Enter your Keyword, Search here,

How to Change the Icon of any File Type

In This section will show you how you can change the default icon that is displayed for any file type on your computer. Changing the icons is actually very easy; the most difficult part of the process is trying to figure out what icon to use.

Additionally, keep in mind that you can use any of the new high resolution icons that you can download from the sites.

To get started changing your icons, you are going to want to use the Folder Options feature you used in the Changing Default Launch Application.
Follow these steps to Begin:
  1. Open up Folder Options again by clicking My Computer. Then when it launches, click the Tools menu bar entry and select Folder Options.
  2. Inside Folder Options, click the File Types tab to reveal the list of all of the different file extensions on your computer.
  3. Browse through the list and select the extension for which you want to change the icon.
  4. Once you have the entry selected, click the Advanced button.
  5. On the Edit File Type screen, click the Change Icon button, as shown in Figure below.
  6. The Change Icon screen will be displayed.Here, you will be shown various system icons from which you can choose.If you do not find any that you like, just click the Browse button and select an icon that you downloaded on your computer.
  7. Once you find the perfect icon,click OK to select the new icon.
  8. Then click OK once more to save your changes.
You don't have to reboot after you make your changes, because you will see your changes immediately after you click OK to save them.

How to change the Default launch Application

The information that Explorer looks up to find which program should be used to launch specific file types is stored in the System Registry under the HKEY_CLASSES_ROOT section.

Using the Registry Editor, it is possible to browse to that key and then find the file type that you want to change and edit some keys,but there is a much easier way in Windows XP to accomplish the same task.

Hidden away in Folder Options within any Explorer window resides a useful utility to change the default application easily without having to worry about application IDs and file association structure.
Just follow these steps to change any File Types default launch app:

  • Open up My Computer by clicking the desktop icon or on the icon in the Start panel.
  • When you have My Computer displayed on your screen,click the Tools menu bar item and select Folder Options.
  • Once the Folder Options window appears,click the File Types tab.
  • Navigate through the list of file extensions until you find the extension of the file for which you want to change the default app.Because I want to change my MP3 player default launch app,I am going to select the MP3 file extension.When you find the file extension that you want to change,select it by clicking it.
  • Click the Change button once you have your extension selected.

    The Open With properties window will load,asking you what program to load it with.It will show a list of common programs that you can choose from,but you are not limited to just those programs.Click the Browse button to navigate to any executable file on your computer to specify exactly what program you want to use if it is not on the list.
  • Once you have the application selected that you want to use,just click the OK button to save your changes.You are now finished with changing the launch application
Your changes to file launch applications are activated immediately after you click OK to save your changes. Now you will no longer have to worry about applications taking control of your files.

Manual Removal of W32/Magania.ASNK Trojan

Manual Removal of W32/Magania.ASNK Trojan.
W32/Magania.ASNK is a trojan. The trojan will infect Windows systems.
This trojan first appeared on January 22, 2009.
Other names of W32/Magania.ASNK Trojan:
This trojan is also known as Trojan-GameThief.Win32.Magania.asnk, Worm/AutoRun.EQ.
Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Magania.ASNK Trojan

W32/Magania.ASNK Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
[In Windows Vista Run As Administrator, After Execution System Will Restart]
Download W32/Magania Removal Tool

  • %Windows\system32\optyhww1.dll
  • %Windows\system32\nmdfgds1.dll
  • %Windows\system32\olhrwef.exe
  • %systemdrive%\gy.exe
  • %Windows\system32\nmdfgds0.dll
  • %Windows\system32\urretnd.exe
  • %Systemdrive%\v63enh.exe
  • %Windows\system32\optyhww0.dll
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Magania.ASNK Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal.Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Magania.ASNK Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

Delete The Entries
HKEY_USER\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\(00f68edb-e62a-11dd-9856-001731b674b7)
\Shell\AutoRun\command-I:\v63enh.exe
\Shell\open\Command-I:\v63enh.exe

Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Magania.ASFR Trojan

Manual Removal of W32/Magania.ASFR Trojan.
W32/Magania.ASFR is a trojan. The trojan will infect Windows systems.
This trojan first appeared on January 21, 2009.
Other names of W32/Magania.ASFR Trojan:
This trojan is also known as W32.Gammima.AG, TR/Crypt.XPACK.Gen, Trojan-GameThief.Win32.Magania.asfr
Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Magania.ASFR Trojan
W32/Magania.ASFR Trojan Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
[In Windows Vista Run As Administrator, After Execution System Will Restart]
Download W32/Magania Removal Tool
  • %Windows\System\amvo.exe
  • %Windows\System\cvnmhg0.dll
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Magania.ASFR Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] and then continue with the removal.Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Magania.ASFR Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

HKEY_USER\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run
amvo.exe

Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Agent.BCXR Trojan

Manual Removal of W32/Agent.BCXR Trojan.
W32/Agent.BCXR is a trojan. The trojan will infect Windows systems.
This trojan first appeared on January 20, 2009.
Other names of W32/Agent.BCXR Trojan:
This trojan is also known as Trojan.DL.Aqw.A, Downloader-AQW, TrojanDropper:Win32/Renos.HH, Downloader.Zlob.AIJK.
Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Agent.BCXR Trojan

W32/Agent.BCXR Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\System\msxml71.dll
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.
W32/Agent.BCXR Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] and then continue with the removal.Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Agent.BCXR Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID

Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:

Manual Removal of W32/Downadup.AL Worm

Manual Removal of W32/Downadup.AL Worm.
W32/Downadup.AL is a Worm. The W32/Downadup.AL worm will infect Windows systems.
This worm first appeared on January 19, 2009.
Other names of W32/Downadup.AL Worm:
This Worm is also known as Win32/Conficker, W32/Conficker.worm.gen, Mal/Conficker.
Read F-Secure Downadup.AL Details
Read Symantec Downadup.AL Details
Damage Level : Medium/High
Distribution Level:
Medium
Symantec Removal Tool for W32/Downadup.AL Worm
F-Secure Removal Tool for W32/Downadup.AL Worm
W32/Downadup.AL Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
  • The W32/Downadup.AL Worm copies itself with the random name with *.dll extension in the following locations
  • %Windows System
  • %Programs Files\Internet Explorer
  • %Programs Files\Movie Maker
  • %All Users Application Data
  • %Windows Temp
    ---------------------------------------------
  • %System%\[Random].dll
  • %Program Files%\Internet Explorer\[Random].dll
  • %Program Files%\Movie Maker\[Random].dll
  • %All Users Application Data%\[Random].dll
  • %Temp%\[Random].dll
  • %System%\[Random].tmp
  • %Temp%\[Random].tmp
  • %DriveLetter\RECYCLER\[Folder]\[1fe.a3d][3 random characters]
  • %DriveLetter%\autorun.inf
  • The W32/Downadup.AL Worm copies itself with the random name with .tmp extension in the following locations
  • Windows System
  • Windows Temp
  • The W32/Downadup.AL Worm disables the following services:
  • Windows Automatic Update Service (wuauserv)
  • Background Intelligent Transfer Service (BITS)
  • Windows Security Center Service (wscsvc)
  • Windows Defender Service (WinDefend)
  • Windows Error Reporting Service (ERSvc)
  • Windows Error Reporting Service (WerSvc)
  • The W32/Downadup.AL Worm attempts to block the access to the following security sites which contain the following strings
  • virus, spyware, malware, rootkit, defender, microsoft, symantec, norton, mcafee, trendmicro, sophos, panda, etrust, networkassociates, computerassociates, f-secure, kaspersky, jotti, f-prot, nod32, eset, grisoft, drweb, centralcommand, ahnlab, esafe, avast, avira, quickheal, comodo, clamav, ewido, fortinet, gdata, hacksoft, hauri, ikarus, k7computing, norman, pctools, prevx, rising, securecomputing, sunbelt, emsisoft, arcabit, cpsecure, spamhaus, castlecops, threatexpert, wilderssecurity, windowsupdate, nai, ca, avp, avg, vet, bit9, sans, cert
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.
W32/Downadup.AL Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal.Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Downadup.AL Worm modifies registry at the following locations to ensure its automatic execution at every system startup:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
    "TcpNumConnections" = dword:0x00FFFFFE
  • The worm deletes a number of keys from the registry, in order to deactivate the Security Center Notifications and prevent Windows Defender from starting. It also bypasses the Windows Firewall by creating the following registry entry, so that the system can download a copy of the worm:
  • HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List, [PortNumber]:TCP = "[PortNumber]:TCP:*Enabled:[random]"
  • To hide its presence in the system, the worm deletes any System Restore points created by the user, then modifies the following registry keys:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Advanced\Folder\Hidden\SHO WALLCheckedValue = dword:00000000
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost, netsvcs = %Previous data% and %Random%
  • During infection, the worm may create a temporary (TMP) file in the the System or Temp folders. The TMP file created is registered as a service kernel driver using the following registry entry:
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random]
    Type = dword:00000001
    Start = dword:00000003
    ErrorControl = dword:00000000
    ImagePath = "\...\%Path%\[random].tmp"
    DisplayName = [Random]
  • Once the key is created, the file %MalwarePath%\[random].tmp is deleted.An interesting change the worm makes to the registry involves the following registry entries:
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
    DisplayName = %ServiceName%
    Type = dword:00000020
    Start = dword:00000002
    ErrorControl = dword:00000000
    ImagePath = "%SystemRoot%\system32\svchost.exe -k netsvcs"
    ObjectName = "LocalSystem"
    Description = %description%
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random]\Parameters
    ServiceDll = %Path%

Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/DieMast.M Trojan

Manual Removal of W32/DieMast.M Trojan.
W32/DieMast.M is a trojan. The W32/DieMast.M Trojan will infect Windows systems.
This trojan first appeared on January 17, 2009.
Other names of W32/DieMast.M Trojan:
This trojan is also known as Patched_c.AML, Trojan.Win32.DieMast.m, Trojan.DieMast.A.
Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/DieMast.M Trojan

W32/DieMast.M Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %System%\digeste.dll
  • %Temp%\load1.exe
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.
W32/DieMast.M Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal.Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/DieMast.M Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

UNKNOWN

Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Removing the Clock from the Taskbar

The clock can be very useful if you don't have any other clocks in the same room as your computer.Otherwise,it is just taking up space.
After all, how many clocks do you really need? If you want the maximum amount of space for your toolbars and open programs on the taskbar, I
suggest that you also remove the clock.

Removing the clock is extremely simple.
  • Follow these quick instructions:
  • Right-click the system clock and select Properties.
  • Then,under the Notification Area on the Taskbar and Start Menu Properties window, uncheck Show the Clock.
  • Click OK to save your changes and the clock will be gone.
Done, Get Maximum Space for Toolbars and Open Programs

More Posts that you may be interested...