Remove old code

This commit is contained in:
2Shirt 2021-10-14 17:34:23 -06:00
parent 9cd39c5691
commit 551c28f242
Signed by: 2Shirt
GPG key ID: 152FAC923B0E132C
193 changed files with 2 additions and 8493 deletions

View file

@ -33,12 +33,7 @@ from wk.io import (
non_clobber_path,
rename_item,
)
from wk.kit.tools import (
download_tool,
extract_tool,
get_tool_path,
run_tool,
)
from wk.kit.tools import (download_tool, get_tool_path, run_tool)
from wk.log import format_log_path, update_log_path
from wk.os.win import (
ARCH,
@ -973,7 +968,6 @@ def delete_registry_null_keys():
def fix_file_associations():
"""Fix file associations via registry edits."""
extract_tool('WinAIORepair')
winaio_path = get_tool_path('WinAIORepair', 'Repair_Windows').parent
winaio_path = winaio_path.joinpath(
f'Files/regfiles/file_associations/{OS_VERSION}',

View file

@ -974,7 +974,7 @@ def open_hwinfo_sensors():
def open_snappy_driver_installer_origin():
"""Open Snappy Driver Installer Origin."""
run_tool('_Drivers/SDIO', 'SDIO', cwd=True, pipe=True, popen=True)
run_tool('SDIO', 'SDIO', cwd=True, pipe=True, popen=True)
def open_windows_activation():

View file

@ -1,11 +0,0 @@
@echo off
setlocal
rem Enable System Restore
PowerShell -Command Enable-ComputerRestore -Drive %SYSTEMDRIVE%\
rem Create Restore Point
PowerShell -Command Checkpoint-Computer -Description 1201-d7II
endlocal

View file

@ -1,27 +0,0 @@
@echo off
setlocal
pushd "%~dp0"
rem Remove stale marker if present
if exist "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker" (
del /f "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker"
)
rem Set marker to prevent unintended MBAM removal
if exist "%PROGRAMFILES%\Malwarebytes\Anti-Malware\mbam.exe" (
echo Previous Malwarebytes installation detected.
echo. > "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker"
)
if exist "%PROGRAMFILES(X86)%\Malwarebytes Anti-Malware\mbam.exe" (
rem MBAM v2 installation
echo Previous Malwarebytes [v2] installation detected.
echo. > "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker"
)
rem Install/Upgrade MBAM
echo Installing Malwarebytes...
start "" /wait mbam-setup.exe /VERYSILENT /NORESTART
popd
endlocal

View file

@ -1,71 +0,0 @@
@echo off
setlocal
pushd "%~dp0"
:GetDate
:: Credit to SS64.com Code taken from http://ss64.com/nt/syntax-getdate.html
:: Use WMIC to retrieve date and time in ISO 8601 format.
for /f "skip=1 tokens=1-6" %%G in ('WMIC Path Win32_LocalTime Get Day^,Hour^,Minute^,Month^,Second^,Year /Format:table') do (
if "%%~L"=="" goto s_done
set _yyyy=%%L
set _mm=00%%J
set _dd=00%%G
set _hour=00%%H
set _minute=00%%I
)
:s_done
:: Pad digits with leading zeros
set _mm=%_mm:~-2%
set _dd=%_dd:~-2%
set _hour=%_hour:~-2%
set _minute=%_minute:~-2%
set iso_date=%_yyyy%-%_mm%-%_dd%
rem Get uninstaller path from registry
set "uninstaller="
set "altuninstaller=%PROGRAMFILES%\Malwarebytes\Anti-Malware\mbuns.exe"
for /f usebackq^ tokens^=2^ delims^=^" %%s in (
`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{35065F43-4BB2-439A-BFF7-0F1014F2E0CD}_is1" /v UninstallString`
) do (
set "uninstaller=%%s"
)
rem Copy logs to 1201 folder
echo "Copying logs..."
robocopy /e "%PROGRAMDATA%\Malwarebytes\MBAMService\LOGS" "%SYSTEMDRIVE%\1201\Logs\%iso_date%\Tools\MBAM" >nul
robocopy /e "%PROGRAMDATA%\Malwarebytes\MBAMService\ScanResults" "%SYSTEMDRIVE%\1201\Logs\%iso_date%\Tools\MBAM" >nul
if exist "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker" (
rem Keep MBAM
echo Previous Malwarebytes installation detected.
) else (
rem Move Quarantine to 1201 folder
move "%PROGRAMDATA%\Malwarebytes\Malwarebytes Anti-Malware\Quarantine" "%SYSTEMDRIVE%\1201\Quarantine\MBAM_%iso_date%_%_hour%%_minute%"
rem Remove MBAM
echo No previous Malwarebytes installation detected.
if exist "%uninstaller%" (
echo "Uninstalling Malwarebytes..."
start "" /wait "%uninstaller%" /VERYSILENT /NORESTART /LOG
goto Done
)
if exist "%altuninstaller%" (
rem MBAM 4.x workaround
echo "Uninstalling Malwarebytes..."
start "" /wait "%altuninstaller%" /Uninstall /VERYSILENT /NORESTART /LOG
goto Done
)
color 4e
echo "Malwarebytes installation not found."
echo ""
echo "Press any key to exit... "
pause >nul
)
:Done
rem Remove marker
del /f "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker" 2>nul
popd
endlocal

View file

@ -1,30 +0,0 @@
:: Python compatibility check
@echo off
setlocal
pushd "%~dp0\..\.."
set "bin=%cd%"
set "python=%bin%\Python\x32\python.exe"
rem Verify Python can run
"%python%" --version >nul || goto ErrorPythonUnsupported
goto Done
:ErrorPythonUnsupported
rem The Windows installation lacks Windows update KB2999226 needed to run Python
echo.
echo ERROR: Failed to run Python, try installing Windows update KB2999226.
echo NOTE: That update is from October 2015 so this system is SEVERELY outdated
echo.
echo Please stop Auto Mode, exit this script, install the update, and try again.
echo.
echo Press Enter to exit...
pause>nul
if exist "%bin%\..\Installers\Extras\Windows Updates" (
start "" "explorer.exe"
start "" "explorer.exe" "%bin%\..\Installers\Extras\Windows Updates"
)
:Done
popd
endlocal

View file

@ -1,14 +0,0 @@
:: Launch WizardKit item
@echo off
setlocal
pushd "%~dp0\..\..\.."
rem Run WizardKit Launcher
call "%*"
rem Sleep for 5 sec so d7II can wait for launched proc
"%systemroot%\System32\ping.exe" -n 5 127.0.0.1>nul
popd
endlocal

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2 KiB

View file

@ -1,39 +0,0 @@
[ShortDesc]
Autoruns=Manages Startup Items
Autoruns_Copy=Manages Startup Items
Autoruns (Verify and Log)=Manages Startup Items
Google Chrome Software Removal Tool=Remove add-ons, extensions, toolbars, and other software that may interfere with the operation of Google Chrome.
VipreRescueScanner (Deep Scan)=Virus scanner (Designed for both the Malware Removal and the Offline Operations tab)
VipreRescueScanner (Quick Scan)=Virus scanner (Designed for both the Malware Removal and the Offline Operations tab)
=Create Restore Point
[ReportDesc]
Autoruns=Examined Windows startup items and removed unnecessary entries.
Autoruns_Copy=Examined Windows startup items and removed unnecessary entries.
Autoruns (Verify and Log)=Examined Windows startup items and removed unnecessary entries.
Google Chrome Software Removal Tool=Scanned for and removed any toolbars/extensions/add-ons that may interfere with the operation of Google Chrome.
VipreRescueScanner (Deep Scan)=Ran virus scans (Vipre)
VipreRescueScanner (Quick Scan)=Ran virus scans (Vipre)
28=Created a System Restore point.
32=Ran a Zero Access malware scan.
2=Uninstalled unnecessary applications
41=Re-wrote the default Safe Mode services to prevent potential issues with blue screens when entering Safe Mode.
33=Backed up all Registry Hives.
1=Uninstalled unnecessary applications
9=Repaired file associations for executable files.
10=Removed restrictive Windows policy settings.
11=Cleared proxy settings.
18=Scanned for known malware files and registry entries and removed anything found.
12=Deleted unnecessary temporary files from user profiles and temporary files used by Windows.
13=Deleted temporary internet cache from user profiles.
34=Scanned for viruses/malware with Microsoft Security Essentials / Windows Defender.
49=Scanned for Windows system component corruption to repair any issues found.
24=Repaired the built-in Windows firewall.
31=Set all network adapters to DHCP.
75=Apply static DNS settings to all NICs.
21=Ran repair and reset procedures on networking components.
25=Reset all settings to defaults for the built-in Windows firewall.
36=Manually examined the HOSTS file for hijacks or other issues.
22=Repaired the Windows Update services responsible for Windows Update functionality.
38=Performed repair routines to ensure the Winsock is operating properly.
83=Examined internet speed/bandwidth.
=Create Restore Point

View file

@ -1,42 +0,0 @@
[Autoruns]
PostRunApp=
AlwaysAttemptDownload=1
DLafterXdays=7
EmailBeforeExecution=0
PriorAlert=1
[Autoruns_Copy]
PostRunApp=
AlwaysAttemptDownload=1
DLafterXdays=7
EmailBeforeExecution=0
PriorAlert=1
[Autoruns (Verify and Log)]
PostRunApp=
AlwaysAttemptDownload=1
DLafterXdays=7
EmailBeforeExecution=0
PriorAlert=0
[Google Chrome Software Removal Tool]
PostRunApp=
AlwaysAttemptDownload=1
DLafterXdays=0
EmailBeforeExecution=0
PriorAlert=1
[VipreRescueScanner (Deep Scan)]
PostRunApp=
AlwaysAttemptDownload=1
DLafterXdays=1
EmailBeforeExecution=0
PriorAlert=0
[VipreRescueScanner (Quick Scan)]
PostRunApp=
AlwaysAttemptDownload=1
DLafterXdays=1
EmailBeforeExecution=0
PriorAlert=0
[]
PostRunApp=
AlwaysAttemptDownload=0
DLafterXdays=5
EmailBeforeExecution=0
PriorAlert=0

View file

@ -1,37 +0,0 @@
[Config]
LastEditDate=10/8/2018 10:56:15 PM
PostRunApp=
AppWebsite=https://www.malwarebytes.com/adwcleaner/
AppDLPage=https://downloads.malwarebytes.com/file/adwcleaner
AppDesc=Toolbar Remover
App=AdwCleaner.exe
UseFTPServer=0
AppURL=https://downloads.malwarebytes.com/file/adwcleaner
AppDLName=AdwCleaner.exe
AlwaysAttemptDownload=1
DLafterXdays=.5
AppWait=1
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%systemdrive%\AdwCleaner\AdwCleaner*.txt
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Removed unnecessary internet browser add-ins (e.g. Toolbars) [AdwCleaner]
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=8/14/2018

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=5/6/2019 6:09:55 PM
PostRunApp=
AppParms=.bin\Scripts\launchers_for_d7\Disable Windows Updates.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
App=WizardKit Launcher.cmd
AutoFlag=0
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
AppDesc=Disable Windows Updates
LogVerbiage=Disable Windows Update services and delete update folders
AppWaitTime=30

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=8/30/2018 10:49:46 AM
PostRunApp=
AppParms=.bin\Scripts\launchers_for_d7\Enable Windows Updates.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
App=WizardKit Launcher.cmd
AutoFlag=0
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
AppDesc=Enable Windows Updates
LogVerbiage=Enable Windows Update services
AppWaitTime=30

View file

@ -1,45 +0,0 @@
[Config]
Author=2Shirt
LastEditDate=10/8/2018 10:56:18 PM
PostRunApp=
AppWebsite=http://www.surfright.nl/en/hitmanpro/
AppDLPage=http://www.surfright.nl/en/downloads/
AppDesc=Malware scanner
App=HitmanPro.exe
App64=HitmanPro_x64.exe
AppParms=/clean /noinstall /excludelist="%3rdpath%\HMP_Excludes.txt" /logtype=txt /log="%malreportdir%\HitmanPro_Scan_Log_%date%.txt"
AppURL64=https://dl.surfright.nl/HitmanPro_x64.exe
AppURL64B=http://dl.surfright.nl/FoolishIT/HitmanPro_x64.exe
AppDLName64=HitmanPro_x64.exe
UseFTPServer=0
AppURL=https://dl.surfright.nl/HitmanPro.exe
AppURLB=http://dl.surfright.nl/FoolishIT/HitmanPro.exe
AppDLName=HitmanPro.exe
AlwaysAttemptDownload=1
DLafterXdays=.5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=1
AppWaitTime=60
AppRandomize=1
CopyConfigFirst=HMP.cmd
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran Malware Scans (HitmanPro)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
LastDownload=8/19/2018

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=8/25/2018 3:50:11 PM
PostRunApp=
App=WizardKit Launcher.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LogVerbiage=Uninstalled unnecessary / junk programs.
AppDesc=Application uninstaller and cleanup utility
AppParms=Uninstallers\IObit Uninstaller.cmd
WaitOnProcesses=IObitUninstallerPortable.exe
AppWaitTime=30

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=8/30/2018 10:49:46 AM
PostRunApp=
AppParms=.bin\Scripts\launchers_for_d7\Install SW Bundle.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
App=WizardKit Launcher.cmd
AutoFlag=0
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe;Ninite.exe
AppDesc=Install software bundle
LogVerbiage=Installed or updated commonly used applications (Adobe Reader, Google Chrome, etc)
AppWaitTime=30

View file

@ -1,35 +0,0 @@
[Config]
LastEditDate=10/8/2018 10:55:27 PM
PostRunApp=
AppWebsite=https://www.malwarebytes.com/
AppDLPage=https://downloads.malwarebytes.com/file/mb3/
AppDesc=Download MBAM setup
UseFTPServer=0
AppURL=https://downloads.malwarebytes.com/file/mb3/
AppDLName=mbam-setup.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=1
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
App=exit
LastDownload=10/7/2018

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=10/7/2018 3:51:22 PM
PostRunApp=
App=MBAM_Install.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=0
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
AppDesc=Install/Upgrade MBAM
LogVerbiage=Malwarebytes installed successfully.
LastDownload=8/18/2018
Author=2Shirt
AppWaitTime=5

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=8/13/2018 4:48:53 PM
PostRunApp=
AppWebsite=https://www.malwarebytes.com/
AppDLPage=https://downloads.malwarebytes.com/file/mb3/
AppDesc=Malwarebytes Execution
App=%programfiles%\Malwarebytes\Anti-Malware\mbam.exe
App64=%programfiles%\Malwarebytes\Anti-Malware\mbam.exe
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Malwarebytes ran successfully.
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0

View file

@ -1,30 +0,0 @@
[Config]
LastEditDate=8/13/2018 7:32:30 PM
PostRunApp=
App=MBAM_Uninstall.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
AppDesc=Uninstall MBAM (if not previously installed)

View file

@ -1,32 +0,0 @@
[Config]
LastEditDate=5/6/2019 6:48:27 PM
PostRunApp=
AppDesc=Python Check
App=Python_Check.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=0
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppWaitTime=30
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Python compatibility check
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0

View file

@ -1,40 +0,0 @@
[Config]
Author=2Shirt
LastEditDate=10/8/2018 10:56:23 PM
PostRunApp=
AppWebsite=http://www.bleepingcomputer.com/forums/t/308364/rkill-what-it-does-and-what-it-doesnt-a-brief-introduction-to-the-program/
AppDLPage=http://www.bleepingcomputer.com/download/rkill/
AppDesc=Anti-Malware app.
App=rkill.exe
AppParms=-s -w "%3rdpath%\rkill_Excludes.txt"
UseFTPServer=0
AppURL=https://download.bleepingcomputer.com/grinler/rkill.exe
AppDLName=rkill.exe
AlwaysAttemptDownload=1
DLafterXdays=.5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=1
CopyConfigFirst=rkill.cmd
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%userprofile%\Desktop\rkill*.txt
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran Malware Scan (RKill)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
LastDownload=10/7/2018

View file

@ -1,35 +0,0 @@
[Config]
Author=2Shirt
LastEditDate=8/25/2018 3:50:41 PM
PostRunApp=
AppDesc=WizardKit browser reset script (d7II mode)
App=WizardKit Launcher.cmd
AppParms=.bin\Scripts\launchers_for_d7\Browser Reset.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Reset web browsers to safe defaults and removed any malicous addons found.
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
AppWaitTime=10

View file

@ -1,35 +0,0 @@
[Config]
Author=2Shirt
LastEditDate=8/25/2018 3:50:50 PM
PostRunApp=
AppDesc=WizardKit system checklist script (d7II mode)
App=WizardKit Launcher.cmd
AppParms=.bin\Scripts\launchers_for_d7\System Checklist.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LogVerbiage=Examined and verified system-wide settings (available updates, drivers, activation, etc)
AppWaitTime=30

View file

@ -1,35 +0,0 @@
[Config]
Author=2Shirt
LastEditDate=8/25/2018 3:49:49 PM
PostRunApp=
AppDesc=WizardKit system diagnostics script (d7II mode)
App=WizardKit Launcher.cmd
AppParms=.bin\Scripts\launchers_for_d7\System Diagnostics.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LogVerbiage=Ran OS built-in repairs and backed up system information
AppWaitTime=30

View file

@ -1,35 +0,0 @@
[Config]
Author=2Shirt
LastEditDate=8/25/2018 3:50:59 PM
PostRunApp=
AppDesc=WizardKit user checklist script (d7II mode)
App=WizardKit Launcher.cmd
AppParms=.bin\Scripts\launchers_for_d7\User Checklist.cmd
UseFTPServer=0
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe;firefox.exe;chrome.exe
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=1
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Verified web browser settings and functionality
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
AppWaitTime=30

View file

@ -1,485 +0,0 @@
[Everything]
app_data=0
run_as_admin=1
window_x=1614
window_y=186
window_wide=794
window_high=664
maximized=0
minimized=0
fullscreen=0
ontop=0
match_whole_word=0
match_path=0
match_case=0
match_diacritics=0
match_regex=0
selection_mask_right_bottom_inclusive=1
allow_multiple_windows=0
allow_multiple_instances=0
run_in_background=1
show_tray_icon=1
alternate_row_color=0
show_mouseover=0
check_for_updates_on_startup=0
beta_updates=0
show_highlighted_search_terms=1
text_size=0
hide_empty_search_results=0
clear_selection_on_search=1
new_window_key=0
show_window_key=0
toggle_window_key=0
language=0
show_selected_item_in_statusbar=0
open_folder_command2=
open_file_command2=
open_path_command2=
explore_command2=
explore_path_command2=
window_title_format=
taskbar_notification_title_format=
instance_name=
translucent_selection_rectangle_alpha=70
min_zoom=-6
max_zoom=27
context_menu_type=0
auto_include_fixed_volumes=1
auto_include_removable_volumes=0
last_export_type=0
max_threads=0
reuse_threads=1
single_parent_context_menu=0
auto_size_1=512
auto_size_2=640
auto_size_3=768
auto_size_aspect_ratio_x=9
auto_size_aspect_ratio_y=7
auto_size_path_x=1
auto_size_path_y=2
sticky_vscroll_bottom=1
last_options_page=9
draw_focus_rect=1
date_format=
time_format=
invert_layout=0
listview_item_high=0
debug=0
home_match_case=0
home_match_whole_word=0
home_match_path=0
home_match_diacritics=0
home_regex=0
home_search=1
home_filter=0
home_sort=0
home_index=1
allow_multiple_windows_from_tray=0
single_click_tray=0
close_on_execute=0
double_click_path=0
update_display_after_scroll=0
update_display_after_mask=1
auto_scroll_view=0
double_quote_copy_as_path=0
snap=0
snaplen=10
rename_select_filepart_only=0
rename_move_caret_to_selection_end=0
search_edit_move_caret_to_selection_end=0
select_search_on_mouse_click=1
focus_search_on_activate=0
reset_vscroll_on_search=1
wrap_focus=0
load_icon_priority=0
load_fileinfo_priority=0
header_high=0
hide_on_close=0
winmm=0
menu_escape_amp=1
fast_ascii_search=1
match_path_when_search_contains_path_separator=1
allow_literal_operators=0
allow_round_bracket_parenthesis=0
expand_environment_variables=0
search_as_you_type=1
convert_forward_slash_to_backslash=0
match_whole_filename_when_using_wildcards=1
double_buffer=1
search=
show_number_of_results_with_selection=0
date_descending_first=0
size_descending_first=0
size_format=2
alpha_select=0
tooltips=1
rtl_listview_edit=0
bookmark_remember_case=1
bookmark_remember_wholeword=1
bookmark_remember_path=1
bookmark_remember_diacritic=1
bookmark_remember_regex=1
bookmark_remember_sort=1
bookmark_remember_filter=1
bookmark_remember_index=1
exclude_list_enabled=1
exclude_hidden_files_and_folders=0
exclude_system_files_and_folders=0
include_only_files=
exclude_files=
db_location=
db_multi_user_filename=0
db_compress=0
extended_information_cache_monitor=1
keep_missing_indexes=0
editor_x=0
editor_y=0
editor_wide=0
editor_high=0
editor_maximized=0
file_list_relative_paths=1
max_recv_size=8388608
display_full_path_name=0
size_tiny=10240
size_small=102400
size_medium=1048576
size_large=16777216
size_huge=134217728
themed_toolbar=1
show_copy_path=2
show_copy_full_name=2
show_open_path=2
show_explore=2
show_explore_path=2
copy_path_folder_append_backslash=0
custom_verb01=
custom_verb02=
custom_verb03=
custom_verb04=
custom_verb05=
custom_verb06=
custom_verb07=
custom_verb08=
custom_verb09=
custom_verb10=
custom_verb11=
custom_verb12=
filters_visible=0
filters_wide=128
filters_right_align=1
filters_tab_stop=0
filter=
filter_everything_name=
sort=Name
sort_ascending=1
always_keep_sort=0
index=0
index_file_list=
index_etp_server=
index_link_type=1
status_bar_visible=1
select_search_on_focus_mode=1
select_search_on_set_mode=2
search_history_enabled=0
run_history_enabled=1
search_history_days_to_keep=90
run_history_days_to_keep=90
search_history_always_suggest=0
search_history_max_results=24
search_history_show_above=0
service_port=15485
etp_server_enabled=0
etp_server_bindings=
etp_server_port=21
etp_server_username=
etp_server_password=
etp_server_welcome_message=
etp_server_log_file_name=
etp_server_logging_enabled=1
etp_server_log_max_size=4194304
etp_server_log_delta_size=524288
etp_server_allow_file_download=1
http_server_enabled=0
http_server_bindings=
http_title_format=
http_server_port=80
http_server_username=
http_server_password=
http_server_home=
http_server_default_page=
http_server_log_file_name=
http_server_logging_enabled=1
http_server_log_max_size=4194304
http_server_log_delta_size=524288
http_server_allow_file_download=1
name_column_pos=0
name_column_width=256
path_column_visible=1
path_column_pos=1
path_column_width=256
size_column_visible=1
size_column_pos=2
size_column_width=96
extension_column_visible=0
extension_column_pos=3
extension_column_width=96
type_column_visible=0
type_column_pos=4
type_column_width=96
last_write_time_column_visible=1
last_write_time_column_pos=3
last_write_time_column_width=153
creation_time_column_visible=0
creation_time_column_pos=6
creation_time_column_width=140
date_accessed_column_visible=0
date_accessed_column_pos=7
date_accessed_column_width=140
attribute_column_visible=0
attribute_column_pos=8
attribute_column_width=70
date_recently_changed_column_visible=0
date_recently_changed_column_pos=9
date_recently_changed_column_width=96
run_count_column_visible=0
run_count_column_pos=10
run_count_column_width=96
date_run_column_visible=0
date_run_column_pos=11
date_run_column_width=140
file_list_filename_column_visible=0
file_list_filename_column_pos=12
file_list_filename_column_width=96
translucent_selection_rectangle_background_color=
translucent_selection_rectangle_border_color=
ntfs_volume_paths=
ntfs_volume_includes=
ntfs_volume_load_recent_changes=
ntfs_volume_include_onlys=
ntfs_volume_monitors=
filelists=
folders=
folder_monitor_changes=
folder_update_types=
folder_update_days=
folder_update_ats=
folder_update_intervals=
folder_update_interval_types=
exclude_folders=
connect_history_hosts=
connect_history_ports=
connect_history_usernames=
connect_history_link_types=
file_new_search_window_keys=334
file_open_file_list_keys=335
file_close_file_list_keys=
file_close_keys=343,27
file_export_keys=339
file_copy_full_name_to_clipboard_keys=9539
file_copy_path_to_clipboard_keys=
file_set_run_count_keys=
file_create_shortcut_keys=
file_delete_keys=8238
file_delete_permanently_keys=9262
file_edit_keys=
file_open_keys=8205
file_open_selection_and_close_everything_keys=
file_explore_path_keys=
file_open_new_keys=
file_open_path_keys=8461
file_open_with_keys=
file_open_with_default_verb_keys=
file_play_keys=
file_preview_keys=
file_print_keys=
file_print_to_keys=
file_properties_keys=8717
file_read_extended_information_keys=8517
file_rename_keys=8305
file_run_as_keys=
file_exit_keys=337
file_custom_verb_1_keys=
file_custom_verb_2_keys=
file_custom_verb_3_keys=
file_custom_verb_4_keys=
file_custom_verb_5_keys=
file_custom_verb_6_keys=
file_custom_verb_7_keys=
file_custom_verb_8_keys=
file_custom_verb_9_keys=
file_custom_verb_10_keys=
file_custom_verb_11_keys=
file_custom_verb_12_keys=
edit_cut_keys=8536
edit_copy_keys=8515,8493
edit_paste_keys=8534,9261
edit_select_all_keys=8513
edit_invert_selection_keys=
view_filters_keys=
view_status_bar_keys=
view_window_size_small_keys=561
view_window_size_medium_keys=562
view_window_size_large_keys=563
view_window_size_auto_fit_keys=564
view_zoom_zoom_in_keys=443,363
view_zoom_zoom_out_keys=445,365
view_zoom_reset_keys=304,352
view_go_to_back_keys=549,166
view_go_to_forward_keys=551,167
view_go_to_home_keys=548
view_sort_by_name_keys=305
view_sort_by_path_keys=306
view_sort_by_size_keys=307
view_sort_by_extension_keys=308
view_sort_by_type_keys=309
view_sort_by_date_modified_keys=310
view_sort_by_date_created_keys=311
view_sort_by_attributes_keys=312
view_sort_by_file_list_filename_keys=
view_sort_by_run_count_keys=
view_sort_by_date_run_keys=
view_sort_by_date_recently_changed_keys=313
view_sort_by_date_accessed_keys=
view_sort_by_ascending_keys=
view_sort_by_descending_keys=
view_refresh_keys=116
view_fullscreen_keys=122
view_toggle_ltrrtl_keys=
view_on_top_never_keys=
view_on_top_always_keys=340
view_on_top_while_searching_keys=
search_match_case_keys=329
search_match_whole_word_keys=322
search_match_path_keys=341
search_match_diacritics_keys=333
search_enable_regex_keys=338
search_add_to_filters_keys=
search_organize_filters_keys=1350
bookmarks_add_to_bookmarks_keys=324
bookmarks_organize_bookmarks_keys=1346
tools_options_keys=336
tools_console_keys=448
tools_file_list_editor_keys=
tools_connect_to_etp_server_keys=
tools_disconnect_from_etp_server_keys=
help_everything_help_keys=112
help_search_syntax_keys=
help_regex_syntax_keys=
help_command_line_options_keys=
help_everything_website_keys=
help_check_for_updates_keys=
help_about_everything_keys=368
search_edit_focus_search_edit_keys=326,114
search_edit_delete_previous_word_keys=4360
search_edit_auto_complete_search_keys=4384
search_edit_show_search_history_keys=
search_edit_show_all_search_history_keys=4646,4648
result_list_item_up_keys=8230,4134
result_list_item_down_keys=8232,4136
result_list_page_up_keys=8225,4129
result_list_page_down_keys=8226,4130
result_list_start_of_list_keys=8228
result_list_end_of_list_keys=8227
result_list_item_up_extend_keys=9254,5158
result_list_item_down_extend_keys=9256,5160
result_list_page_up_extend_keys=9249,5153
result_list_page_down_extend_keys=9250,5154
result_list_start_of_list_extend_keys=9252
result_list_end_of_list_extend_keys=9251
result_list_focus_up_keys=8486,4390
result_list_focus_down_keys=8488,4392
result_list_focus_page_up_keys=8481,4385
result_list_focus_page_down_keys=8482,4386
result_list_focus_start_of_list_keys=8484
result_list_focus_end_of_list_keys=8483
result_list_focus_up_extend_keys=9510,5414
result_list_focus_down_extend_keys=9512,5416
result_list_focus_page_up_extend_keys=9505,5409
result_list_focus_page_down_extend_keys=9506,5410
result_list_focus_start_of_list_extend_keys=9508
result_list_focus_end_of_list_extend_keys=9507
result_list_focus_result_list_keys=
result_list_toggle_path_column_keys=1330
result_list_toggle_size_column_keys=1331
result_list_toggle_extension_column_keys=1332
result_list_toggle_type_column_keys=1333
result_list_toggle_date_modified_column_keys=1334
result_list_toggle_date_created_column_keys=1335
result_list_toggle_attributes_column_keys=1336
result_list_toggle_file_list_filename_column_keys=
result_list_toggle_run_count_column_keys=
result_list_toggle_date_recently_changed_column_keys=1337
result_list_toggle_date_accessed_column_keys=
result_list_toggle_date_run_column_keys=
result_list_size_all_columns_to_fit_keys=8555
result_list_size_result_list_to_fit_keys=
result_list_context_menu_keys=9337
result_list_scroll_left_keys=8229
result_list_scroll_right_keys=8231
result_list_scroll_page_left_keys=8485
result_list_scroll_page_right_keys=8487
result_list_select_focus_keys=8224
result_list_toggle_focus_selection_keys=8480
result_list_copy_selection_to_clipboard_as_csv_keys=
result_list_font=
result_list_font_size=
search_edit_font=
search_edit_font_size=
status_bar_font=
status_bar_font_size=
header_font=
header_font_size=
normal_background_color=
normal_foreground_color=
normal_bold=
highlighted_background_color=
highlighted_foreground_color=
highlighted_bold=
selected_background_color=
selected_foreground_color=
selected_bold=
highlighted_selected_background_color=
highlighted_selected_foreground_color=
highlighted_selected_bold=
selected_inactive_background_color=
selected_inactive_foreground_color=
selected_inactive_bold=
highlighted_selected_inactive_background_color=
highlighted_selected_inactive_foreground_color=
highlighted_selected_inactive_bold=
drop_target_background_color=
drop_target_foreground_color=
drop_target_bold=
highlighted_drop_target_background_color=
highlighted_drop_target_foreground_color=
highlighted_drop_target_bold=
current_sort_background_color=
current_sort_foreground_color=
current_sort_bold=
highlighted_current_sort_background_color=
highlighted_current_sort_foreground_color=
highlighted_current_sort_bold=
mouseover_background_color=
mouseover_foreground_color=
mouseover_bold=
mouseover_highlighted_background_color=
mouseover_highlighted_foreground_color=
mouseover_highlighted_bold=
current_sort_mouseover_background_color=
current_sort_mouseover_foreground_color=
current_sort_mouseover_bold=
mouseover_current_sort_highlighted_background_color=
mouseover_current_sort_highlighted_foreground_color=
mouseover_current_sort_highlighted_bold=
alternate_row_background_color=
alternate_row_foreground_color=
alternate_row_bold=
alternate_row_highlighted_background_color=
alternate_row_highlighted_foreground_color=
alternate_row_highlighted_bold=
current_sort_alternate_row_background_color=
current_sort_alternate_row_foreground_color=
current_sort_alternate_row_bold=
current_sort_alternate_row_highlighted_background_color=
current_sort_alternate_row_highlighted_foreground_color=
current_sort_alternate_row_highlighted_bold=

View file

@ -1,11 +0,0 @@
pushd "%~dp0"
cd..
set d7IIpath=%cd%
pushd "%~dp0"
echo %d7IIpath%\>HMP_Excludes.txt
echo %programfiles%\dSupportSuite\>>HMP_Excludes.txt
echo %programfiles(x86)%\dSupportSuite\>>HMP_Excludes.txt
echo %programfiles%\CryptoPrevent\>>HMP_Excludes.txt
echo %programfiles(x86)%\CryptoPrevent\>>HMP_Excludes.txt
echo %programfiles%\Foolish IT\CryptoPrevent\>>HMP_Excludes.txt
echo %programfiles(x86)%\Foolish IT\CryptoPrevent\>>HMP_Excludes.txt

View file

@ -1,17 +0,0 @@
@echo off&pushd "%~dp0"
start /wait JRT.exe -y -nr
pushd "%temp%\jrt"
if not exist "get.bat" pushd %systemdrive%\JRT
if not exist "get.bat" goto :eof
findstr /v /i "pause" get.bat>tmp.txt
findstr /v /i /b "notepad" tmp.txt>get.bat
echo.>>"%temp%\jrt\wl_services.cfg"
echo d7iisvc>>"%temp%\jrt\wl_services.cfg"
echo dSSEventSvc>>"%temp%\jrt\wl_services.cfg"
echo CryptoPreventEventSvc>>"%temp%\jrt\wl_services.cfg"
echo.>>"%temp%\jrt\wl_processes.cfg"
echo d7ii>>"%temp%\jrt\wl_processes.cfg"
echo dfunk>>"%temp%\jrt\wl_processes.cfg"
echo dSupportSuite>>"%temp%\jrt\wl_processes.cfg"
echo CryptoPrevent>>"%temp%\jrt\wl_processes.cfg"
start /wait cmd.exe /c get.bat

View file

@ -1,26 +0,0 @@
[Options]
AutoSync=1
AutoExit=1
Retry=1
[Servers]
0="time-a.nist.gov"
1="time-a.timefreq.bldrdoc.gov"
2="time-b.nist.gov"
3="time-b.timefreq.bldrdoc.gov"
4="time-c.timefreq.bldrdoc.gov"
5="us.pool.ntp.org"
6="1.us.pool.ntp.org"
7="2.us.pool.ntp.org"
8="3.us.pool.ntp.org"
9="pubts1-sj.witime.net"
10="pubts2-sj.witime.net"
11="rolex.usg.edu"
12="timekeeper.isi.edu"
13="nist1.symmetricom.com"
14="clock.via.net"
15="nist1.aol-ca.truetime.com"
16="nist.expertsmi.com"
17="nist1-dc.WiTime.net"
18="nist1-sj.WiTime.net"
19="utcnist.colorado.edu"

View file

@ -1,167 +0,0 @@
::
:: --- BEGIN INFO ---
::
::
:: Applicable Custom App: All 'Emsisoft xxx' app configurations in d7II default custom app configurations.
::
:: Last Update: 2017-02-03
::
:: Created by Nick @ FoolishIT.com [Foolish IT LLC] as an example for the user-configurable d7II custom app's system.
::
::
:: - d7II Config Location: (applicable to most anything having to do with this batch file)
:: Open Config (under Main drop down menu) \ Custom Apps (tab) \ (search/find/highlight desired custom app in left column/box first) \ New/Edit App (sub-tab)
::
:: - This batch file is referenced from custom app configuration items in d7II Config, and may make references to other data available from within
:: the custom app configuration or used by it such as noted here.
::
:: - The 'Whitelist.txt' file created by this batch file will by referenced in the command line arguments passed to the custom app; the configuration
:: for this is located in custom apps config as mentioned above \ then the Execution (sub-tab)
::
:: - This batch file is called into action when configured in the 'Import Config Before Execution' setting in a d7II custom app configuration,
:: which can be found on the 'Pre-Execution' tab of the custom app configuration mentioned above.
::
:: NOTES: * When a .BAT/.CMD file such as this is found configured under this setting (as opposed to any other text or data file) it will be
:: copied to the custom app's final running directory (the same as any other files would be) but then executed as a batch script (after
:: the installer is executed if one is configured, but prior to execution of the main custom app itself.
::
:: * Similarly, a .VBS file would be copied to the custom app directory and executed as a script as above.
::
:: * Further, a .REG file would be imported to the registry if found configured for this setting.
::
:: * This setting may reference multiple files separated by a comma with no spacing required; e.g. 'file1.bat,file2.txt,file3.reg'
::
:: * All files (no paths) configured here must be located within your 'd7II\Config\CustomApps\3rd Party Configs' path (create the last
:: dirs if not exist.) They will likely work if located in the 'd7II\Config\CustomApps_d7II\3rd Party Configs' path, but with all
:: d7II default custom app configurations, this path with all content will be deleted and rewritten during updates to the default apps.
::
::
:: Batch File Objectives:
::
:: 1. Obtain d7II path via registry; use this in creating a whitelist to be used by the custom app
:: (to include all custom apps in subdirs of d7II)
::
:: 2. Obtain 3rd Party Tools path via registry; if this is not a subdir of the main d7II Path, then
:: add this to a whitelist to be used by the custom app (to include all custom apps in subdirs)
::
:: 3. create a2cmd whitelist as a new file in the location/directory of the custom app (overwrite existing if any)
:: - batch file current directory should be same as the main executable of the custom app (Execution tab)
:: - add d7II path and include all custom apps within the d7II subdir structure) and other Foolish IT apps
:: to a new file (overwrite) in the current directory (of the custom app whitelist for a2cmd.)
::
::
:: --- BEGIN CODE ---
:: Disable local echo, clear screen, output a blank line.
::
@echo off&cls&echo.
:: Set window title to visually identify what this console window is doing.
title [a2cmd] Performing Additional Custom App Tasks...
:: Change from the Current Working Directory (available to the %cd% variable)
:: to the Current Directory (available as %~dp0 below) where the file actually "lives"
:: and was the location where this batch file was copied to by d7II.exe prior to running it.
::
:: - This should be the path of the main exe for this custom app as configured in d7II;
:: located in custom apps config as mentioned above \ then the Execution (sub-tab)
::
:: - Syntax explanation:
::
:: '~' removes wrapping quotes (never use in a variable if possible, instead wrap the variable as necessary!)
:: 'd' returns a drive letter and colon
:: 'p' returns a full directory path (without a prepended driveletter, and including a trailing backslash)
:: '0' refers to self (this batch file) as the subject of the above conditions
::
pushd "%~dp0"
:: Set variables for registry value queries and app info
::
set "RegKey=HKLM\Software\Foolish IT\d7II\Session\Paths"
set "RegNameEXE=AppEXE"
set "RegName3PT=3PTDir"
set "MainPath=%systemdrive%\EmsisoftCmd"
set "MainEXE=a2cmd.exe"
set "InstEXE32=EmsisoftCommandlineScanner32.exe"
set "InstEXE64=EmsisoftCommandlineScanner64.exe"
set "InstParms=/S"
:: Determine if 64bit paths should be used. Note that by using the syntax '%programfiles% (x86)' and not the single
:: '%programfiles(x86)%' then we avoid any errors with the variable not existing and throwing off the actual exist check.
::
if "[%programfiles(x86)%]" NEQ "[]" if exist "%programfiles% (x86)" set Win64=True
::
if defined Win64 (
set "ProgramDir32=%programfiles(x86)%"
set "InstEXE=%InstEXE64%"
) else (
set "ProgramDir32=%programfiles%"
set "InstEXE=%InstEXE32%"
)
:: Run installer/self-extractor
::
if not exist "%MainPath%\%MainEXE%" if exist %InstEXE% start "" /wait "%InstEXE%" %InstParms%
:: Exit if install path does not exist...
::
if not exist "%MainPath%" (
goto :eof
) else (
pushd "%MainPath%"
)
:: Add exclusions for other Foolish IT product paths (unrelated to d7II) that may be on a system;
:: While we could first test for dir exist, the dumb addition of a few extra exclusions to the
:: whitelist without checking for their existence will make much of a difference to any custom app...
::
:: - NOTE: observe the first code line using a single ">" chr prior to the whitelist filename,
:: this creates new or overwrites an existing file; all subsequent usage for the same
:: filename must include the syntax of double ">>" chrs, which creates new or appends
:: to an existing file.
::
echo %ProgramDir32%\dSupportSuite\>a2cmd_Whitelist.txt
echo %ProgramDir32%\CryptoPrevent\>>a2cmd_Whitelist.txt
echo %ProgramDir32%\Foolish IT\CryptoPrevent\>>a2cmd_Whitelist.txt
:: Extract the full path to d7II.exe for the "d7IIPath" variable; obtain d7II path for the currently active
:: d7II 'session' via a registry query to the registry's copy of d7II's current session configuration.
::
:: - NOTE: The ' 2^>nul' syntax below redirects errors from the 'reg query' command to 'nul' in order to
:: keep garbage/error messages from defining this variable on an unexpected error...
::
:: Also, similar to the '%~dp0' syntax used with pushd at the beginning of the batch file, the
:: variable syntax '~dp' is used with the variable '%%_' to ensure output as a drive\path without
:: without a filename and without wrapping quotes (a trailing backslash is included in the output
:: and for these purposes it is also expected syntax for the custom app whitelist.
::
for /f "usebackq tokens=2*" %%a in (`reg query "%RegKey%" /v "%RegNameEXE%" 2^>nul`) do set "d7IIPath=%%~dpb"
::
:: Check for a result; if variable is defined above then add this path to the whitelist.
::
if defined d7IIPath echo %d7IIpath%>>a2cmd_Whitelist.txt
:: Next get the path to d7II custom apps / 3rd party tools via reg query, to provide redundancy if this path
:: for any reason is not located within a subdir of d7II.exe itself. First set the new registry value name.
::
for /f "usebackq tokens=2*" %%a in (`reg query "%RegKey%" /v "%RegName3PT%" 2^>nul`) do set "ToolsPath=%%~b"
::
:: Check for a result; if variable is defined above then add this path to the whitelist, otherwise the rest
:: of this script is useless, so exit.
::
if not defined ToolsPath goto :eof
echo %ToolsPath%\>>a2cmd_Whitelist.txt
:: If no parameters were passed to this batch file, it is being run as part of the "Copy Config" custom app
:: setting (it will be run a second time with parameters for the execution of the custom app itself, which is
:: configured to run this batch file again instead of %MainEXE% as the actual configured exe for this custom
:: app.)
::
:: Test to find out if any parameters were passed to this batch file, and if none are found just update...
::
if [%1] EQU [] goto :RunUpdate
:: If we make it this far then this batch file was launched with command line parameters intended for %MainEXE%,
:: so run the custom app passing all parameters as received and waiting for exit.
::
echo Running scan... (in a separate window; please do NOT close this window!)
::
start "" /wait "%MainEXE%" %*
goto :eof
:RunUpdate
::
:: Since getting here means no parameters were passed, run %MainEXE% using parameters for it's own internal
:: definition/signature update, then exit.
::
echo Starting update... (in a separate window; please do NOT close this window!)
::
start "" /wait "%MainEXE%" /update
goto :eof

View file

@ -1,5 +0,0 @@
pushd "%~dp0"
cd..
set d7IIpath=%cd%
pushd "%~dp0"
echo %d7IIpath%\d7II.exe>rkill_Excludes.txt

View file

@ -1,35 +0,0 @@
[Config]
DisableCloudShare=0
AppURL=http://www.alex-is.de/PHP/fusion/downloads.php?cat_id=4&file_id=9
AppDLName=AS SSD Benchmark.zip
AlwaysAttemptDownload=1
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
App=AS SSD Benchmark\AS SSD Benchmark.exe
UseFTPServer=0
DLafterXdays=7
PriorAlert=0
LogVerbiage=Ran SSD testing/benchmark
LastDownload=10/27/2017
AppWebsite=www.alex-is.de/PHP/fusion/downloads.php?cat_id=4&download_id=9
Author=FoolishTech
LastEditDate=2/7/2014 9:45:12 AM
NonDirectURLs=0
AppDLPage=www.alex-is.de/PHP/fusion/downloads.php?cat_id=4&download_id=9
AppDesc=SSD Benchmark Utility
AutoFlag=0

View file

@ -1,36 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=7/21/2014 11:16:06 AM
AppWebsite=http://www.bleepingcomputer.com/download/adwcleaner/
AppDLPage=http://www.bleepingcomputer.com/download/adwcleaner/
AppDesc=Toolbar Remover
App=AdwCleaner.exe
UseFTPServer=0
AppURL=http://download.bleepingcomputer.com/Xplode/AdwCleaner.exe
AppURLB=http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner
AppDLName=AdwCleaner.exe
AlwaysAttemptDownload=1
DLafterXdays=.5
AppWait=1
PriorAlert=1
ServiceWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%systemdrive%\AdwCleaner\AdwCleaner*.txt
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Removed unnecessary internet browser add-ins (e.g. Toolbars) [AdwCleaner]
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
LastDownload=10/27/2017
AutoFlag=0

View file

@ -1,34 +0,0 @@
[Config]
DisableCloudShare=0
AppWebsite=http://www.auslogics.com/en/software/disk-defrag/command-line/
App=ausdiskdefragportable.exe
AppURL=http://www.auslogics.com/en/downloads/disk-defrag/ausdiskdefragportable.exe
AppDLName=ausdiskdefragportable.exe
AlwaysAttemptDownload=1
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=0
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
LogVerbiage=Defragmented file system (Auslogics)
Author=FoolishTech
LastEditDate=2/7/2014 9:45:41 AM
NonDirectURLs=0
AppDesc=Disk Defragmenter
AppDLPage=http://www.auslogics.com/en/software/disk-defrag/
AutoFlag=0

View file

@ -1,36 +0,0 @@
[Config]
App=autoruns\autoruns.exe
AppURL=http://download.sysinternals.com/files/Autoruns.zip
AppDLName=autoruns.zip
AppWait=1
AppMsgBox=0
AppRandomize=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
AppParms=-accepteula
DisableCloudShare=0
UseFTPServer=0
AlwaysAttemptDownload=1
DLafterXdays=7
PriorAlert=1
ServiceWait=0
SaveConfigAfter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=http://technet.microsoft.com/en-us/sysinternals/bb963902
LogVerbiage=Examined Windows startup items and removed unnecessary entries.
LastDownload=10/27/2017
Author=FoolishTech
LastEditDate=2/7/2014 9:46:37 AM
NonDirectURLs=0
AppDLPage=http://technet.microsoft.com/en-us/sysinternals/bb963902
AppDesc=Manages Startup Items
AutoFlag=0

View file

@ -1,33 +0,0 @@
[Config]
App=aswMBR.exe
AppURL=http://public.avast.com/~gmerek/aswMBR.exe
AppWait=1
AppMsgBox=0
AppRandomize=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
AppDLName=aswMBR.exe
DisableCloudShare=0
UseFTPServer=0
AlwaysAttemptDownload=0
PriorAlert=1
ServiceWait=0
SaveConfigAfter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=http://public.avast.com/~gmerek/aswMBR.htm
LogVerbiage=Checked MBR for infections and scanned for additional malicious items (Avast!).
Author=FoolishTech
LastEditDate=2/7/2014 9:46:53 AM
AppDLPage=http://public.avast.com/~gmerek/aswMBR.htm
AppDesc=MBR Checker and Virus Scanner
NonDirectURLs=0
AutoFlag=0

View file

@ -1,34 +0,0 @@
[Config]
DisableCloudShare=0
App=batteryinfoview.exe
AppURL=http://www.nirsoft.net/panel/batteryinfoview.exe
AppDLName=batteryinfoview.exe
AlwaysAttemptDownload=0
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=www.nirsoft.net/utils/battery_information_view.html
UseFTPServer=0
PriorAlert=0
LogVerbiage=Checked battery life and wear level.
Author=FoolishTech
LastEditDate=2/7/2014 9:47:17 AM
AppDLPage=www.nirsoft.net/utils/battery_information_view.html
AppDesc=Detailed info on installed batteries
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,36 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/7/2014 9:49:58 AM
App=advisorinstaller.exe
AppParms=/silent
UseFTPServer=0
AppURL=http://www.belarc.com/Programs/advisorinstaller.exe
AppDLName=advisorinstaller.exe
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
WaitOnProcesses=Belarc~1.exe
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsLoc=%programfiles(x86)%\Belarc\BelarcAdvisor\System\tmp\(%computername%).html
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AppWebsite=http://www.belarc.com/free_download.html
AppDLPage=http://www.belarc.com/free_download.html
AppDesc=System Information Utility (Not 'Portable' - Installation Necessary)
AutoFlag=1
LastDownload=10/27/2017

View file

@ -1,38 +0,0 @@
[Config]
DisableCloudShare=0
App=BootkitRemoval_x86.exe
App64=BootkitRemoval_x64.exe
AppURL64=http://download.bitdefender.com/removal_tools/BootkitRemoval_x64.exe
AppDLName64=BootkitRemoval_x64.exe
UseFTPServer=0
AppURL=http://download.bitdefender.com/removal_tools/BootkitRemoval_x86.exe
AppDLName=BootkitRemoval_x86.exe
AlwaysAttemptDownload=1
DLafterXdays=5
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=http://labs.bitdefender.com/projects/rootkit-remover/rootkit-remover/
LogVerbiage=Performed additional rootkit scanning. (BRR)
Author=FoolishTech
LastEditDate=2/7/2014 9:50:38 AM
AppDLPage=http://labs.bitdefender.com/projects/rootkit-remover/rootkit-remover/
AppDesc=Bitdefender Rootkit Remover
NonDirectURLs=0
AutoFlag=0
LastDownload=8/13/2018

View file

@ -1,34 +0,0 @@
[Config]
DisableCloudShare=0
App=bluescreenview.exe
AppURL=http://www.nirsoft.net/panel/bluescreenview.exe
AppDLName=bluescreenview.exe
AlwaysAttemptDownload=0
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
UseFTPServer=0
PriorAlert=0
LogVerbiage=Checked for previous blue screens / crash dumps.
AppWebsite=www.nirsoft.net/utils/blue_screen_view.html
Author=FoolishTech
LastEditDate=2/7/2014 9:51:06 AM
AppDLPage=www.nirsoft.net/utils/blue_screen_view.html
AppDesc=Analyze blue screens / memory dumps created by Windows
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,39 +0,0 @@
[Config]
Author=FoolishIT
LastEditDate=12/8/2015 9:51:43 AM
PostRunApp=
AppWebsite=http://www.cpuid.com/softwares/cpu-z.html
AppDLPage=http://www.cpuid.com/softwares/cpu-z.html
App=cpu-z\cpuz_x32.exe
App64=cpu-z\cpuz_x64.exe
UseFTPServer=0
AppURL=http://download.cpuid.com/cpu-z/cpu-z_1.74-en.zip
AppDLName=cpu-z.zip
AlwaysAttemptDownload=1
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
AppDesc=Display hardware information (CPU, RAM, MB)
LogVerbiage=Reviewed hardware information of the system.
LastDownload=12/8/2015
CopyConfigFirst=cpuz.ini

View file

@ -1,33 +0,0 @@
[Config]
App=combofix.exe
AppParms=/uninstall
AppURL=http://download.bleepingcomputer.com/sUBs/ComboFix.exe
AppDLName=combofix.exe
AppWait=1
AppMsgBox=0
AppRandomize=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
32=1
64=1
XP=1
Vista=1
7=1
8=0
AlwaysAttemptDownload=0
SaveConfigAfter=0
DisableCloudShare=0
UseFTPServer=0
PriorAlert=1
ServiceWait=1
RunWithSystemAccess=0
IsDLInstaller=0
Servers=1
AppWebsite=http://www.bleepingcomputer.com/download/combofix/
Author=FoolishTech
LastEditDate=2/7/2014 9:51:39 AM
AppDLPage=http://www.bleepingcomputer.com/download/combofix/
AppDesc=Uninstalls Combofix, cleaning up any leftover files/settings.
NonDirectURLs=0
AutoFlag=0

View file

@ -1,34 +0,0 @@
[Config]
App=combofix.exe
AppURL=http://download.bleepingcomputer.com/sUBs/ComboFix.exe
AppDLName=combofix.exe
AppWait=1
AppMsgBox=0
AppRandomize=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
AlwaysAttemptDownload=1
SaveConfigAfter=0
32=1
64=1
XP=1
Vista=1
7=1
8=0
DisableCloudShare=0
UseFTPServer=0
DLafterXdays=.5
PriorAlert=1
ServiceWait=1
RunWithSystemAccess=0
IsDLInstaller=0
Servers=1
AppWebsite=http://www.bleepingcomputer.com/download/combofix/
LogVerbiage=Ran malware scans (Combofix)
Author=FoolishTech
LastEditDate=2/7/2014 9:52:03 AM
AppDLPage=http://www.bleepingcomputer.com/download/combofix/
AppDesc=Malware removal tool.
NonDirectURLs=0
AutoFlag=0

View file

@ -1,33 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=3/15/2014 3:49:54 PM
AppWebsite=www.crowdstrike.com
AppDLPage=www.crowdstrike.com/crowdinspect/
AppDesc=Analyze running processes against VirusTotal, Web of Trust, and the Malware Hash Project.
App=CrowdInspect\CrowdInspect.exe
UseFTPServer=0
AppURL=http://download.crowdstrike.com/crowdinspect/CrowdInspect.zip
AppDLName=CrowdInspect.zip
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,37 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=4/1/2016 12:41:03 PM
PostRunApp=
AppWebsite=http://crystalmark.info/software/CrystalDiskInfo/index-e.html
AppDLPage=http://crystalmark.info/software/CrystalDiskInfo/index-e.html
AppDesc=Hard drive diagnostics / information.
App=CrystalDiskInfo\DiskInfo.exe
App64=CrystalDiskInfo\DiskInfoX64.exe
UseFTPServer=0
AppURL=https://osdn.jp/frs/redir.php?m=tcpdiag&f=%2Fcrystaldiskinfo%2F65634%2FCrystalDiskInfo6_8_2.zip
AppDLName=CrystalDiskInfo.zip
AlwaysAttemptDownload=0
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Examined Hard Drive health (CrystalDiskInfo)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,39 +0,0 @@
[Config]
Author=dSupportOnline
LastEditDate=11/6/2014 10:33:04 PM
PostRunApp=
AppWebsite=http://www.nirsoft.net/utils/cports.html
AppDLPage=http://www.nirsoft.net/utils/cports.html
AppDesc=Displays current ports in use on system and by which process
App=cports\cports.exe
AppURLSpoof=http://www.nirsoft.net/utils/cports.html
UseFTPServer=0
AppURL=http://www.nirsoft.net/utils/cports.zip
AppDLName=cports.zip
AlwaysAttemptDownload=1
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
CopyConfigFirst=cports.cfg
SaveConfigAfter=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Reviewed current ports in use by various applications on the system
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,36 +0,0 @@
[Config]
DisableCloudShare=0
App=esetsmartinstaller_enu.exe
AppURL=http://download.eset.com/special/eos/esetsmartinstaller_enu.exe
AppDLName=esetsmartinstaller_enu.exe
AlwaysAttemptDownload=1
AppWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
ServiceWait=0
IsDLInstaller=0
Servers=1
AppWebsite=http://www.eset.com/int/online-scanner-popup/
LogVerbiage=Ran Virus/Malware scans (ESET)
LastDownload=9/28/2013
WaitOnProcesses=onlinescannerapp.exe
NonDirectURLs=0
Author=FoolishTech
LastEditDate=2/7/2014 9:53:54 AM
AppDLPage=http://www.eset.com/int/online-scanner-popup/
AppDesc=Online Virus Scanner
AutoFlag=0

View file

@ -1,42 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/3/2017 5:45:31 PM
PostRunApp=
AppWebsite=http://www.emsisoft.com/en/software/cmd/
AppDLPage=http://www.emsisoft.com/en/software/cmd/
AppDesc=Virus Scanner (configured for scanning from the Offline Operations tab)
AppParms=/f=%tdrive% /deep /rk /pup /a /n /ac /dq /la="%malreportdir%\a2cmd_deep_log_offline_%date%.txt"
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
UseFTPServer=0
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
AlwaysAttemptDownload=1
DLafterXdays=1
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran deep virus scans (Emsisoft)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
App=Emsisoft_a2cmd\a2cmd.cmd
CopyConfigFirst=a2cmd.cmd
WaitOnProcesses=a2cmd.exe
LastDownload=10/27/2017

View file

@ -1,42 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/3/2017 5:45:31 PM
PostRunApp=
AppWebsite=http://www.emsisoft.com/en/software/cmd/
AppDLPage=http://www.emsisoft.com/en/software/cmd/
AppDesc=Virus Scanner - Scans all files on all hard disks thoroughly. (does not need prior update)
AppParms=/f=%tdrive% /deep /rk /m /t /c /pup /a /n /ac /d /wl="%systemdrive%\EmsisoftCmd\a2cmd_Whitelist.txt" /la="%malreportdir%\a2cmd_deep_log_%date%.txt"
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
UseFTPServer=0
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
AlwaysAttemptDownload=1
DLafterXdays=1
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran deep virus scans (Emsisoft)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
App=Emsisoft_a2cmd\a2cmd.cmd
CopyConfigFirst=a2cmd.cmd
WaitOnProcesses=a2cmd.exe
LastDownload=10/7/2018

View file

@ -1,41 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/3/2017 5:45:31 PM
PostRunApp=
AppWebsite=http://www.emsisoft.com/en/software/cmd/
AppDLPage=http://www.emsisoft.com/en/software/cmd/
AppDesc=Virus Scanner - Scans all active programs, malware traces (registry, files) and Tracking Cookies. Skips ADS, archive files, and some cookies. (does not need prior update)
AppParms=/f=%tdrive% /quick /rk /m /t /pup /ac /d /wl="%systemdrive%\EmsisoftCmd\a2cmd_Whitelist.txt" /la="%malreportdir%\a2cmd_quick_log_%date%.txt"
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
UseFTPServer=0
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
AlwaysAttemptDownload=1
DLafterXdays=1
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran virus scans (Emsisoft)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
App=Emsisoft_a2cmd\a2cmd.cmd
CopyConfigFirst=a2cmd.cmd
WaitOnProcesses=a2cmd.exe

View file

@ -1,41 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/3/2017 5:45:31 PM
PostRunApp=
AppWebsite=http://www.emsisoft.com/en/software/cmd/
AppDLPage=http://www.emsisoft.com/en/software/cmd/
AppDesc=Virus Scanner - Scans the Windows and program files folders in addition to everything scanned by the quick scan. Skips ADS, archive files, and some cookies. (does not need prior update)
AppParms=/f=%tdrive% /smart /rk /m /t /pup /ac /d /wl="%systemdrive%\EmsisoftCmd\a2cmd_Whitelist.txt" /la="%malreportdir%\a2cmd_smart_log_%date%.txt"
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
UseFTPServer=0
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
AlwaysAttemptDownload=1
DLafterXdays=1
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran virus scans (Emsisoft)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
App=Emsisoft_a2cmd\a2cmd.cmd
CopyConfigFirst=a2cmd.cmd
WaitOnProcesses=a2cmd.exe

View file

@ -1,39 +0,0 @@
[Config]
Author=dSupportOnline
LastEditDate=10/9/2014 1:20:00 PM
PostRunApp=
AppWebsite=http://www.voidtools.com/support/everything/
AppDLPage=http://www.voidtools.com/downloads/
App=everything32\Everything.exe
App64=everything64\Everything.exe
AppURL64=http://www.voidtools.com/Everything-1.3.4.686.x64.zip
AppDLName64=everything64.zip
UseFTPServer=0
AppURL=http://www.voidtools.com/Everything-1.3.4.686.x86.zip
AppDLName=everything32.zip
AlwaysAttemptDownload=0
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
CopyConfigFirst=Everything.ini
SaveConfigAfter=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
AppDesc=Quickly searches files and folders
LogVerbiage=Searched system for files and folders to further inspect or remove.

View file

@ -1,37 +0,0 @@
[Config]
LastEditDate=3/29/2016 4:09:19 PM
PostRunApp=
UseFTPServer=0
AppURL=http://www.nirsoft.net/utils/executedprogramslist.zip
AppDLName=ExecutedProgramsList.zip
AlwaysAttemptDownload=1
DLafterXdays=30
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
Author=Foolish IT
AppWebsite=http://www.nirsoft.net/utils/executed_programs_list.html
AppDLPage=http://www.nirsoft.net/utils/executed_programs_list.html
AutoFlag=0
App=ExecutedProgramsList\ExecutedProgramsList.exe
AppDesc=List out recently executed programs.
LogVerbiage=Checked recently executed programs.
LastDownload=3/29/2016

View file

@ -1,34 +0,0 @@
[Config]
App=gmer\gmer.exe
AppURL=http://www2.gmer.net/gmer.zip
AppDLName=gmer.zip
AppWait=1
AppMsgBox=0
AppRandomize=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
DisableCloudShare=0
UseFTPServer=0
AlwaysAttemptDownload=1
DLafterXdays=7
PriorAlert=1
ServiceWait=0
SaveConfigAfter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=http://www.gmer.net/
LogVerbiage=Manually scanned for rootkit activity.
Author=FoolishTech
LastEditDate=2/7/2014 9:54:39 AM
AppDLPage=http://www.gmer.net/
AppDesc=Rootkit / Malware Scanner
NonDirectURLs=0
AutoFlag=0

View file

@ -1,37 +0,0 @@
[Config]
Author=Proctor Foolish IT
LastEditDate=3/2/2016 5:09:19 PM
PostRunApp=
AppWebsite=https://www.techpowerup.com/gpuz/
AppDesc=Reported on Graphis Adapter Information
LogVerbiage=Reviewed hardware information of the system.
UseFTPServer=0
AppURL=https://www.techpowerup.com/downloads/2627/techpowerup-gpu-z-v0-8-7/start?server=6
AppDLName=GPU-Z.exe
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=0
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
AppParms=-dump gpu-z.xml
SnatchReportsLoc=gpu-z.xml
App=GPU-Z.exe

View file

@ -1,35 +0,0 @@
[Config]
Author=Proctor Foolish IT
LastEditDate=3/2/2016 4:24:41 PM
PostRunApp=GPU-Z Report
AppWebsite=https://www.techpowerup.com/gpuz/
App64=GPU-Z.exe
UseFTPServer=0
AppURL=https://www.techpowerup.com/downloads/2627/techpowerup-gpu-z-v0-8-7/start?server=6
AppDLName=GPU-Z.exe
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
AppDesc=Review Graphis Adapter Information
LogVerbiage=Reviewed hardware information of the system.

View file

@ -1,36 +0,0 @@
[Config]
LastEditDate=10/13/2014 6:35:14 AM
PostRunApp=
AppWebsite=https://support.google.com/chrome/answer/6086368?p=ui_software_removal_tool&rd=1
AppDLPage=https://www.google.com/chrome/srt/
App=software_removal_tool.exe
UseFTPServer=0
AppURL=https://dl.google.com/dl/softwareremovaltool/win/software_removal_tool.exe
AppDLName=software_removal_tool.exe
AlwaysAttemptDownload=1
DLafterXdays=0
AppWait=1
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
Author=FoolishTech
AppDesc=Remove add-ons, extensions, toolbars, and other software that may interfere with the operation of Google Chrome.
LogVerbiage=Scanned for and removed any toolbars/extensions/add-ons that may interfere with the operation of Google Chrome.

View file

@ -1,39 +0,0 @@
[Config]
Author=Foolish IT
LastEditDate=3/30/2016 11:11:09 AM
PostRunApp=
AppWebsite=https://www.jam-software.de/heavyload/
AppDLPage=https://www.jam-software.de/heavyload/
App=HeavyLoadx86\HeavyLoad.exe
UseFTPServer=0
AppURL=http://www.jam-software.com/heavyload/HeavyLoad-x86.zip
AppDLName=HeavyLoadx86.zip
AlwaysAttemptDownload=1
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
AppURL64=http://www.jam-software.com/heavyload/HeavyLoad-x64.zip
AppDLName64=HeavyLoadx64.zip
App64=HeavyLoadx64\HeavyLoad.exe
AppDesc=Stress Testing Application
LogVerbiage=Stress Tested System

View file

@ -1,44 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=10/10/2014 4:14:36 AM
PostRunApp=
AppWebsite=http://www.surfright.nl/en/hitmanpro/
AppDLPage=http://www.surfright.nl/en/downloads/
AppDesc=Malware scanner (Manual removal)
App=HitmanPro.exe
App64=HitmanPro_x64.exe
AppParms=/noinstall /excludelist="%3rdpath%\HMP_Excludes.txt" /log="%malreportdir%\HitmanPro_Scan_Log_%date%.txt"
AppURL64=http://dl.surfright.nl/HitmanPro_x64.exe
AppURL64B=http://dl.surfright.nl/FoolishIT/HitmanPro_x64.exe
AppDLName64=HitmanPro_x64.exe
UseFTPServer=0
AppURL=http://dl.surfright.nl/HitmanPro.exe
AppURLB=http://dl.surfright.nl/FoolishIT/HitmanPro.exe
AppDLName=HitmanPro.exe
AlwaysAttemptDownload=1
DLafterXdays=4
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=1
AppWaitTime=60
AppRandomize=1
CopyConfigFirst=HMP.cmd
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran Malware Scans and manually investigated results (HitmanPro)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0

View file

@ -1,45 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=7/13/2015 10:52:20 AM
PostRunApp=
AppWebsite=http://www.surfright.nl/en/hitmanpro/
AppDLPage=http://www.surfright.nl/en/downloads/
AppDesc=Malware scanner
App=HitmanPro.exe
App64=HitmanPro_x64.exe
AppParms=/clean /noinstall /excludelist="%3rdpath%\HMP_Excludes.txt" /log="%malreportdir%\HitmanPro_Scan_Log_%date%.txt"
AppURL64=http://dl.surfright.nl/HitmanPro_x64.exe
AppURL64B=http://dl.surfright.nl/FoolishIT/HitmanPro_x64.exe
AppDLName64=HitmanPro_x64.exe
UseFTPServer=0
AppURL=http://dl.surfright.nl/HitmanPro.exe
AppURLB=http://dl.surfright.nl/FoolishIT/HitmanPro.exe
AppDLName=HitmanPro.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=1
AppWaitTime=60
AppRandomize=1
CopyConfigFirst=HMP.cmd
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran Malware Scans (HitmanPro)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
LastDownload=10/7/2018

View file

@ -1,42 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=7/13/2015 9:38:52 AM
PostRunApp=
AppWebsite=http://thisisudax.org/
AppDLPage=http://thisisudax.org/
AppDesc=Junkware Removal Tool - toolbar remover.
App=JRT.exe
AppParms=-y -om1 -nr
UseFTPServer=0
AppURL=http://thisisudax.org/downloads/JRT.exe
AppDLName=JRT.exe
AlwaysAttemptDownload=1
DLafterXdays=1
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
CopyConfigFirst=JRT_Auto.cmd
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%userprofile%\Desktop\JRT.txt
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Removed unnecessary internet browser add-ins (e.g. Toolbars) [JRT]
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
WaitOnProcesses=wget.dat,jq.dat,nircmd.dat,sed.dat,grep.dat,cut.dat,reg.exe
LastDownload=8/19/2018
AppWaitTime=30

View file

@ -1,35 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=5/27/2014 1:45:37 PM
AppWebsite=http://support.kaspersky.com/5350
AppDLPage=http://support.kaspersky.com/viruses/disinfection/5350
AppDesc=TDSS / Rootkit scanner
App=TDSSKiller.exe
AppParms=-accepteula -accepteulaksn -l "%malreportdir%\TDSSKiller_Report_%date%.txt" -tdlfs -dcexact -silent
UseFTPServer=0
AppURL=http://media.kaspersky.com/utilities/VirusUtilities/EN/tdsskiller.exe
AppDLName=tdsskiller.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Scanned for MBR infections / rootkits (TDSSKiller)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=2
LastDownload=10/7/2018

View file

@ -1,35 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=5/27/2014 1:45:26 PM
AppWebsite=http://support.kaspersky.com/5350
AppDLPage=http://support.kaspersky.com/viruses/disinfection/5350
AppDesc=TDSS / Rootkit scanner
App=TDSSKiller.exe
AppParms=-accepteula -accepteulaksn -l "%malreportdir%\TDSSKiller_Report_%date%.txt" -tdlfs -dcexact
UseFTPServer=0
AppURL=http://media.kaspersky.com/utilities/VirusUtilities/EN/tdsskiller.exe
AppDLName=tdsskiller.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Scanned for MBR infections / rootkits (TDSSKiller)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,36 +0,0 @@
[Config]
Author=Foolish IT
LastEditDate=1/28/2016 3:33:42 PM
PostRunApp=
AppWebsite=https://www.foolishit.com/d7x/killemall/
AppDLPage=https://www.foolishit.com/d7x/killemall/
UseFTPServer=0
AppURL=http://download.foolishit.com/killemall/KillEmAll_Portable.zip
AppDLName=KillEmAll_Portable.zip
AlwaysAttemptDownload=1
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
App=KillEmAll_Portable\KillEmAll.exe
AutoFlag=0
AppDesc=Kills non-essential processes
LastDownload=5/17/2016

View file

@ -1,36 +0,0 @@
[Config]
DisableCloudShare=0
App=MBRCheck.exe
AppURL=http://ad13.geekstogo.com/MBRCheck.exe
AppDLName=MBRCheck.exe
AlwaysAttemptDownload=1
AppWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%userprofile%\Desktop\MBRCheck*.txt
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
ServiceWait=0
IsDLInstaller=0
AppWebsite=http://www.majorgeeks.com/files/details/mbrcheck.html
LogVerbiage=Checked MBR for infections.
Author=FoolishTech
LastEditDate=2/7/2014 9:59:38 AM
AppDLPage=http://www.majorgeeks.com/files/details/mbrcheck.html
AppDesc=MBR scanner, this profile is intended to be used from the Offline Operations page.
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,38 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=9/28/2014 4:13:43 PM
PostRunApp=Autoruns_Copy
AppWebsite=http://www.majorgeeks.com/files/details/mbrcheck.html
AppDLPage=http://www.majorgeeks.com/files/details/mbrcheck.html
AppDesc=MBR scanner - use as a second opinion, not reliable especially to repair any damage.
App=MBRCheck.exe
UseFTPServer=0
AppURL=http://ad13.geekstogo.com/MBRCheck.exe
AppDLName=MBRCheck.exe
AlwaysAttemptDownload=1
DLafterXdays=7
AppWait=1
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%userprofile%\Desktop\MBRCheck*.txt
SnatchReportsToMalwareLogs=1
RunInCMD=1
SendEnter=1
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Checked MBR for infections.
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=2
LastDownload=9/28/2014

View file

@ -1,36 +0,0 @@
[Config]
DisableCloudShare=0
App=MBRCheck.exe
AppURL=http://ad13.geekstogo.com/MBRCheck.exe
AppDLName=MBRCheck.exe
AlwaysAttemptDownload=1
AppWait=1
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%userprofile%\Desktop\MBRCheck*.txt
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
ServiceWait=0
IsDLInstaller=0
AppWebsite=http://www.majorgeeks.com/files/details/mbrcheck.html
LogVerbiage=Checked MBR for infections.
Author=FoolishTech
LastEditDate=2/7/2014 10:00:33 AM
AppDLPage=http://www.majorgeeks.com/files/details/mbrcheck.html
AppDesc=MBR scanner - use as a second opinion, not reliable especially to repair any damage.
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,35 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/8/2014 1:17:11 AM
AppWebsite=http://support.microsoft.com/kb/2812744
AppDLPage=http://www.microsoft.com/en-us/download/details.aspx?id=36852
AppDesc=Fixes a wide variety of issues with Microsoft Office - Installer version
App=%programfiles(x86)%\Microsoft OffCAT\OffCAT.exe
UseFTPServer=0
InstallerParms=/passive
InstallerName=OffCAT.msi
AppURL=http://go.microsoft.com/fwlink/?LinkID=286211
AppDLName=OffCAT.msi
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=1
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,32 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/8/2014 1:17:02 AM
AppWebsite=http://support.microsoft.com/kb/2812744
AppDLPage=http://www.microsoft.com/en-us/download/details.aspx?id=36852
AppDesc=Fixes a wide variety of issues with Microsoft Office - Portable Version
App=OffCAT\OffCAT.exe
UseFTPServer=0
AppURL=http://go.microsoft.com/fwlink/?LinkID=286208
AppDLName=OffCAT.zip
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0

View file

@ -1,37 +0,0 @@
[Config]
DisableCloudShare=0
App=mbar\mbar\mbar.exe
AppURL=http://downloads.malwarebytes.org/file/mbar
AppDLName=mbar.7z
AlwaysAttemptDownload=1
AppWait=1
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=1
RunWithSystemAccess=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
ServiceWait=0
SnatchReportsLoc=%3rdpath%\system-log.txt
IsDLInstaller=0
Servers=1
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
LogVerbiage=Scanned for MBR infections / rootkits (MBAR)
AppWebsite=http://www.malwarebytes.org/products/mbar/
LastDownload=11/3/2013
NonDirectURLs=0
WaitOnProcesses=mbar.exe
Author=FoolishTech
LastEditDate=2/7/2014 9:59:08 AM
AppDLPage=http://www.malwarebytes.org/products/mbar/
AppDesc=Rootkit scanner
AutoFlag=0

View file

@ -1,39 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=1/26/2015 3:38:04 PM
PostRunApp=
AppWebsite=http://www.malwarebytes.org/products/malwarebytes_free/
AppDLPage=http://www.malwarebytes.org/products/malwarebytes_free/
AppDesc=Malware scanner
App=%programfiles(x86)%\Malwarebytes Anti-Malware\mbam.exe
UseFTPServer=0
InstallerParms=/silent /suppressmsgboxes /norestart /nocancel /lang=1033
InstallerName=mbam2-setup.exe
AppURL=http://downloads.malwarebytes.org/file/mbam/
AppDLName=mbam2-setup.exe
AlwaysAttemptDownload=1
DLafterXdays=0
AppWait=1
EmailBeforeExecution=0
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=1
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsLoc=%programdata%\Malwarebytes\Malwarebytes Anti-Malware\Logs\*.xml
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=1
LogVerbiage=Scanned for Malware (MBAM)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0

View file

@ -1,38 +0,0 @@
[Config]
DisableCloudShare=0
App=stinger32.exe
App64=stinger64.exe
AppParms=--go --repair --noprocess --noregistry --scanpath=%tdrive% --reportpath="%malreportdir%"
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
AppDLName64=stinger64.exe
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
AppDLName=stinger32.exe
AlwaysAttemptDownload=1
AppWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
ServiceWait=1
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
UseFTPServer=0
PriorAlert=1
IsDLInstaller=0
LogVerbiage=Ran virus scans (McAfee Stinger)
Author=FoolishTech
LastEditDate=2/7/2014 10:01:11 AM
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
AppDesc=Virus scanner - meant to be used from the Offline Operations tab.
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,37 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=5/27/2014 1:47:06 PM
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
AppDesc=Virus scanner
App=stinger32.exe
App64=stinger64.exe
AppParms=--silent --go --repair --adl --reportpath="%malreportdir%"
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
AppDLName64=stinger64.exe
UseFTPServer=0
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
AppDLName=stinger32.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
PriorAlert=0
ServiceWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran virus scans (McAfee Stinger)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=2

View file

@ -1,38 +0,0 @@
[Config]
DisableCloudShare=0
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
App=stinger32.exe
App64=stinger64.exe
AppParms=--silent --go --repair --noprocess --noregistry --scanpath=%tdrive% --reportpath="%malreportdir%"
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
AppDLName64=stinger64.exe
UseFTPServer=0
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
AppDLName=stinger32.exe
AlwaysAttemptDownload=1
AppWait=1
PriorAlert=0
ServiceWait=1
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran virus scans (McAfee Stinger)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
Author=FoolishTech
LastEditDate=2/7/2014 10:01:42 AM
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
AppDesc=Virus scanner - meant to be used from the Offline Operations tab.
NonDirectURLs=0
AutoFlag=2
LastDownload=10/27/2017

View file

@ -1,38 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=5/27/2014 1:46:41 PM
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
AppDesc=Virus scanner
App=stinger32.exe
App64=stinger64.exe
AppParms=--go --repair --adl --reportpath="%malreportdir%"
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
AppDLName64=stinger64.exe
UseFTPServer=0
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
AppDLName=stinger32.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Ran virus scans (McAfee Stinger)
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,35 +0,0 @@
[Config]
Author=Microsoft
LastEditDate=6/20/2016 2:00:27 PM
PostRunApp=
AppWebsite=https://support.microsoft.com/en-us/kb/2698555
AppDLPage=http://go.microsoft.com/fwlink/?LinkID=246062
App=NetFxRepairTool.exe
UseFTPServer=0
AppURL=https://download.microsoft.com/download/2/B/D/2BDE5459-2225-48B8-830C-AE19CAF038F1/NetFxRepairTool.exe
AlwaysAttemptDownload=0
DLafterXdays=30
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=1
LastDownload=6/20/2016
AppDLName=NetFxRepairTool.exe
AutoFlag=0

View file

@ -1,34 +0,0 @@
[Config]
LastEditDate=2/8/2014 12:42:30 AM
AppWebsite=www.microsoft.com
AppDLPage=http://go.microsoft.com/?linkid=9775982
AppDesc=Fix a wide variety of Windows issues all in one portable MS FixIT
App=MicrosoftFixit-portable.exe
UseFTPServer=0
AppURL=http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe
AppDLName=MicrosoftFixit-portable.exe
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Fixed misc. broken Windows functions with %app%
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=0
NonDirectURLs=0
Author=FoolishTech
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,34 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/8/2014 1:20:09 AM
AppWebsite=http://support.microsoft.com/kb/971058/en-US
AppDLPage=http://go.microsoft.com/?linkid=9665683
AppDesc=MS FixIt 50202 fixes issues with Windows Update - This will reboot!
App=MicrosoftFixIt50202.msi
AppParms=/passive
UseFTPServer=0
AppURL=http://go.microsoft.com/?linkid=9665683
AppDLName=MicrosoftFixIt50202.msi
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
LastDownload=10/27/2017
AutoFlag=1

View file

@ -1,34 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=2/8/2014 1:03:54 AM
AppWebsite=http://support.microsoft.com/kb/811259
AppDLPage=http://go.microsoft.com/?linkid=9662461
AppDesc=Microsoft FixIt 50203 fixes Winsock corruption issues - This will reboot!
App=MicrosoftFixit50203.msi
AppParms=/passive
UseFTPServer=0
AppURL=http://go.microsoft.com/?linkid=9662461
AppDLName=MicrosoftFixit50203.msi
AlwaysAttemptDownload=0
DLafterXdays=5
AppWait=1
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
LastDownload=10/27/2017

View file

@ -1,38 +0,0 @@
[Config]
Author=Microsoft
LastEditDate=7/11/2016 1:23:26 PM
PostRunApp=
AppWebsite=https://www.microsoft.com/security/scanner/en-us/default.aspx
AppDLPage=https://www.microsoft.com/security/scanner/en-us/default.aspx
App=msert.exe
App64=msert.exe
AppURL64=http://definitionupdates.microsoft.com/download/definitionupdates/safetyscanner/amd64/msert.exe
AppDLName64=msert.exe
UseFTPServer=0
AppURL=http://definitionupdates.microsoft.com/download/definitionupdates/safetyscanner/x86/msert.exe
AppDLName=msert.exe
AlwaysAttemptDownload=1
DLafterXdays=9
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=7/11/2016

View file

@ -1,35 +0,0 @@
[Config]
DisableCloudShare=0
AppWebsite=http://keir.net/neutron.html
App=neutron\Neutron.exe
UseFTPServer=0
AppURL=http://keir.net/download/neutron.zip
AppDLName=neutron.zip
AlwaysAttemptDownload=0
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
CopyConfigFirst=neutron.ini
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
PriorAlert=0
LogVerbiage=Synced Windows time with the atomic clock.
Author=FoolishTech
LastEditDate=2/7/2014 10:03:42 AM
AppDLPage=http://keir.net/neutron.html
AppDesc=Sync time with an internet time server
NonDirectURLs=0
AutoFlag=1
LastDownload=10/8/2018

View file

@ -1,34 +0,0 @@
[Config]
App=OTL.exe
AppURL=http://oldtimer.geekstogo.com/OTL.exe
AppDLName=OTL.exe
AppWait=1
AppMsgBox=0
AppRandomize=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
DisableCloudShare=0
UseFTPServer=0
AlwaysAttemptDownload=1
DLafterXdays=7
PriorAlert=1
ServiceWait=0
SaveConfigAfter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=http://www.geekstogo.com/forum/topic/277391-otl-tutorial-how-to-use-oldtimer-listit/
LogVerbiage=Performed manual inspection for viruses/malware.
Author=FoolishTech
LastEditDate=2/7/2014 10:05:19 AM
AppDLPage=http://www.geekstogo.com/forum/topic/277391-otl-tutorial-how-to-use-oldtimer-listit/
AppDesc=Malware scanner and startup manager.
NonDirectURLs=0
AutoFlag=0

View file

@ -1,34 +0,0 @@
[Config]
DisableCloudShare=0
App=openhardwaremonitor\OpenHardwareMonitor\OpenHardwareMonitor.exe
AppURL=http://openhardwaremonitor.org/files/openhardwaremonitor-v0.6.0-beta.zip
AppDLName=openhardwaremonitor.zip
AlwaysAttemptDownload=0
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=http://openhardwaremonitor.org/
UseFTPServer=0
PriorAlert=0
LogVerbiage=Checked hardware temperatures / fan speeds.
Author=FoolishTech
LastEditDate=2/7/2014 10:04:27 AM
AppDLPage=http://openhardwaremonitor.org/downloads/
AppDesc=Detailed hardware information
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,42 +0,0 @@
[Config]
Author=dSupportOnline
LastEditDate=10/29/2014 9:41:55 AM
PostRunApp=
AppWebsite=http://www.nirsoft.net/utils/opened_files_view.html
AppDLPage=http://www.nirsoft.net/utils/opened_files_view.html
AppDesc=Shows currently opened files in use by the system
App=ofview\OpenedFilesView.exe
App64=ofview-x64\OpenedFilesView.exe
AppURL64=http://www.nirsoft.net/utils/ofview-x64.zip
AppDLName64=ofview-x64.zip
AppURLSpoof=http://www.nirsoft.net/utils/opened_files_view.html
UseFTPServer=0
AppURL=http://www.nirsoft.net/utils/ofview.zip
AppDLName=ofview.zip
AlwaysAttemptDownload=1
DLafterXdays=5
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=1
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Detected currently open files and manipulated as necessary.
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017
CopyConfigFirst=OpenedFilesView.cfg

View file

@ -1,24 +0,0 @@
[General]
ToolTipTimeAutoPop=-1
ToolTipTimeInitial=10
ToolTipTimeReshow=10
TrayIcon=0
ShowGridLines=0
ShowOpenedFiles=1
ShowOpenedDirectories=0
ShowNetworkFiles=0
SortOnRefresh=0
HideWindowsFiles=0
HideSystemProcessFiles=0
HideSvchostFiles=0
AddExportHeaderLine=0
ShowInfoTip=1
AutoRefresh=0
SaveFilterIndex=0
ConvertToLongPath=0
MarkModifiedFilenames=1
MarkPositionChange=1
MarkOddEvenRows=0
WinPos=2C 00 00 00 00 00 00 00 01 00 00 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 00 00 00 00 00 00 00 00 80 02 00 00 E0 01 00 00
Columns=82 00 00 00 2C 01 01 00 3C 00 02 00 78 00 03 00 78 00 04 00 46 00 05 00 64 00 06 00 3C 00 07 00 3C 00 08 00 3C 00 09 00 3C 00 0A 00 3C 00 0B 00 3C 00 0C 00 50 00 0D 00 50 00 0E 00 50 00 0F 00 78 00 10 00 FA 00 11 00 50 00 12 00 50 00 13 00
Sort=0

View file

@ -1,37 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=5/27/2014 1:45:01 PM
AppWebsite=www.patchmypc.net
AppDLPage=www.patchmypc.net
AppDesc=Windows and misc application updater
App=PatchMyPC.exe
AppParms=/auto /update
UseFTPServer=0
AppURL=https://patchmypc.net/freeupdater/PatchMyPC.exe
AppDLName=PatchMyPC.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
CopyConfigFirst=PatchMyPC.reg
SaveConfigAfter=0
MoveSnatchReports=1
SnatchReportsLoc=%systemdrive%\%computername%.rtf
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Installed updates Windows and commonly used applications.
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=1
LastDownload=10/27/2017

View file

@ -1,37 +0,0 @@
[Config]
Author=FoolishTech
LastEditDate=5/27/2014 1:44:22 PM
AppWebsite=www.patchmypc.net
AppDLPage=www.patchmypc.net
AppDesc=Windows and misc application updater
App=PatchMyPC.exe
UseFTPServer=0
AppURL=http://www.patchmypc.net/PatchMyPC.exe
AppDLName=PatchMyPC.exe
AlwaysAttemptDownload=1
DLafterXdays=3
AppWait=1
PriorAlert=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
CopyConfigFirst=PatchMyPC.reg
ExportRegAfter=HKLM\Software\Patch My PC\Options
SaveConfigAfter=1
MoveSnatchReports=1
SnatchReportsLoc=%systemdrive%\%computername%.rtf
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
LogVerbiage=Installed updates Windows and commonly used applications.
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,36 +0,0 @@
[Config]
Author=Foolish Proctor
LastEditDate=4/13/2016 3:12:07 PM
PostRunApp=
AppWebsite=http://rmprepusb.blogspot.co.uk/2016/04/petya-whole-disk-encryption-fix.html
AppDLPage=http://rmprepusb.blogspot.co.uk/2016/04/petya-whole-disk-encryption-fix.html
App=PetyaExtractor\PetyaExtractor.exe
UseFTPServer=0
AppURL=http://download.bleepingcomputer.com/fabian-wosar/PetyaExtractor.zip
AppDLName=PetyaExtractor.zip
AlwaysAttemptDownload=1
DLafterXdays=7
AppWait=1
EmailBeforeExecution=0
PriorAlert=0
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
SendEnter=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
NonDirectURLs=0
AutoFlag=0
AppDesc=Decrypt Disk with Petya malware infection
LogVerbiage=Decrypt Disk infected with Petya malware

View file

@ -1,38 +0,0 @@
[Config]
App=ccleaner\CCleaner.exe
App64=ccleaner\CCleaner64.exe
AppParms=/auto
AppURL=http://www.piriform.com/ccleaner/download/portable/downloadfile
AppDLName=ccleaner.zip
AppWait=0
AppMsgBox=0
AppRandomize=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
AlwaysAttemptDownload=1
CopyConfigFirst=CCleaner.ini
SaveConfigAfter=0
DisableCloudShare=0
UseFTPServer=0
DLafterXdays=7
PriorAlert=0
ServiceWait=0
RunWithSystemAccess=0
IsDLInstaller=0
Servers=1
AppWebsite=www.piriform.com/ccleaner
LogVerbiage=Scanned registry for unnecessary data and removed.
Author=FoolishTech
LastEditDate=2/7/2014 10:06:48 AM
AppDLPage=http://www.piriform.com/ccleaner/builds
AppDesc=Temp file remover and registry cleaner
NonDirectURLs=0
AutoFlag=1
LastDownload=8/13/2018

View file

@ -1,37 +0,0 @@
[Config]
App=ccleaner\CCleaner.exe
App64=ccleaner\CCleaner64.exe
AppURL=http://www.piriform.com/ccleaner/download/portable/downloadfile
AppDLName=ccleaner.zip
AppWait=0
AppMsgBox=0
AppRandomize=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
AlwaysAttemptDownload=1
CopyConfigFirst=CCleaner.ini
SaveConfigAfter=1
DisableCloudShare=0
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
ServiceWait=0
RunWithSystemAccess=0
IsDLInstaller=0
Servers=1
AppWebsite=www.piriform.com/ccleaner
LogVerbiage=Scanned registry for unnecessary data and removed.
LastEditDate=2/7/2014 10:07:10 AM
AppDLPage=http://www.piriform.com/ccleaner/builds
NonDirectURLs=0
Author=FoolishTech
AppDesc=Temp file remover and registry cleaner
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,38 +0,0 @@
[Config]
App=defraggler\df.exe
App64=defraggler\df64.exe
AppParms=%systemdrive%
AppURL=http://www.piriform.com/defraggler/download/portable/downloadfile
AppDLName=defraggler.zip
AppWait=1
AppMsgBox=0
AppRandomize=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
AlwaysAttemptDownload=1
CopyConfigFirst=Defraggler.ini
SaveConfigAfter=0
DisableCloudShare=0
UseFTPServer=0
DLafterXdays=7
PriorAlert=0
ServiceWait=0
RunWithSystemAccess=0
IsDLInstaller=0
Servers=1
AppWebsite=www.piriform.com/defraggler
LogVerbiage=Defragmented file system (Defraggler)
Author=FoolishTech
LastEditDate=2/7/2014 10:07:50 AM
AppDLPage=http://www.piriform.com/defraggler/builds
AppDesc=Disk defragmenter
NonDirectURLs=0
AutoFlag=1
LastDownload=10/27/2017

View file

@ -1,37 +0,0 @@
[Config]
App=Defraggler\Defraggler.exe
App64=Defraggler\Defraggler64.exe
AppURL=http://www.piriform.com/defraggler/download/portable/downloadfile
AppDLName=defraggler.zip
AppWait=1
AppMsgBox=0
AppRandomize=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=1
RunInCMD=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
AlwaysAttemptDownload=1
CopyConfigFirst=Defraggler.ini
SaveConfigAfter=1
DisableCloudShare=0
UseFTPServer=0
DLafterXdays=7
PriorAlert=1
ServiceWait=0
RunWithSystemAccess=0
IsDLInstaller=0
Servers=1
AppWebsite=www.piriform.com/defraggler
LogVerbiage=Defragmented file system (Defraggler)
Author=FoolishTech
LastEditDate=2/7/2014 10:08:05 AM
AppDLPage=http://www.piriform.com/defraggler/builds
AppDesc=Disk defragmenter
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

View file

@ -1,33 +0,0 @@
[Config]
DisableCloudShare=0
App=recuva\recuva.exe
App64=recuva\recuva64.exe
AppURL=http://www.piriform.com/recuva/download/portable/downloadfile
AppDLName=recuva.zip
AlwaysAttemptDownload=0
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=www.piriform.com/recuva
UseFTPServer=0
PriorAlert=0
Author=FoolishTech
LastEditDate=2/7/2014 10:08:40 AM
AppDLPage=http://www.piriform.com/recuva/builds
AppDesc=File undelete utility
NonDirectURLs=0
AutoFlag=0

View file

@ -1,35 +0,0 @@
[Config]
DisableCloudShare=0
App=speccy\Speccy.exe
App64=speccy\Speccy64.exe
AppURL=http://www.piriform.com/speccy/download/portable/downloadfile
AppDLName=speccy.zip
AlwaysAttemptDownload=0
AppWait=1
ServiceWait=0
AppMsgBox=0
AppRandomize=0
SaveConfigAfter=0
MoveSnatchReports=0
SnatchReportsToMalwareLogs=0
RunInCMD=0
RunWithSystemAccess=0
IsDLInstaller=0
32=1
64=1
XP=1
Vista=1
7=1
8=1
Servers=1
AppWebsite=www.piriform.com/speccy
UseFTPServer=0
PriorAlert=0
LogVerbiage=Gathered information on system specs.
Author=FoolishTech
LastEditDate=2/7/2014 10:09:08 AM
AppDLPage=http://www.piriform.com/speccy/builds
AppDesc=System information utility.
NonDirectURLs=0
AutoFlag=0
LastDownload=10/27/2017

Some files were not shown because too many files have changed in this diff Show more