I have been infected with this virus. When I try to start in safe mode the screen goes blue and says “A problem has been detected” etc. It is a 7 year old Dell desk top running Windows XP Professional. Please help.
Do you have a Flash Drive??
Quads
Hello yes I do. I believe it is 20mb
How old is it, as I have never heard of a 20mb Flash Drive,
Quads
ha. its about 2 years old. I just bought it to make sure I heard certain files on a trip. I am sure it is a little larger than that
ANY other user other than the thread starter is not to use any instructions, scripts or proceedures, The work though in cleaning a system is individual and only for that system due to a number of factors.
Unfortunately, with the amount of threads means the waiting time is longer, Norton continually Blocking files won't hurt your system but is is just annoying, Please wait and be patient. I am trying to keep up, spending hours here to script and clean machines on a first come/first served basis. If you or someone adds to your thread It will be pushed back in line due to the new update. I use the boards in reverse to what is seen
Please do not run any tools unless instructed to do so.
- We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability. Do as the instructions ask nothing extra or run things twice
- If I ask a Question just answer it, don't run anything unless it states.
- Major steps used:
1. Find
2. Break
3. Destroy
4. Cleanup (including system as a whole)
Please read every post completely before doing anything.
- Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
- Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forum, (sometimes
)
- Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
Read Slowly and all of it.
Please download http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/ Download the version that is your bit type
Transfer it on to the Flash Drive
Enter System Recovery Options.
To enter System Recovery Options from the Advanced Boot Options:
- Restart the computer.
- As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
- Use the arrow keys to select the Repair your computer menu item.
- Choose your language settings, and then click Next.
- Select the operating system you want to repair, and then click Next.
- Select your user account and click Next.
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
- Select Command Prompt
- In the command window type in notepad and press Enter.
- The notepad opens. Under File menu select Open.
- Select "Computer" and find your flash drive drive letter and close the notepad.
- In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
Note: Replace letter e with the drive letter of your portable hard drive - The tool will start to run.
- When the tool opens click Yes to disclaimer.
- Press Scan button.
- It will make a log (FRST.txt) on the flash drive. restart the system and load Windows Pleaseattach the log in your reply back..
Quads
i am in a similar situation as macca121. I am new to these forums. I found this post and was hoping you could help me also. I have scanned with the appropriate download as instructed and was wondering if i could send you the frst.txt file that is on my flash drive. I apoligize for any incompetence of mine in the use of this forum. Thank you.
Hi,
You can try out a simple step and check if it is working.
You will need to restart the computer in safe mode with networking. And after that try to log in to the account that is infected. If that is not happening, try logging in to another "admin" user account, if you have one.
If you do not have any and the only option is to reach a cmd prompt, please create a new admin account from that. You can use the following commands for that.
net user /add useraccountname mypassword
net localgroup administrators useraccountname /add
net share concfg*C:\\/grant:useraccountname,full
net user useraccountname *
If you are getting an error at the 3rd line, you may have hidden the admin account and needs to unhide it.
And you can do that using the commands,
net user administrator /active:yes
net user administrator <Password>
And after you have successfully created/unhide your admin account, log in to it in safe mode itself using the new admin account.
From there, you will need to search and delete several files.
You will need to find a file named lsass.exe in program data corresponding to the infected user account and remove it.
You will also need to check for any files or folders with "random" names in "program data" and roaming appdata.
If you were able to log in to the infected user account using the safe mode option, type "%allusersprofile%" in "run" command and check for "random" name files and folders and remove them. And again type %appdata% in "run" command and then remove all "random name" files and folders. And while you are at it, check for "lsass.exe" file.
For an example of random named files is ... fghzide.exe
After doing these try rebooting in to normal mode. It should log in. Please let me know the out come.
Thanks,
Ullas.
seanimo wrote:i am in a similar situation as macca121. I am new to these forums. I found this post and was hoping you could help me also. I have scanned with the appropriate download as instructed and was wondering if i could send you the frst.txt file that is on my flash drive. I apoligize for any incompetence of mine in the use of this forum. Thank you.
No I gave you no instructions, you went on your own, ignoring warnings.
Good Luck.
Quads
Hi,
Some times it affects other programs in the computer also. If you have downloaded a freee version of AVG from an unreliable location, remove that first. And run NPE, it helps....well some times....and try not to remove everything that NPE suggests, remove only "random name" files.
Thanks,
Ullas.
Ullas_T wrote:Hi,
You can try out a simple step and check if it is working.
You will need to restart the computer in safe mode with networking. And after that try to log in to the account that is infected. If that is not happening, try logging in to another "admin" user account, if you have one.
If you do not have any and the only option is to reach a cmd prompt, please create a new admin account from that. You can use the following commands for that.
net user /add useraccountname mypassword
net localgroup administrators useraccountname /add
net share concfg*C:\\/grant:useraccountname,full
net user useraccountname *If you are getting an error at the 3rd line, you may have hidden the admin account and needs to unhide it.
And you can do that using the commands,
net user administrator /active:yes
net user administrator <Password>
And after you have successfully created/unhide your admin account, log in to it in safe mode itself using the new admin account.
From there, you will need to search and delete several files.
You will need to find a file named lsass.exe in program data corresponding to the infected user account and remove it.
You will also need to check for any files or folders with "random" names in "program data" and roaming appdata.
If you were able to log in to the infected user account using the safe mode option, type "%allusersprofile%" in "run" command and check for "random" name files and folders and remove them. And again type %appdata% in "run" command and then remove all "random name" files and folders. And while you are at it, check for "lsass.exe" file.
For an example of random named files is ... fghzide.exe
After doing these try rebooting in to normal mode. It should log in. Please let me know the out come.
Thanks,
Ullas.
This is why the likes of Bleeing Computer blocks non malware specialists from threads
The instructions given for starters requires Safe Mode, and even then hope you don't have extras and screw up.
Useless
See the users subject title
Quads
Ullas_T wrote:Hi,
Some times it affects other programs in the computer also. If you have downloaded a freee version of AVG from an unreliable location, remove that first. And run NPE, it helps....well some times....and try not to remove everything that NPE suggests, remove only "random name" files.
Thanks,
Ullas.
USELESS, thread creator has no safe Mode to speak of uninstall ...................... hahahahahaha
Quads
Hey, genius, thats why the instructions for going in to the cmd was given. And this could also help other guys who are checking this thread.
Why can't you be a little open to new suggestions. If I have written something wrong, please feel free to correct it and provide modified instructions so that you can actually help them and not stamp up on them.
I agree these are not the most advanced trouble shooting steps, and I intend these for the beginners only.
Since, the guy is only able to reach the cmd, he can navigate to the locations using the cmd itself and try searching for all these files. Why can't you just ask to do that? Why can't you just provide simple solutions or help the beginners. It does not hurt to help others in a nice way.
Ullas.
Because it is dangerous and I have already given instructions for the thread creator who this thread is for and I have given instructions to hand are waiting.
You are just another one that goes in all guns and these type of people are dangerous, no logging, no lets look, that is why people in my field are so good at what we do, and why malware forums like Bleeping Computer block this from happening. to stop users from giving outher information to a infected system and user.
I do help the so called "beginners" from males, females, young, old and even now and then PC techs.
The tools used are for beginners (under guidance by the likes of myself)) I do the bulk of the reading and scripting, and also find other infections and at times partitions to delete.
It is as simple as that.
Quads
Quads,
I appologize for the inconvenience. I was thinking of only people who are stranded with this infection and just who wants to give it a try to fix the issue their own. I have tried this on couple of computers and so far this has worked.
And was'nt the last post easier than being sarcastic?
Ullas.
No,
Malware removal; people, and I have done this for a few years, has a sense of what is going on but also when another user is giving bad info
I got another way to remove it for you DOD the Hard Drive that works to.
Quads
Quads,
Sorry, dude... no time to argue. Did not want to get in to the fight in the first place.
Take care of the poor guy and the one who got in your way...
Peace,
Ullas :D
"Take care of the poor guy" hahahaha that is what I do, for users who follow instructions given.
I am waiting for the log.
Quads
:)