Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

MBAM log, viruses, rootkit help


  • This topic is locked This topic is locked
40 replies to this topic

#1 GradyBoleyn

GradyBoleyn

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 16 September 2012 - 10:22 PM

Here is my MBAM Log (before removal). It's the only protection I have and I looked up the virus it said it found and it says "Rootkit" and I googled Rootkit and it says you have to wipe your computer to get rid of those, but MB seems to have gotten rid of it. Can anyone tell me what kind of file was downloaded onto my computer to give me the trojan.0access virus? Also, I don't have a windows disc or a backup disc, so if I want to wipe my computer, how could I? Also, if I move all of my docs, pics, music etc. to a external hard drive to wipe it, then will I just reinfect the computer when I put that stuff back on? Thanks for any help.


Malwarebytes Anti-Malware 1.65.0.1400
www.malwarebytes.org

Database version: v2012.09.13.02

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
GradyBoleyn :: OTHERBOLEYNPC [administrator]

9/16/2012 9:52:15 PM
mbam-log-2012-09-16 (22-00-31).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 207678
Time elapsed: 7 minute(s), 45 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 1
C:\Users\GradyBoleyn\AppData\Roaming\pdcsas.dll (Trojan.RedirRdll2.Gen) -> No action taken.

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|pdcsas (Trojan.RedirRdll2.Gen) -> Data: rundll32.exe "C:\Users\GradyBoleyn\AppData\Roaming\pdcsas.dll",WriteStreamToFileHandle -> No action taken.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 3
C:\$Recycle.Bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\n (Trojan.0Access) -> No action taken.
C:\$Recycle.Bin\S-1-5-21-2396082338-1472310501-1874657052-1000\$09b9d309aeee6cf6923a21b3aaff18c2\n (Trojan.0Access) -> No action taken.
C:\Users\GradyBoleyn\AppData\Roaming\pdcsas.dll (Trojan.RedirRdll2.Gen) -> No action taken.

(end)

BC AdBot (Login to Remove)

 


#2 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 16 September 2012 - 10:54 PM

I just restarted to finish the MB removal and when the computer came back on, my whole screen was blocked by the fake FBI GreenDot money scam thing and I restarted in Safe Mode and ran MB again and here's the log for that.
I have removed these and restarted (in Safe Mode w/Networking) and I'm scared to load Windows properly now.

Malwarebytes Anti-Malware 1.65.0.1400
www.malwarebytes.org

Database version: v2012.09.13.02

Windows 7 Service Pack 1 x64 NTFS (Safe Mode)
Internet Explorer 9.0.8112.16421
GradyBoleyn :: OTHERBOLEYNPC [administrator]

9/16/2012 10:41:19 PM
mbam-log-2012-09-16 (22-47-24) 2.txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 205012
Time elapsed: 5 minute(s), 38 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 1
C:\Users\GradyBoleyn\AppData\Roaming\hellomoto (Trojan.Ransom.FGen) -> No action taken.

Files Detected: 2
C:\Users\GradyBoleyn\AppData\Roaming\hellomoto\TujP.dat (Trojan.Ransom.FGen) -> No action taken.
C:\Users\GradyBoleyn\AppData\Roaming\hellomoto\BukF.dat (Trojan.Ransom.FGen) -> No action taken.

(end)

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:10 PM

Posted 17 September 2012 - 10:18 PM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

-AdwCleaner-

  • Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 12:32 AM

Since I posted this, I did a restore point and it worked. Should I still follow these steps just in case?

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:10 PM

Posted 18 September 2012 - 12:41 AM

yes - it is better to safe than sorry



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 01:53 AM

Since I've replied, I have an "Adobe flash player update" pop-up that wont go away no matter what i click and at the same time Spybot found a Trojan and killed it. This thing is still popping up. What is it?

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:10 PM

Posted 18 September 2012 - 01:57 AM

it could be a virus or it could be the flash player
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 02:17 AM

I just opened task manager and there's a random number.exe program and now MBAM is picking up more stuff. I have made sure not to download anything since my restore point and my walware and virus sweeps keep coming up dirty, so I fix them.... and then an hour later they are going off again. I don't understand. Here's a pic of Task Manager and my MBAM log. Thanks so much for helping me. After I post this, I'm going to let MBAM "get rid" of these threats.

http://i1162.photobucket.com/albums/q523/Grady_Boleyn/vir.jpg

**

Malwarebytes Anti-Malware 1.65.0.1400
www.malwarebytes.org

Database version: v2012.09.17.01

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
GradyBoleyn :: OTHERBOLEYNPC [administrator]

Protection: Enabled

9/18/2012 1:58:50 AM
mbam-log-2012-09-18 (02-14-38).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 227782
Time elapsed: 8 minute(s), 38 second(s)

Memory Processes Detected: 1
C:\Users\GradyBoleyn\AppData\Local\Temp\0139d80a035b.exe (Rootkit.0Access) -> 5284 -> No action taken.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 2
C:\Users\GradyBoleyn\AppData\Local\Temp\0139d80a035b.exe (Rootkit.0Access) -> No action taken.
C:\Users\GradyBoleyn\AppData\Local\Temp\msimg32.dll (Rootkit.0Access) -> No action taken.

(end)

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:10 PM

Posted 18 September 2012 - 02:22 AM

pleasae go back to post three and run the programs that I asked you to run and we may get this virus removed



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 02:43 AM

Ok, here's the log from the second step, and now I'm going to do the third step.

# AdwCleaner v2.002 - Logfile created 09/18/2012 at 02:37:48
# Updated 16/09/2012 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : GradyBoleyn - OTHERBOLEYNPC
# Boot Mode : Normal
# Running from : C:\Users\GradyBoleyn\Desktop\Downloads\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

Folder Deleted : C:\Users\GRADYB~1\AppData\Local\Temp\boost_interprocess

***** [Registry] *****

Key Deleted : HKLM\SOFTWARE\Software

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

Restored : [HKCU\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
Restored : [HKCU\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
Restored : [HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
Restored : [HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
Restored : [HKU\S-1-5-18\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
Restored : [HKU\S-1-5-19\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
Restored : [HKU\S-1-5-20\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]

-\\ Mozilla Firefox v15.0 (en-US)

Profile name : default
File : C:\Users\GradyBoleyn\AppData\Roaming\Mozilla\Firefox\Profiles\5j2565y6.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v [Unable to get version]

File : C:\Users\GradyBoleyn\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

File : C:\Users\Josh\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[S1].txt - [1718 octets] - [18/09/2012 02:37:48]

########## EOF - C:\AdwCleaner[S1].txt - [1778 octets] ##########

#11 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 02:49 AM

Here's the last log.

RogueKiller V8.0.3 [09/13/2012] by Tigzy
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : GradyBoleyn [Admin rights]
Mode : Remove -- Date : 09/18/2012 02:47:32

Bad processes : 0

Registry Entries : 3
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\$Recycle.Bin\S-1-5-21-2396082338-1472310501-1874657052-1000\$09b9d309aeee6cf6923a21b3aaff18c2\n.) -> REPLACED (C:\windows\system32\shell32.dll)

Particular Files / Folders:
[ZeroAccess][FILE] @ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\@ --> REMOVED
[ZeroAccess][FILE] @ : C:\$recycle.bin\S-1-5-21-2396082338-1472310501-1874657052-1000\$09b9d309aeee6cf6923a21b3aaff18c2\@ --> REMOVED
[Del.Parent][FILE] 00000004.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U\00000004.@ --> REMOVED
[Del.Parent][FILE] 00000008.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U\00000008.@ --> REMOVED
[Del.Parent][FILE] 000000cb.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U\000000cb.@ --> REMOVED
[Del.Parent][FILE] 80000000.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U\80000000.@ --> REMOVED
[Del.Parent][FILE] 80000032.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U\80000032.@ --> REMOVED
[Del.Parent][FILE] 80000064.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U\80000064.@ --> REMOVED
[ZeroAccess][FOLDER] ROOT : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\U --> REMOVED
[ZeroAccess][FOLDER] ROOT : C:\$recycle.bin\S-1-5-21-2396082338-1472310501-1874657052-1000\$09b9d309aeee6cf6923a21b3aaff18c2\U --> REMOVED
[Del.Parent][FILE] 00000004.@ : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\L\00000004.@ --> REMOVED
[ZeroAccess][FOLDER] ROOT : C:\$recycle.bin\S-1-5-18\$09b9d309aeee6cf6923a21b3aaff18c2\L --> REMOVED
[ZeroAccess][FOLDER] ROOT : C:\$recycle.bin\S-1-5-21-2396082338-1472310501-1874657052-1000\$09b9d309aeee6cf6923a21b3aaff18c2\L --> REMOVED

Driver : [NOT LOADED]

Infection : ZeroAccess

HOSTS File:
--> C:\windows\system32\drivers\etc\hosts

127.0.0.1 localhost
127.0.0.1 activate.adobe.com
127.0.0.1 3dns-3.adobe.com
127.0.0.1 adobe-dns-2.adobe.com
127.0.0.1 adobe-dns-3.adobe.com
127.0.0.1 ereg.wip3.adobe.com
127.0.0.1 activate-sea.adobe.com
127.0.0.1 wip3.adobe.com
127.0.0.1 wwis-dubc1-vip60.adobe.com
127.0.0.1 activate-sjc0.adobe.com
127.0.0.1 practivate.adobe.com
127.0.0.1 ereg.adobe.com
127.0.0.1 activate.wip3.adobe.com
127.0.0.1 3dns-2.adobe.com
127.0.0.1 adobe-dns.adobe.com
::1 localhost


MBR Check:

+++++ PhysicalDrive0: TOSHIBA MK3275GSX +++++
--- User ---
[MBR] b7199178d0e3903282c250e3804fa345
[BSP] e5f4d5c958a9f54873d5ea5bbf8c1a29 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 1500 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 3074048 | Size: 288275 Mo
2 - [XXXXXX] NTFS (0x17) [HIDDEN!] Offset (sectors): 593461248 | Size: 15469 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:10 PM

Posted 18 September 2012 - 03:22 AM

Hello

download Farbar Recovery Scan Tool x64 and save it to a flash drive.

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt
[*]In the command window type in notepad and press Enter.
[*]The notepad opens. Under File menu select Open.
[*]Select "Computer" and find your flash drive letter and close the notepad.
[*]In the command window type e:\frst64.exe and press Enter
Note: Replace letter e with the drive letter of your flash drive.
[*]The tool will start to run.
[*]When the tool opens click Yes to disclaimer.

[*]First Press the Scan button.
[*]It will make a log (FRST.txt)

[*]Second Type the following in the edit box after "Search:". services.exe
[*]Click the Search button
[*]It will make a log (Search.txt)
[/list]
I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 03:50 AM

I don't have an installation disc. Also, should I transfer my stuff to my external drive so it's not erased?

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:10 PM

Posted 18 September 2012 - 07:09 AM

Greetings


the instructions show two ways to get to the recovery environment - only one needs the install disk


It is always a great idea to move any file that cannot be replaced to an external source just in case



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 GradyBoleyn

GradyBoleyn
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Midwest
  • Local time:09:10 PM

Posted 18 September 2012 - 02:11 PM

Oh, I'm sorry. I read them it like it was all one big step. I'm about to do this with my XD card as a flash drive, hope it works :-D




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users