Remove old code
This commit is contained in:
parent
9cd39c5691
commit
551c28f242
193 changed files with 2 additions and 8493 deletions
|
|
@ -33,12 +33,7 @@ from wk.io import (
|
||||||
non_clobber_path,
|
non_clobber_path,
|
||||||
rename_item,
|
rename_item,
|
||||||
)
|
)
|
||||||
from wk.kit.tools import (
|
from wk.kit.tools import (download_tool, get_tool_path, run_tool)
|
||||||
download_tool,
|
|
||||||
extract_tool,
|
|
||||||
get_tool_path,
|
|
||||||
run_tool,
|
|
||||||
)
|
|
||||||
from wk.log import format_log_path, update_log_path
|
from wk.log import format_log_path, update_log_path
|
||||||
from wk.os.win import (
|
from wk.os.win import (
|
||||||
ARCH,
|
ARCH,
|
||||||
|
|
@ -973,7 +968,6 @@ def delete_registry_null_keys():
|
||||||
|
|
||||||
def fix_file_associations():
|
def fix_file_associations():
|
||||||
"""Fix file associations via registry edits."""
|
"""Fix file associations via registry edits."""
|
||||||
extract_tool('WinAIORepair')
|
|
||||||
winaio_path = get_tool_path('WinAIORepair', 'Repair_Windows').parent
|
winaio_path = get_tool_path('WinAIORepair', 'Repair_Windows').parent
|
||||||
winaio_path = winaio_path.joinpath(
|
winaio_path = winaio_path.joinpath(
|
||||||
f'Files/regfiles/file_associations/{OS_VERSION}',
|
f'Files/regfiles/file_associations/{OS_VERSION}',
|
||||||
|
|
|
||||||
|
|
@ -974,7 +974,7 @@ def open_hwinfo_sensors():
|
||||||
|
|
||||||
def open_snappy_driver_installer_origin():
|
def open_snappy_driver_installer_origin():
|
||||||
"""Open Snappy Driver Installer Origin."""
|
"""Open Snappy Driver Installer Origin."""
|
||||||
run_tool('_Drivers/SDIO', 'SDIO', cwd=True, pipe=True, popen=True)
|
run_tool('SDIO', 'SDIO', cwd=True, pipe=True, popen=True)
|
||||||
|
|
||||||
|
|
||||||
def open_windows_activation():
|
def open_windows_activation():
|
||||||
|
|
|
||||||
|
|
@ -1,11 +0,0 @@
|
||||||
@echo off
|
|
||||||
|
|
||||||
setlocal
|
|
||||||
|
|
||||||
rem Enable System Restore
|
|
||||||
PowerShell -Command Enable-ComputerRestore -Drive %SYSTEMDRIVE%\
|
|
||||||
|
|
||||||
rem Create Restore Point
|
|
||||||
PowerShell -Command Checkpoint-Computer -Description 1201-d7II
|
|
||||||
|
|
||||||
endlocal
|
|
||||||
|
|
@ -1,27 +0,0 @@
|
||||||
@echo off
|
|
||||||
|
|
||||||
setlocal
|
|
||||||
pushd "%~dp0"
|
|
||||||
|
|
||||||
rem Remove stale marker if present
|
|
||||||
if exist "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker" (
|
|
||||||
del /f "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker"
|
|
||||||
)
|
|
||||||
|
|
||||||
rem Set marker to prevent unintended MBAM removal
|
|
||||||
if exist "%PROGRAMFILES%\Malwarebytes\Anti-Malware\mbam.exe" (
|
|
||||||
echo Previous Malwarebytes installation detected.
|
|
||||||
echo. > "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker"
|
|
||||||
)
|
|
||||||
if exist "%PROGRAMFILES(X86)%\Malwarebytes Anti-Malware\mbam.exe" (
|
|
||||||
rem MBAM v2 installation
|
|
||||||
echo Previous Malwarebytes [v2] installation detected.
|
|
||||||
echo. > "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker"
|
|
||||||
)
|
|
||||||
|
|
||||||
rem Install/Upgrade MBAM
|
|
||||||
echo Installing Malwarebytes...
|
|
||||||
start "" /wait mbam-setup.exe /VERYSILENT /NORESTART
|
|
||||||
|
|
||||||
popd
|
|
||||||
endlocal
|
|
||||||
|
|
@ -1,71 +0,0 @@
|
||||||
@echo off
|
|
||||||
|
|
||||||
setlocal
|
|
||||||
pushd "%~dp0"
|
|
||||||
|
|
||||||
:GetDate
|
|
||||||
:: Credit to SS64.com Code taken from http://ss64.com/nt/syntax-getdate.html
|
|
||||||
:: Use WMIC to retrieve date and time in ISO 8601 format.
|
|
||||||
for /f "skip=1 tokens=1-6" %%G in ('WMIC Path Win32_LocalTime Get Day^,Hour^,Minute^,Month^,Second^,Year /Format:table') do (
|
|
||||||
if "%%~L"=="" goto s_done
|
|
||||||
set _yyyy=%%L
|
|
||||||
set _mm=00%%J
|
|
||||||
set _dd=00%%G
|
|
||||||
set _hour=00%%H
|
|
||||||
set _minute=00%%I
|
|
||||||
)
|
|
||||||
:s_done
|
|
||||||
:: Pad digits with leading zeros
|
|
||||||
set _mm=%_mm:~-2%
|
|
||||||
set _dd=%_dd:~-2%
|
|
||||||
set _hour=%_hour:~-2%
|
|
||||||
set _minute=%_minute:~-2%
|
|
||||||
set iso_date=%_yyyy%-%_mm%-%_dd%
|
|
||||||
|
|
||||||
rem Get uninstaller path from registry
|
|
||||||
set "uninstaller="
|
|
||||||
set "altuninstaller=%PROGRAMFILES%\Malwarebytes\Anti-Malware\mbuns.exe"
|
|
||||||
for /f usebackq^ tokens^=2^ delims^=^" %%s in (
|
|
||||||
`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{35065F43-4BB2-439A-BFF7-0F1014F2E0CD}_is1" /v UninstallString`
|
|
||||||
) do (
|
|
||||||
set "uninstaller=%%s"
|
|
||||||
)
|
|
||||||
|
|
||||||
rem Copy logs to 1201 folder
|
|
||||||
echo "Copying logs..."
|
|
||||||
robocopy /e "%PROGRAMDATA%\Malwarebytes\MBAMService\LOGS" "%SYSTEMDRIVE%\1201\Logs\%iso_date%\Tools\MBAM" >nul
|
|
||||||
robocopy /e "%PROGRAMDATA%\Malwarebytes\MBAMService\ScanResults" "%SYSTEMDRIVE%\1201\Logs\%iso_date%\Tools\MBAM" >nul
|
|
||||||
|
|
||||||
if exist "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker" (
|
|
||||||
rem Keep MBAM
|
|
||||||
echo Previous Malwarebytes installation detected.
|
|
||||||
) else (
|
|
||||||
rem Move Quarantine to 1201 folder
|
|
||||||
move "%PROGRAMDATA%\Malwarebytes\Malwarebytes Anti-Malware\Quarantine" "%SYSTEMDRIVE%\1201\Quarantine\MBAM_%iso_date%_%_hour%%_minute%"
|
|
||||||
|
|
||||||
rem Remove MBAM
|
|
||||||
echo No previous Malwarebytes installation detected.
|
|
||||||
if exist "%uninstaller%" (
|
|
||||||
echo "Uninstalling Malwarebytes..."
|
|
||||||
start "" /wait "%uninstaller%" /VERYSILENT /NORESTART /LOG
|
|
||||||
goto Done
|
|
||||||
)
|
|
||||||
if exist "%altuninstaller%" (
|
|
||||||
rem MBAM 4.x workaround
|
|
||||||
echo "Uninstalling Malwarebytes..."
|
|
||||||
start "" /wait "%altuninstaller%" /Uninstall /VERYSILENT /NORESTART /LOG
|
|
||||||
goto Done
|
|
||||||
)
|
|
||||||
color 4e
|
|
||||||
echo "Malwarebytes installation not found."
|
|
||||||
echo ""
|
|
||||||
echo "Press any key to exit... "
|
|
||||||
pause >nul
|
|
||||||
)
|
|
||||||
|
|
||||||
:Done
|
|
||||||
rem Remove marker
|
|
||||||
del /f "%SYSTEMDRIVE%\1201\Preserve-MBAM.marker" 2>nul
|
|
||||||
|
|
||||||
popd
|
|
||||||
endlocal
|
|
||||||
|
|
@ -1,30 +0,0 @@
|
||||||
:: Python compatibility check
|
|
||||||
@echo off
|
|
||||||
|
|
||||||
setlocal
|
|
||||||
pushd "%~dp0\..\.."
|
|
||||||
set "bin=%cd%"
|
|
||||||
set "python=%bin%\Python\x32\python.exe"
|
|
||||||
|
|
||||||
rem Verify Python can run
|
|
||||||
"%python%" --version >nul || goto ErrorPythonUnsupported
|
|
||||||
goto Done
|
|
||||||
|
|
||||||
:ErrorPythonUnsupported
|
|
||||||
rem The Windows installation lacks Windows update KB2999226 needed to run Python
|
|
||||||
echo.
|
|
||||||
echo ERROR: Failed to run Python, try installing Windows update KB2999226.
|
|
||||||
echo NOTE: That update is from October 2015 so this system is SEVERELY outdated
|
|
||||||
echo.
|
|
||||||
echo Please stop Auto Mode, exit this script, install the update, and try again.
|
|
||||||
echo.
|
|
||||||
echo Press Enter to exit...
|
|
||||||
pause>nul
|
|
||||||
if exist "%bin%\..\Installers\Extras\Windows Updates" (
|
|
||||||
start "" "explorer.exe"
|
|
||||||
start "" "explorer.exe" "%bin%\..\Installers\Extras\Windows Updates"
|
|
||||||
)
|
|
||||||
|
|
||||||
:Done
|
|
||||||
popd
|
|
||||||
endlocal
|
|
||||||
|
|
@ -1,14 +0,0 @@
|
||||||
:: Launch WizardKit item
|
|
||||||
@echo off
|
|
||||||
|
|
||||||
setlocal
|
|
||||||
pushd "%~dp0\..\..\.."
|
|
||||||
|
|
||||||
rem Run WizardKit Launcher
|
|
||||||
call "%*"
|
|
||||||
|
|
||||||
rem Sleep for 5 sec so d7II can wait for launched proc
|
|
||||||
"%systemroot%\System32\ping.exe" -n 5 127.0.0.1>nul
|
|
||||||
|
|
||||||
popd
|
|
||||||
endlocal
|
|
||||||
Binary file not shown.
|
Before Width: | Height: | Size: 2 KiB |
|
|
@ -1,39 +0,0 @@
|
||||||
[ShortDesc]
|
|
||||||
Autoruns=Manages Startup Items
|
|
||||||
Autoruns_Copy=Manages Startup Items
|
|
||||||
Autoruns (Verify and Log)=Manages Startup Items
|
|
||||||
Google Chrome Software Removal Tool=Remove add-ons, extensions, toolbars, and other software that may interfere with the operation of Google Chrome.
|
|
||||||
VipreRescueScanner (Deep Scan)=Virus scanner (Designed for both the Malware Removal and the Offline Operations tab)
|
|
||||||
VipreRescueScanner (Quick Scan)=Virus scanner (Designed for both the Malware Removal and the Offline Operations tab)
|
|
||||||
=Create Restore Point
|
|
||||||
[ReportDesc]
|
|
||||||
Autoruns=Examined Windows startup items and removed unnecessary entries.
|
|
||||||
Autoruns_Copy=Examined Windows startup items and removed unnecessary entries.
|
|
||||||
Autoruns (Verify and Log)=Examined Windows startup items and removed unnecessary entries.
|
|
||||||
Google Chrome Software Removal Tool=Scanned for and removed any toolbars/extensions/add-ons that may interfere with the operation of Google Chrome.
|
|
||||||
VipreRescueScanner (Deep Scan)=Ran virus scans (Vipre)
|
|
||||||
VipreRescueScanner (Quick Scan)=Ran virus scans (Vipre)
|
|
||||||
28=Created a System Restore point.
|
|
||||||
32=Ran a Zero Access malware scan.
|
|
||||||
2=Uninstalled unnecessary applications
|
|
||||||
41=Re-wrote the default Safe Mode services to prevent potential issues with blue screens when entering Safe Mode.
|
|
||||||
33=Backed up all Registry Hives.
|
|
||||||
1=Uninstalled unnecessary applications
|
|
||||||
9=Repaired file associations for executable files.
|
|
||||||
10=Removed restrictive Windows policy settings.
|
|
||||||
11=Cleared proxy settings.
|
|
||||||
18=Scanned for known malware files and registry entries and removed anything found.
|
|
||||||
12=Deleted unnecessary temporary files from user profiles and temporary files used by Windows.
|
|
||||||
13=Deleted temporary internet cache from user profiles.
|
|
||||||
34=Scanned for viruses/malware with Microsoft Security Essentials / Windows Defender.
|
|
||||||
49=Scanned for Windows system component corruption to repair any issues found.
|
|
||||||
24=Repaired the built-in Windows firewall.
|
|
||||||
31=Set all network adapters to DHCP.
|
|
||||||
75=Apply static DNS settings to all NICs.
|
|
||||||
21=Ran repair and reset procedures on networking components.
|
|
||||||
25=Reset all settings to defaults for the built-in Windows firewall.
|
|
||||||
36=Manually examined the HOSTS file for hijacks or other issues.
|
|
||||||
22=Repaired the Windows Update services responsible for Windows Update functionality.
|
|
||||||
38=Performed repair routines to ensure the Winsock is operating properly.
|
|
||||||
83=Examined internet speed/bandwidth.
|
|
||||||
=Create Restore Point
|
|
||||||
|
|
@ -1,42 +0,0 @@
|
||||||
[Autoruns]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
[Autoruns_Copy]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
[Autoruns (Verify and Log)]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
[Google Chrome Software Removal Tool]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=0
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
[VipreRescueScanner (Deep Scan)]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
[VipreRescueScanner (Quick Scan)]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
[]
|
|
||||||
PostRunApp=
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=10/8/2018 10:56:15 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.malwarebytes.com/adwcleaner/
|
|
||||||
AppDLPage=https://downloads.malwarebytes.com/file/adwcleaner
|
|
||||||
AppDesc=Toolbar Remover
|
|
||||||
App=AdwCleaner.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://downloads.malwarebytes.com/file/adwcleaner
|
|
||||||
AppDLName=AdwCleaner.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=.5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%systemdrive%\AdwCleaner\AdwCleaner*.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Removed unnecessary internet browser add-ins (e.g. Toolbars) [AdwCleaner]
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=8/14/2018
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=5/6/2019 6:09:55 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\Disable Windows Updates.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AutoFlag=0
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
|
|
||||||
AppDesc=Disable Windows Updates
|
|
||||||
LogVerbiage=Disable Windows Update services and delete update folders
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=8/30/2018 10:49:46 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\Enable Windows Updates.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AutoFlag=0
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
|
|
||||||
AppDesc=Enable Windows Updates
|
|
||||||
LogVerbiage=Enable Windows Update services
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,45 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=2Shirt
|
|
||||||
LastEditDate=10/8/2018 10:56:18 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.surfright.nl/en/hitmanpro/
|
|
||||||
AppDLPage=http://www.surfright.nl/en/downloads/
|
|
||||||
AppDesc=Malware scanner
|
|
||||||
App=HitmanPro.exe
|
|
||||||
App64=HitmanPro_x64.exe
|
|
||||||
AppParms=/clean /noinstall /excludelist="%3rdpath%\HMP_Excludes.txt" /logtype=txt /log="%malreportdir%\HitmanPro_Scan_Log_%date%.txt"
|
|
||||||
AppURL64=https://dl.surfright.nl/HitmanPro_x64.exe
|
|
||||||
AppURL64B=http://dl.surfright.nl/FoolishIT/HitmanPro_x64.exe
|
|
||||||
AppDLName64=HitmanPro_x64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://dl.surfright.nl/HitmanPro.exe
|
|
||||||
AppURLB=http://dl.surfright.nl/FoolishIT/HitmanPro.exe
|
|
||||||
AppDLName=HitmanPro.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=.5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppWaitTime=60
|
|
||||||
AppRandomize=1
|
|
||||||
CopyConfigFirst=HMP.cmd
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran Malware Scans (HitmanPro)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=8/19/2018
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=8/25/2018 3:50:11 PM
|
|
||||||
PostRunApp=
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LogVerbiage=Uninstalled unnecessary / junk programs.
|
|
||||||
AppDesc=Application uninstaller and cleanup utility
|
|
||||||
AppParms=Uninstallers\IObit Uninstaller.cmd
|
|
||||||
WaitOnProcesses=IObitUninstallerPortable.exe
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=8/30/2018 10:49:46 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\Install SW Bundle.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AutoFlag=0
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe;Ninite.exe
|
|
||||||
AppDesc=Install software bundle
|
|
||||||
LogVerbiage=Installed or updated commonly used applications (Adobe Reader, Google Chrome, etc)
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=10/8/2018 10:55:27 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.malwarebytes.com/
|
|
||||||
AppDLPage=https://downloads.malwarebytes.com/file/mb3/
|
|
||||||
AppDesc=Download MBAM setup
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://downloads.malwarebytes.com/file/mb3/
|
|
||||||
AppDLName=mbam-setup.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=1
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
App=exit
|
|
||||||
LastDownload=10/7/2018
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=10/7/2018 3:51:22 PM
|
|
||||||
PostRunApp=
|
|
||||||
App=MBAM_Install.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=0
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
AppDesc=Install/Upgrade MBAM
|
|
||||||
LogVerbiage=Malwarebytes installed successfully.
|
|
||||||
LastDownload=8/18/2018
|
|
||||||
Author=2Shirt
|
|
||||||
AppWaitTime=5
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=8/13/2018 4:48:53 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.malwarebytes.com/
|
|
||||||
AppDLPage=https://downloads.malwarebytes.com/file/mb3/
|
|
||||||
AppDesc=Malwarebytes Execution
|
|
||||||
App=%programfiles%\Malwarebytes\Anti-Malware\mbam.exe
|
|
||||||
App64=%programfiles%\Malwarebytes\Anti-Malware\mbam.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Malwarebytes ran successfully.
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,30 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=8/13/2018 7:32:30 PM
|
|
||||||
PostRunApp=
|
|
||||||
App=MBAM_Uninstall.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
AppDesc=Uninstall MBAM (if not previously installed)
|
|
||||||
|
|
@ -1,32 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=5/6/2019 6:48:27 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppDesc=Python Check
|
|
||||||
App=Python_Check.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=0
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppWaitTime=30
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Python compatibility check
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,40 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=2Shirt
|
|
||||||
LastEditDate=10/8/2018 10:56:23 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.bleepingcomputer.com/forums/t/308364/rkill-what-it-does-and-what-it-doesnt-a-brief-introduction-to-the-program/
|
|
||||||
AppDLPage=http://www.bleepingcomputer.com/download/rkill/
|
|
||||||
AppDesc=Anti-Malware app.
|
|
||||||
App=rkill.exe
|
|
||||||
AppParms=-s -w "%3rdpath%\rkill_Excludes.txt"
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://download.bleepingcomputer.com/grinler/rkill.exe
|
|
||||||
AppDLName=rkill.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=.5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
CopyConfigFirst=rkill.cmd
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%userprofile%\Desktop\rkill*.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran Malware Scan (RKill)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/7/2018
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=2Shirt
|
|
||||||
LastEditDate=8/25/2018 3:50:41 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppDesc=WizardKit browser reset script (d7II mode)
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\Browser Reset.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Reset web browsers to safe defaults and removed any malicous addons found.
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
AppWaitTime=10
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=2Shirt
|
|
||||||
LastEditDate=8/25/2018 3:50:50 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppDesc=WizardKit system checklist script (d7II mode)
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\System Checklist.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LogVerbiage=Examined and verified system-wide settings (available updates, drivers, activation, etc)
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=2Shirt
|
|
||||||
LastEditDate=8/25/2018 3:49:49 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppDesc=WizardKit system diagnostics script (d7II mode)
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\System Diagnostics.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LogVerbiage=Ran OS built-in repairs and backed up system information
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=2Shirt
|
|
||||||
LastEditDate=8/25/2018 3:50:59 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppDesc=WizardKit user checklist script (d7II mode)
|
|
||||||
App=WizardKit Launcher.cmd
|
|
||||||
AppParms=.bin\Scripts\launchers_for_d7\User Checklist.cmd
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
WaitOnProcesses=ConEmu.exe;ConEmuC.exe;ConEmu64.exe;ConEmuC64.exe;python.exe;firefox.exe;chrome.exe
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Verified web browser settings and functionality
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,485 +0,0 @@
|
||||||
[Everything]
|
|
||||||
app_data=0
|
|
||||||
run_as_admin=1
|
|
||||||
window_x=1614
|
|
||||||
window_y=186
|
|
||||||
window_wide=794
|
|
||||||
window_high=664
|
|
||||||
maximized=0
|
|
||||||
minimized=0
|
|
||||||
fullscreen=0
|
|
||||||
ontop=0
|
|
||||||
match_whole_word=0
|
|
||||||
match_path=0
|
|
||||||
match_case=0
|
|
||||||
match_diacritics=0
|
|
||||||
match_regex=0
|
|
||||||
selection_mask_right_bottom_inclusive=1
|
|
||||||
allow_multiple_windows=0
|
|
||||||
allow_multiple_instances=0
|
|
||||||
run_in_background=1
|
|
||||||
show_tray_icon=1
|
|
||||||
alternate_row_color=0
|
|
||||||
show_mouseover=0
|
|
||||||
check_for_updates_on_startup=0
|
|
||||||
beta_updates=0
|
|
||||||
show_highlighted_search_terms=1
|
|
||||||
text_size=0
|
|
||||||
hide_empty_search_results=0
|
|
||||||
clear_selection_on_search=1
|
|
||||||
new_window_key=0
|
|
||||||
show_window_key=0
|
|
||||||
toggle_window_key=0
|
|
||||||
language=0
|
|
||||||
show_selected_item_in_statusbar=0
|
|
||||||
open_folder_command2=
|
|
||||||
open_file_command2=
|
|
||||||
open_path_command2=
|
|
||||||
explore_command2=
|
|
||||||
explore_path_command2=
|
|
||||||
window_title_format=
|
|
||||||
taskbar_notification_title_format=
|
|
||||||
instance_name=
|
|
||||||
translucent_selection_rectangle_alpha=70
|
|
||||||
min_zoom=-6
|
|
||||||
max_zoom=27
|
|
||||||
context_menu_type=0
|
|
||||||
auto_include_fixed_volumes=1
|
|
||||||
auto_include_removable_volumes=0
|
|
||||||
last_export_type=0
|
|
||||||
max_threads=0
|
|
||||||
reuse_threads=1
|
|
||||||
single_parent_context_menu=0
|
|
||||||
auto_size_1=512
|
|
||||||
auto_size_2=640
|
|
||||||
auto_size_3=768
|
|
||||||
auto_size_aspect_ratio_x=9
|
|
||||||
auto_size_aspect_ratio_y=7
|
|
||||||
auto_size_path_x=1
|
|
||||||
auto_size_path_y=2
|
|
||||||
sticky_vscroll_bottom=1
|
|
||||||
last_options_page=9
|
|
||||||
draw_focus_rect=1
|
|
||||||
date_format=
|
|
||||||
time_format=
|
|
||||||
invert_layout=0
|
|
||||||
listview_item_high=0
|
|
||||||
debug=0
|
|
||||||
home_match_case=0
|
|
||||||
home_match_whole_word=0
|
|
||||||
home_match_path=0
|
|
||||||
home_match_diacritics=0
|
|
||||||
home_regex=0
|
|
||||||
home_search=1
|
|
||||||
home_filter=0
|
|
||||||
home_sort=0
|
|
||||||
home_index=1
|
|
||||||
allow_multiple_windows_from_tray=0
|
|
||||||
single_click_tray=0
|
|
||||||
close_on_execute=0
|
|
||||||
double_click_path=0
|
|
||||||
update_display_after_scroll=0
|
|
||||||
update_display_after_mask=1
|
|
||||||
auto_scroll_view=0
|
|
||||||
double_quote_copy_as_path=0
|
|
||||||
snap=0
|
|
||||||
snaplen=10
|
|
||||||
rename_select_filepart_only=0
|
|
||||||
rename_move_caret_to_selection_end=0
|
|
||||||
search_edit_move_caret_to_selection_end=0
|
|
||||||
select_search_on_mouse_click=1
|
|
||||||
focus_search_on_activate=0
|
|
||||||
reset_vscroll_on_search=1
|
|
||||||
wrap_focus=0
|
|
||||||
load_icon_priority=0
|
|
||||||
load_fileinfo_priority=0
|
|
||||||
header_high=0
|
|
||||||
hide_on_close=0
|
|
||||||
winmm=0
|
|
||||||
menu_escape_amp=1
|
|
||||||
fast_ascii_search=1
|
|
||||||
match_path_when_search_contains_path_separator=1
|
|
||||||
allow_literal_operators=0
|
|
||||||
allow_round_bracket_parenthesis=0
|
|
||||||
expand_environment_variables=0
|
|
||||||
search_as_you_type=1
|
|
||||||
convert_forward_slash_to_backslash=0
|
|
||||||
match_whole_filename_when_using_wildcards=1
|
|
||||||
double_buffer=1
|
|
||||||
search=
|
|
||||||
show_number_of_results_with_selection=0
|
|
||||||
date_descending_first=0
|
|
||||||
size_descending_first=0
|
|
||||||
size_format=2
|
|
||||||
alpha_select=0
|
|
||||||
tooltips=1
|
|
||||||
rtl_listview_edit=0
|
|
||||||
bookmark_remember_case=1
|
|
||||||
bookmark_remember_wholeword=1
|
|
||||||
bookmark_remember_path=1
|
|
||||||
bookmark_remember_diacritic=1
|
|
||||||
bookmark_remember_regex=1
|
|
||||||
bookmark_remember_sort=1
|
|
||||||
bookmark_remember_filter=1
|
|
||||||
bookmark_remember_index=1
|
|
||||||
exclude_list_enabled=1
|
|
||||||
exclude_hidden_files_and_folders=0
|
|
||||||
exclude_system_files_and_folders=0
|
|
||||||
include_only_files=
|
|
||||||
exclude_files=
|
|
||||||
db_location=
|
|
||||||
db_multi_user_filename=0
|
|
||||||
db_compress=0
|
|
||||||
extended_information_cache_monitor=1
|
|
||||||
keep_missing_indexes=0
|
|
||||||
editor_x=0
|
|
||||||
editor_y=0
|
|
||||||
editor_wide=0
|
|
||||||
editor_high=0
|
|
||||||
editor_maximized=0
|
|
||||||
file_list_relative_paths=1
|
|
||||||
max_recv_size=8388608
|
|
||||||
display_full_path_name=0
|
|
||||||
size_tiny=10240
|
|
||||||
size_small=102400
|
|
||||||
size_medium=1048576
|
|
||||||
size_large=16777216
|
|
||||||
size_huge=134217728
|
|
||||||
themed_toolbar=1
|
|
||||||
show_copy_path=2
|
|
||||||
show_copy_full_name=2
|
|
||||||
show_open_path=2
|
|
||||||
show_explore=2
|
|
||||||
show_explore_path=2
|
|
||||||
copy_path_folder_append_backslash=0
|
|
||||||
custom_verb01=
|
|
||||||
custom_verb02=
|
|
||||||
custom_verb03=
|
|
||||||
custom_verb04=
|
|
||||||
custom_verb05=
|
|
||||||
custom_verb06=
|
|
||||||
custom_verb07=
|
|
||||||
custom_verb08=
|
|
||||||
custom_verb09=
|
|
||||||
custom_verb10=
|
|
||||||
custom_verb11=
|
|
||||||
custom_verb12=
|
|
||||||
filters_visible=0
|
|
||||||
filters_wide=128
|
|
||||||
filters_right_align=1
|
|
||||||
filters_tab_stop=0
|
|
||||||
filter=
|
|
||||||
filter_everything_name=
|
|
||||||
sort=Name
|
|
||||||
sort_ascending=1
|
|
||||||
always_keep_sort=0
|
|
||||||
index=0
|
|
||||||
index_file_list=
|
|
||||||
index_etp_server=
|
|
||||||
index_link_type=1
|
|
||||||
status_bar_visible=1
|
|
||||||
select_search_on_focus_mode=1
|
|
||||||
select_search_on_set_mode=2
|
|
||||||
search_history_enabled=0
|
|
||||||
run_history_enabled=1
|
|
||||||
search_history_days_to_keep=90
|
|
||||||
run_history_days_to_keep=90
|
|
||||||
search_history_always_suggest=0
|
|
||||||
search_history_max_results=24
|
|
||||||
search_history_show_above=0
|
|
||||||
service_port=15485
|
|
||||||
etp_server_enabled=0
|
|
||||||
etp_server_bindings=
|
|
||||||
etp_server_port=21
|
|
||||||
etp_server_username=
|
|
||||||
etp_server_password=
|
|
||||||
etp_server_welcome_message=
|
|
||||||
etp_server_log_file_name=
|
|
||||||
etp_server_logging_enabled=1
|
|
||||||
etp_server_log_max_size=4194304
|
|
||||||
etp_server_log_delta_size=524288
|
|
||||||
etp_server_allow_file_download=1
|
|
||||||
http_server_enabled=0
|
|
||||||
http_server_bindings=
|
|
||||||
http_title_format=
|
|
||||||
http_server_port=80
|
|
||||||
http_server_username=
|
|
||||||
http_server_password=
|
|
||||||
http_server_home=
|
|
||||||
http_server_default_page=
|
|
||||||
http_server_log_file_name=
|
|
||||||
http_server_logging_enabled=1
|
|
||||||
http_server_log_max_size=4194304
|
|
||||||
http_server_log_delta_size=524288
|
|
||||||
http_server_allow_file_download=1
|
|
||||||
name_column_pos=0
|
|
||||||
name_column_width=256
|
|
||||||
path_column_visible=1
|
|
||||||
path_column_pos=1
|
|
||||||
path_column_width=256
|
|
||||||
size_column_visible=1
|
|
||||||
size_column_pos=2
|
|
||||||
size_column_width=96
|
|
||||||
extension_column_visible=0
|
|
||||||
extension_column_pos=3
|
|
||||||
extension_column_width=96
|
|
||||||
type_column_visible=0
|
|
||||||
type_column_pos=4
|
|
||||||
type_column_width=96
|
|
||||||
last_write_time_column_visible=1
|
|
||||||
last_write_time_column_pos=3
|
|
||||||
last_write_time_column_width=153
|
|
||||||
creation_time_column_visible=0
|
|
||||||
creation_time_column_pos=6
|
|
||||||
creation_time_column_width=140
|
|
||||||
date_accessed_column_visible=0
|
|
||||||
date_accessed_column_pos=7
|
|
||||||
date_accessed_column_width=140
|
|
||||||
attribute_column_visible=0
|
|
||||||
attribute_column_pos=8
|
|
||||||
attribute_column_width=70
|
|
||||||
date_recently_changed_column_visible=0
|
|
||||||
date_recently_changed_column_pos=9
|
|
||||||
date_recently_changed_column_width=96
|
|
||||||
run_count_column_visible=0
|
|
||||||
run_count_column_pos=10
|
|
||||||
run_count_column_width=96
|
|
||||||
date_run_column_visible=0
|
|
||||||
date_run_column_pos=11
|
|
||||||
date_run_column_width=140
|
|
||||||
file_list_filename_column_visible=0
|
|
||||||
file_list_filename_column_pos=12
|
|
||||||
file_list_filename_column_width=96
|
|
||||||
translucent_selection_rectangle_background_color=
|
|
||||||
translucent_selection_rectangle_border_color=
|
|
||||||
ntfs_volume_paths=
|
|
||||||
ntfs_volume_includes=
|
|
||||||
ntfs_volume_load_recent_changes=
|
|
||||||
ntfs_volume_include_onlys=
|
|
||||||
ntfs_volume_monitors=
|
|
||||||
filelists=
|
|
||||||
folders=
|
|
||||||
folder_monitor_changes=
|
|
||||||
folder_update_types=
|
|
||||||
folder_update_days=
|
|
||||||
folder_update_ats=
|
|
||||||
folder_update_intervals=
|
|
||||||
folder_update_interval_types=
|
|
||||||
exclude_folders=
|
|
||||||
connect_history_hosts=
|
|
||||||
connect_history_ports=
|
|
||||||
connect_history_usernames=
|
|
||||||
connect_history_link_types=
|
|
||||||
file_new_search_window_keys=334
|
|
||||||
file_open_file_list_keys=335
|
|
||||||
file_close_file_list_keys=
|
|
||||||
file_close_keys=343,27
|
|
||||||
file_export_keys=339
|
|
||||||
file_copy_full_name_to_clipboard_keys=9539
|
|
||||||
file_copy_path_to_clipboard_keys=
|
|
||||||
file_set_run_count_keys=
|
|
||||||
file_create_shortcut_keys=
|
|
||||||
file_delete_keys=8238
|
|
||||||
file_delete_permanently_keys=9262
|
|
||||||
file_edit_keys=
|
|
||||||
file_open_keys=8205
|
|
||||||
file_open_selection_and_close_everything_keys=
|
|
||||||
file_explore_path_keys=
|
|
||||||
file_open_new_keys=
|
|
||||||
file_open_path_keys=8461
|
|
||||||
file_open_with_keys=
|
|
||||||
file_open_with_default_verb_keys=
|
|
||||||
file_play_keys=
|
|
||||||
file_preview_keys=
|
|
||||||
file_print_keys=
|
|
||||||
file_print_to_keys=
|
|
||||||
file_properties_keys=8717
|
|
||||||
file_read_extended_information_keys=8517
|
|
||||||
file_rename_keys=8305
|
|
||||||
file_run_as_keys=
|
|
||||||
file_exit_keys=337
|
|
||||||
file_custom_verb_1_keys=
|
|
||||||
file_custom_verb_2_keys=
|
|
||||||
file_custom_verb_3_keys=
|
|
||||||
file_custom_verb_4_keys=
|
|
||||||
file_custom_verb_5_keys=
|
|
||||||
file_custom_verb_6_keys=
|
|
||||||
file_custom_verb_7_keys=
|
|
||||||
file_custom_verb_8_keys=
|
|
||||||
file_custom_verb_9_keys=
|
|
||||||
file_custom_verb_10_keys=
|
|
||||||
file_custom_verb_11_keys=
|
|
||||||
file_custom_verb_12_keys=
|
|
||||||
edit_cut_keys=8536
|
|
||||||
edit_copy_keys=8515,8493
|
|
||||||
edit_paste_keys=8534,9261
|
|
||||||
edit_select_all_keys=8513
|
|
||||||
edit_invert_selection_keys=
|
|
||||||
view_filters_keys=
|
|
||||||
view_status_bar_keys=
|
|
||||||
view_window_size_small_keys=561
|
|
||||||
view_window_size_medium_keys=562
|
|
||||||
view_window_size_large_keys=563
|
|
||||||
view_window_size_auto_fit_keys=564
|
|
||||||
view_zoom_zoom_in_keys=443,363
|
|
||||||
view_zoom_zoom_out_keys=445,365
|
|
||||||
view_zoom_reset_keys=304,352
|
|
||||||
view_go_to_back_keys=549,166
|
|
||||||
view_go_to_forward_keys=551,167
|
|
||||||
view_go_to_home_keys=548
|
|
||||||
view_sort_by_name_keys=305
|
|
||||||
view_sort_by_path_keys=306
|
|
||||||
view_sort_by_size_keys=307
|
|
||||||
view_sort_by_extension_keys=308
|
|
||||||
view_sort_by_type_keys=309
|
|
||||||
view_sort_by_date_modified_keys=310
|
|
||||||
view_sort_by_date_created_keys=311
|
|
||||||
view_sort_by_attributes_keys=312
|
|
||||||
view_sort_by_file_list_filename_keys=
|
|
||||||
view_sort_by_run_count_keys=
|
|
||||||
view_sort_by_date_run_keys=
|
|
||||||
view_sort_by_date_recently_changed_keys=313
|
|
||||||
view_sort_by_date_accessed_keys=
|
|
||||||
view_sort_by_ascending_keys=
|
|
||||||
view_sort_by_descending_keys=
|
|
||||||
view_refresh_keys=116
|
|
||||||
view_fullscreen_keys=122
|
|
||||||
view_toggle_ltrrtl_keys=
|
|
||||||
view_on_top_never_keys=
|
|
||||||
view_on_top_always_keys=340
|
|
||||||
view_on_top_while_searching_keys=
|
|
||||||
search_match_case_keys=329
|
|
||||||
search_match_whole_word_keys=322
|
|
||||||
search_match_path_keys=341
|
|
||||||
search_match_diacritics_keys=333
|
|
||||||
search_enable_regex_keys=338
|
|
||||||
search_add_to_filters_keys=
|
|
||||||
search_organize_filters_keys=1350
|
|
||||||
bookmarks_add_to_bookmarks_keys=324
|
|
||||||
bookmarks_organize_bookmarks_keys=1346
|
|
||||||
tools_options_keys=336
|
|
||||||
tools_console_keys=448
|
|
||||||
tools_file_list_editor_keys=
|
|
||||||
tools_connect_to_etp_server_keys=
|
|
||||||
tools_disconnect_from_etp_server_keys=
|
|
||||||
help_everything_help_keys=112
|
|
||||||
help_search_syntax_keys=
|
|
||||||
help_regex_syntax_keys=
|
|
||||||
help_command_line_options_keys=
|
|
||||||
help_everything_website_keys=
|
|
||||||
help_check_for_updates_keys=
|
|
||||||
help_about_everything_keys=368
|
|
||||||
search_edit_focus_search_edit_keys=326,114
|
|
||||||
search_edit_delete_previous_word_keys=4360
|
|
||||||
search_edit_auto_complete_search_keys=4384
|
|
||||||
search_edit_show_search_history_keys=
|
|
||||||
search_edit_show_all_search_history_keys=4646,4648
|
|
||||||
result_list_item_up_keys=8230,4134
|
|
||||||
result_list_item_down_keys=8232,4136
|
|
||||||
result_list_page_up_keys=8225,4129
|
|
||||||
result_list_page_down_keys=8226,4130
|
|
||||||
result_list_start_of_list_keys=8228
|
|
||||||
result_list_end_of_list_keys=8227
|
|
||||||
result_list_item_up_extend_keys=9254,5158
|
|
||||||
result_list_item_down_extend_keys=9256,5160
|
|
||||||
result_list_page_up_extend_keys=9249,5153
|
|
||||||
result_list_page_down_extend_keys=9250,5154
|
|
||||||
result_list_start_of_list_extend_keys=9252
|
|
||||||
result_list_end_of_list_extend_keys=9251
|
|
||||||
result_list_focus_up_keys=8486,4390
|
|
||||||
result_list_focus_down_keys=8488,4392
|
|
||||||
result_list_focus_page_up_keys=8481,4385
|
|
||||||
result_list_focus_page_down_keys=8482,4386
|
|
||||||
result_list_focus_start_of_list_keys=8484
|
|
||||||
result_list_focus_end_of_list_keys=8483
|
|
||||||
result_list_focus_up_extend_keys=9510,5414
|
|
||||||
result_list_focus_down_extend_keys=9512,5416
|
|
||||||
result_list_focus_page_up_extend_keys=9505,5409
|
|
||||||
result_list_focus_page_down_extend_keys=9506,5410
|
|
||||||
result_list_focus_start_of_list_extend_keys=9508
|
|
||||||
result_list_focus_end_of_list_extend_keys=9507
|
|
||||||
result_list_focus_result_list_keys=
|
|
||||||
result_list_toggle_path_column_keys=1330
|
|
||||||
result_list_toggle_size_column_keys=1331
|
|
||||||
result_list_toggle_extension_column_keys=1332
|
|
||||||
result_list_toggle_type_column_keys=1333
|
|
||||||
result_list_toggle_date_modified_column_keys=1334
|
|
||||||
result_list_toggle_date_created_column_keys=1335
|
|
||||||
result_list_toggle_attributes_column_keys=1336
|
|
||||||
result_list_toggle_file_list_filename_column_keys=
|
|
||||||
result_list_toggle_run_count_column_keys=
|
|
||||||
result_list_toggle_date_recently_changed_column_keys=1337
|
|
||||||
result_list_toggle_date_accessed_column_keys=
|
|
||||||
result_list_toggle_date_run_column_keys=
|
|
||||||
result_list_size_all_columns_to_fit_keys=8555
|
|
||||||
result_list_size_result_list_to_fit_keys=
|
|
||||||
result_list_context_menu_keys=9337
|
|
||||||
result_list_scroll_left_keys=8229
|
|
||||||
result_list_scroll_right_keys=8231
|
|
||||||
result_list_scroll_page_left_keys=8485
|
|
||||||
result_list_scroll_page_right_keys=8487
|
|
||||||
result_list_select_focus_keys=8224
|
|
||||||
result_list_toggle_focus_selection_keys=8480
|
|
||||||
result_list_copy_selection_to_clipboard_as_csv_keys=
|
|
||||||
result_list_font=
|
|
||||||
result_list_font_size=
|
|
||||||
search_edit_font=
|
|
||||||
search_edit_font_size=
|
|
||||||
status_bar_font=
|
|
||||||
status_bar_font_size=
|
|
||||||
header_font=
|
|
||||||
header_font_size=
|
|
||||||
normal_background_color=
|
|
||||||
normal_foreground_color=
|
|
||||||
normal_bold=
|
|
||||||
highlighted_background_color=
|
|
||||||
highlighted_foreground_color=
|
|
||||||
highlighted_bold=
|
|
||||||
selected_background_color=
|
|
||||||
selected_foreground_color=
|
|
||||||
selected_bold=
|
|
||||||
highlighted_selected_background_color=
|
|
||||||
highlighted_selected_foreground_color=
|
|
||||||
highlighted_selected_bold=
|
|
||||||
selected_inactive_background_color=
|
|
||||||
selected_inactive_foreground_color=
|
|
||||||
selected_inactive_bold=
|
|
||||||
highlighted_selected_inactive_background_color=
|
|
||||||
highlighted_selected_inactive_foreground_color=
|
|
||||||
highlighted_selected_inactive_bold=
|
|
||||||
drop_target_background_color=
|
|
||||||
drop_target_foreground_color=
|
|
||||||
drop_target_bold=
|
|
||||||
highlighted_drop_target_background_color=
|
|
||||||
highlighted_drop_target_foreground_color=
|
|
||||||
highlighted_drop_target_bold=
|
|
||||||
current_sort_background_color=
|
|
||||||
current_sort_foreground_color=
|
|
||||||
current_sort_bold=
|
|
||||||
highlighted_current_sort_background_color=
|
|
||||||
highlighted_current_sort_foreground_color=
|
|
||||||
highlighted_current_sort_bold=
|
|
||||||
mouseover_background_color=
|
|
||||||
mouseover_foreground_color=
|
|
||||||
mouseover_bold=
|
|
||||||
mouseover_highlighted_background_color=
|
|
||||||
mouseover_highlighted_foreground_color=
|
|
||||||
mouseover_highlighted_bold=
|
|
||||||
current_sort_mouseover_background_color=
|
|
||||||
current_sort_mouseover_foreground_color=
|
|
||||||
current_sort_mouseover_bold=
|
|
||||||
mouseover_current_sort_highlighted_background_color=
|
|
||||||
mouseover_current_sort_highlighted_foreground_color=
|
|
||||||
mouseover_current_sort_highlighted_bold=
|
|
||||||
alternate_row_background_color=
|
|
||||||
alternate_row_foreground_color=
|
|
||||||
alternate_row_bold=
|
|
||||||
alternate_row_highlighted_background_color=
|
|
||||||
alternate_row_highlighted_foreground_color=
|
|
||||||
alternate_row_highlighted_bold=
|
|
||||||
current_sort_alternate_row_background_color=
|
|
||||||
current_sort_alternate_row_foreground_color=
|
|
||||||
current_sort_alternate_row_bold=
|
|
||||||
current_sort_alternate_row_highlighted_background_color=
|
|
||||||
current_sort_alternate_row_highlighted_foreground_color=
|
|
||||||
current_sort_alternate_row_highlighted_bold=
|
|
||||||
|
|
@ -1,11 +0,0 @@
|
||||||
pushd "%~dp0"
|
|
||||||
cd..
|
|
||||||
set d7IIpath=%cd%
|
|
||||||
pushd "%~dp0"
|
|
||||||
echo %d7IIpath%\>HMP_Excludes.txt
|
|
||||||
echo %programfiles%\dSupportSuite\>>HMP_Excludes.txt
|
|
||||||
echo %programfiles(x86)%\dSupportSuite\>>HMP_Excludes.txt
|
|
||||||
echo %programfiles%\CryptoPrevent\>>HMP_Excludes.txt
|
|
||||||
echo %programfiles(x86)%\CryptoPrevent\>>HMP_Excludes.txt
|
|
||||||
echo %programfiles%\Foolish IT\CryptoPrevent\>>HMP_Excludes.txt
|
|
||||||
echo %programfiles(x86)%\Foolish IT\CryptoPrevent\>>HMP_Excludes.txt
|
|
||||||
|
|
@ -1,17 +0,0 @@
|
||||||
@echo off&pushd "%~dp0"
|
|
||||||
start /wait JRT.exe -y -nr
|
|
||||||
pushd "%temp%\jrt"
|
|
||||||
if not exist "get.bat" pushd %systemdrive%\JRT
|
|
||||||
if not exist "get.bat" goto :eof
|
|
||||||
findstr /v /i "pause" get.bat>tmp.txt
|
|
||||||
findstr /v /i /b "notepad" tmp.txt>get.bat
|
|
||||||
echo.>>"%temp%\jrt\wl_services.cfg"
|
|
||||||
echo d7iisvc>>"%temp%\jrt\wl_services.cfg"
|
|
||||||
echo dSSEventSvc>>"%temp%\jrt\wl_services.cfg"
|
|
||||||
echo CryptoPreventEventSvc>>"%temp%\jrt\wl_services.cfg"
|
|
||||||
echo.>>"%temp%\jrt\wl_processes.cfg"
|
|
||||||
echo d7ii>>"%temp%\jrt\wl_processes.cfg"
|
|
||||||
echo dfunk>>"%temp%\jrt\wl_processes.cfg"
|
|
||||||
echo dSupportSuite>>"%temp%\jrt\wl_processes.cfg"
|
|
||||||
echo CryptoPrevent>>"%temp%\jrt\wl_processes.cfg"
|
|
||||||
start /wait cmd.exe /c get.bat
|
|
||||||
|
|
@ -1,26 +0,0 @@
|
||||||
[Options]
|
|
||||||
AutoSync=1
|
|
||||||
AutoExit=1
|
|
||||||
Retry=1
|
|
||||||
|
|
||||||
[Servers]
|
|
||||||
0="time-a.nist.gov"
|
|
||||||
1="time-a.timefreq.bldrdoc.gov"
|
|
||||||
2="time-b.nist.gov"
|
|
||||||
3="time-b.timefreq.bldrdoc.gov"
|
|
||||||
4="time-c.timefreq.bldrdoc.gov"
|
|
||||||
5="us.pool.ntp.org"
|
|
||||||
6="1.us.pool.ntp.org"
|
|
||||||
7="2.us.pool.ntp.org"
|
|
||||||
8="3.us.pool.ntp.org"
|
|
||||||
9="pubts1-sj.witime.net"
|
|
||||||
10="pubts2-sj.witime.net"
|
|
||||||
11="rolex.usg.edu"
|
|
||||||
12="timekeeper.isi.edu"
|
|
||||||
13="nist1.symmetricom.com"
|
|
||||||
14="clock.via.net"
|
|
||||||
15="nist1.aol-ca.truetime.com"
|
|
||||||
16="nist.expertsmi.com"
|
|
||||||
17="nist1-dc.WiTime.net"
|
|
||||||
18="nist1-sj.WiTime.net"
|
|
||||||
19="utcnist.colorado.edu"
|
|
||||||
Binary file not shown.
|
|
@ -1,167 +0,0 @@
|
||||||
::
|
|
||||||
:: --- BEGIN INFO ---
|
|
||||||
::
|
|
||||||
::
|
|
||||||
:: Applicable Custom App: All 'Emsisoft xxx' app configurations in d7II default custom app configurations.
|
|
||||||
::
|
|
||||||
:: Last Update: 2017-02-03
|
|
||||||
::
|
|
||||||
:: Created by Nick @ FoolishIT.com [Foolish IT LLC] as an example for the user-configurable d7II custom app's system.
|
|
||||||
::
|
|
||||||
::
|
|
||||||
:: - d7II Config Location: (applicable to most anything having to do with this batch file)
|
|
||||||
:: Open Config (under Main drop down menu) \ Custom Apps (tab) \ (search/find/highlight desired custom app in left column/box first) \ New/Edit App (sub-tab)
|
|
||||||
::
|
|
||||||
:: - This batch file is referenced from custom app configuration items in d7II Config, and may make references to other data available from within
|
|
||||||
:: the custom app configuration or used by it such as noted here.
|
|
||||||
::
|
|
||||||
:: - The 'Whitelist.txt' file created by this batch file will by referenced in the command line arguments passed to the custom app; the configuration
|
|
||||||
:: for this is located in custom apps config as mentioned above \ then the Execution (sub-tab)
|
|
||||||
::
|
|
||||||
:: - This batch file is called into action when configured in the 'Import Config Before Execution' setting in a d7II custom app configuration,
|
|
||||||
:: which can be found on the 'Pre-Execution' tab of the custom app configuration mentioned above.
|
|
||||||
::
|
|
||||||
:: NOTES: * When a .BAT/.CMD file such as this is found configured under this setting (as opposed to any other text or data file) it will be
|
|
||||||
:: copied to the custom app's final running directory (the same as any other files would be) but then executed as a batch script (after
|
|
||||||
:: the installer is executed if one is configured, but prior to execution of the main custom app itself.
|
|
||||||
::
|
|
||||||
:: * Similarly, a .VBS file would be copied to the custom app directory and executed as a script as above.
|
|
||||||
::
|
|
||||||
:: * Further, a .REG file would be imported to the registry if found configured for this setting.
|
|
||||||
::
|
|
||||||
:: * This setting may reference multiple files separated by a comma with no spacing required; e.g. 'file1.bat,file2.txt,file3.reg'
|
|
||||||
::
|
|
||||||
:: * All files (no paths) configured here must be located within your 'd7II\Config\CustomApps\3rd Party Configs' path (create the last
|
|
||||||
:: dirs if not exist.) They will likely work if located in the 'd7II\Config\CustomApps_d7II\3rd Party Configs' path, but with all
|
|
||||||
:: d7II default custom app configurations, this path with all content will be deleted and rewritten during updates to the default apps.
|
|
||||||
::
|
|
||||||
::
|
|
||||||
:: Batch File Objectives:
|
|
||||||
::
|
|
||||||
:: 1. Obtain d7II path via registry; use this in creating a whitelist to be used by the custom app
|
|
||||||
:: (to include all custom apps in subdirs of d7II)
|
|
||||||
::
|
|
||||||
:: 2. Obtain 3rd Party Tools path via registry; if this is not a subdir of the main d7II Path, then
|
|
||||||
:: add this to a whitelist to be used by the custom app (to include all custom apps in subdirs)
|
|
||||||
::
|
|
||||||
:: 3. create a2cmd whitelist as a new file in the location/directory of the custom app (overwrite existing if any)
|
|
||||||
:: - batch file current directory should be same as the main executable of the custom app (Execution tab)
|
|
||||||
:: - add d7II path and include all custom apps within the d7II subdir structure) and other Foolish IT apps
|
|
||||||
:: to a new file (overwrite) in the current directory (of the custom app whitelist for a2cmd.)
|
|
||||||
::
|
|
||||||
::
|
|
||||||
:: --- BEGIN CODE ---
|
|
||||||
:: Disable local echo, clear screen, output a blank line.
|
|
||||||
::
|
|
||||||
@echo off&cls&echo.
|
|
||||||
:: Set window title to visually identify what this console window is doing.
|
|
||||||
title [a2cmd] Performing Additional Custom App Tasks...
|
|
||||||
:: Change from the Current Working Directory (available to the %cd% variable)
|
|
||||||
:: to the Current Directory (available as %~dp0 below) where the file actually "lives"
|
|
||||||
:: and was the location where this batch file was copied to by d7II.exe prior to running it.
|
|
||||||
::
|
|
||||||
:: - This should be the path of the main exe for this custom app as configured in d7II;
|
|
||||||
:: located in custom apps config as mentioned above \ then the Execution (sub-tab)
|
|
||||||
::
|
|
||||||
:: - Syntax explanation:
|
|
||||||
::
|
|
||||||
:: '~' removes wrapping quotes (never use in a variable if possible, instead wrap the variable as necessary!)
|
|
||||||
:: 'd' returns a drive letter and colon
|
|
||||||
:: 'p' returns a full directory path (without a prepended driveletter, and including a trailing backslash)
|
|
||||||
:: '0' refers to self (this batch file) as the subject of the above conditions
|
|
||||||
::
|
|
||||||
pushd "%~dp0"
|
|
||||||
:: Set variables for registry value queries and app info
|
|
||||||
::
|
|
||||||
set "RegKey=HKLM\Software\Foolish IT\d7II\Session\Paths"
|
|
||||||
set "RegNameEXE=AppEXE"
|
|
||||||
set "RegName3PT=3PTDir"
|
|
||||||
set "MainPath=%systemdrive%\EmsisoftCmd"
|
|
||||||
set "MainEXE=a2cmd.exe"
|
|
||||||
set "InstEXE32=EmsisoftCommandlineScanner32.exe"
|
|
||||||
set "InstEXE64=EmsisoftCommandlineScanner64.exe"
|
|
||||||
set "InstParms=/S"
|
|
||||||
:: Determine if 64bit paths should be used. Note that by using the syntax '%programfiles% (x86)' and not the single
|
|
||||||
:: '%programfiles(x86)%' then we avoid any errors with the variable not existing and throwing off the actual exist check.
|
|
||||||
::
|
|
||||||
if "[%programfiles(x86)%]" NEQ "[]" if exist "%programfiles% (x86)" set Win64=True
|
|
||||||
::
|
|
||||||
if defined Win64 (
|
|
||||||
set "ProgramDir32=%programfiles(x86)%"
|
|
||||||
set "InstEXE=%InstEXE64%"
|
|
||||||
) else (
|
|
||||||
set "ProgramDir32=%programfiles%"
|
|
||||||
set "InstEXE=%InstEXE32%"
|
|
||||||
)
|
|
||||||
:: Run installer/self-extractor
|
|
||||||
::
|
|
||||||
if not exist "%MainPath%\%MainEXE%" if exist %InstEXE% start "" /wait "%InstEXE%" %InstParms%
|
|
||||||
:: Exit if install path does not exist...
|
|
||||||
::
|
|
||||||
if not exist "%MainPath%" (
|
|
||||||
goto :eof
|
|
||||||
) else (
|
|
||||||
pushd "%MainPath%"
|
|
||||||
)
|
|
||||||
:: Add exclusions for other Foolish IT product paths (unrelated to d7II) that may be on a system;
|
|
||||||
:: While we could first test for dir exist, the dumb addition of a few extra exclusions to the
|
|
||||||
:: whitelist without checking for their existence will make much of a difference to any custom app...
|
|
||||||
::
|
|
||||||
:: - NOTE: observe the first code line using a single ">" chr prior to the whitelist filename,
|
|
||||||
:: this creates new or overwrites an existing file; all subsequent usage for the same
|
|
||||||
:: filename must include the syntax of double ">>" chrs, which creates new or appends
|
|
||||||
:: to an existing file.
|
|
||||||
::
|
|
||||||
echo %ProgramDir32%\dSupportSuite\>a2cmd_Whitelist.txt
|
|
||||||
echo %ProgramDir32%\CryptoPrevent\>>a2cmd_Whitelist.txt
|
|
||||||
echo %ProgramDir32%\Foolish IT\CryptoPrevent\>>a2cmd_Whitelist.txt
|
|
||||||
:: Extract the full path to d7II.exe for the "d7IIPath" variable; obtain d7II path for the currently active
|
|
||||||
:: d7II 'session' via a registry query to the registry's copy of d7II's current session configuration.
|
|
||||||
::
|
|
||||||
:: - NOTE: The ' 2^>nul' syntax below redirects errors from the 'reg query' command to 'nul' in order to
|
|
||||||
:: keep garbage/error messages from defining this variable on an unexpected error...
|
|
||||||
::
|
|
||||||
:: Also, similar to the '%~dp0' syntax used with pushd at the beginning of the batch file, the
|
|
||||||
:: variable syntax '~dp' is used with the variable '%%_' to ensure output as a drive\path without
|
|
||||||
:: without a filename and without wrapping quotes (a trailing backslash is included in the output
|
|
||||||
:: and for these purposes it is also expected syntax for the custom app whitelist.
|
|
||||||
::
|
|
||||||
for /f "usebackq tokens=2*" %%a in (`reg query "%RegKey%" /v "%RegNameEXE%" 2^>nul`) do set "d7IIPath=%%~dpb"
|
|
||||||
::
|
|
||||||
:: Check for a result; if variable is defined above then add this path to the whitelist.
|
|
||||||
::
|
|
||||||
if defined d7IIPath echo %d7IIpath%>>a2cmd_Whitelist.txt
|
|
||||||
:: Next get the path to d7II custom apps / 3rd party tools via reg query, to provide redundancy if this path
|
|
||||||
:: for any reason is not located within a subdir of d7II.exe itself. First set the new registry value name.
|
|
||||||
::
|
|
||||||
for /f "usebackq tokens=2*" %%a in (`reg query "%RegKey%" /v "%RegName3PT%" 2^>nul`) do set "ToolsPath=%%~b"
|
|
||||||
::
|
|
||||||
:: Check for a result; if variable is defined above then add this path to the whitelist, otherwise the rest
|
|
||||||
:: of this script is useless, so exit.
|
|
||||||
::
|
|
||||||
if not defined ToolsPath goto :eof
|
|
||||||
echo %ToolsPath%\>>a2cmd_Whitelist.txt
|
|
||||||
:: If no parameters were passed to this batch file, it is being run as part of the "Copy Config" custom app
|
|
||||||
:: setting (it will be run a second time with parameters for the execution of the custom app itself, which is
|
|
||||||
:: configured to run this batch file again instead of %MainEXE% as the actual configured exe for this custom
|
|
||||||
:: app.)
|
|
||||||
::
|
|
||||||
:: Test to find out if any parameters were passed to this batch file, and if none are found just update...
|
|
||||||
::
|
|
||||||
if [%1] EQU [] goto :RunUpdate
|
|
||||||
:: If we make it this far then this batch file was launched with command line parameters intended for %MainEXE%,
|
|
||||||
:: so run the custom app passing all parameters as received and waiting for exit.
|
|
||||||
::
|
|
||||||
echo Running scan... (in a separate window; please do NOT close this window!)
|
|
||||||
::
|
|
||||||
start "" /wait "%MainEXE%" %*
|
|
||||||
goto :eof
|
|
||||||
:RunUpdate
|
|
||||||
::
|
|
||||||
:: Since getting here means no parameters were passed, run %MainEXE% using parameters for it's own internal
|
|
||||||
:: definition/signature update, then exit.
|
|
||||||
::
|
|
||||||
echo Starting update... (in a separate window; please do NOT close this window!)
|
|
||||||
::
|
|
||||||
start "" /wait "%MainEXE%" /update
|
|
||||||
goto :eof
|
|
||||||
Binary file not shown.
Binary file not shown.
|
|
@ -1,5 +0,0 @@
|
||||||
pushd "%~dp0"
|
|
||||||
cd..
|
|
||||||
set d7IIpath=%cd%
|
|
||||||
pushd "%~dp0"
|
|
||||||
echo %d7IIpath%\d7II.exe>rkill_Excludes.txt
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
AppURL=http://www.alex-is.de/PHP/fusion/downloads.php?cat_id=4&file_id=9
|
|
||||||
AppDLName=AS SSD Benchmark.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
App=AS SSD Benchmark\AS SSD Benchmark.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=0
|
|
||||||
LogVerbiage=Ran SSD testing/benchmark
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
AppWebsite=www.alex-is.de/PHP/fusion/downloads.php?cat_id=4&download_id=9
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:45:12 AM
|
|
||||||
NonDirectURLs=0
|
|
||||||
AppDLPage=www.alex-is.de/PHP/fusion/downloads.php?cat_id=4&download_id=9
|
|
||||||
AppDesc=SSD Benchmark Utility
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=7/21/2014 11:16:06 AM
|
|
||||||
AppWebsite=http://www.bleepingcomputer.com/download/adwcleaner/
|
|
||||||
AppDLPage=http://www.bleepingcomputer.com/download/adwcleaner/
|
|
||||||
AppDesc=Toolbar Remover
|
|
||||||
App=AdwCleaner.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.bleepingcomputer.com/Xplode/AdwCleaner.exe
|
|
||||||
AppURLB=http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner
|
|
||||||
AppDLName=AdwCleaner.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=.5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%systemdrive%\AdwCleaner\AdwCleaner*.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Removed unnecessary internet browser add-ins (e.g. Toolbars) [AdwCleaner]
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
AppWebsite=http://www.auslogics.com/en/software/disk-defrag/command-line/
|
|
||||||
App=ausdiskdefragportable.exe
|
|
||||||
AppURL=http://www.auslogics.com/en/downloads/disk-defrag/ausdiskdefragportable.exe
|
|
||||||
AppDLName=ausdiskdefragportable.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=0
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
LogVerbiage=Defragmented file system (Auslogics)
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:45:41 AM
|
|
||||||
NonDirectURLs=0
|
|
||||||
AppDesc=Disk Defragmenter
|
|
||||||
AppDLPage=http://www.auslogics.com/en/software/disk-defrag/
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=autoruns\autoruns.exe
|
|
||||||
AppURL=http://download.sysinternals.com/files/Autoruns.zip
|
|
||||||
AppDLName=autoruns.zip
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
AppParms=-accepteula
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://technet.microsoft.com/en-us/sysinternals/bb963902
|
|
||||||
LogVerbiage=Examined Windows startup items and removed unnecessary entries.
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:46:37 AM
|
|
||||||
NonDirectURLs=0
|
|
||||||
AppDLPage=http://technet.microsoft.com/en-us/sysinternals/bb963902
|
|
||||||
AppDesc=Manages Startup Items
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,33 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=aswMBR.exe
|
|
||||||
AppURL=http://public.avast.com/~gmerek/aswMBR.exe
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
AppDLName=aswMBR.exe
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://public.avast.com/~gmerek/aswMBR.htm
|
|
||||||
LogVerbiage=Checked MBR for infections and scanned for additional malicious items (Avast!).
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:46:53 AM
|
|
||||||
AppDLPage=http://public.avast.com/~gmerek/aswMBR.htm
|
|
||||||
AppDesc=MBR Checker and Virus Scanner
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=batteryinfoview.exe
|
|
||||||
AppURL=http://www.nirsoft.net/panel/batteryinfoview.exe
|
|
||||||
AppDLName=batteryinfoview.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.nirsoft.net/utils/battery_information_view.html
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=0
|
|
||||||
LogVerbiage=Checked battery life and wear level.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:47:17 AM
|
|
||||||
AppDLPage=www.nirsoft.net/utils/battery_information_view.html
|
|
||||||
AppDesc=Detailed info on installed batteries
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:49:58 AM
|
|
||||||
App=advisorinstaller.exe
|
|
||||||
AppParms=/silent
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.belarc.com/Programs/advisorinstaller.exe
|
|
||||||
AppDLName=advisorinstaller.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
WaitOnProcesses=Belarc~1.exe
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsLoc=%programfiles(x86)%\Belarc\BelarcAdvisor\System\tmp\(%computername%).html
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AppWebsite=http://www.belarc.com/free_download.html
|
|
||||||
AppDLPage=http://www.belarc.com/free_download.html
|
|
||||||
AppDesc=System Information Utility (Not 'Portable' - Installation Necessary)
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=BootkitRemoval_x86.exe
|
|
||||||
App64=BootkitRemoval_x64.exe
|
|
||||||
AppURL64=http://download.bitdefender.com/removal_tools/BootkitRemoval_x64.exe
|
|
||||||
AppDLName64=BootkitRemoval_x64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.bitdefender.com/removal_tools/BootkitRemoval_x86.exe
|
|
||||||
AppDLName=BootkitRemoval_x86.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://labs.bitdefender.com/projects/rootkit-remover/rootkit-remover/
|
|
||||||
LogVerbiage=Performed additional rootkit scanning. (BRR)
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:50:38 AM
|
|
||||||
AppDLPage=http://labs.bitdefender.com/projects/rootkit-remover/rootkit-remover/
|
|
||||||
AppDesc=Bitdefender Rootkit Remover
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=8/13/2018
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=bluescreenview.exe
|
|
||||||
AppURL=http://www.nirsoft.net/panel/bluescreenview.exe
|
|
||||||
AppDLName=bluescreenview.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=0
|
|
||||||
LogVerbiage=Checked for previous blue screens / crash dumps.
|
|
||||||
AppWebsite=www.nirsoft.net/utils/blue_screen_view.html
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:51:06 AM
|
|
||||||
AppDLPage=www.nirsoft.net/utils/blue_screen_view.html
|
|
||||||
AppDesc=Analyze blue screens / memory dumps created by Windows
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,39 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishIT
|
|
||||||
LastEditDate=12/8/2015 9:51:43 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.cpuid.com/softwares/cpu-z.html
|
|
||||||
AppDLPage=http://www.cpuid.com/softwares/cpu-z.html
|
|
||||||
App=cpu-z\cpuz_x32.exe
|
|
||||||
App64=cpu-z\cpuz_x64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.cpuid.com/cpu-z/cpu-z_1.74-en.zip
|
|
||||||
AppDLName=cpu-z.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
AppDesc=Display hardware information (CPU, RAM, MB)
|
|
||||||
LogVerbiage=Reviewed hardware information of the system.
|
|
||||||
LastDownload=12/8/2015
|
|
||||||
CopyConfigFirst=cpuz.ini
|
|
||||||
|
|
@ -1,33 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=combofix.exe
|
|
||||||
AppParms=/uninstall
|
|
||||||
AppURL=http://download.bleepingcomputer.com/sUBs/ComboFix.exe
|
|
||||||
AppDLName=combofix.exe
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=0
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=1
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://www.bleepingcomputer.com/download/combofix/
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:51:39 AM
|
|
||||||
AppDLPage=http://www.bleepingcomputer.com/download/combofix/
|
|
||||||
AppDesc=Uninstalls Combofix, cleaning up any leftover files/settings.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=combofix.exe
|
|
||||||
AppURL=http://download.bleepingcomputer.com/sUBs/ComboFix.exe
|
|
||||||
AppDLName=combofix.exe
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=0
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=.5
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=1
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://www.bleepingcomputer.com/download/combofix/
|
|
||||||
LogVerbiage=Ran malware scans (Combofix)
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:52:03 AM
|
|
||||||
AppDLPage=http://www.bleepingcomputer.com/download/combofix/
|
|
||||||
AppDesc=Malware removal tool.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,33 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=3/15/2014 3:49:54 PM
|
|
||||||
AppWebsite=www.crowdstrike.com
|
|
||||||
AppDLPage=www.crowdstrike.com/crowdinspect/
|
|
||||||
AppDesc=Analyze running processes against VirusTotal, Web of Trust, and the Malware Hash Project.
|
|
||||||
App=CrowdInspect\CrowdInspect.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.crowdstrike.com/crowdinspect/CrowdInspect.zip
|
|
||||||
AppDLName=CrowdInspect.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=4/1/2016 12:41:03 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://crystalmark.info/software/CrystalDiskInfo/index-e.html
|
|
||||||
AppDLPage=http://crystalmark.info/software/CrystalDiskInfo/index-e.html
|
|
||||||
AppDesc=Hard drive diagnostics / information.
|
|
||||||
App=CrystalDiskInfo\DiskInfo.exe
|
|
||||||
App64=CrystalDiskInfo\DiskInfoX64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://osdn.jp/frs/redir.php?m=tcpdiag&f=%2Fcrystaldiskinfo%2F65634%2FCrystalDiskInfo6_8_2.zip
|
|
||||||
AppDLName=CrystalDiskInfo.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Examined Hard Drive health (CrystalDiskInfo)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,39 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=dSupportOnline
|
|
||||||
LastEditDate=11/6/2014 10:33:04 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.nirsoft.net/utils/cports.html
|
|
||||||
AppDLPage=http://www.nirsoft.net/utils/cports.html
|
|
||||||
AppDesc=Displays current ports in use on system and by which process
|
|
||||||
App=cports\cports.exe
|
|
||||||
AppURLSpoof=http://www.nirsoft.net/utils/cports.html
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.nirsoft.net/utils/cports.zip
|
|
||||||
AppDLName=cports.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
CopyConfigFirst=cports.cfg
|
|
||||||
SaveConfigAfter=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Reviewed current ports in use by various applications on the system
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=esetsmartinstaller_enu.exe
|
|
||||||
AppURL=http://download.eset.com/special/eos/esetsmartinstaller_enu.exe
|
|
||||||
AppDLName=esetsmartinstaller_enu.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://www.eset.com/int/online-scanner-popup/
|
|
||||||
LogVerbiage=Ran Virus/Malware scans (ESET)
|
|
||||||
LastDownload=9/28/2013
|
|
||||||
WaitOnProcesses=onlinescannerapp.exe
|
|
||||||
NonDirectURLs=0
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:53:54 AM
|
|
||||||
AppDLPage=http://www.eset.com/int/online-scanner-popup/
|
|
||||||
AppDesc=Online Virus Scanner
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,42 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/3/2017 5:45:31 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDLPage=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDesc=Virus Scanner (configured for scanning from the Offline Operations tab)
|
|
||||||
AppParms=/f=%tdrive% /deep /rk /pup /a /n /ac /dq /la="%malreportdir%\a2cmd_deep_log_offline_%date%.txt"
|
|
||||||
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
|
|
||||||
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
|
|
||||||
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran deep virus scans (Emsisoft)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
App=Emsisoft_a2cmd\a2cmd.cmd
|
|
||||||
CopyConfigFirst=a2cmd.cmd
|
|
||||||
WaitOnProcesses=a2cmd.exe
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,42 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/3/2017 5:45:31 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDLPage=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDesc=Virus Scanner - Scans all files on all hard disks thoroughly. (does not need prior update)
|
|
||||||
AppParms=/f=%tdrive% /deep /rk /m /t /c /pup /a /n /ac /d /wl="%systemdrive%\EmsisoftCmd\a2cmd_Whitelist.txt" /la="%malreportdir%\a2cmd_deep_log_%date%.txt"
|
|
||||||
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
|
|
||||||
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
|
|
||||||
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran deep virus scans (Emsisoft)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
App=Emsisoft_a2cmd\a2cmd.cmd
|
|
||||||
CopyConfigFirst=a2cmd.cmd
|
|
||||||
WaitOnProcesses=a2cmd.exe
|
|
||||||
LastDownload=10/7/2018
|
|
||||||
|
|
@ -1,41 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/3/2017 5:45:31 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDLPage=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDesc=Virus Scanner - Scans all active programs, malware traces (registry, files) and Tracking Cookies. Skips ADS, archive files, and some cookies. (does not need prior update)
|
|
||||||
AppParms=/f=%tdrive% /quick /rk /m /t /pup /ac /d /wl="%systemdrive%\EmsisoftCmd\a2cmd_Whitelist.txt" /la="%malreportdir%\a2cmd_quick_log_%date%.txt"
|
|
||||||
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
|
|
||||||
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
|
|
||||||
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran virus scans (Emsisoft)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
App=Emsisoft_a2cmd\a2cmd.cmd
|
|
||||||
CopyConfigFirst=a2cmd.cmd
|
|
||||||
WaitOnProcesses=a2cmd.exe
|
|
||||||
|
|
@ -1,41 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/3/2017 5:45:31 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDLPage=http://www.emsisoft.com/en/software/cmd/
|
|
||||||
AppDesc=Virus Scanner - Scans the Windows and program files folders in addition to everything scanned by the quick scan. Skips ADS, archive files, and some cookies. (does not need prior update)
|
|
||||||
AppParms=/f=%tdrive% /smart /rk /m /t /pup /ac /d /wl="%systemdrive%\EmsisoftCmd\a2cmd_Whitelist.txt" /la="%malreportdir%\a2cmd_smart_log_%date%.txt"
|
|
||||||
AppURL64=http://dl.emsisoft.com/EmsisoftCommandlineScanner64.exe
|
|
||||||
AppDLName64=Emsisoft_a2cmd\EmsisoftCommandlineScanner64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://dl.emsisoft.com/EmsisoftCommandlineScanner32.exe
|
|
||||||
AppDLName=Emsisoft_a2cmd\EmsisoftCommandlineScanner32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran virus scans (Emsisoft)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
App=Emsisoft_a2cmd\a2cmd.cmd
|
|
||||||
CopyConfigFirst=a2cmd.cmd
|
|
||||||
WaitOnProcesses=a2cmd.exe
|
|
||||||
|
|
@ -1,39 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=dSupportOnline
|
|
||||||
LastEditDate=10/9/2014 1:20:00 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.voidtools.com/support/everything/
|
|
||||||
AppDLPage=http://www.voidtools.com/downloads/
|
|
||||||
App=everything32\Everything.exe
|
|
||||||
App64=everything64\Everything.exe
|
|
||||||
AppURL64=http://www.voidtools.com/Everything-1.3.4.686.x64.zip
|
|
||||||
AppDLName64=everything64.zip
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.voidtools.com/Everything-1.3.4.686.x86.zip
|
|
||||||
AppDLName=everything32.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
CopyConfigFirst=Everything.ini
|
|
||||||
SaveConfigAfter=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
AppDesc=Quickly searches files and folders
|
|
||||||
LogVerbiage=Searched system for files and folders to further inspect or remove.
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=3/29/2016 4:09:19 PM
|
|
||||||
PostRunApp=
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.nirsoft.net/utils/executedprogramslist.zip
|
|
||||||
AppDLName=ExecutedProgramsList.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=30
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
Author=Foolish IT
|
|
||||||
AppWebsite=http://www.nirsoft.net/utils/executed_programs_list.html
|
|
||||||
AppDLPage=http://www.nirsoft.net/utils/executed_programs_list.html
|
|
||||||
AutoFlag=0
|
|
||||||
App=ExecutedProgramsList\ExecutedProgramsList.exe
|
|
||||||
AppDesc=List out recently executed programs.
|
|
||||||
LogVerbiage=Checked recently executed programs.
|
|
||||||
LastDownload=3/29/2016
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=gmer\gmer.exe
|
|
||||||
AppURL=http://www2.gmer.net/gmer.zip
|
|
||||||
AppDLName=gmer.zip
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://www.gmer.net/
|
|
||||||
LogVerbiage=Manually scanned for rootkit activity.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:54:39 AM
|
|
||||||
AppDLPage=http://www.gmer.net/
|
|
||||||
AppDesc=Rootkit / Malware Scanner
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Proctor Foolish IT
|
|
||||||
LastEditDate=3/2/2016 5:09:19 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.techpowerup.com/gpuz/
|
|
||||||
AppDesc=Reported on Graphis Adapter Information
|
|
||||||
LogVerbiage=Reviewed hardware information of the system.
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://www.techpowerup.com/downloads/2627/techpowerup-gpu-z-v0-8-7/start?server=6
|
|
||||||
AppDLName=GPU-Z.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
AppParms=-dump gpu-z.xml
|
|
||||||
SnatchReportsLoc=gpu-z.xml
|
|
||||||
App=GPU-Z.exe
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Proctor Foolish IT
|
|
||||||
LastEditDate=3/2/2016 4:24:41 PM
|
|
||||||
PostRunApp=GPU-Z Report
|
|
||||||
AppWebsite=https://www.techpowerup.com/gpuz/
|
|
||||||
App64=GPU-Z.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://www.techpowerup.com/downloads/2627/techpowerup-gpu-z-v0-8-7/start?server=6
|
|
||||||
AppDLName=GPU-Z.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
AppDesc=Review Graphis Adapter Information
|
|
||||||
LogVerbiage=Reviewed hardware information of the system.
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=10/13/2014 6:35:14 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://support.google.com/chrome/answer/6086368?p=ui_software_removal_tool&rd=1
|
|
||||||
AppDLPage=https://www.google.com/chrome/srt/
|
|
||||||
App=software_removal_tool.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://dl.google.com/dl/softwareremovaltool/win/software_removal_tool.exe
|
|
||||||
AppDLName=software_removal_tool.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=0
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
Author=FoolishTech
|
|
||||||
AppDesc=Remove add-ons, extensions, toolbars, and other software that may interfere with the operation of Google Chrome.
|
|
||||||
LogVerbiage=Scanned for and removed any toolbars/extensions/add-ons that may interfere with the operation of Google Chrome.
|
|
||||||
|
|
@ -1,39 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Foolish IT
|
|
||||||
LastEditDate=3/30/2016 11:11:09 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.jam-software.de/heavyload/
|
|
||||||
AppDLPage=https://www.jam-software.de/heavyload/
|
|
||||||
App=HeavyLoadx86\HeavyLoad.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.jam-software.com/heavyload/HeavyLoad-x86.zip
|
|
||||||
AppDLName=HeavyLoadx86.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
AppURL64=http://www.jam-software.com/heavyload/HeavyLoad-x64.zip
|
|
||||||
AppDLName64=HeavyLoadx64.zip
|
|
||||||
App64=HeavyLoadx64\HeavyLoad.exe
|
|
||||||
AppDesc=Stress Testing Application
|
|
||||||
LogVerbiage=Stress Tested System
|
|
||||||
|
|
@ -1,44 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=10/10/2014 4:14:36 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.surfright.nl/en/hitmanpro/
|
|
||||||
AppDLPage=http://www.surfright.nl/en/downloads/
|
|
||||||
AppDesc=Malware scanner (Manual removal)
|
|
||||||
App=HitmanPro.exe
|
|
||||||
App64=HitmanPro_x64.exe
|
|
||||||
AppParms=/noinstall /excludelist="%3rdpath%\HMP_Excludes.txt" /log="%malreportdir%\HitmanPro_Scan_Log_%date%.txt"
|
|
||||||
AppURL64=http://dl.surfright.nl/HitmanPro_x64.exe
|
|
||||||
AppURL64B=http://dl.surfright.nl/FoolishIT/HitmanPro_x64.exe
|
|
||||||
AppDLName64=HitmanPro_x64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://dl.surfright.nl/HitmanPro.exe
|
|
||||||
AppURLB=http://dl.surfright.nl/FoolishIT/HitmanPro.exe
|
|
||||||
AppDLName=HitmanPro.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=4
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppWaitTime=60
|
|
||||||
AppRandomize=1
|
|
||||||
CopyConfigFirst=HMP.cmd
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran Malware Scans and manually investigated results (HitmanPro)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,45 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=7/13/2015 10:52:20 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.surfright.nl/en/hitmanpro/
|
|
||||||
AppDLPage=http://www.surfright.nl/en/downloads/
|
|
||||||
AppDesc=Malware scanner
|
|
||||||
App=HitmanPro.exe
|
|
||||||
App64=HitmanPro_x64.exe
|
|
||||||
AppParms=/clean /noinstall /excludelist="%3rdpath%\HMP_Excludes.txt" /log="%malreportdir%\HitmanPro_Scan_Log_%date%.txt"
|
|
||||||
AppURL64=http://dl.surfright.nl/HitmanPro_x64.exe
|
|
||||||
AppURL64B=http://dl.surfright.nl/FoolishIT/HitmanPro_x64.exe
|
|
||||||
AppDLName64=HitmanPro_x64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://dl.surfright.nl/HitmanPro.exe
|
|
||||||
AppURLB=http://dl.surfright.nl/FoolishIT/HitmanPro.exe
|
|
||||||
AppDLName=HitmanPro.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=1
|
|
||||||
AppWaitTime=60
|
|
||||||
AppRandomize=1
|
|
||||||
CopyConfigFirst=HMP.cmd
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran Malware Scans (HitmanPro)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/7/2018
|
|
||||||
|
|
@ -1,42 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=7/13/2015 9:38:52 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://thisisudax.org/
|
|
||||||
AppDLPage=http://thisisudax.org/
|
|
||||||
AppDesc=Junkware Removal Tool - toolbar remover.
|
|
||||||
App=JRT.exe
|
|
||||||
AppParms=-y -om1 -nr
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://thisisudax.org/downloads/JRT.exe
|
|
||||||
AppDLName=JRT.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=1
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
CopyConfigFirst=JRT_Auto.cmd
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%userprofile%\Desktop\JRT.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Removed unnecessary internet browser add-ins (e.g. Toolbars) [JRT]
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
WaitOnProcesses=wget.dat,jq.dat,nircmd.dat,sed.dat,grep.dat,cut.dat,reg.exe
|
|
||||||
LastDownload=8/19/2018
|
|
||||||
AppWaitTime=30
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=5/27/2014 1:45:37 PM
|
|
||||||
AppWebsite=http://support.kaspersky.com/5350
|
|
||||||
AppDLPage=http://support.kaspersky.com/viruses/disinfection/5350
|
|
||||||
AppDesc=TDSS / Rootkit scanner
|
|
||||||
App=TDSSKiller.exe
|
|
||||||
AppParms=-accepteula -accepteulaksn -l "%malreportdir%\TDSSKiller_Report_%date%.txt" -tdlfs -dcexact -silent
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://media.kaspersky.com/utilities/VirusUtilities/EN/tdsskiller.exe
|
|
||||||
AppDLName=tdsskiller.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Scanned for MBR infections / rootkits (TDSSKiller)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=2
|
|
||||||
LastDownload=10/7/2018
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=5/27/2014 1:45:26 PM
|
|
||||||
AppWebsite=http://support.kaspersky.com/5350
|
|
||||||
AppDLPage=http://support.kaspersky.com/viruses/disinfection/5350
|
|
||||||
AppDesc=TDSS / Rootkit scanner
|
|
||||||
App=TDSSKiller.exe
|
|
||||||
AppParms=-accepteula -accepteulaksn -l "%malreportdir%\TDSSKiller_Report_%date%.txt" -tdlfs -dcexact
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://media.kaspersky.com/utilities/VirusUtilities/EN/tdsskiller.exe
|
|
||||||
AppDLName=tdsskiller.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Scanned for MBR infections / rootkits (TDSSKiller)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Foolish IT
|
|
||||||
LastEditDate=1/28/2016 3:33:42 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.foolishit.com/d7x/killemall/
|
|
||||||
AppDLPage=https://www.foolishit.com/d7x/killemall/
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.foolishit.com/killemall/KillEmAll_Portable.zip
|
|
||||||
AppDLName=KillEmAll_Portable.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
App=KillEmAll_Portable\KillEmAll.exe
|
|
||||||
AutoFlag=0
|
|
||||||
AppDesc=Kills non-essential processes
|
|
||||||
LastDownload=5/17/2016
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=MBRCheck.exe
|
|
||||||
AppURL=http://ad13.geekstogo.com/MBRCheck.exe
|
|
||||||
AppDLName=MBRCheck.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%userprofile%\Desktop\MBRCheck*.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
AppWebsite=http://www.majorgeeks.com/files/details/mbrcheck.html
|
|
||||||
LogVerbiage=Checked MBR for infections.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:59:38 AM
|
|
||||||
AppDLPage=http://www.majorgeeks.com/files/details/mbrcheck.html
|
|
||||||
AppDesc=MBR scanner, this profile is intended to be used from the Offline Operations page.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=9/28/2014 4:13:43 PM
|
|
||||||
PostRunApp=Autoruns_Copy
|
|
||||||
AppWebsite=http://www.majorgeeks.com/files/details/mbrcheck.html
|
|
||||||
AppDLPage=http://www.majorgeeks.com/files/details/mbrcheck.html
|
|
||||||
AppDesc=MBR scanner - use as a second opinion, not reliable especially to repair any damage.
|
|
||||||
App=MBRCheck.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://ad13.geekstogo.com/MBRCheck.exe
|
|
||||||
AppDLName=MBRCheck.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%userprofile%\Desktop\MBRCheck*.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=1
|
|
||||||
SendEnter=1
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Checked MBR for infections.
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=2
|
|
||||||
LastDownload=9/28/2014
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=MBRCheck.exe
|
|
||||||
AppURL=http://ad13.geekstogo.com/MBRCheck.exe
|
|
||||||
AppDLName=MBRCheck.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%userprofile%\Desktop\MBRCheck*.txt
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
AppWebsite=http://www.majorgeeks.com/files/details/mbrcheck.html
|
|
||||||
LogVerbiage=Checked MBR for infections.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:00:33 AM
|
|
||||||
AppDLPage=http://www.majorgeeks.com/files/details/mbrcheck.html
|
|
||||||
AppDesc=MBR scanner - use as a second opinion, not reliable especially to repair any damage.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/8/2014 1:17:11 AM
|
|
||||||
AppWebsite=http://support.microsoft.com/kb/2812744
|
|
||||||
AppDLPage=http://www.microsoft.com/en-us/download/details.aspx?id=36852
|
|
||||||
AppDesc=Fixes a wide variety of issues with Microsoft Office - Installer version
|
|
||||||
App=%programfiles(x86)%\Microsoft OffCAT\OffCAT.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
InstallerParms=/passive
|
|
||||||
InstallerName=OffCAT.msi
|
|
||||||
AppURL=http://go.microsoft.com/fwlink/?LinkID=286211
|
|
||||||
AppDLName=OffCAT.msi
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=1
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,32 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/8/2014 1:17:02 AM
|
|
||||||
AppWebsite=http://support.microsoft.com/kb/2812744
|
|
||||||
AppDLPage=http://www.microsoft.com/en-us/download/details.aspx?id=36852
|
|
||||||
AppDesc=Fixes a wide variety of issues with Microsoft Office - Portable Version
|
|
||||||
App=OffCAT\OffCAT.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://go.microsoft.com/fwlink/?LinkID=286208
|
|
||||||
AppDLName=OffCAT.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=mbar\mbar\mbar.exe
|
|
||||||
AppURL=http://downloads.malwarebytes.org/file/mbar
|
|
||||||
AppDLName=mbar.7z
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=1
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
ServiceWait=0
|
|
||||||
SnatchReportsLoc=%3rdpath%\system-log.txt
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
LogVerbiage=Scanned for MBR infections / rootkits (MBAR)
|
|
||||||
AppWebsite=http://www.malwarebytes.org/products/mbar/
|
|
||||||
LastDownload=11/3/2013
|
|
||||||
NonDirectURLs=0
|
|
||||||
WaitOnProcesses=mbar.exe
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 9:59:08 AM
|
|
||||||
AppDLPage=http://www.malwarebytes.org/products/mbar/
|
|
||||||
AppDesc=Rootkit scanner
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,39 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=1/26/2015 3:38:04 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.malwarebytes.org/products/malwarebytes_free/
|
|
||||||
AppDLPage=http://www.malwarebytes.org/products/malwarebytes_free/
|
|
||||||
AppDesc=Malware scanner
|
|
||||||
App=%programfiles(x86)%\Malwarebytes Anti-Malware\mbam.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
InstallerParms=/silent /suppressmsgboxes /norestart /nocancel /lang=1033
|
|
||||||
InstallerName=mbam2-setup.exe
|
|
||||||
AppURL=http://downloads.malwarebytes.org/file/mbam/
|
|
||||||
AppDLName=mbam2-setup.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=0
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsLoc=%programdata%\Malwarebytes\Malwarebytes Anti-Malware\Logs\*.xml
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=1
|
|
||||||
LogVerbiage=Scanned for Malware (MBAM)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=stinger32.exe
|
|
||||||
App64=stinger64.exe
|
|
||||||
AppParms=--go --repair --noprocess --noregistry --scanpath=%tdrive% --reportpath="%malreportdir%"
|
|
||||||
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
|
|
||||||
AppDLName64=stinger64.exe
|
|
||||||
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
|
|
||||||
AppDLName=stinger32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
ServiceWait=1
|
|
||||||
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=1
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran virus scans (McAfee Stinger)
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:01:11 AM
|
|
||||||
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
AppDesc=Virus scanner - meant to be used from the Offline Operations tab.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=5/27/2014 1:47:06 PM
|
|
||||||
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
AppDesc=Virus scanner
|
|
||||||
App=stinger32.exe
|
|
||||||
App64=stinger64.exe
|
|
||||||
AppParms=--silent --go --repair --adl --reportpath="%malreportdir%"
|
|
||||||
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
|
|
||||||
AppDLName64=stinger64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
|
|
||||||
AppDLName=stinger32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran virus scans (McAfee Stinger)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=2
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
App=stinger32.exe
|
|
||||||
App64=stinger64.exe
|
|
||||||
AppParms=--silent --go --repair --noprocess --noregistry --scanpath=%tdrive% --reportpath="%malreportdir%"
|
|
||||||
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
|
|
||||||
AppDLName64=stinger64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
|
|
||||||
AppDLName=stinger32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran virus scans (McAfee Stinger)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:01:42 AM
|
|
||||||
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
AppDesc=Virus scanner - meant to be used from the Offline Operations tab.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=2
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=5/27/2014 1:46:41 PM
|
|
||||||
AppWebsite=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
AppDLPage=http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
|
|
||||||
AppDesc=Virus scanner
|
|
||||||
App=stinger32.exe
|
|
||||||
App64=stinger64.exe
|
|
||||||
AppParms=--go --repair --adl --reportpath="%malreportdir%"
|
|
||||||
AppURL64=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe
|
|
||||||
AppDLName64=stinger64.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe
|
|
||||||
AppDLName=stinger32.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Ran virus scans (McAfee Stinger)
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Microsoft
|
|
||||||
LastEditDate=6/20/2016 2:00:27 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://support.microsoft.com/en-us/kb/2698555
|
|
||||||
AppDLPage=http://go.microsoft.com/fwlink/?LinkID=246062
|
|
||||||
App=NetFxRepairTool.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://download.microsoft.com/download/2/B/D/2BDE5459-2225-48B8-830C-AE19CAF038F1/NetFxRepairTool.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=30
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=1
|
|
||||||
LastDownload=6/20/2016
|
|
||||||
AppDLName=NetFxRepairTool.exe
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
LastEditDate=2/8/2014 12:42:30 AM
|
|
||||||
AppWebsite=www.microsoft.com
|
|
||||||
AppDLPage=http://go.microsoft.com/?linkid=9775982
|
|
||||||
AppDesc=Fix a wide variety of Windows issues all in one portable MS FixIT
|
|
||||||
App=MicrosoftFixit-portable.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe
|
|
||||||
AppDLName=MicrosoftFixit-portable.exe
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Fixed misc. broken Windows functions with %app%
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=0
|
|
||||||
NonDirectURLs=0
|
|
||||||
Author=FoolishTech
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/8/2014 1:20:09 AM
|
|
||||||
AppWebsite=http://support.microsoft.com/kb/971058/en-US
|
|
||||||
AppDLPage=http://go.microsoft.com/?linkid=9665683
|
|
||||||
AppDesc=MS FixIt 50202 fixes issues with Windows Update - This will reboot!
|
|
||||||
App=MicrosoftFixIt50202.msi
|
|
||||||
AppParms=/passive
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://go.microsoft.com/?linkid=9665683
|
|
||||||
AppDLName=MicrosoftFixIt50202.msi
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
AutoFlag=1
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/8/2014 1:03:54 AM
|
|
||||||
AppWebsite=http://support.microsoft.com/kb/811259
|
|
||||||
AppDLPage=http://go.microsoft.com/?linkid=9662461
|
|
||||||
AppDesc=Microsoft FixIt 50203 fixes Winsock corruption issues - This will reboot!
|
|
||||||
App=MicrosoftFixit50203.msi
|
|
||||||
AppParms=/passive
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://go.microsoft.com/?linkid=9662461
|
|
||||||
AppDLName=MicrosoftFixit50203.msi
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Microsoft
|
|
||||||
LastEditDate=7/11/2016 1:23:26 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=https://www.microsoft.com/security/scanner/en-us/default.aspx
|
|
||||||
AppDLPage=https://www.microsoft.com/security/scanner/en-us/default.aspx
|
|
||||||
App=msert.exe
|
|
||||||
App64=msert.exe
|
|
||||||
AppURL64=http://definitionupdates.microsoft.com/download/definitionupdates/safetyscanner/amd64/msert.exe
|
|
||||||
AppDLName64=msert.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://definitionupdates.microsoft.com/download/definitionupdates/safetyscanner/x86/msert.exe
|
|
||||||
AppDLName=msert.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=9
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=7/11/2016
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
AppWebsite=http://keir.net/neutron.html
|
|
||||||
App=neutron\Neutron.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://keir.net/download/neutron.zip
|
|
||||||
AppDLName=neutron.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
CopyConfigFirst=neutron.ini
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
PriorAlert=0
|
|
||||||
LogVerbiage=Synced Windows time with the atomic clock.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:03:42 AM
|
|
||||||
AppDLPage=http://keir.net/neutron.html
|
|
||||||
AppDesc=Sync time with an internet time server
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/8/2018
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=OTL.exe
|
|
||||||
AppURL=http://oldtimer.geekstogo.com/OTL.exe
|
|
||||||
AppDLName=OTL.exe
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://www.geekstogo.com/forum/topic/277391-otl-tutorial-how-to-use-oldtimer-listit/
|
|
||||||
LogVerbiage=Performed manual inspection for viruses/malware.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:05:19 AM
|
|
||||||
AppDLPage=http://www.geekstogo.com/forum/topic/277391-otl-tutorial-how-to-use-oldtimer-listit/
|
|
||||||
AppDesc=Malware scanner and startup manager.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,34 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=openhardwaremonitor\OpenHardwareMonitor\OpenHardwareMonitor.exe
|
|
||||||
AppURL=http://openhardwaremonitor.org/files/openhardwaremonitor-v0.6.0-beta.zip
|
|
||||||
AppDLName=openhardwaremonitor.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=http://openhardwaremonitor.org/
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=0
|
|
||||||
LogVerbiage=Checked hardware temperatures / fan speeds.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:04:27 AM
|
|
||||||
AppDLPage=http://openhardwaremonitor.org/downloads/
|
|
||||||
AppDesc=Detailed hardware information
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,42 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=dSupportOnline
|
|
||||||
LastEditDate=10/29/2014 9:41:55 AM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://www.nirsoft.net/utils/opened_files_view.html
|
|
||||||
AppDLPage=http://www.nirsoft.net/utils/opened_files_view.html
|
|
||||||
AppDesc=Shows currently opened files in use by the system
|
|
||||||
App=ofview\OpenedFilesView.exe
|
|
||||||
App64=ofview-x64\OpenedFilesView.exe
|
|
||||||
AppURL64=http://www.nirsoft.net/utils/ofview-x64.zip
|
|
||||||
AppDLName64=ofview-x64.zip
|
|
||||||
AppURLSpoof=http://www.nirsoft.net/utils/opened_files_view.html
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.nirsoft.net/utils/ofview.zip
|
|
||||||
AppDLName=ofview.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=5
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=1
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Detected currently open files and manipulated as necessary.
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
CopyConfigFirst=OpenedFilesView.cfg
|
|
||||||
|
|
@ -1,24 +0,0 @@
|
||||||
[General]
|
|
||||||
ToolTipTimeAutoPop=-1
|
|
||||||
ToolTipTimeInitial=10
|
|
||||||
ToolTipTimeReshow=10
|
|
||||||
TrayIcon=0
|
|
||||||
ShowGridLines=0
|
|
||||||
ShowOpenedFiles=1
|
|
||||||
ShowOpenedDirectories=0
|
|
||||||
ShowNetworkFiles=0
|
|
||||||
SortOnRefresh=0
|
|
||||||
HideWindowsFiles=0
|
|
||||||
HideSystemProcessFiles=0
|
|
||||||
HideSvchostFiles=0
|
|
||||||
AddExportHeaderLine=0
|
|
||||||
ShowInfoTip=1
|
|
||||||
AutoRefresh=0
|
|
||||||
SaveFilterIndex=0
|
|
||||||
ConvertToLongPath=0
|
|
||||||
MarkModifiedFilenames=1
|
|
||||||
MarkPositionChange=1
|
|
||||||
MarkOddEvenRows=0
|
|
||||||
WinPos=2C 00 00 00 00 00 00 00 01 00 00 00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 00 00 00 00 00 00 00 00 80 02 00 00 E0 01 00 00
|
|
||||||
Columns=82 00 00 00 2C 01 01 00 3C 00 02 00 78 00 03 00 78 00 04 00 46 00 05 00 64 00 06 00 3C 00 07 00 3C 00 08 00 3C 00 09 00 3C 00 0A 00 3C 00 0B 00 3C 00 0C 00 50 00 0D 00 50 00 0E 00 50 00 0F 00 78 00 10 00 FA 00 11 00 50 00 12 00 50 00 13 00
|
|
||||||
Sort=0
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=5/27/2014 1:45:01 PM
|
|
||||||
AppWebsite=www.patchmypc.net
|
|
||||||
AppDLPage=www.patchmypc.net
|
|
||||||
AppDesc=Windows and misc application updater
|
|
||||||
App=PatchMyPC.exe
|
|
||||||
AppParms=/auto /update
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=https://patchmypc.net/freeupdater/PatchMyPC.exe
|
|
||||||
AppDLName=PatchMyPC.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
CopyConfigFirst=PatchMyPC.reg
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%systemdrive%\%computername%.rtf
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Installed updates Windows and commonly used applications.
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=5/27/2014 1:44:22 PM
|
|
||||||
AppWebsite=www.patchmypc.net
|
|
||||||
AppDLPage=www.patchmypc.net
|
|
||||||
AppDesc=Windows and misc application updater
|
|
||||||
App=PatchMyPC.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://www.patchmypc.net/PatchMyPC.exe
|
|
||||||
AppDLName=PatchMyPC.exe
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=3
|
|
||||||
AppWait=1
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
CopyConfigFirst=PatchMyPC.reg
|
|
||||||
ExportRegAfter=HKLM\Software\Patch My PC\Options
|
|
||||||
SaveConfigAfter=1
|
|
||||||
MoveSnatchReports=1
|
|
||||||
SnatchReportsLoc=%systemdrive%\%computername%.rtf
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
LogVerbiage=Installed updates Windows and commonly used applications.
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
||||||
[Config]
|
|
||||||
Author=Foolish Proctor
|
|
||||||
LastEditDate=4/13/2016 3:12:07 PM
|
|
||||||
PostRunApp=
|
|
||||||
AppWebsite=http://rmprepusb.blogspot.co.uk/2016/04/petya-whole-disk-encryption-fix.html
|
|
||||||
AppDLPage=http://rmprepusb.blogspot.co.uk/2016/04/petya-whole-disk-encryption-fix.html
|
|
||||||
App=PetyaExtractor\PetyaExtractor.exe
|
|
||||||
UseFTPServer=0
|
|
||||||
AppURL=http://download.bleepingcomputer.com/fabian-wosar/PetyaExtractor.zip
|
|
||||||
AppDLName=PetyaExtractor.zip
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
DLafterXdays=7
|
|
||||||
AppWait=1
|
|
||||||
EmailBeforeExecution=0
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
SendEnter=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
AppDesc=Decrypt Disk with Petya malware infection
|
|
||||||
LogVerbiage=Decrypt Disk infected with Petya malware
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=ccleaner\CCleaner.exe
|
|
||||||
App64=ccleaner\CCleaner64.exe
|
|
||||||
AppParms=/auto
|
|
||||||
AppURL=http://www.piriform.com/ccleaner/download/portable/downloadfile
|
|
||||||
AppDLName=ccleaner.zip
|
|
||||||
AppWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
CopyConfigFirst=CCleaner.ini
|
|
||||||
SaveConfigAfter=0
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.piriform.com/ccleaner
|
|
||||||
LogVerbiage=Scanned registry for unnecessary data and removed.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:06:48 AM
|
|
||||||
AppDLPage=http://www.piriform.com/ccleaner/builds
|
|
||||||
AppDesc=Temp file remover and registry cleaner
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=8/13/2018
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=ccleaner\CCleaner.exe
|
|
||||||
App64=ccleaner\CCleaner64.exe
|
|
||||||
AppURL=http://www.piriform.com/ccleaner/download/portable/downloadfile
|
|
||||||
AppDLName=ccleaner.zip
|
|
||||||
AppWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
CopyConfigFirst=CCleaner.ini
|
|
||||||
SaveConfigAfter=1
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.piriform.com/ccleaner
|
|
||||||
LogVerbiage=Scanned registry for unnecessary data and removed.
|
|
||||||
LastEditDate=2/7/2014 10:07:10 AM
|
|
||||||
AppDLPage=http://www.piriform.com/ccleaner/builds
|
|
||||||
NonDirectURLs=0
|
|
||||||
Author=FoolishTech
|
|
||||||
AppDesc=Temp file remover and registry cleaner
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,38 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=defraggler\df.exe
|
|
||||||
App64=defraggler\df64.exe
|
|
||||||
AppParms=%systemdrive%
|
|
||||||
AppURL=http://www.piriform.com/defraggler/download/portable/downloadfile
|
|
||||||
AppDLName=defraggler.zip
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
CopyConfigFirst=Defraggler.ini
|
|
||||||
SaveConfigAfter=0
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=0
|
|
||||||
ServiceWait=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.piriform.com/defraggler
|
|
||||||
LogVerbiage=Defragmented file system (Defraggler)
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:07:50 AM
|
|
||||||
AppDLPage=http://www.piriform.com/defraggler/builds
|
|
||||||
AppDesc=Disk defragmenter
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=1
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,37 +0,0 @@
|
||||||
[Config]
|
|
||||||
App=Defraggler\Defraggler.exe
|
|
||||||
App64=Defraggler\Defraggler64.exe
|
|
||||||
AppURL=http://www.piriform.com/defraggler/download/portable/downloadfile
|
|
||||||
AppDLName=defraggler.zip
|
|
||||||
AppWait=1
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=1
|
|
||||||
RunInCMD=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
AlwaysAttemptDownload=1
|
|
||||||
CopyConfigFirst=Defraggler.ini
|
|
||||||
SaveConfigAfter=1
|
|
||||||
DisableCloudShare=0
|
|
||||||
UseFTPServer=0
|
|
||||||
DLafterXdays=7
|
|
||||||
PriorAlert=1
|
|
||||||
ServiceWait=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.piriform.com/defraggler
|
|
||||||
LogVerbiage=Defragmented file system (Defraggler)
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:08:05 AM
|
|
||||||
AppDLPage=http://www.piriform.com/defraggler/builds
|
|
||||||
AppDesc=Disk defragmenter
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
|
|
@ -1,33 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=recuva\recuva.exe
|
|
||||||
App64=recuva\recuva64.exe
|
|
||||||
AppURL=http://www.piriform.com/recuva/download/portable/downloadfile
|
|
||||||
AppDLName=recuva.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.piriform.com/recuva
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=0
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:08:40 AM
|
|
||||||
AppDLPage=http://www.piriform.com/recuva/builds
|
|
||||||
AppDesc=File undelete utility
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
||||||
[Config]
|
|
||||||
DisableCloudShare=0
|
|
||||||
App=speccy\Speccy.exe
|
|
||||||
App64=speccy\Speccy64.exe
|
|
||||||
AppURL=http://www.piriform.com/speccy/download/portable/downloadfile
|
|
||||||
AppDLName=speccy.zip
|
|
||||||
AlwaysAttemptDownload=0
|
|
||||||
AppWait=1
|
|
||||||
ServiceWait=0
|
|
||||||
AppMsgBox=0
|
|
||||||
AppRandomize=0
|
|
||||||
SaveConfigAfter=0
|
|
||||||
MoveSnatchReports=0
|
|
||||||
SnatchReportsToMalwareLogs=0
|
|
||||||
RunInCMD=0
|
|
||||||
RunWithSystemAccess=0
|
|
||||||
IsDLInstaller=0
|
|
||||||
32=1
|
|
||||||
64=1
|
|
||||||
XP=1
|
|
||||||
Vista=1
|
|
||||||
7=1
|
|
||||||
8=1
|
|
||||||
Servers=1
|
|
||||||
AppWebsite=www.piriform.com/speccy
|
|
||||||
UseFTPServer=0
|
|
||||||
PriorAlert=0
|
|
||||||
LogVerbiage=Gathered information on system specs.
|
|
||||||
Author=FoolishTech
|
|
||||||
LastEditDate=2/7/2014 10:09:08 AM
|
|
||||||
AppDLPage=http://www.piriform.com/speccy/builds
|
|
||||||
AppDesc=System information utility.
|
|
||||||
NonDirectURLs=0
|
|
||||||
AutoFlag=0
|
|
||||||
LastDownload=10/27/2017
|
|
||||||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue