Jump to content

Search the Community

Showing results for tags 'Hijack.ControlPanelStyle'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Privacy
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Nebula
    • Malwarebytes Nebula Modules
    • Malwarebytes Endpoint Security
    • Other Malwarebytes Business Products
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL






Found 3 results

  1. Malwarebytes has detected Hijack.ControlPanelStyle. It cleans it but after a reboot it is back. Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 10/6/2015 Scan Time: 9:27 AM Logfile: MBAM Scan Results.txt Administrator: Yes Version: Malware Database: v2015.10.06.04 Rootkit Database: v2015.10.06.01 License: Free Malware Protection: Disabled Malicious Website Protection: Disabled Self-protection: Disabled OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: jjacob002 Scan Type: Threat Scan Result: Completed Objects Scanned: 470972 Time Elapsed: 9 min, 37 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Registry Keys: 0 (No malicious items detected) Registry Values: 1 Hijack.ControlPanelStyle, HKU\S-1-5-21-2052111302-448539723-1801674531-58812\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [17a55bf85f2c092de18cb9137390e818] Registry Data: 0 (No malicious items detected) Folders: 0 (No malicious items detected) Files: 0 (No malicious items detected) Physical Sectors: 0 (No malicious items detected) (end)
  2. Malwarebytes has quarantined the following: Hijack.ControlPanelStyle (2 prior quarantines have been deleted) Trojan.FakeDesk (1st occurance)Addition.txtFRST.txt
  3. Greetings, I need assistance removing "Hijack.ControlPanelStyle", an element of a Trojan virus that the malwarebytes report says would delete on reboot, but it stays on the system and shows up in subsequent MWB scans. I've seen this on several systems in our organization in the past 4 months as a part of different viruses. I've read differing accounts of what this is and what its potential liabilities are. I'd like to know what this is and how to repair or remove it from this and future occurrences of it. Below is the report following the initial scan of malware found. Thank you for the assistance! Malwarebytes Anti-Malware www.malwarebytes.org Database version: v2013.08.08.07 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 22248 :: A012814LT [limited] 8/8/2013 3:00:35 PM mbam-log-2013-08-08 (15-00-35).txt Scan type: Full scan (C:\|) Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 314244 Time elapsed: 41 minute(s), 13 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 2 HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer|ForceClassicControlPanel (Hijack.ControlPanelStyle) -> Data: 1 -> Delete on reboot. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Internet Security (Trojan.Agent.AMSGen) -> Data: C:\Users\22248\AppData\Roaming\amsecure.exe -> Quarantined and deleted successfully. Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 0 (No malicious items detected) (end)
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.