thewolfsmith72 said:
That is because it is literally the same thing, other then utilizing a different scare tactic. Most of these "ransomware" can be dealt with through "safemode", although i have come across one particular case where the Ransomware actually popped up in safemode as it loaded, leaving no way to attack it through that vector.
We can try another alternative way...
Start the computer in
Safe mode with Command Prompt. Inside the Command Prompt type
Code:
net user administrator /active:yes
This one will activate the hidden Administrative User account on your computer.
After that restart the computer in Normal mode. Now you will be able to see one Administrator user account in your login screen like this.
Now Login to the Administrator user account and Delete the infections manually or run our removal tools...
Infected file locations are as below
* C:\Documents and Settings\{Your User Name}\Local Settings\Temp (In Windows XP)
* C:\Documents and Settings\{Your User Name}\Start Menu\Programs\Startup (In Windows XP)
* C:\Users\{Your User Name}\Appdata\Local\Temp (In Windows Vista, Windows 7)
* C:\Users\{Your User Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (In Windows Vista, Windows 7)
* C:\Users\{User Profile}\AppData\Local\Microsoft\Windows\[Random]\ [Random.exe]
* C:\Users\{User Profile}\AppData\Local\Microsoft\Windows\ [Random]
* C:\Program Data\lsass.exeC:\Program Data\[Random.exe]
* C:\Program Data\csrss.exe
* C:\Users\{Your User Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.exe
If you wish you can create a new user account also from the
Safe mode with Command Prompt
Code:
net user UserName Password /add
Code:
Net localgroup Administrator UserAccountName /add
To Disable the Administrator user account
Code:
net user administrator /active:no