Temp File Cleaner reboot admin problem

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by bhaunna, Mar 2, 2010.

  1. bhaunna

    bhaunna Private E-2

    I was recently infected with XP AntiVirus 2010. I was in the process of completing 3 steps.

    1) Run TFC (Temp File Cleaner)
    2) Run ERUNT (Emergency Recovery Utility NT)
    3) Run Mbam.exe

    Following the first step, which took a very long time, the program prompted me to reboot computer to finalize removal of temp files. Upon reboot the computer no longer allows me to access programs or files. The following message appears;

    "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item."

    I think that for some reason I've lost administrative privilege.:cry I've tried going into the control panel and accessing various things to correct this but every attempt is blocked with windows message.

    Any help would greatly be appreciated.

    OS - XP Home edition
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hello and welcome. :)

    Who told you to run these? Was it your own choice? You need to be honest and tell me if you are recieving assistance in another forum.

    Have you indeed took a look at our own malware removal process?

    READ & RUN ME FIRST. Malware Removal Guide

    And if none of that can be completed in normal mode, how about in safe mode? You need to explain what you were and were not able to run and attach logs if successful.
     
  3. bhaunna

    bhaunna Private E-2

    You're absolutely right. I was originally following the thread of another forum, but once I realized that they didn't know what was going on I went looking for another forum and came across MajorGeeks (who's members seem to be substantially more informed and organized).

    I ended up performing a recovery, and then running MalWare and AVG again, which seemed to solve the problem. It was interesting that even after a recovery that MalWare pulled stuff off of my comp.

    Malwarebytes' Anti-Malware 1.44
    Database version: 3817
    Windows 5.1.2600 Service Pack 2
    Internet Explorer 8.0.6001.18702

    3/3/2010 1:15:13 PM
    mbam-log-2010-03-03 (13-15-13).txt

    Scan type: Quick Scan
    Objects scanned: 146332
    Time elapsed: 13 minute(s), 51 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 1

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Documents and Settings\HP_Administrator.YOUR-4DACD0EA75\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> Quarantined and deleted successfully.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    When you say you performed a recovery, can you tell me exactly what you did?

    If you still suspect malware then you need to complete the rest of our scans and attach logs.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds