scuba_pup said:Any help appreciated as to how to ged rid of this.
kuttus said:Okay. Take your time and let me know if you are facing any other issues....
scuba_pup said:kuttus said:Okay. Take your time and let me know if you are facing any other issues....
Klittus - am getting there! Have created the CD and burnt the ISO to it. Changed bios to boot from Disc and it has loaded the tool. Does it need to have internet access - as had disconnected from the router when the virus hit? Have other iDevices and PC on the home network.
Just starting the NARS.....
Sorry - being a complete dummy - battery had run out (forgot I disconnected from docking station). Will reboot onto CD and run scan.scuba_pup said:scuba_pup said:kuttus said:Okay. Take your time and let me know if you are facing any other issues....
Klittus - am getting there! Have created the CD and burnt the ISO to it. Changed bios to boot from Disc and it has loaded the tool. Does it need to have internet access - as had disconnected from the router when the virus hit? Have other iDevices and PC on the home network.
Just starting the NARS.....
Have run the scan - and left the it going. Came back and the computer was off. Booted to remove the CD, and left it to continue - will not boot past a few instructions on the start up. Reboot and press F2 and the computer turns off..
kuttus said:Hmmm..
Plug the power cable and Run the scan anyway... Let me know the status at the end of the scan......
kuttus said:Please print these instruction out so that you know what you are doing
- Download OTLPENet.exe to your desktop
- Download Farbar Recovery Scan Tool and save it to a flash drive.
- Download List Parts and save it to the flash drive also.
- Ensure that you have a blank CD in the drive
- Double click OTLPENet.exe and this will then open imgburn to burn the file to CD
- Reboot your system using the boot CD you just created.
Note If you do not know how to set your computer to boot from CD follow the steps here- Wait for the CD to detect your hardware and load the operating system
- Your system should now display a Reatogo desktop
Note as you are running from CD it is not exactly speedy- Insert the USB with FRST
- Locate the flash drive with FRST and double click
- The tool will start to run.
- When the tool opens click Yes to disclaimer.
- Press Scan button.
- It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.
[]Next click List Parts and then click Scan
It will make a log Results.txt on the flash drive. Please copy and paste it to your reply.
kuttus said:Try to run it... The Possibility is very less...
Is there any chance the USB could get infected? (Thinking about friends PC)scuba_pup said:kuttus said:Try to run it... The Possibility is very less...
Just run it and scan completed in 29 seconds with nothing found. Will continue with your instructions - have downloaded files ready - just to access to a CD burner now.
kuttus said:This particular infection is not a replicative one. So chances for get infected is very less... Same time please scan your USB drive with his antivirus software so that we can make sure there is no infections in it...
HKU\Robert\...\Winlogon: [Shell] explorer.exe,C:\DOCUME~1\Robert\LOCALS~1\Temp\nmasdanjc.exe [52736 2013-01-25] (?????????? ??????????)
HKLM\...\Winlogon: [Userinit] C:\WINDOWS\system32\userinit.exe,,C:\WINDOWS\temp\sepsanjc.exe, [52736 2013-01-25] (?????????? ??????????)
3 DMSKSSRh; \??\C:\DOCUME~1\Robert\LOCALS~1\Temp\DMSKSSRh.sys [x]
kuttus said:Okay Thank you...
On a clean PC, open notepad and copy & paste the following:
HKU\Robert\...\Winlogon: [Shell] explorer.exe,C:\DOCUME~1\Robert\LOCALS~1\Temp\nmasdanjc.exe [52736 2013-01-25] (?????????? ??????????)
HKLM\...\Winlogon: [Userinit] C:\WINDOWS\system32\userinit.exe,,C:\WINDOWS\temp\sepsanjc.exe, [52736 2013-01-25] (?????????? ??????????)
3 DMSKSSRh; \??\C:\DOCUME~1\Robert\LOCALS~1\Temp\DMSKSSRh.sys [x]
and save it as fixlist.txt onto your flash drive.
Then, boot to OTLPE, plug in your flash drive, open FRST and click fix. Post the generated log.
<hr>
While in OTLPE, double click the OTLPE icon.
- Select the Windows folder of the infected drive if it asks for a location.
- When asked Do you wish to load the remote registry, select Yes.
- When asked Do you wish to load remote user profile(s) for scanning, select Yes.
- Ensure the box Automatically Load All Remaining Users is checked and press OK.
- OTL should now start
- Click the Scan All Users checkbox.
- Change Standard Registry to All
- Check the boxes beside LOP Check and Purity Check
- Click on Run Scan at the top left hand corner.
- When done, two Notepad files will open.
- OTListIt.txt <-- Will be opened
- Extra.txt <-- Will be minimized
- Please post the contents of these 2 Notepad files in your next reply.
scuba_pup said:kuttus said:Okay Thank you...
On a clean PC, open notepad and copy & paste the following:
HKU\Robert\...\Winlogon: [Shell] explorer.exe,C:\DOCUME~1\Robert\LOCALS~1\Temp\nmasdanjc.exe [52736 2013-01-25] (?????????? ??????????)
HKLM\...\Winlogon: [Userinit] C:\WINDOWS\system32\userinit.exe,,C:\WINDOWS\temp\sepsanjc.exe, [52736 2013-01-25] (?????????? ??????????)
3 DMSKSSRh; \??\C:\DOCUME~1\Robert\LOCALS~1\Temp\DMSKSSRh.sys [x]
and save it as fixlist.txt onto your flash drive.
Then, boot to OTLPE, plug in your flash drive, open FRST and click fix. Post the generated log.
<hr>
While in OTLPE, double click the OTLPE icon.
- Select the Windows folder of the infected drive if it asks for a location.
- When asked Do you wish to load the remote registry, select Yes.
- When asked Do you wish to load remote user profile(s) for scanning, select Yes.
- Ensure the box Automatically Load All Remaining Users is checked and press OK.
- OTL should now start
- Click the Scan All Users checkbox.
- Change Standard Registry to All
- Check the boxes beside LOP Check and Purity Check
- Click on Run Scan at the top left hand corner.
- When done, two Notepad files will open.
- OTListIt.txt <-- Will be opened
- Extra.txt <-- Will be minimized
- Please post the contents of these 2 Notepad files in your next reply.
First log file