Unable to run Administrator commands/programs,and file & icon names vanished

Discussion in 'Malware Help (A Specialist Will Reply)' started by cindi.bueno1@gmail.com, Apr 27, 2013.

  1. I believe I have a virus. I first noticed on my home page the names on my icons had disappeared, then all my file names were gone. Then a few weeks later my main profile became corrupted. I have run AVG free, Glaryis utilities, Sophos Virus Removal, Combofix, and Unhide. None of these have worked. I can't access anything that requires an administrator, even though I am logged on with an administrative profile. Also can't access most properties, control panel functions, or regedit. Please help!! Here are the logs:
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Your problems may not be due to malware. It may be due to your having installed to many protection programs. Let's clean this up and see what happens. We are going to be uninstalling all of your protection prorgams and also removing left overs from a few others that are no longer installed but still have things running.


    Uninstall the below programs:
    COMODO Firewall
    Java(TM) 6 Update 31
    Java(TM) SE Runtime Environment 6 Update 1
    Microsoft Security Client
    Microsoft Security Essentials

    Please download OTM by Old Timer and save it to your Desktop.
    • Run it by double clicking on it (Note: if using Vista, Win7, or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    
    :Services
    AVG Security Toolbar Service 
    vToolbarUpdater14.2.0
    SophosVirusRemovalTool
    cmdvirth
    cmdAgent
    
     
    :Files
    :\Program Files\Microsoft Security Client
    C:\Users\Arnold\Downloads\MGtools (1).exe
    C:\Program Files\COMODO
    C:\Program Files\AVG
    C:\Program Files\Sophos
    C:\Program Files\Common Files\AVG Secure Search
    c:\program files\ConduitEngine
    c:\program files\Ask.com
    c:\program files\SGPSA
    C:\Windows\System32\drivers\cmderd.sys
    C:\Windows\System32\drivers\cmdguard.sys
    C:\Windows\System32\drivers\cmdhlp.sys
    C:\Windows\System32\drivers\inspect.sys
    C:\ProgramData\Comodo
    C:\ProgramData\Comodo Downloader
    C:\ProgramData\Sophos
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\COMODO
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Security Essentials.lnk
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Norton Internet Security
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ThreatFire
    C:\Windows\System32\cmdcsr.dll
    C:\Windows\System32\cmdkbd32.dll
    C:\Windows\System32\cmdvrt32.dll
    C:\Windows\temp\*.*
    C:\Users\Arnold\AppData\Local\Temp\*.*
    :Reg
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1000.bak\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping\{B58926D6-CFB0-45d2-9C28-4B5A0F0368AE}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1004\Software\clickpotatolitesa\]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1004\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping\{B58926D6-CFB0-45d2-9C28-4B5A0F0368AE}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1004\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B58926D6-CFB0-45D2-9C28-4B5A0F0368AE}\]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F928123A039649549966D4C29D35B1C9]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1000.bak\Software\Ask.com]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1000.bak\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1000.bak\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1000.bak\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1000.bak\Software\Softonic]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1005\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1005\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKEY_USERS\S-1-5-21-1218040005-2861035627-41675107-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{5CB1601E-2003-4C86-B73C-9049AEF5B001}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{5CB1601E-2003-4C86-B73C-9049AEF5B001}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{30F9B915-B755-4826-820B-08FBA6BD249D}"=-
    [-HKEY_CLASSES_ROOT\clsid\{30f9b915-b755-4826-820b-08fba6bd249d}]
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
    "{30F9B915-B755-4826-820B-08FBA6BD249D}"=-
    [-HKEY_CLASSES_ROOT\clsid\{30f9b915-b755-4826-820b-08fba6bd249d}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Anti-phishing Domain Advisor"=-
    "vProt"=-
    "AVG_UI"=-
    [-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    [-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\vProt]
    [-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ApnUpdater]
    [-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FBSSA]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\AboutURLs]
    "Tabs"="res://ieframe.dll/tabswelcome.htm"
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Be patient while doing the below. The fixes can sometimes take quite awhile to run. Especially the permissions repairs. It may be best to kick it off and goto bed or do something else. It is better not to run anything while the repairs are going on.
    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Remove Policies Set By Infections
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds