Jump to content

Wireless card cannot find network after using MBAM


Recommended Posts

I somehow contracted a nasty bug (grayware, spyware, virus) of some type that hijacked any search engine I tried and made me unable to get into Yahoo, along with some annoying pop-ups, IE (7) closing on it's own, and my laptop restarting all by itself. I used McAfee that is installed, found and deleted but kept coming back, OneCare Live and TrendMicro, same thing. I could not do a system restore, because clicking the next button once I selected a date would result in no action. I have a Dell Laptop with XP Pro.

I found this board and downloaded MBAM, but it wouldn't install. I used the directions in this forum: http://www.malwarebytes.org/forums/index.php?showtopic=12709 and downloaded RootRepeal, found the offending hider and wiped it. MBAM then installed, ran beautifully and SUCCESSFULLY got them! ;)

See log below.

BUT once I rebooted my computer my Verizon Wireless card will no longer see the nationwide broadband network. I have uninstalled and reinstalled the VZManager software (verizon) twice, updated the version, and spent an hour on the phone with Verizon techs to no avail. Kept getting a "unable to connect-error 621" The card is on and the verizon tech said it is working ok.

Oddly, my internal wireless card picks up signal (but I have to go away from home to pick it up a public signal), and the Verizon dude got me hooked up on a dial up through my card phone number. So I can get on the internet through those. I am confused.

Also, before getting MBAM to run, when I was using TrendMicro, it said it could not connect to the ports to do a port scan. Anyone have ANY ideas? Other than this, I am super relieved my computer seems back, Yahoo is back, search engines are normal again and no pop-ups. System appears totally stable.

Thanks so much ahead of time for any ideas!

MBAM Log:

Malwarebytes' Anti-Malware 1.36

Database version: 1945

Windows 5.1.2600 Service Pack 3

5/24/2009 11:32:47 PM

mbam-log-2009-05-24 (23-32-47).txt

Scan type: Quick Scan

Objects scanned: 74169

Time elapsed: 7 minute(s), 34 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 11

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 3

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a072ec12-a40b-41dd-9a1a-cdb848b70f3c} (Rogue.Installer) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{964bf54a-a147-4b3f-9540-6c40cc6b9d8c} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\WinPC Antivirus (Rogue.WinPCAntivirus) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\TypeLib\{92dea029-400e-497b-863d-1e5cd71b6441} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{9580c756-9b78-41c8-8371-21105052831e} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{b00d6c77-5229-41b0-86b9-5b31509557d4} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{eedc4410-6b4d-4d68-a6bd-c386f0335c1b} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{eedc4410-6b4d-4d68-a6bd-c386f0335c1b} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{eedc4410-6b4d-4d68-a6bd-c386f0335c1b} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0068406 (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\ieocx.dll (Trojan.BHO) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\Susan\Application Data\asd.bat (Rogue.WinPCDefender) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Uninstall the Verizon software. Open the Device Manager while the card is plugged in and find the card most likely under networking devices. Right-click on the Verizon card in the list, and select "Uninstall" (make sure to check any boxes that say "Delete the driver software", or say yes to delete the driver software if it asks). I don't 100% remember the process on Windows XP, but on Vista it's pretty easy to do.

Link to post
Share on other sites

Guest victimized

If your ports are messed up, it might be because you're using a firewall. If you are using Windows Firewall on Windows XP (like I am) go to control panel>windows firewall>exceptions. now when you are here you can view, add, delete, or enable/disable ports. Try searching on google for help.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.