Trojan infection Hey Guys, does anyone else get a trojan warning with the OEMBIOS changer installer.exe? Latest SEP labels it infected and I cannot work with it.
Man you got that right...!!! I am surprised it doesn't label its own .exe and delete itself... Of course they may yet...I think Symantec and McAfee are not worth the trouble they cause...
Thanks alot mate, you've given life anew to my old pc equipt with vlk keys before, now its OEM pro. THANKS
Ran it on a xp pro VLK install,followed the instructions and placed all the appropriate files in the correct folders. I did everything and OEMBIOS changer now shows the PID for this version as 55274OEM so as far as I can tell it seems ok and it goes through Microsoft as a legit key. Is that correct up to now? I wanted to ask this though...when I run the XP Activation OOBE Check, I get a screen pop up saying that 'windows cannot find C:\WINDOWS\system32\oobe\msoobe.exe' Is that normal or have I done something wrong? After I did the VLK to OEM change,I deleted the antiWPA3 because I didn't think I needed it. After I rebooted I got a screen saying I had 5 days to activate windows. Wasn't sure if I'd done wrong so I just installed the antiWPA3 patch again and its been fine since. Just curious in case I've made a mistake somewhere along the line. Thanks in advance if someone can give me a bit of friendly advice.
I don't know. How do I check if I have the string? I've downloaded SLIC 1.0 for my motherboard,Asus P5VD2-MX. But what do I have to do next? Can anyone point me in the right direction? I'm willing to learn but not sure where to read next. Thanks.
Symantec is crap...this is no trojan, I have converted the .bat to an EXE...This may be the problem.. First suggestion is to nix the Symantec....
If you don't trust the download, do this: Temporarily disable SEP. Download "OEMBIOS changer installer.exe"; don't run it. Open "OEMBIOS changer installer.exe" with WinRar (or 7zip), and extract "OEMBIOS changer.exe"; don't run it. From "OEMBIOS changer.exe", extract the "OEMBIOS changer" folder with WinRar (or 7zip). You can now delete "OEMBIOS changer installer.exe" and "OEMBIOS changer.exe". Enable SEP and scan the "OEMBIOS changer" folder; my KIS didn't find any. In the "OEMBIOS changer" folder, OEM.exe is the main executable, but you'll find its script version in the folder "source CMD file" inside the "Activation check and Serial tools" folder: "OEM.cmd.src". You can verify its innocuity: open with Notepad or other text editor and read it. You can decide to run that script instead of the executable: rename to "OEM.cmd" and place it in the root of "OEMBIOS changer" folder. Some of the other executables in the "Activation check and Serial tools" folder are from "official" sources (mgadiag, crystaldmi), others not; you can decide whether to run them or not in the batch script, you're free to modify it if you know what you're doing.