View Single Post
 
Old 01-03-2009, 08:36 PM
Guitar1969 Guitar1969 is offline
Novice
 
Join Date: Dec 2008
Posts: 8
Guitar1969 is on a distinguished road
Default

Quote:
Originally Posted by stjones1221 View Post
I thought I would post the actual information listed within the Malware quarantine tab to see if anyone knows which registry values might be able to be restored and then recover the files:

1)
Vendor: Rootkit.Agent
Category: Registry Key
Items: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\new_drv

2)
Vendor: Rootkit.Agent
Category: Registry Key
Items: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\n ew_drv

3)
Vendor: Trojan.Agent
Category: Registry Key
Items: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Run\ttool(Data: C:\WINDOWS\9129837.exe)
I would be curious if this works - As I had some of the same entries in MalWareBytes and restored them, and the decrypt still didn't work, and then I had opened the door to all sorts of other spyware - I untimately ran Malwarebytes again and it removed like 32 spywares.

Seems like people are moving on and all of us are stuck with thousands of lost files. Disappointing that most of the big name virus programs(And MICROSOFT) didn't do their job in stopping this virus in the first place

i'll tell you one thing - I am now running Mozilla Firefox as a browser - so much better than IE7 and none of the security vulnerabilities now.
Reply With Quote