task manager has been disabled by your administrator

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

sh4d0w1o1

Thread Starter
Joined
Sep 28, 2008
Messages
11
hello looking for help i cant get into my task manager and i goggled how to fix it iv tried a few but when i get to being done it tells me again on the admin has disabled it gpedit.msc i tried that way but nothing happens REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f into run and nothing Change Task Manager through a Registry REG file i tried that way but after i made the file and tried to open i got told registry editor has been disabled by your administrator any idea on how to fix this? any help will be apriciated
 

sh4d0w1o1

Thread Starter
Joined
Sep 28, 2008
Messages
11
ok ty but bad thing is i lost my stuff my comps kind of old so i guess i cant do nothing oh well my fault thanks for the help
 

sh4d0w1o1

Thread Starter
Joined
Sep 28, 2008
Messages
11
ok ty man im going to do it yea i probly got alooooooooot of viruses ill post here in a couple mins
 

sh4d0w1o1

Thread Starter
Joined
Sep 28, 2008
Messages
11
well ill send when its done anyway well into it for like 3 mins and already 8 detected
 
Joined
Jul 28, 2007
Messages
2,461
sh4d0w1o1, For the regedit problem go to the link below and download the "regtools.vbs" file and run it. Instructions are on the page and this should correct that problem.

http://www.dougknox.com/security/scripts_desc/regtools.htm

If the above corrects the regedit problem, which it should, then go to the link below and use Method 2 which is painless and should correct your Task Manager problem..

Error Message: "Task Manager has been disabled by your administrator" fix.
http://windowsxp.mvps.org/Taskmanager_error.htm

Tufenuf
 

eddie5659

Moderator
Malware Specialist
Joined
Mar 19, 2001
Messages
37,277
Hiya

Lets see if any malware could be the cause, as this is known to happen with certain types of infections:

Click here to download HJTInstall.exe
  • Save HJTInstall.exe to your desktop.
  • Doubleclick on the HJTInstall.exe icon on your desktop.
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed, it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

Regards

eddie
 
Joined
Jul 28, 2007
Messages
2,461
sh4d0w1o1, Try the possible fix at the link below.

Click Start>Run and copy & paste or type in:


REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f


Click OK


"Registry Editing has been disabled by your administrator"

http://windowsxp.mvps.org/tweakuirest.htm

Tufenuf
 

Cookiegal

Karen
Administrator
Malware Specialist Coordinator
Joined
Aug 27, 2003
Messages
118,097
caperjack,

Please refer to the rules concerning HijackThis log analysis and malware removal.

http://www.techguy.org/rules.html

Log Analysis/Malware Removal - In order to ensure that advice given to users is consistent and of the highest quality, those who wish to assist with security related matters must first graduate from one of the malware boot camp training universities or be approved by the administration as already being qualified. Those authorized to help with malware issues have a gold shield
next to their name and authorized malware removal trainees have a blue shield next to their
next to their names. Anyone wishing to participate in a training program should contact a Moderator for more information.

Please refrain from replying to security related matters on this forum until you have presented evidence to one of the moderators or admins here that proves you to be qualified to do so. If you are not yet qualified and interested in being trained, we will be glad to help you get enrolled at one of the free online training facilities. Just PM me or one of the other moderators that work Security and we'll point you in the right direction.

Thanks in advance for your cooperation. :)
 
Joined
Jan 2, 2003
Messages
236
no problem,from now on i will send posters to the :"hijackthis section:" ,
I only posted the malware info because i knew the scripts weren't going to totally ,if at all help him ,
next time i will just advisvie poster to go to hijackthis section
 

eddie5659

Moderator
Malware Specialist
Joined
Mar 19, 2001
Messages
37,277
sh4d0w1o1

I'd still like to see a hijackThis log, just to see if there is any malware present :)

eddie
 

sh4d0w1o1

Thread Starter
Joined
Sep 28, 2008
Messages
11
umm i downloaded it and scaned you mean u want to see the notepad that comes up? if so here


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:55:55 AM, on 10/1/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\arservice.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Xfire\xfire.exe
C:\WINDOWS\system32\WISPTIS.EXE
C:\WINDOWS\Explorer.exe
C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\winhhsly.exe
C:\Program Files\Windows Media Player\wmplayer.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

O4 - .DEFAULT User Startup: Pin.lnk = C:\hp\bin\CLOAKER.EXE (User 'Default user')
O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
O4 - Startup: Xfire.lnk = C:\Program Files\Xfire\xfire.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Symantec Internet Security Password Validation (ccISPwdSvc) - Symantec Corporation - c:\Program Files\Norton Internet Security\ccPwdSvc.exe
O23 - Service: COM Host (comHost) - Symantec Corporation - c:\Program Files\Norton Internet Security\comHost.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: Symantec AVScan (SAVScan) - Unknown owner - c:\Program Files\Norton Internet Security\Norton AntiVirus\SAVScan.exe (file missing)

--
End of file - 2262 bytes
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Members online

Top