i researched a little and found some info.
trying to compile it here. confirm you find anythign like this or helped with it.
Step 1: look for any of the following files.
C:\Program Files\MsConfigs\MsConfigs.exe
C:\WINDOWS\system32\p2pnetwork.exe
C:\WINDOWS\system32\CMD.COM
C:\WINDOWS\system32\netstat.com
C:\WINDOWS\system32\ping.com
C:\WINDOWS\system32\regedit.com
C:\WINDOWS\system32\tasklist.com
C:\WINDOWS\system32\taskkill.com
C:\WINDOWS\system32\taskmgr.com
C:\WINDOWS\system32\tracert.com
step 2:
if you find any of them, then download a utility called Killbox from here
step 3:
run killbox.exe program
select the option DELETE on REBOOT
Then type the names of any of the above file found in the box at killbox
click delete button
click yes on delete on reboot option
click no at pending options
then reboot you should recover taskmanager and regedit.
if the above method does not work then
another option is
1.- Created a Restore Point
2.-Downloaded PROCESS EXPLORER freeware to see what processes were running
( http://www.sysinternals.com/Utilities/ProcessExplorer.html )
3.- Found the process “mswinsck.exeâ€
4.- Killed the process and immediately was able to use Task Manager, cmd, Msconfig, regedit, etc.
5.-I deleted the file “mswinsck.exe†located in C:\Windows\System (Remember, it is a hidden file, so set up your windows explorer)
6.- The following registry entries are modified by the worm to execute the file at logon, so I had to delete them.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Microsoft Winsock
mswinsck.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Winsock
mswinsck.exe
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
Microsoft Winsock
mswinsck.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Microsoft Winsock
mswinsck.exe
HKCU\SYSTEM\CurrentControlSet\Control\Lsa
Microsoft Winsock
mswinsck.exe
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
Microsoft Winsock
mswinsck.exe
HKCU\Software\Microsoft\OLE
Microsoft Winsock
mswinsck.exe
HKLM\SOFTWARE\Microsoft\Ole
Microsoft Winsock
8.- I rebooted and my computer seems to work fine.
9.- Scanned the computer, no virus or spyware found
after this you need to edit your hosts file with notepad
1.- Open your windows explorer and go to c:\windows\system32\drivers\etc
2.- Backup the file “hosts” it does not have an extention
3.- Open the file hosts with your notepad
4.- Don’t delete the line 127.0.0.1 localhost
5.- Delete every line after the 127.0.0.1 (including the 127.0.0.1) that has addresses you want to access.
If still problem persisting then there is one more method
- copy to notepad.
- save it as anythingyouwant.vbs
3.save as ALL FILES
when you do this save to your desktop…you will see it is in the form of a script.
go to the saved file and double click on it…it will take a second literally to run…when it says finished…thats it…you functions will work!
i did this and it worked…and it will work for you too…thank you
copy and paste this to notepad:
Set WshShell = WScript.CreateObject(“WScript.Shell”)
With WScript.CreateObject(“WScript.Shell”)
On Error Resume Next
.RegDelete “HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disabl eRegistryTools”
.RegDelete “HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD”
.RegDelete “HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disabl eTaskMgr”
.RegDelete “HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\Disabl eTaskMgr”
End With
Mybox = MsgBox(jobfunc & enab & vbCR & “Finished!”, 4096, t)
i found this info from here
and still if this does not help then download and run Processexplorer from sysinternals websites and post the findings of it here.
also download trendmicro`s hijackthis and run a scan and paste your logfile here.
hope it helps.