3com Officeconnect Wireless 11g Access Point Discovery Software Download

0 views
Skip to first unread message
Message has been deleted

Genciana Haggins

unread,
Jul 10, 2024, 4:26:10 AM7/10/24
to illasurnu

Share One Broadband Connection with Wireless Users
The 3Com OfficeConnect Wireless Cable/DSL Gateway is an affordable and easy-to-use small business solution that lets wireless and wired PCs and laptops share a single broadband Internet connection.

Specially designed for small offices, branch offices, and the home, the gateway combines an integrated 802.11b Wi-Fi wireless access point and a four-port Ethernet/Fast Ethernet switch. Up to 32 wireless users or up to 253 total wireless and wired users can share access to a single cable or DSL modem. This means an entire office can economically take advantage of a single broadband connection.

The 3Com OfficeConnect Wireless Cable/DSL Gateway includes many of the IP routing and firewall privacy features of a full-scale router or firewall, at a fraction of the price. Multiple security features protect data and applications. The gateway is easy to install and configureoften no manual configuration is required. And because it conforms to the Wi-Fi wireless standard, it works with any Wi-Fi compatible equipment.

My Windows 7 Professional 64-bit computer had been connected to a LinkSys AC1200+ wireless router, which was connected to a 3com OfficeConnect hub/switch, which was connected via the uplink to a gateway provided by TimeWarner/Spectrum Business Class. But the other night, the hub/switch failed, and I couldn't get on the Internet.

3com officeconnect wireless 11g access point discovery software download


Download File https://vittuv.com/2yN1Ok



For a while, I connected the computer directly to the gateway, via one of its four ports on the back. (I reconfigured the computer's IP and DNS to a fixed IP address.) It probably was this way for less than a day. I suddenly noticed, though, some strange things:

(*) I started getting messages, seemingly one every 5 to 10 minutes, from the real-time protection from Malwarebytes that it was blocking various attacks. I then realized that being connected directly to a port on the "Wild Internet" was really dangerous. So I pulled the plug.

At this point, my Wifi finally came alive (honestly, I had never figured out how to force it to do that when connected via Ethernet, but the cable being plugged in seems to have prevented that---I never thought of that!). I'm now connected through the LinkSys AC 1200+ wireless router. The Wireless connection is configured for DHCP, so I should be safe from picking up any new infections?? (At least, that's the way it was before. The LinkSys wireless router is sitting on the Wild Internet, but it is password protected with a good strong password---NOT admin!)

The odd thing is that my Malwarebytes Anti-Malware Premium scan comes up clean, even though I'm still getting messages every so often that another attempt has been blocked! Does this indicate that something is masquerading as a system (whitelisted) program?? (If this is the case, then would running a threat scan in safe mode pick it up?)

(*) There were two files that were caught and quarantined: 1) First was "Backdoor Zegost" at C:\adg.exe; 2) Second was "RansomWannaCrypt" at C:\Windows\mssecsvc.exe" Microsoft Security Center says that this file should not be allowed to run, associated with ransomware I think.

(*) While backing up some files to DVD-ROM, I noted an odd file in the Documents directory. It is called adxloader.log, and when I opened it with Notepad, it looks as though it was loading things into the Registry maybe. Since I noticed it, it had been modified to a later date, but maybe this happened as a result of opening the file with Notepad. Maybe it's something legit, but I don't recall ever seeing it before. And the stuff inside it looks pretty malicious if it isn't something legit.

(*) There is one other thing---maybe it's normal, or maybe not. When I went to try to retrieve the log file from Malwarebytes Threat scan the Documents and Settings folder shows with a padlock icon over it, and says "Access Denied" when I click on it, EVEN WHEN RUNNING WINDOWS EXPLORER AS ADMIN. Is this normal? Maybe this is for safety?? I was able to view the required logs and save them elsewhere, so not critical, but thought I'd ask.

I will attach the following files to this post: 1) The MalwareBytes Threat Scan Log (which found nothing), which I called MalwareBytesThreatScanLog.txt; 2) The FRST scan log, FRST.txt; 3) the Addition.txt log; 3) Samples of the MalwareBytes blocked threat reports from the Russian site: They are called MalwarebytesBlocked_1.txt, MalwarebytesBlocked_2, MalwarebytesBlocked_3, MalwarebytesBlocked_4 and MalwarebytesBlocked_5; 4) the adxloader.log file, re-saved as a text file. I think that's all. Let me know if you need something else.

My Windows updates are really out of date, sad to say. The updates got stuck at some point, and HP "Smart Friend" deleted a bunch of stuff, including Malwarebytes Anti-Exploit Premium, and really screwed everything up. They wiped out all of the pending updates. But I've been very ill and haven't had the energy to deal with it. I do have a backup I made when I got Acronis Backup, when the system was fairly new. And of course there faling back to a configuration from a few days ago before the hub started failing is an option. I keep all of my important files on a portable drive, though.

I won't do anything at all, such as put in the replacement hub I just got through the mail today, until given the okay. I especially won't restore my direct wired connection yet, as this would require reconfiguring my LAN connection, and I don't want to make anything worse.

Please visit each of the following sites and let's reset all of your browsers back to defaults to prevent unexpected issues.
If you are not using one of the browsers but it is installed then you may want to consider uninstalling it as older versions of some software can pose an increase in the potential for an infection to get in.

I followed your instructions for resetting Internet Explorer 11 (which we're trying not to use anymore, as I view IE as not as safe as Chrome). I first exported the bookmarks and Cookies as files and copied them to my external drive (we can worry later about scanning them?). I haven't restarted the computer yet (which is required for the final step).

Before I do that, can you tell me what is meant by "Make sure you know your password as this will clear it from your account." I want to make sure I understand what will happen as a result of doing this. I currently have a number of Google accounts that are all tied together, but this one is the "master account." I also store all of my zillions of passwords through LastPass, which is hooked up through this gmail account.

So, I need to understand if this will affect my ability to access my gmail accounts through my other Samsung devices. I actually never have my browser save my password anyway, so are you just talking about situations where people have the browser store passwords (my spouse does this, so will need to check and make sure those are written down). I just want to make sure though, that this wiping out of data will only affect this local machine, and not, say, affect all of my accounts, or somehow change my main gmail password, etc.

Command Line: "C:\Program Files (x86)\Microsoft Office\Office12\EXCEL.EXE"
It then apparently changed things in the Registry having to do with CLSID and successfully. It added a new instance of add-in loader, then loaded mscoree.dll, then got the latest CLR version, then checked to see if "API of .NET Framework v4.0 beta is installed," then called "GetInterface method for the CorRuntimeHost interface," started and initialized it, created a new domain setup.

It then enables a shadow copy of C:\Program Files\WinZip, creates a "new application domain," creates an instance of the managed class: Assembly identity: 'WinZipExpressForOffice, PublicKeyToken=86E07F6D9D2175EE', successfully queries a bunch of things, and then finishes with "The managed add-in class has been created successfully."

The other night, while looking up information about one of the exe files in the Malwarebytes blocked websites (through Google), I got a link to a strange website that seemed to have mostly Russians asking questions on some forum. (Wish I could remember what the search was.) Just now, I did a search for adxloader.log, and ended up getting a link to the exact same website:

There are two people with Russian names discussing how to change the location of a.d.x.l.o.a.d.e.r(dot)log. One ended his post with "H.a.c.k.i.n.g. m.y. w.a.y. t.h.r.o.u.g.h. l.i.f.e., o.n.e. s.y.n.t.a.x. e.r.r.o.r. a.t. a. t.i.m.e." and another said "R.e.g.a.r.d.s. f.r.o.m. B.e.l.a.r.u.s."

I note with alarm that the examples they posted to the screen look verbatim like some of the text from the adxloader.log file I attached---the text re: shadow copy, for example. They seem to be discussing that things won't work in Windows Vista, etc. If this were a legitimate company, then wouldn't they be working on Windows 10 and newer software? I'm just sayin'. This seems to be some sort of hacker site.

It means that the web browser stores your password (not all that securely) and by removing all the cookies and settings it will no longer automatically log you back into your Google account. It makes no other changes. Yes, unfortunately there are many underground sites that deal in helping each other on how to circumvent Windows protections and how to make the computer do things they want so they can get more control. We want to clean up all the browsers as that is often one of the ways they start to get a foothold on your system. Then we'll follow up with the scans below.

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

I wanted to make you aware of what I just found. Malwarebytes Anti-Malware Premium's real-time blocking has been regularly blocking outbound communication to the Russian website, as you know. I have now noticed that it is re-queueing itself to run exactly every three hours (12:05 am, 3:05 am; 6:05 am, 12:05 pm was the latest). I checked the Task Scheduler, but didn't see anything, and in fact had read that tasks can be scheduled to be hidden. While looking up something online about viruses scheduling hidden tasks, I found a program from Microsoft called autoruns - sysinternals designed to display everything scheduled to autorun. I downloaded it and was looking at it, when I noticed something that is extremely suspicious.

b1e95dc632
Reply all
Reply to author
Forward
0 new messages