IT Support
Home | About | Contact | |

Technology and Solutions

  • Security

    StL MobileTech offers a range of Security Solutions. The data industry has seen an escalation in breaches . The result of such an increase is greater demands on the businesses servicing the cyber industry. StL MobileTech can help simply the process of securing your data by implementing the lastest security technologies

    Read More
  • Productivity

    In today‘s economy, businesses require fast, professional and intelligent Information Technonly solutions. StL MobileTech helps businesses take everyday demands and turn them into profit. Small businesses are keenly aware of the need to maximize every dollar, StL MobileTech will help streamline your Technoloy so that you can focus on your bottom line.

    Read More
  • Solutions

    StL MobileTech offers customerized solutions. What does that mean? That means that if you have a Technology solution that needs to be implemented, no matter how big or small, StL MobileTech will be there for you. From Digital Signage, Telephone system installs, Cable Runs, Card Access support, Security Camera installation, Consultation, etc. Call today!

    Read More
  • Worry-Free

    Let StL MobileTech take the worry out of running your devices or business so that you can focus on greater profitability, client retention, access to information, flexibility, faster response rates, performance and quality of life. ...ALL THE THINGS THAT MAKE YOU A SUCCESS!

    Read More

(NOTE: This page loads content dynamically, to view more tips, click the refresh button on the top of you browser or press CTL+R)
Did you know???

View Intermediate and Advanced Tips
Below this article

New Users                            Learn more...
Did you know that you can add devices to your computer to make your computer more productive. This is usually called an "upgrade".
  • You can add memory to help the computer move data faster.
  • You can upgrade the hard disk drive to a larger size to store larger and more files. This is helpful if you edit multimedia, download songs or store image files. With a larger drive you can centralize all of your files on one drive
  • You can add CD/DVD Drives. These drives allow you play CD's and DVD's. The CD/DVD writeable drives have a nice feature which is they allow you to back up and restore Data on your hard drive.
  • You can also update to a faster processor, dependant upon the mainboard specifications. This will allow you to process data files at a higher frequency(faster).
  • The list is almost infinite with the many things you can add to your system. It really depends on what you would like to do with your system. One example would be, wanting to connect to the internet. Depending on how you connect to the internet, you can connect a modem or NIC.

This article is for informational and educational purposes only. It is not intended as a Virus removal guide.

Ever find your computer Running Slow and you are not sure WHY?

For starters, here are a few programs to AVOID.

  1. XP Smart Antivirus 2010 Recently Added: XP Smart Antivirus 2010 (files to look for: ave.exe)
  2. Security Essentials 2010 Recently Added: Security Essentials 2010 (files to look for: SE2010.exe, fibumazi.dll,, etc.)
  3. Internet Security 2010 Recently Added: Internet Security 2010 (files to look for: winupdate86.exe , winhelper86.dll, winlogon86.exe, is2010.exe, etc.)
  4. Control Center Recently Added: Control Center (files to look for: ccagent.exe , ccmain.exe, settings.ini, uninstall.exe, etc.)
  5. Cyber Protection System Recently Added: Cyber Protection System (files to look for: cs.exe, etc.)
  6. Safety Center Recently Added: Safety Center (files to look for: start.exe , main.ico, tst.exe, protector.exe.)
  7. Security Tool Recently Added: Security Tool (files to look for: randomly generated .exe file, see link for details etc.)
  8. GreenAV Recently Added: GreenAV (files to look for: GreenAV_Install[?].exe, exdll.dll, nsis.hdr, etc.)
  9. Protection System Recently Added: Protection System (files to look for: psystem.exe, coreext.dll, firewall.dll, etc.)
  10. Windows Security Suite Recently Added: Windows Security Suite (files to look for: wi904c.exe, ANTIGEN.exe, SICKBOY.exe, etc.)
  11. MS AntiSpyware 2009 Recently Added: MS AntiSpyware 2009 (files to look for: msas2009.exe, etc.)
  12. WinPC Defender Recently Added: WinPC Defender (files to look for: pcdefender.exe, etc.)
  13. Personal Antivirus Recently Added: Personal Antivirus (files to look for: pav.exe, etc.)
  14. Internet Antivirus Pro Recently Added: Internet Antivirus Pro (files to look for: IAPro.exe, etc.)
  15. AntiSpyware Pro Recently Added: AntiSpyware Pro (files to look for: AntiSpyware Pro.exe, ASProSB.dll, etc.)
  16. Recently Added: DriveCleaner Free (files to look for:
    C:\Documents and Settings\Owner\Local Settings\Temp\UDC6_4444_D21M0303\installer.exe
    C:\Program Files\Common Files\DriveCleaner Free\dchlp.dll
    C:\Program Files\Common Files\DriveCleaner Free\UDCPAS.EXE
    C:\Program Files\Common Files\DriveCleaner Free\UDCSDR.EXE
    C:\Program Files\DriveCleaner Free\pv.exe
    C:\Program Files\DriveCleaner Free\UDC6CW.EXE
    C:\Program Files\DriveCleaner Free\UDCPChk.dll
    C:\Program Files\DriveCleaner Free\InstHelp.exe
    C:\Program Files\DriveCleaner Free\UDC.exe , etc.)
  17. AntiVirus360 Read more Below. (files to look for: av360.exe, winconfig.dll, etc.)
  18. NewDotNet (files to look for: nnrun.exe, nncore.dll, etc.)
  19. Antivirus 2009 Read more Below.   (files to look for: av2009.exe, etc.)
  20. webHancer Agent  (files to look for: whagent.exe,, etc.)
  21. VirusRemover2008  (files to look for: VirusRemover2008_Setup_Free_en.exe, etc.)
  22. VirusTrigger 2.1  (files to look for: VirusTriggerBin.exe, VirusTriggerBinWarning.dll, etc.) 
  23. Network Monitor  (files to look for: netmon.exe, etc.) 
  24. Other Files to look for: (svchstb.dll, freescan.htm)
  25. Win32.Netsky.Q  (files to look for: fhexj*.exe, etc.) 

Today we are going to give you some information to help you keep your PC free of Malware, Viruses and Spyware. Here are a few names to kick around FOR NOW.

The new face of AntiVirus 2009 (Read more about AntiVirus 2009 below) is AntiVirus 360 (av360.exe)
It has all the goodies of the old version with some new names. I guess these people are getting paid? Be very cautious about installing . If installed you may see
Below are a Few ScreenShots.

  1. winconfig.dll   299,088 bytes   CLSID: D263FA6D-84CC-48A8-9AF6-C664362B7A5B
Find more information on Av360 here

AntiVirus 2009 (FAKE SCANNER)


  1. " ?product= %product%& aff=%aff%&update=%update%& crypt=g"
  2. http://microsoft.securityinfohelp. com/2009/presale.php ?aid=&u=2

This one is Great. It LOOKS like a legitimate program to download and install and a lot of our clients have. Unfortunately, this is another malicious program that notifies you that you have been infected with so many threats that you feel like you have to install this program and get rid of the threats. Oh, from what we have been told they provide a way for you to pay them. Wow!

Well, what you soon learn is that your PC is behaving strangely. Over time, you will not be able to get to certain sites and you are not allowed to install certain programs that might detect the malware. Your PC will begin to perform poorly (i.e. running slow and crashing).

This thing has soooooo many faces to it that, while virus scanners get most OR some of it, you are left with pieces of it on your computer that ensures the process will start again. Thus creating a never ending cycle!

Computer Tip: Some files hide themselves in the System Restore files and folders.

Be sure to visit StL MobileTech's Free Download Center to get Free Programs that can help you protect your computer!

Below are some screenshots. If you need assistance with removal of this or any malware/ spyware of Virus, contact us at 314-496-5193!

Delete this folder:
C:\Program Files\Antivirus 2009
it contains the file: av2009.exe
Here are a couple of registry entries to look for, however, if you are not familiar with the registry...DON'T TOUCH IT!
Name: 4c23ed73
Type: REG_SZ
Data: rundll32.exe "C:\WINDOWS\system32\djcrocjg.dll",b

Name: BM4f10deef
Type: REG_SZ
Data: Rundll32.exe "C:\WINDOWS\system32\gkovpwci.dll",s

Name: pPath
Type: REG_SZ
Data: "C:\Program Files\Antivirus 2009\av2009.exe"
Click to Enlarge    
Click to Enlarge    
Click to Enlarge

Lastly, you may want to look for the following files and verify that they are legit. They are usually in the C:\WINNT\System32\ OR C:\Windows\System32\  folder.

  1. mmeluy.dll   129,024 bytes   CLSID: e7fccdac-0d16-ed2b-e1f4-6fff9b54ace9 AND 9eca45b9-fff6-4f1e-b2de-61d0cadccf7e
  2. winsystems.dll   297,472 bytes  CLSID: 0B014B81-4E12-46F9-806F-55867AF8FD3C
These are Browser Helper Objects (BHO).

Next, we'll discuss things associated with Win32_Netsky_q ( High Risk Worm)

This is a nasty one (Risk Level:HIGH); usually passed through email attachments or maybe codecs. Once your PC is infected, the worm can scan your address book and send itself to all of your friends and colleagues. I guess you will know if they are really you friends when they get the email? This Email Worm is malicious and spreads without any help from the user. In addition to Email, Worms can use vulnerabilities of networks to self-perpetuate across any given network. Some worms can consume substantial amounts of your PC' s available assets making it agonizing to work with. Misery loves company. Don't forget, Worms, have friends and they are getting invited too. You may OR may not notice it. However, you may have programs with malicious intent installed on your computer that you did not install. Those are the friends!

If you have uninvited guests, StL MobileTech can help clean up the party!

Below are some file names that you can look for on your PC that are associated with this virus. We have also attached some screenshots.


  • C:\Documents and Settings\<USER NAME>\Application Data\Google\fhexj<NUMBERS>.exe
  •  helper.dll
  • C:\WINDOWS\system32\mst122.dll (You may find it under C:\WINNT\system32\mst122.dll  as well)
  • affected file SHUTDOWN.EXE
Of course, Google is not associated with this, even though it installs to a folder called Google.
Click to Enlarge    
Click to Enlarge
If you see these addresses in your browser, you may have malware/ spyware on your PC!

»» ?c=8473ec75d8382f3b5df6d9993b00


Remeber you can go to StL MobileTech's Free Download Center to get Free Programs to help you protect your computer by taking pre-emptive actions. These programs ONLY help protect your PC! Nothing more. You must ensure that your protection is updated regularly and that scans are performed regularly.

Intermediate Users                   Learn more...
Below are a few not-so common examples of hot keys for PC's.
  • ALT+TAB allows you to move between open windows
  • ALT+ESC allows you to move through windows in the order they were opened.
  • F5 allows you to Refresh the window
  • F1 allows you to view Help files.

Advanced Users                   Learn more...
  1. Drivers are software programs that allows your peripheral hardware devices to communicate with the computer. They are essential for operation of hardware devices. However, there are occasions when drivers do not properly install unassisted. The below steps can help with the installation of driver files.
    • Click Start > Run
    • Type devmgmt.msc (OS Dependent)
    • Alternatively, right-click on My Computer
    • Click "Properties"
    • Click "Hardware"
    • Click "Device Manager"
    • A window will open, Select the type of device you would like to install drivers for. Usually, if the drivers did not install properly you will see a yellow question mark labeled "Other..."
    • If you see a [+] sign to the left of the question mark, click it. That will expand the category so you can see the device. Right-click the device
    • Click "Properties"
    • Click the "Driver" Tab
    • Click "Update Driver"
    • When the wizard appears click Next.
    • At this point you can let windows search for a driver or you can specify where the install files are located. Either option, you elect will give you a chance to specify a location. One will say "Specify a Location" the other will say "Have Disk"
    • Once you locate the correct files, windows will install the files and inform you if the files installed successfully.
Thank You for visiting StL MobileTech today.

We have also added links to e-mail us so that we can make your visit with us more enjoyable. We can only do this with your feedback. So please, feel free to submit your comments.

Shop Securely Online (see privacy). For your convenience we do accept major credit cards via real-time processing. We will soon add a Check service. This is due to the enormous amount of request to have checks as a method of payment. As you know it is our utmost priority to assure that your needs are accommodated.

Once again, We Thank You For Visiting Us.
       Enjoy your Shopping experience.

Please contact us at Comments Welcome, we can not wait to hear from you.

Return Policy