G
Guest
Guest
Archived from groups: microsoft.public.windowsnt.registry (More info?)
Hi,
Following a viral attack on a Windows NT/SP6 station, I was able to identify
the worm (Win32.Darby.J) and eliminate all traces when logged in as an
administrator. However, when I log in to the account which was open when the
attack occurred I still get a message "The file
"CTVWIEK040A.COM" (or one of it's components) is missing. Verify that the
path and the file name is correct. etc.".
Effectively, this the name of the worm that was downloaded and which I
deleted. One of the side effects of this worm is to disable the the registry
tools so I can no longer excecute Regedit.exe or regedt32.exe under the
session.
I imagine that there is still a reference to the file in
HKCU\Software\Microsoft\Windows\Currentversion\Run.
However, I can execute Regedit.exe or Regedt32.exe as an administrator, but
I can no longer find any trace of the worm name. Furthermore,
according to Computer Associates, the keys to disable the registry tools are :
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = 1
and
HKCU\Software\Microsoft\WindowsNT\CurrentVersion\Policies\System\DisableRegistryTools = 1
However, I can't find these keys in Windows NT.
Can anyone suggest a means of getting around this problem.
I can create a new account which functions normally. Should I just delete
the faulty account and create it?
Cheers,
--
Len
Hi,
Following a viral attack on a Windows NT/SP6 station, I was able to identify
the worm (Win32.Darby.J) and eliminate all traces when logged in as an
administrator. However, when I log in to the account which was open when the
attack occurred I still get a message "The file
"CTVWIEK040A.COM" (or one of it's components) is missing. Verify that the
path and the file name is correct. etc.".
Effectively, this the name of the worm that was downloaded and which I
deleted. One of the side effects of this worm is to disable the the registry
tools so I can no longer excecute Regedit.exe or regedt32.exe under the
session.
I imagine that there is still a reference to the file in
HKCU\Software\Microsoft\Windows\Currentversion\Run.
However, I can execute Regedit.exe or Regedt32.exe as an administrator, but
I can no longer find any trace of the worm name. Furthermore,
according to Computer Associates, the keys to disable the registry tools are :
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = 1
and
HKCU\Software\Microsoft\WindowsNT\CurrentVersion\Policies\System\DisableRegistryTools = 1
However, I can't find these keys in Windows NT.
Can anyone suggest a means of getting around this problem.
I can create a new account which functions normally. Should I just delete
the faulty account and create it?
Cheers,
--
Len