Jump to content
Due to inclement weather in Southwest Florida, our Clearwater support team is offline. Our other offices are available to assist you, however their responses may be delayed. We appreciate your patience and understanding during this time. ×

Ran Malwarebytes Now Computer Won't Boot Up


jeannie
 Share

Recommended Posts

Hello. Two days ago, my computer was running fine, but I hadn't ran a virus scan in a while so I decided to do so. When I opened up MWB, it informed there was an update available, so I updated the program and the virus definitions and ran a scan. The scan found two items, both Rootkit files. MWB informed me either that it couldn't clean the files or that it needed to restart to clean/delete them, I can't quite remember which, but in any case, it said that I needed to restart my computer. I clicked the restart option, and immediately after, my computer will no longer boot up fully. I am running Windows XP, and it will get to the screen with the Microsoft logo with the blue bar running across the bottom, but it will go no further. It won't boot up in safe mode either or using Last Known Good Configuration. Thank you in advance for any advice that you may be able to offer.

Link to post
Share on other sites

Hi,

Follow these first steps on another PC:

First, copy this scan.txt to a USB drive.

Please print these instruction out so that you know what you are doing.

OTLPEStd.exe

Size: 97,697,047b / 93.1Mb

MD5: E29EEBA00CCA665A2F04B8695469D986

  1. Download OTLPEStd.exe to your desktop.
  2. Ensure that you have a blank CD in the drive.
  3. Double click OTLPEStd.exe and this will then open imgburn to burn the file to CD.
  4. Reboot the infected system using the boot CD you just created.
    Note : If you do not know how to set your computer to boot from CD follow the steps here.
  5. As the CD needs to detect your hardware and load the operating system, I would recommend a nice cup of tea whilst it loads. :)
  6. Your system should now display a Reatogo desktop.
    Note : as you are running from CD it is not exactly speedy.
  7. Double-click on the OTLPE icon.
  8. Select the Windows folder of the infected drive if it asks for a location.
  9. When asked "Do you wish to load the remote registry", select Yes.
  10. When asked "Do you wish to load remote user profile(s) for scanning", select Yes.
  11. Ensure the box "Automatically Load All Remaining Users" is checked and press OK.
  12. OTL should now start.
  13. Double-click on the Custom Scans/Fixes box and a message box will popup asking if you want to load a custom scan from a file.
    Select Scan.txt on your USB drive.
  14. Press Run Scan to start the scan.
  15. When finished, the file will be saved in drive C:\OTL.txt.
  16. Copy this file to your USB drive if you do not have internet connection on this system.
  17. Right click the file and select send to : select the USB drive.
  18. Confirm that it has copied to the USB drive by selecting it
  19. You can backup any files that you wish from this OS
  20. Please post the contents of the C:\OTL.txt file in your reply.

Link to post
Share on other sites

Thank you for your response! When I click on scan.txt, it just redirects me to another forum. Do you have another link for this file?

Also, I didn't know if you could tell me this, but is there a good chance I will lose all the files on my computer? I will back up all the files I can, but I don't have an external hard drive and have never done a backup (dumb I know). Maybe I should buy a external hard drive before I begin? I don't have a lot I care about saving, but I do have a lot of pictures. I can burn these to CD though.

Link to post
Share on other sites

Hi,

I don't think you're gonna lose your data, but backing up is always a good idea. :rolleyes:

You can skip the scan.txt part. What remains is this:

Follow these first steps on another PC:

Please print these instruction out so that you know what you are doing.

  1. Download OTLPEStd.exe to your desktop.
  2. Ensure that you have a blank CD in the drive.
  3. Double click OTLPEStd.exe and this will then open imgburn to burn the file to CD.
  4. Reboot the infected system using the boot CD you just created.
    Note : If you do not know how to set your computer to boot from CD follow the steps here.
  5. As the CD needs to detect your hardware and load the operating system, I would recommend a nice cup of tea whilst it loads. :lol:
  6. Your system should now display a Reatogo desktop.
    Note : as you are running from CD it is not exactly speedy.
  7. Double-click on the OTLPE icon.
  8. Select the Windows folder of the infected drive if it asks for a location.
  9. When asked "Do you wish to load the remote registry", select Yes.
  10. When asked "Do you wish to load remote user profile(s) for scanning", select Yes.
  11. Ensure the box "Automatically Load All Remaining Users" is checked and press OK.
  12. OTL should now start.
  13. Press Run Scan to start the scan.
  14. When finished, the file will be saved in drive C:\OTL.txt.
  15. Copy this file to your USB drive if you do not have internet connection on this system.
  16. Right click the file and select send to : select the USB drive.
  17. Confirm that it has copied to the USB drive by selecting it
  18. You can backup any files that you wish from this OS
  19. Please post the contents of the C:\OTL.txt file in your reply.

Link to post
Share on other sites

  • 1 month later...
  • Staff

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.