs
 
How to Delete All Junk Files from Computer
How to Delete All Junk Files from ComputerHow to Delete All Junk Files from Computer
How to Delete All Junk Files from Computer
 

Recently uploaded

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 

Recently uploaded (20)

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 

Yerbuddy18

  • 1. Aplore 1.Click Start>Run, type Regedit then hit the Enter key. 2.In the left panel, double click the following: HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>CurrentVersion>Run 3.In the right panel, look for and then delete this registry entry: Explorer=%SYSTEM%explorer.exe 4.Close the registry. 5.Restart your system. 6.Open your Windows System directory, which is usually at C:WindowsSystem. Click Start>Run, type C:WindowsSystem or your Windows System directory then hit the Enter key. 7.In the Windows System directory, look for and then delete these files: ¦EXPLORER.EXE (copy of itself) ¦PSECURE20X-CGI-INSTALL.VERSION6.01.BIN.HX.COM (copy of itself) ¦EMAIL.VBS (detected as VBS_PSECURE.A) ¦INDEX.HTML (detected as HTML_PSECURE.A) ¦APHEX.JPG (image) ¦HWND32.DLL (program usually truncates to 0 byte) 8.Scan your system
  • 2.
  • 4.
  • 6.
  • 8.
  • 10.
  • 12.
  • 14.
  • 16.
  • 18.
  • 20.
  • 22.