Search the Community
Showing results for tags 'dll'.
Found 4 results
I have been using Cute FTP for years, and now out of nowhere I am getting the following error message when I try to launch the program... System error - RichEdit initialization failed. Please make sure that the latest RichEdit libraries are present. Google searches are no help. No two sites suggest the same solution, and there seems to be no simple straight forward solution. Any ideas or help would be greatly appreciated. I am running Windows 10 Professional. My computer is a laptop purchased about six months ago. This is the first time I have tried it since about August, I believe, and it worked fine then.
Hello, malwarebytes users i have one problem with virus I hope someone can help me. The problem is the following "I have other viruses too, but they are not a problem" The problem is the virus I got a few days ago I'm not a malware analyst or anything like that but I managed to connect these viruses svghost.exe, mserver.exe and usp20.dll this files make other files and changes in registry i delete it but they back after i restart my pc, including registry I scanned them with malwarebytes some detect as viruses and remove but after restart, they come back again I see they use 100% CPU I guess It's a miner But I'm not sure. If anyone can help me solve this, I would be very appreciate.
I've been struggling with malware that keeps coming back to my Windows install. This Windows install is not clean because I haven't had the need to use it since I use Debian as my main OS This is the second time I do a Windows restore since everytime I try to clean dlls the system breaks down I've used malwarebytes, spybot search and destroy and I get a clean analysis so I tried to use boot up recovery disks, sfc /scannow and lastly "Unhack me" where I could see the suspicious files but manually since the programs above trust all "Trusted installer " signed files and processes, after that I used SVChostanalyzer and Security Task Manager and realized suspicious instructions inside of wininit.exe, services.exe, lsass.exe ,one of them being a on purpose BSOD when you kill a certain process so that the rootkit can backup itself, another being a programmed memory.dmp creation instruction and as usually many instances of svchost.exe are not a good sign. I uploaded two of these files to Hybrid-Analysis (online sandbox analyzer) ; svchost.exe Which showed header timestamps into the future (2050) and forged Microsoft signatures Inside of lsass.exe I found TCP connections an Ip which seems to be part of Akamai-Technologies I already know that the best option is to make a clean and secure install in this partition but I wanted to know if this is could possibly be work of an enteprise stealing data or just maybe someone who is playing with tools and tunneling this to that Ip, I would gladly receive any counsel, comment or help for this issue if there was any to kill this malware without the cleanup. Thanks svchost.txt lsass.txt