Jump to content

Recommended Posts

Hello and :welcome:

First of all, what are you still able to access? For example, can you reboot in Safe Mode with Networking, on the welcome screen click on the Administrator account and let me know if you still see the rogue there? If so, try to press Alt-Ctrl-Del and let me know if that brings up the Task Manager.

If it doesn't work, just let me know. :)

Link to post
Share on other sites

Hello and :welcome:

First of all, what are you still able to access? For example, can you reboot in Safe Mode with Networking, on the welcome screen click on the Administrator account and let me know if you still see the rogue there? If so, try to press Alt-Ctrl-Del and let me know if that brings up the Task Manager.

If it doesn't work, just let me know. :)

Ok, I had a talk with microsoft, and went into all of that. I deleted my temp files and also the files in prefetch and deleted those. He/she had me go into note pad a start a new registry and start a new one. She had me download SUPERAntiSpyware and run it as a Quickscan in Safemode Networking. I did that and rebooted. Logged onto the account with administrator on it and problem was still there. I was able to get SUPERAnti-Spyware running on a complete scan on Normal mode, but still waiting for a reply back.

Link to post
Share on other sites

Hi, if you are being helped by someone else, that is okay, in that case we'll close this topic.

It doesn't work smooth neither for you, me or the other one helping you if you are receiving help from two parts.

If you decide to stick with this topic, please follow the steps below. Do not attempt fixes on your own; that might make things worse.

To protect your clean computer, please use Flash Disinfector.

Please download Flash_Disinfector.exe by sUBs and save it to your desktop.

  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.

Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.

Note: If using Firefox right-click on any download links and choose Save As

Please download OTH to a flashdrive

Please download OTL to a flashdrive

Put the flash drive into your infected computer, open it and double click the OTH file to run it and click Kill All Processes, your desktop will go blank.

OTH_Main.gif

Then select Start OTL. OTL will now run

  • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    [*]Click the Internet Explorer button, post these logs in your Virus Removal topic.

If you cannot connect to the internet using the infected computer, just save the two log files to your flash drive an post them using your clean computer.

Link to post
Share on other sites

  • 4 weeks later...
  • Staff

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.