Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Removing Windows Police Pro


  • Please log in to reply
8 replies to this topic

#1 Bwm367

Bwm367

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Maine
  • Local time:05:47 PM

Posted 21 October 2009 - 12:43 PM

I stumbled across this article, http://www.bleepingcomputer.com/virus-remo...dows-police-pro
However, the virus seems to have disabled the ability to edit the registry.
Running the .reg files linked in the article brings up a bogus popup that disallows registry access.

Any ideas how to manually disable this process or how to get around this?
I'm going to try safe mode in a minute, but I believe its still preventing full system access even in safe mode.

Any help would be appreciated.

BC AdBot (Login to Remove)

 


#2 Bwm367

Bwm367
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Maine
  • Local time:05:47 PM

Posted 21 October 2009 - 01:27 PM

I used something called unhookexec.inf from symantec to allow me to edit the registry, then ran the two .reg files. I still could not install malware bytes fully, it wouldn't allow the mbam.exe to be unpacked during install. However, since it installed fully regardless, I was able to install it on another computer and copy mbam.exe to the infected one and bring up the program.

Its scanning now.
I thought maybe you'd like to know the process and add to the document I previously linked to, in case other users stumble across this issue.

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:47 PM

Posted 21 October 2009 - 02:24 PM

OK ,thank you. I'll mention it to the boss :thumbsup:

Post the MBAM log when done. Tell us how it is running now.

The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.

Edited by boopme, 21 October 2009 - 02:24 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 Bwm367

Bwm367
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Maine
  • Local time:05:47 PM

Posted 22 October 2009 - 10:12 AM

Well the virus came back, and it was much larger than just the Windows Police Pro. I've got it down to symantec killing it at startup everytime the OS comes up. It detects a hatakuvu.dll, but there must be another part it isn't catching thats replicating it. Rundll32.exe runs under the user's account name for a minute or so then drops when symantec pops up. I can't figure out a way to trace what .dll its running that's replicating the virus. I've researched hatakuvu.dll a little bit, but it seems to be fairly generic and I can't find information on how to fully purge it. Malware bytes doesn't pick anything else up on the system. I'm monitoring TCP/IP traffic and nothing seems to be going out to download more either.

Any ideas on how to prevent this replication?
And do you still want those log files, even though much of it is probably unrelated to Windows Police Pro?

Edited by Bwm367, 22 October 2009 - 10:13 AM.


#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:47 PM

Posted 22 October 2009 - 10:19 AM

Possibly a hiding rootkit.
Download this Utility and save it to your Desktop.
Double-click the Utility to run it and and let it finish.
When it states Finished! Press any key to exit, press any key to close the program.
It will save a .txt file to your desktop automatically. Double-click on the Win32kDiag.txt file that is located on your Desktop and post the entire contents of that log as part of the reply in the topic you will create below..
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 Bwm367

Bwm367
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Maine
  • Local time:05:47 PM

Posted 22 October 2009 - 10:41 AM

Thanks for the quick response!

I ran the utility, and It didn't find anything. The log essentially says Searching... then Finished.

I've become aware that while Automatic Updates thinks its enabled, the service has been deleted from the list. Going to update.microsoft.com brings up an error saying the service is disabled. I'm going to research this symptom next, as it may be a part of another infection that MB and Symantec aren't finding. If you know of anymore utilities like the last one that may help, please let me know.

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:47 PM

Posted 22 October 2009 - 10:46 AM

Maybe it is one of these ..
Use Process Explorer to see what's running at startup.

Please download and run Process Explorer v11.33

Now look for any/all of these.
Right click with your mouse to highlight. Then go to top of page and kill them by clicking the red X along the toolbar.
Under explorer.exe

av360.exe
453732.exe (look for a brown shield and something like... 453732.exe it can be different numbers)
tsc.exe (has a blue/white stripe shield).


If still no joy.
1. Uninstall Malwarebytes' Anti-Malware using Add/Remove programs in the control panel.
2. Restart your computer (very important).
3. Download and run this utility. Mbam clean
4. It will ask to restart your computer (please allow it to).
5. After the computer restarts, install the latest version from here. http://www.malwarebytes.org/mbam-download.php
Note: You will need to reactivate the program using the license you were sent.
Note: If using Free version, ignore the part about putting in your license key and activating.
Launch the program and set the Protection and Registration.
Then go to the UPDATE tab if not done during installation and check for updates.
Restart the computer again and verify that MBAM is in the task tray and run a Quick Scan and post that log.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 Bwm367

Bwm367
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Maine
  • Local time:05:47 PM

Posted 23 October 2009 - 09:30 AM

Again, I appreciate the responses.

Malware bytes and symantec are unable to prevent this from replicating, so each time they delete it it comes back. It is preventing windows update from remaining started (I reregistered the dlls for the service after it had been completely removed as a service, but after starting it it disables itself.) So I cannot fully update windows, which is something the owner of the computer neglected to do, as its still at SP2. Manual installing of SP3 fails, freezes halfway through.

At this point I'm just going to reinstall windows and backup the users files.
It was a good fight while it lasted though, thanks again for the help. :thumbsup:

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:47 PM

Posted 23 October 2009 - 11:20 AM

Not an unwise decision to make. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.

The best proceedure is a low level format. This completely wipes the drive. Then reinstall the OS.
Use the free version of Active@ KillDisk.
Or Darik's Boot And Nuke

The best sources of Information on this are
Reformatting Windows XP
Michael Stevens Tech

Of course also feel free to ask anything on this in the XP forum. They'd be glad to help.

==============================

2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe/.scr/.htm/.html/.xml/.zip/.rar files as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.

Download Belarc Advisor - builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser.
Run it and then print out the results, they may be handy.

Since we don't know exactly which infections we're dealing with here, we should take some precautions before we attempt to move files from the infected machine. Run the following on your clean computer, and make sure you insert your flash drives at the prompt.
Download and Run FlashDisinfector

Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.


Reinstall Windows Vista
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users