Resend my activation email : Register : Log in 
BCF: Bike Chat Forums


Bad wee virus in W7

Reply to topic
Bike Chat Forums Index -> The Geek Zone
View previous topic : View next topic  
Author Message

Rank Bajin
Two Stroke Sniffer



Joined: 08 Dec 2011
Karma :

PostPosted: 12:51 - 17 Dec 2012    Post subject: Bad wee virus in W7 Reply with quote

My AVG internet security expired with no warning on Saturday. Now I've got a virus that won't let me start Windows Security and won't let me access any Microsoft or antivirus sites. Tried downloading antivirus/malware removers onto a another PC and installing on mine via a USB stick, but no joy.
Any of you folks got any ideas that might help me avoid a format & reinstall? Sad
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

The Artist
Super Spammer



Joined: 06 Jan 2008
Karma :

PostPosted: 12:53 - 17 Dec 2012    Post subject: Reply with quote

Restart in safe mode, install malware anti malbytes or whatever its called.

If you can't do that, you need to boot off a live cd and do the same.
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Rank Bajin
Two Stroke Sniffer



Joined: 08 Dec 2011
Karma :

PostPosted: 13:04 - 17 Dec 2012    Post subject: Bad wee virus in W7 Reply with quote

Tried using MalwareBytes in safe mode, but no joy. Same with virus software as they all need to connect to the sites to update, which the virus is blocking.
Not sure what you mean by booting from a live cd - do you mean from the W7 disc? Very Happy
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

The Artist
Super Spammer



Joined: 06 Jan 2008
Karma :

PostPosted: 13:10 - 17 Dec 2012    Post subject: Reply with quote

Google "live cd"
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Ichy
World Chat Champion



Joined: 15 Jul 2005
Karma :

PostPosted: 13:16 - 17 Dec 2012    Post subject: Reply with quote

Give https://www.pendriveapps.com/tag/portable-antivirus/ a try.

Loads of antivirus software that runs off a USB.

https://thepcsecurity.com/ultimate-list-of-portable-antiviruses-for-your-usb/

Obviously you will need to use another PC to install them Wink
____________________
https://www.metacafe.com/watch/1972097/how_to_behave_on_a_forum/
 Back to top
View user's profile Send private message You must be logged in to rate posts

Rank Bajin
Two Stroke Sniffer



Joined: 08 Dec 2011
Karma :

PostPosted: 13:54 - 17 Dec 2012    Post subject: Bad wee virus in W7 Reply with quote

Thanks, guys. I'll try your suggestions out tonight & let you know how I get on. Just don't want to format & reinstall 'cos I've never figured out how to retain all my emails & stuff in Outlook. Very Happy Very Happy Very Happy
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Andy_Pagin
World Chat Champion



Joined: 08 Nov 2010
Karma :

PostPosted: 14:04 - 17 Dec 2012    Post subject: Reply with quote

Do you know what virus you have? Sounds like the Conficker worm.

I've copied this from https://support.microsoft.com/kb/962007, since you probably can't get to it yourself.


Virus alert about the Win32/Conficker worm
Article ID: 962007 - View products that this article applies to.

Summary
The information in this Knowledge Base article is intended for business environments that have system administrators who can implement the details in this article. There is no reason to use this article if your antivirus program is cleaning the virus correctly and if your systems are fully updated. To confirm that the system is clean of the Conficker virus, perform a quick scan from the following Web page:

https://safety.live.com

For detailed information about the Conficker virus, visit the following Microsoft Web page:
https://www.microsoft.com/security/portal/Threat/Encyclopedia
/Entry.aspx?Name=Win32%2fConficker

Symptoms of infection
If your computer is infected with this worm, you may not experience any symptoms, or you may experience any of the following symptoms:

Account lockout policies are being tripped.
Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender, and Error Reporting Services are disabled.
Domain controllers respond slowly to client requests.
The network is congested.
Various security-related Web sites cannot be accessed.
Various security-related tools will not run. For a list of known tools, visit the following Microsoft Web page, and then click the Analysis tab for information about Win32/Conficker.D. For more information, visit the following Microsoft Web page:
https://www.microsoft.com/security/portal/Entry.aspx?Name=Worm%3aWin32%2fConficker.D

For more information about Win32/Conficker, visit the following Microsoft Malware Protection Center Web page:
https://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker
Back to the top | Give Feedback
Propagation methods
Win32/Conficker has multiple propagation methods. These include the following:

Exploitation of the vulnerability that is patched by security update 958644 (MS08-067)
The use of network shares
The use of AutoPlay functionality

Therefore, you must be careful when you clean a network so that the threat is not reintroduced to systems that have previously been cleaned.

Note The Win32/Conficker.D variant does not spread to removable drives or shared folders over a network. Win32/Conficker.D is installed by previous variants of Win32/Conficker.
Back to the top | Give Feedback
Prevention

Use strong administrator passwords that are unique for all computers.
Do not log on to computers by using Domain Admin credentials or credentials that have access to all computers.
Make sure all systems have the latest security updates applied.
Disable the Autoplay features. For more information, see step 3 of the "Create a Group Policy object" section.
Remove excessive rights to shares. This includes removing write permissions to the root of any share.

Mitigation steps
Stop Win32/Conficker from spreading by using Group Policy settings
Notes

Important Make sure that you document any current settings before you make any of the changes that are suggested in this article.
This procedure does not remove the Conficker malware from the system. This procedure only stops the spread of the malware. You should use an antivirus product to remove the Conficker malware from the system. Or, follow the steps in the "Manual steps to remove the Win32/Conficker virus" section of this Knowledge Base article to manually remove the malware from the system.
You may be unable to correctly install applications, service packs, or other updates while the permission changes that are recommended in the following steps are in place. This includes, but is not limited to, applying updates by using Windows Update, Microsoft Windows Server Update Services (WSUS) server, and System Center Configuration Manager (Configuration Manager 2007), as these products rely on components of Automatic Updates. Make sure that you change the permissions back to default settings after you clean the system.
For information about the default permissions for the SVCHOST registry key and the Tasks Folder that are mentioned in the "Create a Group Policy object" section, see the Default permissions table at the end of this article.

Create a Group Policy object
Create a new Group Policy object (GPO) that applies to all computers in a specific organizational unit (OU), site, or domain, as required in your environment.

To do this, follow these steps:

Set the policy to remove write permissions to the following registry subkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Svchost
This prevents the randomly named malware service from being created in the netsvcs registry value.

To do this, follow these steps:
Open the Group Policy Management Console (GPMC).
Create a new GPO. Give it any name that you want.
Open the new GPO, and then move to the following folder:
Computer Configuration\Windows Settings\Security Settings\Registry
Right-click Registry, and then click Add Key.
In the Select Registry Key dialog box, expand Machine, and then move to the following folder:
Software\Microsoft\Windows NT\CurrentVersion\Svchost
Click OK.
In the dialog box that opens, click to clear the Full Control check box for both Administrators and System.
Click OK.
In the Add Object dialog box, click Replace existing permissions on all subkeys with inheritable permissions.
Click OK.
Set the policy to remove write permissions to the %windir%\Tasks folder. This prevents the Conficker malware from creating the Scheduled Tasks that can reinfect the system.

To do this, follow these steps:
In the same GPO that you created earlier, move to the following folder:
Computer Configuration\Windows Settings\Security Settings\File System
Right-click File System, and then click Add File.
In the Add a file or folder dialog box, browse to the %windir%\Tasks folder. Make sure that Tasks is highlighted and listed in the Folder dialog box.
Click OK.
In the dialog box that opens, click to clear the check boxes for Full Control, Modify, and Write for both Administrators and System.
Click OK.
In the Add Object dialog box, click Replace existing permissions on all subkeys with inheritable permissions.
Click OK.
Set AutoPlay (Autorun) features to disabled. This keeps the Conficker malware from spreading by using the AutoPlay features that are built into Windows.

Note Depending on the version of Windows that you are using, there are different updates that you must have installed to correctly disable the Autorun functionality:
To disable the Autorun functionality in Windows Vista or in Windows Server 2008, you must have security update 950582 installed (described in security bulletin MS08-038).
To disable the Autorun functionality in Windows XP, in Windows Server 2003, or in Windows 2000, you must have security update 950582, update 967715, or update 953252 installed.
To set AutoPlay (Autorun) features to disabled, follow these steps:
In the same GPO that you created earlier, move to one of the following folders:
For a Windows Server 2003 domain, move to the following folder:
Computer Configuration\Administrative Templates\System
For a Windows 2008 domain, move to the following folder:
Computer Configuration\Administrative Templates\Windows Components\Autoplay Policies
Open the Turn off Autoplay policy.
In the Turn off Autoplay dialog box, click Enabled.
In the drop-down menu, click All drives.
Click OK.
Close the Group Policy Management Console.
Link the newly created GPO to the location that you want it to apply to.
Allow for enough time for Group Policy settings to update to all computers. Generally, Group Policy replication takes five minutes to replicate to each domain controller, and then 90 minutes to replicate to the rest of the systems. A couple hours should be enough. However, more time may be required, depending on the environment.
After the Group Policy settings have propagated, clean the systems of malware.

To do this, follow these steps:
Run full antivirus scans on all computers.
If your antivirus software does not detect Conficker, you can use the Malicious Software Removal Tool (MSRT) to clean the malware. For more information, visit the following Microsoft Web page:
https://www.microsoft.com/security/malwareremove/default.mspx
Note You may have to follow some manual steps to clean up all the effects of the malware. We recommend that you review the steps that are listed in the "Manual steps to remove the Win32/Conficker virus" section of this article to clean up all the effects of the malware.

Recovery
Run the Malicious Software Removal tool
The Microsoft Malware Protection Center has updated the Malicious Software Removal tool (MSRT). This is a stand-alone binary that is useful in the removal of prevalent malicious software, and it can help remove the Win32/Conficker malware family.

Note The MSRT does not prevent reinfection because it is not a real-time antivirus program.

You can download the MSRT from either of the following Microsoft Web sites:
https://www.update.microsoft.com
https://support.microsoft.com/kb/890830

For more information about specific deployment details for the MSRT, click the following article number to view the article in the Microsoft Knowledge Base:
891716 Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment
Note The Stand-Alone System Sweeper tool will also remove this infection. This tool is available as a component of the Microsoft Desktop Optimization Pack 6.0 or through Customer Service and Support. To obtain the Microsoft Desktop Optimization Pack, visit the following Microsoft Web site:
https://www.microsoft.com/windows/enterprise/technologies/mdop.aspx
If Microsoft Security Essentials or Microsoft Forefront Client Security is running on the system, these programs also block the threat before it is installed.
Manual steps to remove the Win32/Conficker virus
Notes

These manual steps are not required any longer and should only be used if you have no antivirus software to remove the Conficker virus.
Depending on the Win32/Conficker variant that the computer is infected with, some of these values referred to in this section may not have been changed by the virus.

The following detailed steps can help you manually remove Conficker from a system:

Log on to the system by using a local account.

Important Do not log on to the system by using a Domain account, if it is possible. Especially, do not log on by using a Domain Admin account. The malware impersonates the logged on user and accesses network resources by using the logged on user credentials. This behavior allows for the malware to spread.
Stop the Server service. This removes the Admin shares from the system so that the malware cannot spread by using this method.

Note The Server service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on production servers because this step will affect network resource availability. As soon as the environment is cleaned up, the Server service can be re-enabled.

To stop the Server service, use the Services Microsoft Management Console (MMC). To do this, follow these steps:
Depending on your system, do the following:
In Windows Vista and Windows Server 2008, click Start, type services.msc in the Start Search box, and then click services.msc in the Programs list.
In Windows 2000, Windows XP, and Windows Server 2003, click Start, click Run, type services.msc, and then click OK.
Double-click Server.
Click Stop.
Select Disabled in the Startup type box.
Click Apply.
Remove all AT-created scheduled tasks. To do this, type AT /Delete /Yes at a command prompt.
Stop the Task Scheduler service.
To stop the Task Scheduler service in Windows 2000, Windows XP, and Windows Server 2003, use the Services Microsoft Management Console (MMC) or the SC.exe utility.
To stop the Task Scheduler service in Windows Vista or in Windows Server 2008, follow these steps.

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
Click Start, type regedit in the Start Search box, and then click regedit.exe in the Programs list.
Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule
In the details pane, right-click the Start DWORD entry, and then click Modify.
In the Value data box, type 4, and then click OK.
Exit Registry Editor, and then restart the computer.

Note The Task Scheduler service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on Windows Vista and Windows Server 2008 because this step will affect various built-in Scheduled Tasks. As soon as the environment is cleaned up, re-enable the Server service.
Download and manually install security update 958644 (MS08-067). For more information, visit the following Microsoft Web site:
https://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
Note This site may be blocked because of the malware infection. In this scenario, you must download the update from an uninfected computer, and then transfer the update file to the infected system. We recommend that you burn the update to a CD because the burned CD is not writable. Therefore, it cannot be infected. If a recordable CD drive is not available, a removable USB memory drive may be the only way to copy the update to the infected system. If you use a removable drive, be aware that the malware can infect the drive with an Autorun.inf file. After you copy the update to the removable drive, make sure that you change the drive to read-only mode, if the option is available for your device. If read-only mode is available, it is typically enabled by using a physical switch on the device. Then, after you copy the update file to the infected computer, check the removable drive to see whether an Autorun.inf file was written to the drive. If it was, rename the Autorun.inf file to something like Autorun.bad so that it cannot run when the removable drive is connected to a computer.
Reset any Local Admin and Domain Admin passwords to use a new strong password. For more information, visit the following Microsoft Web site:
https://technet.microsoft.com/en-us/library/cc875814.aspx
In Registry Editor, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
In the details pane, right-click the netsvcs entry, and then click Modify.
If the computer is infected with the Win32/Conficker virus, a random service name will be listed.

Note With Win32/Conficker.B, the service name was random letters and was at the bottom of the list. With later variants, the service name may be anywhere in the list and may seem to be more legitimate. If the random service name is not at the bottom, compare your system with the "Services table" in this procedure to determine which service name may have been added by Win32/Conficker. To verify, compare the list in the "Services table" with a similar system that is known not to be infected.

Note the name of the malware service. You will need this information later in this procedure.
Delete the line that contains the reference to the malware service. Make sure that you leave a blank line feed under the last legitimate entry that is listed, and then click OK.

Notes about the Services table
All the entries in the Services table are valid entries, except for the items that are highlighted in bold.
The items that are highlighted in bold are examples of what the Win32/Conficker virus may add to the netsvcs value in the SVCHOST registry key.
This may not be a complete list of services, depending on what is installed on the system.
The Services table is from a default installation of Windows.
The entry that the Win32/Conficker virus adds to the list is an obfuscation technique. The highlighted, malicious entry that is supposed to resemble the first letter is a lowercase "L." However, it is actually an uppercase "I." Because of the font that is used by the operating system, the uppercase "I" seems to be a lowercase "L."
Services table
Expand this table
Windows Server 2008 Windows Vista Windows Server 2003 Windows XP Windows 2000
AeLookupSvc AeLookupSvc AppMgmt 6to4 EventSystem
wercplsupport wercplsupport AudioSrv AppMgmt Ias
Themes Themes Browser AudioSrv Iprip
CertPropSvc CertPropSvc CryptSvc Browser Irmon
SCPolicySvc SCPolicySvc DMServer CryptSvc Netman
lanmanserver lanmanserver EventSystem DMServer Nwsapagent
gpsvc gpsvc HidServ DHCP Rasauto
IKEEXT IKEEXT Ias ERSvc Iaslogon
AudioSrv AudioSrv Iprip EventSystem Rasman
FastUserSwitchingCompatibility FastUserSwitchingCompatibility Irmon FastUserSwitchingCompatibility Remoteaccess
Ias Ias LanmanServer HidServ SENS
Irmon Irmon LanmanWorkstation Ias Sharedaccess
Nla Nla Messenger Iprip Ntmssvc
Ntmssvc Ntmssvc Netman Irmon wzcsvc
NWCWorkstation NWCWorkstation Nla LanmanServer
Nwsapagent Nwsapagent Ntmssvc LanmanWorkstation
Rasauto Rasauto NWCWorkstation Messenger
Rasman Rasman Nwsapagent Netman
Iaslogon Iaslogon Iaslogon Iaslogon
Remoteaccess Remoteaccess Rasauto Nla
SENS SENS Rasman Ntmssvc
Sharedaccess Sharedaccess Remoteaccess NWCWorkstation
SRService SRService Sacsvr Nwsapagent
Tapisrv Tapisrv Schedule Rasauto
Wmi Wmi Seclogon Rasman
WmdmPmSp WmdmPmSp SENS Remoteaccess
TermService TermService Sharedaccess Schedule
wuauserv wuauserv Themes Seclogon
BITS BITS TrkWks SENS
ShellHWDetection ShellHWDetection TrkSvr Sharedaccess
LogonHours LogonHours W32Time SRService
PCAudit PCAudit WZCSVC Tapisrv
helpsvc helpsvc Wmi Themes
uploadmgr uploadmgr WmdmPmSp TrkWks
iphlpsvc iphlpsvc winmgmt W32Time
seclogon seclogon wuauserv WZCSVC
AppInfo AppInfo BITS Wmi
msiscsi msiscsi ShellHWDetection WmdmPmSp
MMCSS MMCSS uploadmgr winmgmt
browser ProfSvc WmdmPmSN TermService
winmgmt EapHost xmlprov wuauserv
SessionEnv winmgmt AeLookupSvc BITS
ProfSvc schedule helpsvc ShellHWDetection
EapHost SessionEnv helpsvc
hkmsvc browser xmlprov
schedule hkmsvc wscsvc
AppMgmt AppMgmt WmdmPmSN
sacsvr hkmsvc
In a previous procedure, you noted the name of the malware service. In our example, the name of the malware entry was "Iaslogon." Using this information, follow these steps:
In Registry Editor, locate and then click the following registry subkey, where BadServiceName is the name of the malware service:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BadServiceName
For example, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Iaslogon
Right-click the subkey in the navigation pane for the malware service name, and then click Permissions.
In the Permissions Entry for SvcHost dialog box, click Advanced.
In the Advanced Security Settings dialog box, click to select both of the following check boxes:
Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here.

Replace permission entries on all child objects with entries shown here that apply to child objects.
Press F5 to update Registry Editor. In the details pane, you can now see and edit the malware DLL that loads as "ServiceDll." To do this, follow these steps:
Double-click the ServiceDll entry.
Note the path of the referenced DLL. You will need this information later in this procedure. For example, the path of the referenced DLL may resemble the following:

%SystemRoot%\System32\doieuln.dll

Rename the reference to resemble the following:

%SystemRoot%\System32\doieuln.old

Click OK.
Remove the malware service entry from the Run subkey in the registry.
In Registry Editor, locate and then click the following registry subkeys:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
In both subkeys, locate any entry that begins with "rundll32.exe" and also references the malware DLL that loads as "ServiceDll" that you identified in step 12b. Delete the entry.
Exit Registry Editor, and then restart the computer.
Check for Autorun.inf files on any drives on the system. Use Notepad to open each file, and then verify that it is a valid Autorun.inf file. The following is an example of a typical valid Autorun.inf file.

[autorun]

shellexecute=Servers\splash.hta *DVD*

icon=Servers\autorun.ico

A valid Autorun.inf is typically 1 to 2 kilobytes (KB).
Delete any Autorun.inf files that do not seem to be valid.
Restart the computer.
Make hidden files visible. To do this, type the following command at a command prompt:
reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 0x1 /f
Set Show hidden files and folders so that you can see the file. To do this, follow these steps:
In step 12b, you noted the path of the referenced .dll file for the malware. For example, you noted a path that resembles the following:
%systemroot%\System32\doieuln.dll
In Windows Explorer, open the %systemroot%\System32 directory or the directory that contains the malware.
Click Tools, and then click Folder Options.
Click the View tab.
Select the Show hidden files and folders check box.
Click OK.
Select the .dll file.
Edit the permissions on the file to add Full Control for Everyone. To do this, follow these steps:
Right-click the .dll file, and then click Properties.
Click the Security tab.
Click Everyone, and then click to select the Full Control check box in the Allow column.
Click OK.
Delete the referenced .dll file for the malware. For example, delete the %systemroot%\System32\doieuln.dll file.
Enable the BITS, Automatic Updates, Error Reporting, and Windows Defender services by using the Services Microsoft Management Console (MMC).
Turn off Autorun to help reduce the effect of any reinfection. To do this, follow these steps:
Depending on your system, install one of the following updates:
If you are running Windows 2000, Windows XP, or Windows Server 2003, install update 967715. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
967715 How to disable the Autorun functionality in Windows
If you are running Windows Vista or Windows Server 2008, install security update 950582. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
950582 MS08-038: Vulnerability in Windows Explorer could allow remote code execution
Note Update 967715 and security update 950582 are not related to this malware issue. These updates must be installed to enable the registry function in step 23b.
Type the following command at a command prompt:
reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 0xff /f
If the system is running Windows Defender, re-enable the Windows Defender autostart location. To do this, type the following command at the command prompt:
reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Defender" /t REG_EXPAND_SZ /d "%ProgramFiles%\Windows Defender\MSASCui.exe –hide" /f
For Windows Vista and later operating systems, the malware changes the global setting for TCP Receive Window Autotuning to disabled. To change this setting back, type the following command at a command prompt:
netsh interface tcp set global autotuning=normal

If, after you complete this procedure, the computer seems to be reinfected, either of the following conditions may be true:

One of the autostart locations was not removed. For example, either the AT job was not removed or an Autorun.inf file was not removed.
The security update for MS08-067 was installed incorrectly.

This malware may change other settings that are not addressed in this article. Please visit the following Microsoft Malware Protection Center Web page for the latest details about Win32/Conficker:
https://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker
Verify that the system is clean
Verify that the following services are started:

Automatic Updates (wuauserv)
Background Intelligent Transfer Service (BITS)
Windows Defender (windefend) (if applicable)
Windows Error Reporting Service

To do this, type the following commands at the command prompt. Press ENTER after each command:

Sc.exe query wuauserv
Sc.exe query bits
Sc.exe query windefend
Sc.exe query ersvc

After each command runs, you will receive a message that resembles the following:
SERVICE_NAME: wuauserv
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE,NOT_PAUSABLE,ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
In this example, "STATE : 4 RUNNING" indicates that the service is running.

To verify the status of the SvcHost registry subkey, follow these steps:

In Registry Editor, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
In the details pane, double-click netsvcs, and then review the service names that are listed. Scroll down to the bottom of the list. If the computer is reinfected with Conficker, a random service name will be listed. For example, in this procedure, the name of the malware service is "Iaslogon."

If these steps do not resolve the issue, contact your antivirus software vendor. For more information about this issue, click the following article number to view the article in the Microsoft Knowledge Base:
49500 List of antivirus software vendors
If you do not have an antivirus software vendor, or your antivirus software vendor cannot help, contact Microsoft Consumer Support Services for more help.
After the environment is fully cleaned
After the environment is fully cleaned, follow these steps:

Re-enable the Server service and the Task Scheduler service.
Restore the default permissions on the SVCHOST registry key and the Tasks folder. This should be reverted to the default settings by using Group Policy settings. If a policy is only removed, the default permissions may not be changed back. See the table of default permissions in the "Mitigation steps" section for more information.
Update the computer by installing any missing security updates. To do this, use Windows Update, Microsoft Windows Server Update Services (WSUS) server, Systems Management Server (SMS), System Center Configuration Manager (Configuration Manager 2007), or your third-party update management product. If you use SMS or Configuration Manager 2007, you must first re-enable the Server service. Otherwise, SMS or Configuration Manager 2007 may be unable to update the system.

Back to the top | Give Feedback
Identifying infected systems
If you have problems identifying systems that are infected with Conficker, the details provided in the following TechNet blog may help:
https://blogs.technet.com/kfalde/archive/2009/01/28/using-logparser-eventcomb-to-find-malware.aspx
Back to the top | Give Feedback
Default permissions table
The following table shows default permissions for each operating system. These permissions are in place before you apply the changes that we recommend in this article. These permissions may differ from the permissions that are set in your environment. Therefore, you must note your settings before you make any changes. You must do this so that you can restore your settings after you clean the system.
Expand this table
Operating system Windows Server 2008 Windows Vista Windows Server 2003 Windows XP Windows 2000
Setting Svchost Registry Tasks Folder Svchost Registry Tasks Folder Svchost Registry Tasks Folder Svchost Registry Tasks Folder Svchost Registry Tasks Folder
Account
Administrators (Local Group) Full Control Full Control Full Control Full Control Full Control Full Control Full Control Full Control Full Control Full Control
System Full Control Full Control Full Control Full Control Full Control Full Control Full Control Full Control Full Control Full Control
Power Users (Local Group) not applicable not applicable not applicable not applicable Read not applicable Read not applicable Read not applicable
Users (Local Group) Special not applicable Special not applicable Read not applicable Read not applicable Read not applicable
Apply to: This key and subkeys Apply to: This key and subkeys
Query Value Query Value
Enumerate Subkeys Enumerate Subkeys
Notify Notify
Read Control Read Control
Authenticated Users not applicable Special not applicable Special not applicable not applicable not applicable not applicable not applicable not applicable
Apply to: This folder only Apply to: This folder only
Traverse Folder Traverse Folder
List Folder List Folder
Read Attributes Read Attributes
Read Extended Attributes Read Extended Attributes
Create Files Create Files
Read Permissions Read Permissions
Backup Operators (Local Group) not applicable not applicable not applicable not applicable not applicable Special not applicable Special
Apply to: This folder only Apply to: This folder only
Traverse Folder Traverse Folder
List Folder List Folder
Read Attributes Read Attributes
Read Extended Attributes Read Extended Attributes
Create Files Create Files
Read Permissions Read Permissions
Everyone not applicable not applicable not applicable not applicable not applicable not applicable not applicable not applicable not applicable Special
Apply to: This folder, subfolder and files
Traverse Folder
List Folder
Read Attributes
Read Extended Attributes
Create Files
Create Folders
Write Attributes
Write Extended Attributes
Read Permissions
Back to the top | Give Feedback
Note This is a "FAST PUBLISH" article created directly from within the Microsoft support organization. The information contained herein is provided as-is in response to emerging issues. As a result of the speed in making it available, the materials may include typographical errors and may be revised at any time without notice. See Terms of Use for other considerations.
____________________
They're coming to take me away, ho-ho, hee-hee, ha-haaa, hey-hey,
the men in white coats are coming to take me away.
Yamaha Vity -> YBR125 -> FZS600 Fazer -> FZ1-S Fazer
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Rank Bajin
Two Stroke Sniffer



Joined: 08 Dec 2011
Karma :

PostPosted: 14:11 - 17 Dec 2012    Post subject: Bad wee virus in W7 Reply with quote

No, sorry - unable to use any virus scan/security even in safe mode. No results coming up using malwarebytes or similar. Very Happy
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Alpha-9
Super Spammer



Joined: 19 Jan 2012
Karma :

PostPosted: 14:13 - 17 Dec 2012    Post subject: Reply with quote

Spybot Search & Destroy

Uninstall your crappy spoof AVG which is probably a virus in itself Wink

All else fails reformat
Freshhhh
____________________
Fzr-600 1999
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

The Artist
Super Spammer



Joined: 06 Jan 2008
Karma :

PostPosted: 16:05 - 17 Dec 2012    Post subject: Reply with quote

Alpha-9 wrote:
Spybot Search & Destroy



Spybot is more 90's than Will Smith
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

bladerunner
World Chat Champion



Joined: 09 Sep 2006
Karma :

PostPosted: 16:07 - 17 Dec 2012    Post subject: Reply with quote

Just an idea but if you type in an address in the addy bar rather than clicking on a search result....does it still block you?
____________________
Current bikes...cbr929, KDX200's, Rd125lc mk2, RGV250's
 Back to top
View user's profile Send private message Visit poster's website You must be logged in to rate posts

Bomberman
World Chat Champion



Joined: 17 Aug 2004
Karma :

PostPosted: 16:24 - 17 Dec 2012    Post subject: Re: Bad wee virus in W7 Reply with quote

Rank Bajin wrote:
Thanks, guys. I'll try your suggestions out tonight & let you know how I get on. Just don't want to format & reinstall 'cos I've never figured out how to retain all my emails & stuff in Outlook. Very Happy Very Happy Very Happy

This is simple. Ditch Outlook, use gmail, never worry about it again Very Happy
To be honest, exporting to .pst isn't too hard, but why Outlook these days?
____________________
'Allo! My name is Inigo Montoya, you killed my father, prepare to die!
'89 TZR 125 - '94 GPZ500s - ZK3 GSXR600 Alstare Very Happy
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Rank Bajin
Two Stroke Sniffer



Joined: 08 Dec 2011
Karma :

PostPosted: 16:53 - 17 Dec 2012    Post subject: Reply with quote

Can't access antivirus providers through search or address bar. Less worried about the email exporting thing, but having to keep my home pc offline while I try & sort this out is a pain... Very Happy
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

prawny1
World Chat Champion



Joined: 28 Jun 2005
Karma :

PostPosted: 18:18 - 17 Dec 2012    Post subject: Reply with quote

mount the drive in a different machine either permanently or via usb and run antivirus anti malware etc on your infected hdd from that machine disable autorun first though just in case,

Some cloned/altered system files might be deleted in the process so a repair install might be needed after.

I don't know if you have tried this already or not but system restore might be an option if the virus hasn't blocked it.
____________________
hellkat wrote:

Some people are only alive cos its against the law to kill them.
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Islander
World Chat Champion



Joined: 05 Aug 2012
Karma :

PostPosted: 23:44 - 19 Dec 2012    Post subject: Re: Bad wee virus in W7 Reply with quote

Rank Bajin wrote:
Tried using MalwareBytes in safe mode, but no joy. Same with virus software as they all need to connect to the sites to update, which the virus is blocking.
Not sure what you mean by booting from a live cd - do you mean from the W7 disc? Very Happy


Try deleting this file:

c:\windows\system32\drivers\etc\hosts

Some malware puts redirects in the hosts file - it's an old trick and you really don't need a hosts file.

If you've got access to an uninfected pc, install and update malwarebytes on that and then copy the rules.ref file to the infected machine's installation folder.
 Back to top
View user's profile Send private message You must be logged in to rate posts

Rank Bajin
Two Stroke Sniffer



Joined: 08 Dec 2011
Karma :

PostPosted: 09:54 - 21 Dec 2012    Post subject: Bad wee virus in W7 Reply with quote

Thanks everyone for your advice. Unfortunately I was unable to remove the virus by any method, and ended up doing a format & reinstall. Next time I'll buy a Mac (never)... Very Happy
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts

Colin Edwards
Brolly Dolly



Joined: 06 Jul 2007
Karma :

PostPosted: 09:23 - 24 Dec 2012    Post subject: Reply with quote

Hi

Use Spy Killer to kill off any malware running in the background
(will search and close any apps it finds that are stopping anti malware software working)

Then use malwarebytes to scan the PC and remove the infection

Colin
 Back to top
View user's profile Send private message Send e-mail You must be logged in to rate posts
Old Thread Alert!

The last post was made 13 years, 76 days ago. Instead of replying here, would creating a new thread be more useful?
  Display posts from previous:   
This page may contain affiliate links, which means we may earn a small commission if a visitor clicks through and makes a purchase. By clicking on an affiliate link, you accept that third-party cookies will be set.

Post new topic   Reply to topic    Bike Chat Forums Index -> The Geek Zone All times are GMT
Page 1 of 1

 
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum

Read the Terms of Use! - Powered by phpBB © phpBB Group
 

Debug Mode: ON - Server: birks (www) - Page Generation Time: 0.17 Sec - Server Load: 0.37 - MySQL Queries: 14 - Page Size: 129.44 Kb