Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected With Virusprotect


  • Please log in to reply
8 replies to this topic

#1 jochemjspaan

jochemjspaan

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 02 February 2008 - 04:29 PM

Hi my computer is infected with virusprotect. I tried to remove it according to the online instructions but I could not get any further when I tried to start up in safe mode ( in order to run a program called Smitfraud) and my password was denied (username / password screen in safe mode) . It might be the spyware blocking the password. Then I saw that there was an other way to restart in safe mode ( system configuration method), but not for me because I'm running under windowsXP in which case some kind loophole (continuously attempting to get into safe mode and not beiing able to do so) could occur if you tried it.

There is a way to restore this but then you have to make a bootdisk. Unfortunately I don't have a working version of windows at my disposal.

What is the best thing to do/ consider next?

A lot of thanx in advance.


Jochem

BC AdBot (Login to Remove)

 


m

#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,173 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:21 AM

Posted 02 February 2008 - 05:53 PM

Most important DO NOT force safe mode. We will get to that later.
Try running everything from normal mode first.
How to remove VirusProtect or Virus Protect (Removal Instructions)

Also run this SUPERAntiSpyware download,install and update it. Perform a complete scan of the root Drive (eg. C:\). Quarantine all items found.

Copy/paste and post back the scan log of
SmitfraudFix
The report can be found at the root of the system drive, usually at C:\rapport.txt

SUPERAntiSpyware
To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 jochemjspaan

jochemjspaan
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 03 February 2008 - 06:02 AM

Hey

I ran the Smitfraud program in normal mode and I ran the SUPERAntispyware program.

Here are the logs:
Smitfraud:

SmitFraudFix v2.278

Scan done at 11:14:21.42, 03/02/2008
Run from C:\Documents and Settings\baaijens\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{7265100a-17e1-41bf-bd08-63b95a25a9c3}"="cured"

[HKEY_CLASSES_ROOT\CLSID\{7265100a-17e1-41bf-bd08-63b95a25a9c3}\InProcServer32]
@="C:\WINDOWS\system32\ofcpi.dll"

[HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{7265100a-17e1-41bf-bd08-63b95a25a9c3}\InProcServer32]
@="C:\WINDOWS\system32\ofcpi.dll"


Killing process


hosts

127.0.0.1 localhost

VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


Generic Renos Fix

GenericRenosFix by S!Ri

C:\WINDOWS\system32\ofcpi.dll -> Hoax.Win32.Renos.gen.o
C:\WINDOWS\system32\ofcpi.dll -> Deleted


Deleting infected files

C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url Deleted
C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url Deleted
C:\DOCUME~1\ALLUSE~1\Desktop\Online Security Guide.url Deleted
C:\DOCUME~1\ALLUSE~1\Desktop\Security Troubleshooting.url Deleted
C:\DOCUME~1\baaijens\FAVORI~1\Online Security Test.url Deleted
C:\Program Files\Helper\ Deleted
Problem while deleting C:\Program Files\Video Add-on\
C:\Program Files\VirusProtect 3.9\ Deleted

IEDFix

IEDFix.exe by S!Ri


DNS

Description: Intel® Wireless WiFi Link 4965AG - SecuRemote Miniport
DNS Server Search Order: 192.168.1.1
DNS Server Search Order: 0.0.0.0

HKLM\SYSTEM\CCS\Services\Tcpip\..\{3F68527F-B05E-4A9C-94DB-DB393B9C0AAE}: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CS1\Services\Tcpip\..\{3F68527F-B05E-4A9C-94DB-DB393B9C0AAE}: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CS2\Services\Tcpip\..\{3F68527F-B05E-4A9C-94DB-DB393B9C0AAE}: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CS3\Services\Tcpip\..\{3F68527F-B05E-4A9C-94DB-DB393B9C0AAE}: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 0.0.0.0
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 0.0.0.0


Deleting Temp Files


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Registry Cleaning

Registry Cleaning done.

SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


Reboot

C:\Program Files\Video Add-on Deleted


End

SUPERAntispyware:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/03/2008 at 11:52 AM

Application Version : 3.9.1008

Core Rules Database Version : 3394
Trace Rules Database Version: 1386

Scan type : Complete Scan
Total Scan Time : 00:26:27

Memory items scanned : 658
Memory threats detected : 0
Registry items scanned : 6656
Registry threats detected : 102
File items scanned : 28184
File threats detected : 31

Trojan.Media-Codec/V4
HKLM\Software\Classes\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}
HKCR\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}
HKCR\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\InprocServer32
HKCR\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\InprocServer32#ThreadingModel
C:\PROGRAM FILES\VIDEO ADD-ON\ISFMDL.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}
HKCR\videoPl.chl
HKCR\videoPl.chl\CLSID
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software#ProductionEnvironment
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software#UninstallString
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software#DisplayIcon
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software#DisplayVersion
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MultiMedia Software#Publisher

Adware.Tracking Cookie
C:\Documents and Settings\baaijens\Cookies\baaijens@goclick[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@www.virprotect[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@adserver4.spele[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@adserver3.spele[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@stats.ilsemedia[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@sextracker[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@specificclick[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@www.fatpenguinmedia[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@counter6.sextracker[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@cgi-bin[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@counter7.sextracker[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@doubleclick[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@statcounter[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@rotator.adjuggler[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@ads.bleepingcomputer[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@abnamronl.122.2o7[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@cz5.clickzs[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@tribalfusion[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@optimize.indieclick[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@adserver.adremedy[2].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@msnportal.112.2o7[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@cgi-bin[1].txt
C:\Documents and Settings\baaijens\Cookies\baaijens@adserver2.spele[2].txt
C:\Documents and Settings\baaijens\Local Settings\Temp\Cookies\baaijens@atdmt[1].txt
C:\Documents and Settings\baaijens\Local Settings\Temp\Cookies\baaijens@doubleclick[1].txt
C:\Documents and Settings\baaijens\Local Settings\Temp\Cookies\baaijens@ehg-adversitement.hitbox[2].txt
C:\Documents and Settings\baaijens\Local Settings\Temp\Cookies\baaijens@ehg-cheaptickets.hitbox[2].txt
C:\Documents and Settings\baaijens\Local Settings\Temp\Cookies\baaijens@hitbox[2].txt
C:\Documents and Settings\baaijens\Local Settings\Temp\Cookies\baaijens@weborama[1].txt
C:\WINDOWS\Administrator\Cookies\administrator@2o7[2].txt

Trojan.DNSChanger-Codec
HKCR\CLSID\E404.e404mgr
HKCR\CLSID\E404.e404mgr#UserId

Malware.VirusProtect
HKCR\TypeLib\{CFAFA83C-855B-4E3D-92B9-A587995B675A}
HKCR\TypeLib\{CFAFA83C-855B-4E3D-92B9-A587995B675A}\1.0
HKCR\TypeLib\{CFAFA83C-855B-4E3D-92B9-A587995B675A}\1.0\0
HKCR\TypeLib\{CFAFA83C-855B-4E3D-92B9-A587995B675A}\1.0\0\win32
HKCR\TypeLib\{CFAFA83C-855B-4E3D-92B9-A587995B675A}\1.0\FLAGS
HKCR\TypeLib\{CFAFA83C-855B-4E3D-92B9-A587995B675A}\1.0\HELPDIR
HKCR\Interface\{0979850F-6C3E-4294-B225-B3D3C4A6F2A1}
HKCR\Interface\{0979850F-6C3E-4294-B225-B3D3C4A6F2A1}\ProxyStubClsid
HKCR\Interface\{0979850F-6C3E-4294-B225-B3D3C4A6F2A1}\ProxyStubClsid32
HKCR\Interface\{0979850F-6C3E-4294-B225-B3D3C4A6F2A1}\TypeLib
HKCR\Interface\{0979850F-6C3E-4294-B225-B3D3C4A6F2A1}\TypeLib#Version
HKCR\Interface\{1BB2DA5F-B78F-44EA-BDA1-771CBE1DEC68}
HKCR\Interface\{1BB2DA5F-B78F-44EA-BDA1-771CBE1DEC68}\ProxyStubClsid
HKCR\Interface\{1BB2DA5F-B78F-44EA-BDA1-771CBE1DEC68}\ProxyStubClsid32
HKCR\Interface\{1BB2DA5F-B78F-44EA-BDA1-771CBE1DEC68}\TypeLib
HKCR\Interface\{1BB2DA5F-B78F-44EA-BDA1-771CBE1DEC68}\TypeLib#Version
HKCR\Interface\{2A4E73C5-BA3C-4391-B7E5-FFE8D3BD6245}
HKCR\Interface\{2A4E73C5-BA3C-4391-B7E5-FFE8D3BD6245}\ProxyStubClsid
HKCR\Interface\{2A4E73C5-BA3C-4391-B7E5-FFE8D3BD6245}\ProxyStubClsid32
HKCR\Interface\{2A4E73C5-BA3C-4391-B7E5-FFE8D3BD6245}\TypeLib
HKCR\Interface\{2A4E73C5-BA3C-4391-B7E5-FFE8D3BD6245}\TypeLib#Version
HKCR\Interface\{44A923CA-F430-4F85-9F84-5153ECDB882E}
HKCR\Interface\{44A923CA-F430-4F85-9F84-5153ECDB882E}\ProxyStubClsid
HKCR\Interface\{44A923CA-F430-4F85-9F84-5153ECDB882E}\ProxyStubClsid32
HKCR\Interface\{44A923CA-F430-4F85-9F84-5153ECDB882E}\TypeLib
HKCR\Interface\{44A923CA-F430-4F85-9F84-5153ECDB882E}\TypeLib#Version
HKCR\Interface\{4E6E21EC-9D72-4164-8A53-74786A467872}
HKCR\Interface\{4E6E21EC-9D72-4164-8A53-74786A467872}\ProxyStubClsid
HKCR\Interface\{4E6E21EC-9D72-4164-8A53-74786A467872}\ProxyStubClsid32
HKCR\Interface\{4E6E21EC-9D72-4164-8A53-74786A467872}\TypeLib
HKCR\Interface\{4E6E21EC-9D72-4164-8A53-74786A467872}\TypeLib#Version
HKCR\Interface\{631E9E48-B066-43DA-92AC-6DADF61B173B}
HKCR\Interface\{631E9E48-B066-43DA-92AC-6DADF61B173B}\ProxyStubClsid
HKCR\Interface\{631E9E48-B066-43DA-92AC-6DADF61B173B}\ProxyStubClsid32
HKCR\Interface\{631E9E48-B066-43DA-92AC-6DADF61B173B}\TypeLib
HKCR\Interface\{631E9E48-B066-43DA-92AC-6DADF61B173B}\TypeLib#Version
HKCR\Interface\{65C1361C-E696-4AF0-9E21-81910193F352}
HKCR\Interface\{65C1361C-E696-4AF0-9E21-81910193F352}\ProxyStubClsid
HKCR\Interface\{65C1361C-E696-4AF0-9E21-81910193F352}\ProxyStubClsid32
HKCR\Interface\{65C1361C-E696-4AF0-9E21-81910193F352}\TypeLib
HKCR\Interface\{65C1361C-E696-4AF0-9E21-81910193F352}\TypeLib#Version
HKCR\Interface\{77DCE805-C8CE-48AA-A47F-BFA6CC7704B3}
HKCR\Interface\{77DCE805-C8CE-48AA-A47F-BFA6CC7704B3}\ProxyStubClsid
HKCR\Interface\{77DCE805-C8CE-48AA-A47F-BFA6CC7704B3}\ProxyStubClsid32
HKCR\Interface\{77DCE805-C8CE-48AA-A47F-BFA6CC7704B3}\TypeLib
HKCR\Interface\{77DCE805-C8CE-48AA-A47F-BFA6CC7704B3}\TypeLib#Version
HKCR\Interface\{8D42769F-07D8-494D-AAB4-AA1652C541FA}
HKCR\Interface\{8D42769F-07D8-494D-AAB4-AA1652C541FA}\ProxyStubClsid
HKCR\Interface\{8D42769F-07D8-494D-AAB4-AA1652C541FA}\ProxyStubClsid32
HKCR\Interface\{8D42769F-07D8-494D-AAB4-AA1652C541FA}\TypeLib
HKCR\Interface\{8D42769F-07D8-494D-AAB4-AA1652C541FA}\TypeLib#Version
HKCR\Interface\{A1922071-390C-418D-916D-91209E95D286}
HKCR\Interface\{A1922071-390C-418D-916D-91209E95D286}\ProxyStubClsid
HKCR\Interface\{A1922071-390C-418D-916D-91209E95D286}\ProxyStubClsid32
HKCR\Interface\{A1922071-390C-418D-916D-91209E95D286}\TypeLib
HKCR\Interface\{A1922071-390C-418D-916D-91209E95D286}\TypeLib#Version
HKCR\Interface\{A1F8CD95-CFB3-43D1-A956-63441CC058C1}
HKCR\Interface\{A1F8CD95-CFB3-43D1-A956-63441CC058C1}\ProxyStubClsid
HKCR\Interface\{A1F8CD95-CFB3-43D1-A956-63441CC058C1}\ProxyStubClsid32
HKCR\Interface\{A1F8CD95-CFB3-43D1-A956-63441CC058C1}\TypeLib
HKCR\Interface\{A1F8CD95-CFB3-43D1-A956-63441CC058C1}\TypeLib#Version
HKCR\Interface\{A63B46AD-96A7-4A2C-BD8F-8CD097E1593A}
HKCR\Interface\{A63B46AD-96A7-4A2C-BD8F-8CD097E1593A}\ProxyStubClsid
HKCR\Interface\{A63B46AD-96A7-4A2C-BD8F-8CD097E1593A}\ProxyStubClsid32
HKCR\Interface\{A63B46AD-96A7-4A2C-BD8F-8CD097E1593A}\TypeLib
HKCR\Interface\{A63B46AD-96A7-4A2C-BD8F-8CD097E1593A}\TypeLib#Version
HKCR\Interface\{A65F98DD-2360-468C-B76E-B1B84C0D547C}
HKCR\Interface\{A65F98DD-2360-468C-B76E-B1B84C0D547C}\ProxyStubClsid
HKCR\Interface\{A65F98DD-2360-468C-B76E-B1B84C0D547C}\ProxyStubClsid32
HKCR\Interface\{A65F98DD-2360-468C-B76E-B1B84C0D547C}\TypeLib
HKCR\Interface\{A65F98DD-2360-468C-B76E-B1B84C0D547C}\TypeLib#Version
HKCR\Interface\{AE2AEED0-BE1B-4BA2-826E-20D1991081B8}
HKCR\Interface\{AE2AEED0-BE1B-4BA2-826E-20D1991081B8}\ProxyStubClsid
HKCR\Interface\{AE2AEED0-BE1B-4BA2-826E-20D1991081B8}\ProxyStubClsid32
HKCR\Interface\{AE2AEED0-BE1B-4BA2-826E-20D1991081B8}\TypeLib
HKCR\Interface\{AE2AEED0-BE1B-4BA2-826E-20D1991081B8}\TypeLib#Version
HKCR\Interface\{D7F73787-6206-4BBA-BDC0-7CFA9940DBCB}
HKCR\Interface\{D7F73787-6206-4BBA-BDC0-7CFA9940DBCB}\ProxyStubClsid
HKCR\Interface\{D7F73787-6206-4BBA-BDC0-7CFA9940DBCB}\ProxyStubClsid32
HKCR\Interface\{D7F73787-6206-4BBA-BDC0-7CFA9940DBCB}\TypeLib
HKCR\Interface\{D7F73787-6206-4BBA-BDC0-7CFA9940DBCB}\TypeLib#Version
HKCR\Interface\{E770F739-2968-4ED9-A63C-DC1938DC82A2}
HKCR\Interface\{E770F739-2968-4ED9-A63C-DC1938DC82A2}\ProxyStubClsid
HKCR\Interface\{E770F739-2968-4ED9-A63C-DC1938DC82A2}\ProxyStubClsid32
HKCR\Interface\{E770F739-2968-4ED9-A63C-DC1938DC82A2}\TypeLib
HKCR\Interface\{E770F739-2968-4ED9-A63C-DC1938DC82A2}\TypeLib#Version

Thanks a lot!

Jochem

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,173 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:21 AM

Posted 03 February 2008 - 01:57 PM

How is the PC running now? Looks like you've killed a lot of baddies. Stop installing strange codecs.
You should still run the Smitfraud and SAS from safe mode. Some malware are active in normal mode and not in safe,hence they resist removal during normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 jochemjspaan

jochemjspaan
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 03 February 2008 - 04:09 PM

pc is running great. I installed one activex thingy, did'nt pay attention to it... It seems like everything is back to normal.
BTW Thought it was a lot of fun trying to kill the virus of my computer, just like all problem solving.

I saw you have tutorials on websites, I think i'll check that out next.

Thanks a lot for your help.

Jochem

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,173 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:21 AM

Posted 03 February 2008 - 04:17 PM

You're welcome. Now so you don't accidentally restore your PC to an infected state. Also malware can hide in these locations as scanners cannot get in there. Create a New restore point.

Next
Create a new Restore Point:
Go to Start > All Programs > Accessories > System Tools > System Restore
Then when Restore opens, select Create a new restore point and click Next
Give the the restore point a name like New and clean >Click Create

Then delete old Restore points:
Go to Start > All Programs > Accessories > System Tools > Disk Cleanup > Click Ok.
Click the more options tab > notice System Restore > click clean up >Reboot
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 jochemjspaan

jochemjspaan
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 03 February 2008 - 04:19 PM

But....
Unfortunately I still cant't log on to the computer in safe mode, it won't accept my password.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,173 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:21 AM

Posted 03 February 2008 - 11:04 PM

This utility will get you there.
Download BootSafe and save it to your Desktop.

Select Safe Mode - Minimal.
Click the Reboot button
After doing what you need to do, run BootSafe again .
Select the Normal Restart option and click the Reboot button to reboot in Normal Mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 jochemjspaan

jochemjspaan
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 04 February 2008 - 03:07 AM

I tried to startup in safe mode using safeboot, my password would still bounce. Maybe it's because I'm working with a company computer and they blocked all entry into safe mode?

I still created a new system restore point and deleted the rest.

Thanks!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users