FBI greendot virus with no safe mode

I have been infected with this virus. When I try to start in safe mode the screen goes blue and says “A problem has been detected” etc. It is a 7 year old Dell desk top running Windows XP Professional. Please help.

Do you have a Flash Drive??

 

Quads

Hello  yes I do. I believe it is 20mb

How old is it, as I have never heard of a 20mb Flash Drive,  

 

Quads

ha. its about 2 years old. I just bought it to make sure I heard certain files on a trip. I am sure it is a little larger than that

ANY other user other than the thread starter is not to use any instructions, scripts or proceedures,  The work though in cleaning a system is individual and only for that system due to a number of factors.

 

Unfortunately, with the amount of threads means the waiting time is longer, Norton continually Blocking files won't hurt your system but is is just annoying, Please wait and be patient.   I am  trying to keep up, spending hours here to script and clean machines on a first come/first served basis. If you or someone adds to your thread It will be pushed back in line due to the new update.  I use the boards in reverse to what is seen

 

Please do not run any tools unless instructed to do so. 

  • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability. Do as the instructions ask nothing extra or run things twice
  • If I ask a Question just answer it, don't run anything unless it states.
  • Major steps used:

1. Find

2. Break

3. Destroy

4. Cleanup  (including system as a whole)

 

Please read every post completely before doing anything. 

  • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

 

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forum, (sometimes :smileylol:)

  • Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.

Read Slowly and all of it.

 

Please download http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/  Download the version that is your bit type


Transfer it on to the Flash Drive

Enter System Recovery Options

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.


On the System Recovery Options menu you will get the following options:

 

Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt

 

  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive drive letter and close the notepad.
  • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    Note: Replace letter e with the drive letter of your portable hard drive
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) on the flash drive.  restart the system and load Windows Pleaseattach the log in  your reply back..

 

Quads

i am in a similar situation as macca121. I am new to these forums. I found this post and was hoping you could help me also. I have scanned with the appropriate download as instructed and was wondering if i could send you the frst.txt file that is on my flash drive. I apoligize for any incompetence of mine in the use of this forum. Thank you.

Hi,

 

You can try out a simple step and check if it is working.

 

You will need to restart the computer in safe mode with networking. And after that try to log in to the account that is infected. If that is not happening, try logging in to another "admin" user account, if you have one.

If you do not have any and the only option is to reach a cmd prompt, please create a new admin account from that. You can use the following commands for that.

 

 net user /add useraccountname mypassword

net localgroup administrators useraccountname /add

net share concfg*C:\\/grant:useraccountname,full

net user useraccountname *


If you are getting an error at the 3rd line, you may have hidden the admin account and needs to unhide it.

 

And you can do that using the commands,

 

net user administrator /active:yes

net user administrator <Password>

 

 

And after you have successfully created/unhide your admin account, log in to it in safe mode itself using the new admin account.

 

From there, you will need to search and delete several files.

 

You will need to find a file named lsass.exe in program data corresponding to the infected user account and remove it.

You will also need to check for any files or folders with "random" names in "program data" and roaming appdata.

 

If you were able to log in to the infected user account using the safe mode option, type "%allusersprofile%" in "run" command and check for "random" name files and folders and remove them. And again type %appdata% in "run" command and then remove all "random name" files and folders. And while you are at it, check for "lsass.exe" file.

 

For an example of random named files is ... fghzide.exe

 

After doing these try rebooting in to normal mode. It should log in. Please let me know the out come.

 

Thanks,

Ullas.


seanimo wrote:

i am in a similar situation as macca121. I am new to these forums. I found this post and was hoping you could help me also. I have scanned with the appropriate download as instructed and was wondering if i could send you the frst.txt file that is on my flash drive. I apoligize for any incompetence of mine in the use of this forum. Thank you.


 

No I gave you no instructions, you went on your own,  ignoring warnings.

 

Good Luck.

 

Quads

Hi,

 

Some times it affects other programs in the computer also. If you have downloaded a freee version of AVG from an unreliable location, remove that first. And run NPE, it helps....well some times....and try not to remove everything that NPE suggests, remove only "random name" files.

 

 

Thanks,

Ullas.

 

 


Ullas_T wrote:

Hi,

 

You can try out a simple step and check if it is working.

 

You will need to restart the computer in safe mode with networking. And after that try to log in to the account that is infected. If that is not happening, try logging in to another "admin" user account, if you have one.

If you do not have any and the only option is to reach a cmd prompt, please create a new admin account from that. You can use the following commands for that.

 

 net user /add useraccountname mypassword

net localgroup administrators useraccountname /add

net share concfg*C:\\/grant:useraccountname,full

net user useraccountname *


If you are getting an error at the 3rd line, you may have hidden the admin account and needs to unhide it.

 

And you can do that using the commands,

 

net user administrator /active:yes

net user administrator <Password>

 

 

And after you have successfully created/unhide your admin account, log in to it in safe mode itself using the new admin account.

 

From there, you will need to search and delete several files.

 

You will need to find a file named lsass.exe in program data corresponding to the infected user account and remove it.

You will also need to check for any files or folders with "random" names in "program data" and roaming appdata.

 

If you were able to log in to the infected user account using the safe mode option, type "%allusersprofile%" in "run" command and check for "random" name files and folders and remove them. And again type %appdata% in "run" command and then remove all "random name" files and folders. And while you are at it, check for "lsass.exe" file.

 

For an example of random named files is ... fghzide.exe

 

After doing these try rebooting in to normal mode. It should log in. Please let me know the out come.

 

Thanks,

Ullas.


 

This is why the likes of Bleeing Computer blocks  non malware specialists from threads 

The instructions given for starters requires Safe Mode, and even then hope you don't have extras and screw up.

 

Useless

 

See the users subject title 

 


Quads


Ullas_T wrote:

Hi,

 

Some times it affects other programs in the computer also. If you have downloaded a freee version of AVG from an unreliable location, remove that first. And run NPE, it helps....well some times....and try not to remove everything that NPE suggests, remove only "random name" files.

 

 

Thanks,

Ullas.

 

 


 

USELESS,  thread creator has no  safe Mode to speak of uninstall ...................... hahahahahaha

 


Quads

This is macca121 's thread for removal

 

Quads

Hey, genius, thats why the instructions for going in to the cmd was given. And this could also help other guys who are checking this thread.

 

Why can't you be a little open to new suggestions. If I have written something wrong, please feel free to correct it and provide modified instructions so that you can actually help them and not stamp up on them.

 

I agree these are not the most advanced trouble shooting steps, and I intend these for the beginners only.

 

 

Since, the guy is only able to reach the cmd, he can navigate to the locations using the cmd itself and try searching for all these files. Why can't you just ask to do that? Why can't you just provide simple solutions or help the beginners. It does not hurt to help others in a nice way.

 

 

Ullas.

Because it is dangerous and I have already given instructions for the thread creator who this thread is for and I have given instructions to hand are waiting.

 

You are just another one that goes in all guns and these type of people are dangerous, no logging, no lets look, that is why people in my field are so good at what we do, and why malware forums like Bleeping Computer block this from happening.  to stop users from giving outher information to a infected system and user.

 

I do help the so called "beginners"  from males, females, young, old and even now and then PC techs.

 

The tools used are for beginners (under guidance by the likes of myself)) I do the bulk of the reading and scripting, and also find other infections and at times partitions to delete.

 

It is as simple as that.  

 

Quads

Quads,

 

I appologize for the inconvenience. I was thinking of only people who are stranded with this infection and just who wants to give it a try to fix the issue their own. I have tried this on couple of computers and so far this has worked.

 

And was'nt the last post easier than being sarcastic?

 

Ullas.

 

 

No, 

 

Malware removal; people, and I have done this for a few years, has a sense of what is going on but also when another user is giving bad info 

 

I got another way to remove it for you  DOD the Hard Drive that works to.

 

Quads

Quads,

 

 

Sorry, dude... no time to argue. Did not want to get in to the fight in the first place.

 

Take care of the poor guy and the one who got in your way...

 

Peace,

Ullas :D

"Take care of the poor guy"  hahahaha that is what I do, for users who follow instructions given.

 

I am waiting for the log.

 

Quads

:)