Jump to content

frankmcatee

Members
  • Posts

    13
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Oh you ruined all my fun. FYI too we have diff versions of endnote. I don't know if this matters. Thanks for everything. Your dog is awesome.
  2. quik scan did not pick it up. Running full scan and it looks like it picked it up. waiting for it to finish. What time is it in Belgium? 3pm?
  3. What does the scan do differenetly when you use run and mbam.exe /developer?
  4. So is it a false positive or do you still need me to post the log to your site? Also, if it will be fixed in the next update... why do I need to post it to determine "why it is being targeted"?
  5. Received this on computers with endnote after Tuesday. (Windows updates) Rogue.Installer C:\program files\endnote 8\wiseupdt.exe My upload of hijackthis failed to your site
  6. I will send the Hijack this log. Not sure what else I can send you.
  7. It would seem that the virus attaches itself somehow to the installation of Windows Update agent as when Malwarebytes cleans the malware Windows updates stop working. I then have to go through and do the following to get updates to work again: Open a Command Prompt and forced a re-install of the Windows Update Agent with the following command: C:\WUAGENT\WindowsUpdateAgent30-x86.exe /wuforce Attempt to download and install the Windows Updates again. Malwarebytes may need/want to look at their clean up procedure regarding this as it actually opens up a huge vulnerabiltiy with Windows Updates not being installed... Can you send this issue to your team please?
  8. If he gets the virus again and I am able to get a Hijack this log... would that tell you?
  9. Thank you for the assistance in advance.... I have a user that continues to be reinfected by Hijack.ControlPanelStyle and Heuristics Reserved.Word.Exploit. We clean the pc with malwarebytes and the next day it is back on the system causing shutdown times to extend to 5 minutes +. No external drives were attached during this time. The user did receive email and was on the network at the time. 1.) How are these viruses spread? Email? Malware sites? via external drives? What is their general threat? 2.) Can they house themselves within Restore points in XP eventhough malwarebytes cleans the system? 3.) If so how can you prevent this or remove them from the restore or remove the restore point? Below is the log file from malwarebytes. I don't have the Hijack this log Frank Malwarebytes' Anti-Malware 1.36 Database version: 2060 Windows 5.1.2600 Service Pack 3 5/7/2009 4:33:59 PM mbam-log-2009-05-07 (16-33-59).txt Scan type: Quick Scan Objects scanned: 111654 Time elapsed: 30 minute(s), 55 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 1 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> Quarantined and deleted successfully. Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected)
  10. I received this error and another that stated Heuristics.reserved.Word.Expoloit. Malware bytes scanned and deleted them... but the user that I support and I would like to know what this malware "does" to your PC. What is it's intended purpose? Besides frustrating the user?
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.