Jump to content

infected with newest fbi ransom virus-cant start PC


keithg

Recommended Posts

so for some reason i got infected by this ransom fbi virus. it seems mine is one of the newest-all black screen asking for 300$. i have been doing research all day on it. i cannot do sys restore, i cannot do safe mode/safe mode networking. i can do safe mode command prompt, but if i do nothing for about a minute...the ransom hijacks the screen there also. one time i quickly tried to so system restore, from safe mode/command and it ran but when i selected which to restore from the pc reboots back to ransom screen. i cannot get to windows to pull your dds.txt files and such. one thing i was able to do on one of the rebooots...was while it was loading the welcome screen i mashed on the keyboard...and somehow that interrupted the ransom screen. it allowed me to get to windows. i was able to do this once in about 75 reboots. anyway, so i download your software, and updated it and ran it. it found 3 viruses. two regular ones i think and one was in a registration catagory. they were ransom something. i was very happy! they were removed and your software told me to reboot to complete removal. i did that and BINGO the ransom popped back up, and mashing the keyboard is not working to get to my desktop. so not sure what to do next.

Link to post
Share on other sites

  • Replies 52
  • Created
  • Last Reply

Top Posters In This Topic

  • Staff

Hello keithg

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!


  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.

    [*]Please do not attach logs or use code boxes, just copy and paste the text.

    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.

    [*]Please read every post completely before doing anything.

    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

    [*]Please provide feedback about your experience as we go.

    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.

NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:


  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:

  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.

On the System Recovery Options menu you will get the following options:


    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt

[*]Select Command Prompt

[*]In the command window type in notepad and press Enter.

[*]The notepad opens. Under File menu select Open.

[*]Select "Computer" and find your flash drive letter and close the notepad.

[*]In the command window type e:\frst64.exe or e:\frst.exe and press Enter

Note: Replace letter e with the drive letter of your flash drive.

[*]The tool will start to run.

[*]When the tool opens click Yes to disclaimer.

[*]First Press the Scan button.

[*]It will make a log (FRST.txt)

[*]Second Type the following in the edit box after "Search:". services.exe

[*]Click the Search button

[*]It will make a log (Search.txt)

I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

Gringo

Link to post
Share on other sites

hi gringo! i do not have a repair option. i have safe mode/net/command enable logging / enable vgs/ last known good / directoryu services / debuggin g mode / disable automatic restart / start normally / reboot / return to os choices. this was preinstalled oem version of xp pro so i do not have the install disk only the recovery or reinstall disk. the safe mode / command prompt works for about 60 secs until the fbi screen hijacks it...maybe i can try running it there...if it sees usb drives and if it gives me enough time...?

Link to post
Share on other sites

  • Staff

Try this please. You will need a USB drive.

Download http://unetbootin.sourceforge.net/unetbootin-xpud-windows-latest.exe & http://noahdfear.net/downloads/bootable/xPUD/xpud-0.9.2.iso to the desktop of your clean computer

  • Insert your USB drive
  • Press Start > My Computer > right click your USB drive > choose Format > Quick format
  • Double click the unetbootin-xpud-windows-387.exe that you just downloaded
  • Press Run then OK
  • Select the DiskImage option then click the browse button located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file you downloaded
  • Verify the correct drive letter is selected for your USB device then click OK
  • It will install a little bootable OS on your USB device
  • Once the files have been written to the device you will be prompted to reboot ~ do not reboot and instead just Exit the UNetbootin interface
  • After it has completed do not choose to reboot the clean computer simply close the installer
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer
  • Boot the Sick computer
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt
    Please note - all text entries are case sensitive

Copy and paste the report.txt for my review

Link to post
Share on other sites

i did everything. and inspected the usb drive and the two files on it now are driver.sh and vesamenu.c32.

i plugged it in to my sick laptop and f12 does not do anything. so i went to the bios and selected boot from USB drive, and when it did something pops up on the screen that says:

SYSLINK 3.72 2008-2009-25 EBIOS Copyright 1994 2008 Peter Anvin

Could not find kernal image: linux

boot: <cursor>

so did it not create the right files during the iso creation?

Link to post
Share on other sites

ok...got it. i recreated the boot usb now it has a bunch of files on it...must have failed the creation the first time. here is the report.txt below.

--------------------------------------

Wed Feb 20 20:10:51 UTC 2013

Driver report for /mnt/sda2/WINDOWS/system32/drivers

658b1557468f3ad0bf7a79c5f0d30da1 int15_64.sys has NO Company Name!

4d8d5b1c895ea0f2a721b98a7ce198f1 int15_old.sys has NO Company Name!

e0c67be430c6de490d6ccaecfa071f9e UBHelper.sys has NO Company Name!

97c3b0e7b7174d6658220862269ddc8d WINIO.sys has NO Company Name!

c1536905ad2067812a238bce998f4bff 1394bus.sys

Microsoft Corporation

6abb91494fe6c59089b9336452ab2ea3 ABP480N5.SYS

Microsoft Corporation

9859c0f6936e723e4892d7141b1327d5 acpiec.sys

Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys

Microsoft Corporation

9a11864873da202c996558b2106b0bbc adpu160m.sys

Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys

Microsoft Corporation

375eb0b97e3950adef3633c27a82438b AegisP.sys

Meetinghouse Data Communications

1e44bc1e83d8fd2305f8d452db109cf9 afd.sys

Microsoft Corporation

08fd04aa961bdc77fb983f328334e3d7 agp440.sys

Microsoft Corporation

03a7e0922acfe1b07d5db2eeb0773063 agpcpq.sys

Microsoft Corporation

d31d1a92479bd8c0d050a6ffbdd410d9 AGRSM.sys

Agere Systems

c23ea9b5f46c7f7910db3eab648ff013 aha154x.sys

Microsoft Corporation

19dd0fb48b0c18892f70e2e7d61a1529 aic78u2.sys

Microsoft Corporation

b7fe594a7468aa0132deb03fb8e34326 aic78xx.sys

Microsoft Corporation

1140ab9938809700b46bb88e46d72a96 aliide.sys

Acer Laboratories

cb08aed0de2dd889a8a820cd8082d83c alim1541.sys

Microsoft Corporation

95b4fb835e28aa1336ceeb07fd5b9398 amdagp.sys

Advanced Micro Devices

d7701d7e72243286cc88c9973d891057 amdk6.sys

Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys

Microsoft Corporation

79f5add8d24bd6893f2903a3e2f3fad6 amsint.sys

Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f arp1394.sys

Microsoft Corporation

69eb0cc7714b32896ccbfd5edcbea447 asc3350p.sys

Microsoft Corporation

5d8de112aa0254b907861e9e9c31d597 asc3550.sys

Advanced System Products

62d318e9a0c8fc9b780008e724283707 asc.sys

Advanced System Products

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys

Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys

Microsoft Corporation

d649c57da6fa762c64013747e5d7d2d6 ati1btxx.sys

ATI Technologies

60b6aa2dc1521da343f781b70eb7895a ati1mdxx.sys

ATI Technologies

6fdc61e8e8e17f6ecc2d9a10fa8df347 ati1pdxx.sys

ATI Technologies

9d318099bf3876a4af4bc75966d27603 ati1raxx.sys

ATI Technologies

bcaf267b10620f8c93f6e87ab726e145 ati1rvxx.sys

ATI Technologies

dac7d785cf62f5bd41441e9d6f5a6efe ati1snxx.sys

ATI Technologies

f7706dae7d101f1b19ce552d772ebfce ati1ttxx.sys

ATI Technologies

6f714b4720dd80ffa9f8d2731594ea4c ati1tuxx.sys

ATI Technologies

67ffbc158dd4d27ba3fc92c6acd87f73 ati1xbxx.sys

ATI Technologies

0d8cab1f08f7d3c4de228b49e12e596a ati1xsxx.sys

ATI Technologies

2d030c2f6b036ca0bc243e1b16d924d1 ati2mtaa.sys

ATI Technologies

8759322ffc1a50569c1e5528ee8026b7 ati2mtag.sys

ATI Technologies

993e7bd6438fe989e328c6b4bca246a9 atinbtxx.sys

ATI Technologies

ed4c2bf8403f4437987c0ba09cf48716 atinmdxx.sys

ATI Technologies

e90ac2b14e98f1a4372e5891b4278784 atinpdxx.sys

ATI Technologies

da36687d701c833430605a298731410b atinraxx.sys

ATI Technologies

a7a01b907db63898d40b0a14248ff9a2 atinrvxx.sys

ATI Technologies

ceddee2e0591894d19654d458fd3b9be atinsnxx.sys

ATI Technologies

d80a8f6c0a717446496c3a06d33b0d9c atinttxx.sys

ATI Technologies

edd66332608d27f4fd5069bcd0bc5164 atintuxx.sys

ATI Technologies

3e7d485cbd0b0d9f6ea2ad9442411831 atinxbxx.sys

ATI Technologies

77b575d7aab35d5908ae6ce681608d62 atinxsxx.sys

ATI Technologies

9916c1225104ba14794209cfa8012159 atmarpc.sys

Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys

Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys

Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys

Microsoft Corporation

f70d2392158cb68e775f8c4cd3d12fbb atswpdrv.sys

tttPbZpt,aMOFDATAMOFRESOURCENAME,VS_VERSION_INFObaabaa?bStringFileInfohB@CompanyNameAuthenTec,Inc.bFileDescriptionSlideFingerprintUSBDriverbFileVersion...:rInternalNameATSwpDrv.sysl$LegalCopyrightCopyright-AuthenTec,Inc.BrOriginalFilenameATSwpDrv.sysZProductNameSlideFingerprintUSBDriverbProductVersion...DVarFileInfo$TranslationtFOMBJDS}TB

d9f724aa26c010a217c97606b160ed68 audstub.sys

Microsoft Corporation

f96038aa1ec4013a93d2420fc689d1e9 b57xp32.sys

Broadcom Corporation

0d93976f7801b7fcd8135cc77257bbd0 battc.sys

Microsoft Corporation

da1f27d85e0d1525f6621372e7b685e9 beep.sys

Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys

Microsoft Corporation

b279426e3c0c344893ed78a613a73bde bthenum.sys

Microsoft Corporation

fca6f069597b62d42495191ace3fc6c1 bthmodem.sys

Microsoft Corporation

80602b8746d3738f5886ce3d67ef06b6 bthpan.sys

Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys

Microsoft Corporation

bb68cebffd181e18a26112d1b9f90f3d bthprint.sys

Microsoft Corporation

61364cd71ef63b0f038b7e9df00f1efa bthusb.sys

Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys

Microsoft Corporation

0be5aef125be881c4f854c554f2b025c ccdecode.sys

Microsoft Corporation

f3ec03299634490e97bbce94cd2954c7 cd20xrnt.sys

Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys

Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys

Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys

Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys

Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys

Microsoft Corporation

0f6c187d38d98f8df904589a5f94d411 cmbatt.sys

Microsoft Corporation

e5dcb56c533014ecbc556a8357c929d5 cmdide.sys

CMD Technology

6e4c9f21f0fae8940661144f41b13203 compbatt.sys

Microsoft Corporation

3ee529119eed34cd212a215e8c40d4b6 cpqarray.sys

Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys

Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys

Microsoft Corporation

e550e7418984b65a78299d248f0a7f36 dac2w2k.sys

Mylex Corporation

683789caa3864eb46125ae86ff677d34 dac960nt.sys

Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys

Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25 disk.sys

Microsoft Corporation

060db81dfb79c8244eb65d10b6c7873f DKbFltr.SYS

tH`=VS_VERSION_INFO?aStringFileInfobbCommentsFCompanyNameDritekSystemInc.l"FileDescriptionDritekPSKeyboardFilterDriver:rFileVersion,,,bInternalNameDKbFltr.Sysz+LegalCopyrightCopyright©-DritekSystemInc.(LegalTrademarks@bOriginalFilenameDKbFltr.SysPrivateBuildNProductNameDritekKeyboardFilter>rProductVersion,,,SpecialBuildDVarFileInfo$Translationt

d992fe1274bde0f84ad826acae022a41 dmboot.sys

Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys

Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys

Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 dmusic.sys

Microsoft Corporation

40f3b93b4e5b0126f2f5c0a7a5e22660 dpti2o.sys

Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys

Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys

Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys

Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys

Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys

Microsoft Corporation

80d1b490b60e74e002dc116ec5d41748 enum1394.sys

Microsoft Corporation

d68564fcfbdfc04280cdbbb37cf7ef7f epm-psd.sys

tH`vVS_VERSION_INFO?StringFileInfobCommentsJCompanyNameAcerValueLabs,USAbFileDescriptionAcerEPMPowerSchemeDriver*FileVersion.bInternalNameepm-psd.sysv)LegalCopyrightCopyrightbyAcerValueLabs,USA(LegalTrademarks@bOriginalFilenameepm-psd.sysPrivateBuildZProductNameAcerEPMPowerSchemeDriver.ProductVersion.SpecialBuildDVarFileInfo$Translationt*

2d0c4a7077f6c68449479f5444c580a7 epm-shd.sys

tH*VS_VERSION_INFO?StringFileInfobCommentsJCompanyNameAcerValueLabs,USAPFileDescriptionAcerEPMSHDECV-TO*FileVersion.bInternalNameepm-shd.sysv)LegalCopyrightCopyrightbyAcerValueLabs,USA(LegalTrademarks@bOriginalFilenameepm-shd.sysPrivateBuild`ProductNameAcerEPMSystemHardwareDriver.ProductVersion.SpecialBuildDVarFileInfo$Translationt*

38d332a6d56af32635675f132548343e fastfat.sys

Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys

Microsoft Corporation

e9648254056bce81a85380c0c3647dc4 fetnd5.sys

VIA Technologies

d45926117eb9fa946a6af572fbe1caa3 fips.sys

Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys

Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltmgr.sys

Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys

Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys

Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys

Microsoft Corporation

3a74c423cf6bcca6982715878f450a3b gagp30kx.sys

Microsoft Corporation

573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys

Windows Server DDK provider

2a013e7530beab6e569faa83f517e836 Hdaudio.sys

Windows Server DDK provider

7bd2de4c85eb4241eed57672b16a7d8d hidbth.sys

Microsoft Corporation

1af592532532a402ed7c060f6954004f hidclass.sys

Microsoft Corporation

bb1a6fb7d35a91e599973fa74a619056 hidir.sys

Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys

Microsoft Corporation

b028377dea0546a5fcfba928a8aefae0 hpn.sys

Microsoft Corporation

970178e8e003eb1481293830069624b9 hsfbs2s2.sys

Conexant

1225ebea76aac3c84df6c54fe5e5d8be hsfcxts2.sys

Conexant

ebb354438a4c5a3327fb97306260714a hsfdpsp2.sys

Conexant

f80a415ef82cd06ffaf0d971528ead38 http.sys

Microsoft Corporation

9368670bd426ebea5e8b18a62416ec28 i2omgmt.sys

Microsoft Corporation

f10863bf1ccc290babd1a09188ae49e0 i2omp.sys

Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys

Microsoft Corporation

997e8f5939f2d12cd9f2e6b395724c16 iaStor.sys

Intel Corporation

28423512370705aeda6a652fedb25468 igxpmp32.sys

Intel Corporation

083a052659f5310dd8b6a6cb05edcf8e imapi.sys

Microsoft Corporation

4a40e045faee58631fd8d91afc620719 ini910u.sys

Microsoft Corporation

658b1557468f3ad0bf7a79c5f0d30da1 int15_64.sys

4d8d5b1c895ea0f2a721b98a7ce198f1 int15_old.sys

f8f75594c17fe7bce1b4045bb7199868 int15.sys

tH`PVS_VERSION_INFO?taStringFileInfoBvCompanyNameAcer,Inc.aFileDescriptionintVFileVersion..builtby:WinDDKnInternalNameint.sysZLegalCopyrightCopyRight@Acersolutions<nOriginalFilenameint.sys.aProductNameintnProductVersion..DVarFileInfo$Translationt*

b5466a9250342a7aa0cd1fba13420678 intelide.sys

Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys

Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys

Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys

Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys

Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys

Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys

Microsoft Corporation

b43b36b382aea10861f7c7a37f9d4ae2 irbus.sys

Microsoft Corporation

aca5e7b54409f9cb5eed97ed0c81120e irda.sys

Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys

Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys

Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys

Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys

Microsoft Corporation

b467646c54cc746128904e1654c750c1 ksecdd.sys

Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys

Microsoft Corporation

b18225739ed9caa83ba2df966e9f43e8 mbamswissarmy.sys

Malwarebytes Corporation

629cabb0421668c9d3d402a3c3d77e14 mbam.sys

Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys

Microsoft Corporation

195741aee20369980796b557358cd774 mdmxsdk.sys

Conexant

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys

Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys

Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys

Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys

Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys

Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726 mqac.sys

Microsoft Corporation

3f4bb95e5a44f3be34824e8e7caf0737 mraid35x.sys

American Megatrends

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys

Microsoft Corporation

7d304a5eb4344ebeeab53a2fe3ffb9f0 mrxsmb.sys

Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys

Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys

Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 mskssrv.sys

Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e mspclock.sys

Microsoft Corporation

bad59648ba099da4a17680b39730cb3d mspqm.sys

Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys

Microsoft Corporation

e53736a9e30c45fa9e7b5eac55056d1d mstee.sys

Microsoft Corporation

c53775780148884ac87c455489a0c070 mtlmnt5.sys

Smart Link

54886a652bf5685192141df304e923fd mtlstrm.sys

Smart Link

6dda78a0be692b61b668fab860f276cf mtxparhm.sys

Matrox Graphics

de6a75f5c270e756c5508d94b6cf68f5 mup.sys

Microsoft Corporation

b538dcd9816ea35fa4f637cfc261aaa8 mutohpen.sys

Microsoft Corporation

5b50f1b2a2ed47d560577b221da734db nabtsfec.sys

Microsoft Corporation

7ff1f1fd8609c149aa432f95a8163d97 ndisip.sys

Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys

Microsoft Corporation

0109c4f3850dfbab279542515386ae22 ndistapi.sys

Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys

Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys

Microsoft Corporation

9282bd12dfb069d3889eb3fcc1000a9b ndproxy.sys

Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys

Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys

Microsoft Corporation

18b2d3e11ed7a3c898ade6a6692b6929 NETw4x32.sys

Intel Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys

Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys

Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys

Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys

Microsoft Corporation

d21fee8db254ba762656878168ac1db6 npf.sys

HuVS_VERSION_INFO?aStringFileInfobCommentsDCompanyNameCACETechnologiesFileDescriptionnpfbFileVersion,,,vInternalNameNPF+TME[LegalCopyrightCopyrightCACETechnologies.Copyright-NetGroup,PolitecnicodiTorino.(LegalTrademarksbOriginalFilenamenpf.sysPrivateBuildl&ProductNameWinPcapNetgroupPacketFilterDriver<bProductVersion,,,SpecialBuildDVarFileInfo$Translation*

2adc0ca9945c65284b3d19bc18765974 nscirda.sys

National Semiconductor

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys

Microsoft Corporation

7f1c1f78d709c4a54cbb46ede7e0b48d NTIDrvr.sys

NewTech Infosystems

576b34ceae5b7e5d9fd2775e93b3db53 ntmtlfax.sys

Smart Link

73c1e1f395918bc2c6dd67af7591a3ad null.sys

Microsoft Corporation

2b298519edbfcf451d43e0f1e8f1006d nv4_mini.sys

NVIDIA Corporation

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys

Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys

Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys

Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys

Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys

Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740 nwrdr.sys

Microsoft Corporation

ca33832df41afb202ee7aeb05145922f ohci1394.sys

Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys

Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys

Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys

Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys

Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys

Microsoft Corporation

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys

Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys

Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys

Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys

Microsoft Corporation

f50f7c27f131afe7beba13e14a3b9416 perc2hib.sys

Microsoft Corporation

6c14b9c19ba84f73d3a86dba11133101 perc2.sys

Microsoft Corporation

e82a496c3961efc6828b508c310ce98f portcls.sys

Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys

Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys

Microsoft Corporation

3dbd60f01f620d4e53fa9ab890fa7095 psdfilter.sys

HiTrust

4194dd2a7d1de0a7aca70e839b878485 psdvdisk.sys

HiTrust

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys

Parallel Technologies

0a63fb54039eb5662433caba3b26dba7 ql1080.sys

QLogic Corporation

6503449e1d43a0ff0201ad5cb1b8c706 ql10wnt.sys

Microsoft Corporation

156ed0ef20c15114ca097a34a30d8a01 ql12160.sys

QLogic Corporation

70f016bebde6d29e864c1230a07cc5e6 ql1240.sys

Microsoft Corporation

907f0aeea6bc451011611e732bd31fcf ql1280.sys

QLogic Corporation

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys

Microsoft Corporation

0207d26ddf796a193ccd9f83047bb5fc rasirda.sys

Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys

Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys

Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys

Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys

Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys

Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys

Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys

Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys

Microsoft Corporation

43af5212bd8fb5ba6eed9754358bd8f7 rdpwd.sys

Microsoft Corporation

e9aaa0092d74a9d371659c4c38882e12 recagent.sys

Smart Link

f828dd7e1419b6653894a8f97a0094c5 redbook.sys

Microsoft Corporation

851c30df2807fcfa21e4c681a7d6440e rfcomm.sys

Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys

Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys

Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c rmcast.sys

Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys

Microsoft Corporation

726548542afeca56257ff01eb13bb6d7 rndismpx.sys

Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys

Microsoft Corporation

b45a576ad280dd4f605f58b24cdaafe1 RtkHDAud.sys

Realtek Semiconductor

e2c6abcbefb1d44f6aaeb1cd5d6062d4 s24trans.sys

Intel Corporation

0dbcc071a268e0340a2ba6bdd98bace4 s3gnbm.sys

SGraphics

76c465f570e90c28942d52ccb2580a10 scsiport.sys

Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys

Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys

Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys

Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys

Microsoft Corporation

a9573045baa16eab9b1085205b82f1ed serscan.sys

Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys

Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys

Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys

Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys

Microsoft Corporation

6b33d0ebd30db32e27d1d78fe946a754 sisagp.sys

Silicon Integrated Systems

866d538ebe33709a5c9f5c62b73b7d14 slip.sys

Microsoft Corporation

d9673011648a71ed1e1f77b831bc85e6 slnt7554.sys

Smart Link

2c1779c0feb1f4a6033600305eba623a slntamr.sys

Smart Link

f9b8e30e82ee95cf3e1d3e495599b99c slnthal.sys

Smart Link

db56bb2c55723815cf549d7fc50cfceb slwdmsup.sys

Smart Link

895be38a993b9bd5abbe570d63d88a2e smbali.sys

Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys

Microsoft Corporation

489703624dac94ed943c2abda022a1cd sonydcam.sys

Microsoft Corporation

83c0f71f86d3bdaf915685f3d568b20e sparrow.sys

Adaptec

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys

Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys

Microsoft Corporation

2a0aaf370d4c6574a34ae2f4a0709cae srtspl.sys

Symantec Corporation

655773f2f1a3730c6cf20280a49f4ee1 srtsp.sys

Symantec Corporation

3104bdceace2d5710776dd05e6a286c1 srtspx.sys

Symantec Corporation

47ddfc2f003f7f9f0592c6874962a2e7 srv.sys

Microsoft Corporation

77813007ba6265c4b6098187e6ed79d2 streamip.sys

Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys

Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f swenum.sys

Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys

Microsoft Corporation

1ff3217614018630d0a6758630fc698c symc810.sys

Symbios Logic

070e001d95cf725186ef8b20335f933c symc8xx.sys

LSI Logic

51b57cda977170ac608d839dbfa1d3ee symdns.sys

Symantec Corporation

06b95820df51502099a8a15c93e87986 SYMEVENT.SYS

Symantec Corporation

a131d8360b01044517aa44529e2137d6 symfw.sys

Symantec Corporation

80ac1c4abbe2df3b738bf15517a51f2c sym_hi.sys

LSI Logic

2b77868f02dae02103380b824431b798 symids.sys

Symantec Corporation

b226f8a4d780acdf76145b58bb791d5b symlcbrd.sys

Symantec Corporation

799282f4a913ca51197c9cdd34d403d6 symndis.sys

Symantec Corporation

7d3addfe63e5227bd2dbd5692bafb688 symndisv.sys

Symantec Corporation

394b2368212114d538316812af60fddd symredrv.sys

Symantec Corporation

d46676bb414c7531bdffe637a33f5033 symtdi.sys

Symantec Corporation

bf4fab949a382a8e105f46ebb4937058 sym_u3.sys

LSI Logic

e295fffff3aaf9a6a40b29497901908f SynTP.sys

Synaptics

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys

Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys

Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys

Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys

Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys

Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys

Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys

Microsoft Corporation

88155247177638048422893737429d9e termdd.sys

Microsoft Corporation

e4c85c291ddb3dc5e4a2f227ca465ba6 tifm21.sys

Texas Instruments

699450901c5ccfd82357cbc531cedd23 tosdvd.sys

Microsoft Corporation

f2790f6af01321b172aa62f8e1e187d9 toside.sys

Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys

Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys

Microsoft Corporation

4e104ebc164231d2272cc9bdd1ef5c40 TVicPort64.sys

tH``VS_VERSION_INFO?adStringFileInfo@bComments<CompanyNameEnTechTaiwanv'FileDescriptionTVicPortDriverforWindowsNT//XP(FileVersion.:rInternalNameTVicPort.sysVLegalCopyrightEnTechTaiwan,-:tLegalTrademarksTVicPortBrOriginalFilenameTVicPort.sysPrivateBuildIProductNameTVicPortGenericDeviceDriverforWindows//ME/NT///XP/XP,ProductVersion.SpecialBuildDVarFileInfo$Translationt*

97dd70feca64fb4f63de7bb7e66a80b1 TVicPort.sys

tH&VS_VERSION_INFO?adStringFileInfo@bComments<CompanyNameEnTechTaiwanv'FileDescriptionTVicPortDriverforWindowsNT//XP(FileVersion.:rInternalNameTVicPort.sysVLegalCopyrightEnTechTaiwan,-:tLegalTrademarksTVicPortBrOriginalFilenameTVicPort.sysPrivateBuildIProductNameTVicPortGenericDeviceDriverforWindows//ME/NT///XP/XP,ProductVersion.SpecialBuildDVarFileInfo$Translationt

d85938f272d1bcf3db3a31fc0a048928 uagp35.sys

Microsoft Corporation

e0c67be430c6de490d6ccaecfa071f9e UBHelper.sys

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys

Microsoft Corporation

1b698a51cd528d8da4ffaed66dfc51b9 ultra.sys

Promise Technology

Promise Technology

Promise Technology

Promise Technology

Promise Technology

402ddc88356b1bac0ee3dd1580c76a31 update.sys

Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys

Microsoft Corporation

b6cc50279d6cd28e090a5d33244adc9a usb8023x.sys

Microsoft Corporation

e919708db44ed8543a7c017953148330 USBAUDIO.sys

Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys

Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys

Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys

Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys

Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys

Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys

Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys

Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys

Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4 usbscan.sys

Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9 usbstor.sys

Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys

Microsoft Corporation

63bbfca7f390f4c49ed4b96bfb1633e0 usbvideo.sys

Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys

Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys

Microsoft Corporation

754292ce5848b3738281b4f3607eaef4 viaagp.sys

Microsoft Corporation

3b3efcda263b8ac14fdf9cbdd0791b2e viaide.sys

Microsoft Corporation

e28726b72c46821a28830e077d39a55b videoprt.sys

Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys

Microsoft Corporation

aced8c149b30f8496c237bcba3727b48 wacompen.sys

Microsoft Corporation

0308aef61941e4af478fa1a0f83812f5 wadv07nt.sys

Intel Corporation

714038a8aa5de08e12062202cd7eaeb5 wadv08nt.sys

Intel Corporation

7bb3aa595e4507a788de1cdc63f4c8c4 wadv09nt.sys

Intel Corporation

36e6c405b6143d09687f4056fd9a0d10 wadv11nt.sys

Intel Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys

Microsoft Corporation

352fa0e98bc461ce1ce5d41f64db558d watv06nt.sys

Intel Corporation

791cc45de6e50445be72e8ad6401ff45 watv10nt.sys

Intel Corporation

6768acf64b18196494413695f0c3a00f wdmaud.sys

Microsoft Corporation

97c3b0e7b7174d6658220862269ddc8d WINIO.sys

c42584fd66ce9e17403aebca199f7bdb wmiacpi.sys

Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys

Microsoft Corporation

c60dc16d4e406810fad54b98dc92d5ec wpdusb.sys

Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys

Microsoft Corporation

c98b39829c2bbd34e454150633c62c78 wstcodec.sys

Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311 WudfPf.sys

Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b WudfRd.sys

Microsoft Corporation

f2f291f29b4ece0394f9a28f8e829afa zntport64.sys

tHVS_VERSION_INFO?bStringFileInfobComments@CompanyNameZealSoftStudiobFileDescriptionNTPortLibrarykerneldrivervFileVersion,,,bInternalNamezntportLegalCopyrightCopyright©-HaiLi,ZealSoftStudio.(LegalTrademarks@bOriginalFilenamezntport.sysPrivateBuild>ProductNameNTPortLibrary:vProductVersion,,,SpecialBuildDVarFileInfo$Translationt*

40ac8590cc9006dbb99ffcb37879d4c6 zntport.sys

tH`nVS_VERSION_INFO?ZStringFileInfob@CompanyNameZealSoftStudiobFileDescriptionzntportvFileVersion,,,bInternalNamezntport/LegalCopyrightCopyright-HaiLi,ZealSoftStudio.@bOriginalFilenamezntport.sys>ProductNameNTPortLibrary:vProductVersion,,,DVarFileInfo$TranslationtTDTb

Link to post
Share on other sites

  • Staff

Download http://noahdfear.net/downloads/rst.sh to the USB drive

  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see rst.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh
  • Press Enter
  • After it has finished a report will be located at sdb1 named enum.log
  • Plug that USB back into the clean computer and open it

Please note: If you have an ethernet connection you can access the internet by way of xPUD (Firefox). You can perform all these steps on your sick computer. When you download the download will reside in the Download folder. It can be found under the File tab also. You can similarly access our thread by way of this OS too so you can send the logs that way.

Please also note - all text entries are case sensitive

Copy and paste the enum.log for my review

Link to post
Share on other sites

here is enum.log

---------------------------

28.8M Feb 21 2013 /mnt/sda2/WINDOWS/system32/config/SOFTWARE

13.5M Feb 21 2013 /mnt/sda2/WINDOWS/system32/config/SYSTEM

28.5M Feb 14 10:00 /sda2/~/RP110/~SOFTWARE

25.7M Dec 9 18:58 /sda2/~/RP48/~SOFTWARE

25.7M Dec 30 19:26 /sda2/~/RP69/~SOFTWARE

28.5M Feb 4 11:42 /sda2/~/RP100/~SOFTWARE

28.5M Feb 5 15:34 /sda2/~/RP101/~SOFTWARE

28.5M Feb 6 17:10 /sda2/~/RP102/~SOFTWARE

28.5M Feb 7 17:42 /sda2/~/RP103/~SOFTWARE

28.5M Feb 8 17:42 /sda2/~/RP104/~SOFTWARE

28.5M Feb 9 18:42 /sda2/~/RP105/~SOFTWARE

28.5M Feb 10 19:42 /sda2/~/RP106/~SOFTWARE

28.5M Feb 11 20:44 /sda2/~/RP107/~SOFTWARE

28.5M Feb 12 21:08 /sda2/~/RP108/~SOFTWARE

28.5M Feb 13 22:10 /sda2/~/RP109/~SOFTWARE

28.5M Feb 15 10:01 /sda2/~/RP111/~SOFTWARE

28.5M Feb 16 10:06 /sda2/~/RP112/~SOFTWARE

28.5M Feb 17 11:06 /sda2/~/RP113/~SOFTWARE

28.5M Feb 18 12:06 /sda2/~/RP114/~SOFTWARE

28.5M Feb 19 16:11 /sda2/~/RP115/~SOFTWARE

28.5M Feb 20 18:04 /sda2/~/RP116/~SOFTWARE

28.5M Feb 20 18:17 /sda2/~/RP117/~SOFTWARE

25.5M Nov 28 10:00 /sda2/~/RP33/~SOFTWARE

25.5M Nov 29 10:00 /sda2/~/RP34/~SOFTWARE

25.5M Nov 29 17:20 /sda2/~/RP35/~SOFTWARE

25.7M Nov 29 17:28 /sda2/~/RP36/~SOFTWARE

25.7M Nov 29 17:37 /sda2/~/RP37/~SOFTWARE

25.7M Nov 30 17:52 /sda2/~/RP38/~SOFTWARE

25.7M Dec 1 19:34 /sda2/~/RP39/~SOFTWARE

25.7M Dec 2 20:34 /sda2/~/RP40/~SOFTWARE

25.7M Dec 3 21:12 /sda2/~/RP41/~SOFTWARE

25.7M Dec 4 22:11 /sda2/~/RP42/~SOFTWARE

25.7M Dec 5 23:05 /sda2/~/RP43/~SOFTWARE

25.7M Dec 6 23:12 /sda2/~/RP44/~SOFTWARE

25.7M Dec 7 23:20 /sda2/~/RP45/~SOFTWARE

25.7M Dec 10 19:33 /sda2/~/RP49/~SOFTWARE

25.7M Dec 12 00:03 /sda2/~/RP50/~SOFTWARE

25.7M Dec 12 10:00 /sda2/~/RP51/~SOFTWARE

25.7M Dec 13 10:29 /sda2/~/RP52/~SOFTWARE

25.7M Dec 14 11:29 /sda2/~/RP53/~SOFTWARE

25.7M Dec 15 12:30 /sda2/~/RP54/~SOFTWARE

25.7M Dec 16 17:12 /sda2/~/RP55/~SOFTWARE

25.7M Dec 17 17:37 /sda2/~/RP56/~SOFTWARE

25.7M Dec 18 18:29 /sda2/~/RP57/~SOFTWARE

25.7M Dec 19 20:58 /sda2/~/RP58/~SOFTWARE

25.7M Dec 20 22:53 /sda2/~/RP59/~SOFTWARE

25.7M Dec 21 10:00 /sda2/~/RP60/~SOFTWARE

25.7M Dec 22 10:27 /sda2/~/RP61/~SOFTWARE

25.7M Dec 23 11:27 /sda2/~/RP62/~SOFTWARE

25.7M Dec 24 12:27 /sda2/~/RP63/~SOFTWARE

25.7M Dec 25 13:57 /sda2/~/RP64/~SOFTWARE

25.7M Dec 26 14:42 /sda2/~/RP65/~SOFTWARE

25.7M Dec 27 15:42 /sda2/~/RP66/~SOFTWARE

25.7M Dec 28 19:07 /sda2/~/RP67/~SOFTWARE

25.7M Dec 29 19:16 /sda2/~/RP68/~SOFTWARE

25.7M Dec 31 19:31 /sda2/~/RP70/~SOFTWARE

25.7M Jan 1 21:04 /sda2/~/RP71/~SOFTWARE

25.7M Jan 2 21:53 /sda2/~/RP72/~SOFTWARE

25.7M Jan 3 22:02 /sda2/~/RP73/~SOFTWARE

25.7M Jan 4 10:00 /sda2/~/RP74/~SOFTWARE

25.7M Jan 5 10:46 /sda2/~/RP75/~SOFTWARE

25.7M Jan 6 10:47 /sda2/~/RP76/~SOFTWARE

25.7M Jan 7 11:47 /sda2/~/RP77/~SOFTWARE

25.7M Jan 8 16:19 /sda2/~/RP78/~SOFTWARE

25.7M Jan 9 10:00 /sda2/~/RP79/~SOFTWARE

25.9M Jan 10 10:28 /sda2/~/RP80/~SOFTWARE

25.9M Jan 11 11:28 /sda2/~/RP81/~SOFTWARE

25.9M Jan 12 11:28 /sda2/~/RP82/~SOFTWARE

25.9M Jan 13 12:28 /sda2/~/RP83/~SOFTWARE

25.9M Jan 14 13:28 /sda2/~/RP84/~SOFTWARE

25.9M Jan 15 14:52 /sda2/~/RP85/~SOFTWARE

25.9M Jan 16 10:00 /sda2/~/RP86/~SOFTWARE

25.9M Jan 17 13:26 /sda2/~/RP87/~SOFTWARE

25.9M Jan 18 14:39 /sda2/~/RP88/~SOFTWARE

25.9M Jan 19 16:16 /sda2/~/RP89/~SOFTWARE

25.9M Jan 20 16:56 /sda2/~/RP90/~SOFTWARE

25.9M Jan 21 16:58 /sda2/~/RP91/~SOFTWARE

25.9M Jan 22 18:55 /sda2/~/RP92/~SOFTWARE

25.9M Jan 29 21:07 /sda2/~/RP93/~SOFTWARE

27.6M Jan 30 21:46 /sda2/~/RP94/~SOFTWARE

27.6M Jan 31 05:14 /sda2/~/RP95/~SOFTWARE

27.6M Feb 1 05:45 /sda2/~/RP96/~SOFTWARE

27.6M Feb 1 10:00 /sda2/~/RP97/~SOFTWARE

28.5M Feb 2 10:33 /sda2/~/RP98/~SOFTWARE

28.5M Feb 3 10:42 /sda2/~/RP99/~SOFTWARE

6.7M Feb 14 10:00 /sda2/~/RP110/~SYSTEM

6.7M Dec 9 18:58 /sda2/~/RP48/~SYSTEM

6.7M Dec 30 19:26 /sda2/~/RP69/~SYSTEM

6.7M Feb 4 11:42 /sda2/~/RP100/~SYSTEM

6.7M Feb 5 15:34 /sda2/~/RP101/~SYSTEM

6.7M Feb 6 17:10 /sda2/~/RP102/~SYSTEM

6.7M Feb 7 17:42 /sda2/~/RP103/~SYSTEM

6.7M Feb 8 17:42 /sda2/~/RP104/~SYSTEM

6.7M Feb 9 18:42 /sda2/~/RP105/~SYSTEM

6.7M Feb 10 19:42 /sda2/~/RP106/~SYSTEM

6.7M Feb 11 20:44 /sda2/~/RP107/~SYSTEM

6.7M Feb 12 21:08 /sda2/~/RP108/~SYSTEM

6.7M Feb 13 22:10 /sda2/~/RP109/~SYSTEM

6.7M Feb 15 10:01 /sda2/~/RP111/~SYSTEM

6.7M Feb 16 10:06 /sda2/~/RP112/~SYSTEM

6.7M Feb 17 11:06 /sda2/~/RP113/~SYSTEM

6.7M Feb 18 12:06 /sda2/~/RP114/~SYSTEM

6.7M Feb 19 16:11 /sda2/~/RP115/~SYSTEM

10.0M Feb 20 18:04 /sda2/~/RP116/~SYSTEM

10.0M Feb 20 18:17 /sda2/~/RP117/~SYSTEM

6.6M Nov 28 10:00 /sda2/~/RP33/~SYSTEM

6.6M Nov 29 10:00 /sda2/~/RP34/~SYSTEM

6.6M Nov 29 17:20 /sda2/~/RP35/~SYSTEM

6.6M Nov 29 17:28 /sda2/~/RP36/~SYSTEM

6.6M Nov 29 17:37 /sda2/~/RP37/~SYSTEM

6.6M Nov 30 17:52 /sda2/~/RP38/~SYSTEM

6.6M Dec 1 19:34 /sda2/~/RP39/~SYSTEM

6.6M Dec 2 20:34 /sda2/~/RP40/~SYSTEM

6.6M Dec 3 21:12 /sda2/~/RP41/~SYSTEM

6.6M Dec 4 22:11 /sda2/~/RP42/~SYSTEM

6.6M Dec 5 23:05 /sda2/~/RP43/~SYSTEM

6.6M Dec 6 23:12 /sda2/~/RP44/~SYSTEM

6.6M Dec 7 23:20 /sda2/~/RP45/~SYSTEM

6.7M Dec 10 19:33 /sda2/~/RP49/~SYSTEM

6.7M Dec 12 00:03 /sda2/~/RP50/~SYSTEM

6.7M Dec 12 10:00 /sda2/~/RP51/~SYSTEM

6.7M Dec 13 10:29 /sda2/~/RP52/~SYSTEM

6.7M Dec 14 11:29 /sda2/~/RP53/~SYSTEM

6.7M Dec 15 12:30 /sda2/~/RP54/~SYSTEM

6.7M Dec 16 17:12 /sda2/~/RP55/~SYSTEM

6.7M Dec 17 17:37 /sda2/~/RP56/~SYSTEM

6.7M Dec 18 18:29 /sda2/~/RP57/~SYSTEM

6.7M Dec 19 20:58 /sda2/~/RP58/~SYSTEM

6.7M Dec 20 22:53 /sda2/~/RP59/~SYSTEM

6.7M Dec 21 10:00 /sda2/~/RP60/~SYSTEM

6.7M Dec 22 10:27 /sda2/~/RP61/~SYSTEM

6.7M Dec 23 11:27 /sda2/~/RP62/~SYSTEM

6.7M Dec 24 12:27 /sda2/~/RP63/~SYSTEM

6.7M Dec 25 13:57 /sda2/~/RP64/~SYSTEM

6.7M Dec 26 14:42 /sda2/~/RP65/~SYSTEM

6.7M Dec 27 15:42 /sda2/~/RP66/~SYSTEM

6.7M Dec 28 19:07 /sda2/~/RP67/~SYSTEM

6.7M Dec 29 19:16 /sda2/~/RP68/~SYSTEM

6.7M Dec 31 19:31 /sda2/~/RP70/~SYSTEM

6.7M Jan 1 21:04 /sda2/~/RP71/~SYSTEM

6.7M Jan 2 21:53 /sda2/~/RP72/~SYSTEM

6.7M Jan 3 22:02 /sda2/~/RP73/~SYSTEM

6.7M Jan 4 10:00 /sda2/~/RP74/~SYSTEM

6.7M Jan 5 10:46 /sda2/~/RP75/~SYSTEM

6.7M Jan 6 10:47 /sda2/~/RP76/~SYSTEM

6.7M Jan 7 11:47 /sda2/~/RP77/~SYSTEM

6.7M Jan 8 16:19 /sda2/~/RP78/~SYSTEM

6.7M Jan 9 10:00 /sda2/~/RP79/~SYSTEM

6.7M Jan 10 10:28 /sda2/~/RP80/~SYSTEM

6.7M Jan 11 11:28 /sda2/~/RP81/~SYSTEM

6.7M Jan 12 11:28 /sda2/~/RP82/~SYSTEM

6.7M Jan 13 12:28 /sda2/~/RP83/~SYSTEM

6.7M Jan 14 13:28 /sda2/~/RP84/~SYSTEM

6.7M Jan 15 14:52 /sda2/~/RP85/~SYSTEM

6.7M Jan 16 10:00 /sda2/~/RP86/~SYSTEM

6.7M Jan 17 13:26 /sda2/~/RP87/~SYSTEM

6.7M Jan 18 14:39 /sda2/~/RP88/~SYSTEM

6.7M Jan 19 16:16 /sda2/~/RP89/~SYSTEM

6.7M Jan 20 16:56 /sda2/~/RP90/~SYSTEM

6.7M Jan 21 16:58 /sda2/~/RP91/~SYSTEM

6.7M Jan 22 18:55 /sda2/~/RP92/~SYSTEM

6.7M Jan 29 21:07 /sda2/~/RP93/~SYSTEM

6.7M Jan 30 21:46 /sda2/~/RP94/~SYSTEM

6.7M Jan 31 05:14 /sda2/~/RP95/~SYSTEM

6.7M Feb 1 05:45 /sda2/~/RP96/~SYSTEM

6.7M Feb 1 10:00 /sda2/~/RP97/~SYSTEM

6.7M Feb 2 10:33 /sda2/~/RP98/~SYSTEM

6.7M Feb 3 10:42 /sda2/~/RP99/~SYSTEM

Link to post
Share on other sites

  • Staff

Let's see if there is an available registry backup we can use to help get your computer booting properly

  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh -r
  • Type 95
  • Press Enter
  • After it has finished a report will be located at sdb1 named restore.log
  • Please try to boot into normal Windows now and indicate if you were successful

Please note - all text entries are case sensitive

Copy and paste the restore.log from your USB drive for my review

Link to post
Share on other sites

i followed your instructions and rebooted. but the message still pops up. Now i must admit that it did sit for about 40 seconds at the windows start screen, just like it did when running your software to remove it. almost like both times it DID remove the software from its running directories, but at boot up, it took that time to reinstall itself from another location. causing the additional time lag, instead of starting right up at boot. but that is just my opinion. here is the log as you requested.

----------------------------------

SOFTWARE hive restored from RP95

SYSTEM hive restored from RP95

SECURITY hive restored from RP95

SAM hive restored from RP95

Link to post
Share on other sites

  • Staff

Hello keithg

These are the programs I would like you to run next, if you have any problems with these just skip it and move on to the next one.

-AdwCleaner-

  • Please download
AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+

Gringo

Link to post
Share on other sites

  • Staff

Hello keithg

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

Link 1
Link 2
Link 3

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

Link to post
Share on other sites

below is the log.

it helped out a bit. now the service ICS / firewall DOES start. and i can see all the home group devices. but the printer still doesnt print i still receive the pop up HPNetworkCommuncatorCom has encountered a problem and needs to close. i click Send or Dont Send the report and it pops right back up infinity. i checked firewall..they are both disabled.

-----------------------------------------------

ComboFix 13-02-26.01 - Tobie 02/26/2013 11:35:10.1.2 - x86

Running from: c:\documents and settings\Tobie\Desktop\ComboFix.exe

* Created a new restore point

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\documents and settings\All Users\Application Data\812411184.pad

C:\prefs.js

c:\program files\Acer\Bio-Protection fingerprint solution\PwdFilter.dll

c:\program files\WinPCap

c:\program files\WinPCap\daemon_mgm.exe

c:\program files\WinPCap\npf_mgm.exe

c:\program files\WinPCap\rpcapd.exe

c:\windows\system32\AegisI5Installer.exe

c:\windows\system32\drivers\npf.sys

c:\windows\system32\Packet.dll

c:\windows\system32\pthreadVC.dll

c:\windows\system32\URTTemp

c:\windows\system32\URTTemp\fusion.dll

c:\windows\system32\URTTemp\mscoree.dll

c:\windows\system32\URTTemp\mscoree.dll.local

c:\windows\system32\URTTemp\mscorsn.dll

c:\windows\system32\URTTemp\mscorwks.dll

c:\windows\system32\URTTemp\msvcr71.dll

c:\windows\system32\URTTemp\regtlib.exe

c:\windows\system32\WanPacket.dll

c:\windows\system32\wpcap.dll

c:\windows\Temp\log.txt

c:\windows\wininit.ini

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

-------\Service_NPF

.

.

((((((((((((((((((((((((( Files Created from 2013-01-26 to 2013-02-26 )))))))))))))))))))))))))))))))

.

.

2013-02-24 15:07 . 2013-02-24 15:07 -------- d-----w- c:\program files\Internet Content Filter

2013-02-24 15:07 . 2012-10-13 09:18 1780776 ----a-w- c:\windows\system32\seinst.dll

2013-02-24 15:07 . 2012-10-13 09:18 1699936 ----a-w- c:\windows\SERecat.exe

2013-02-24 15:07 . 2012-10-13 09:18 341360 ----a-w- c:\windows\system32\ICF.dll

2013-02-24 15:07 . 2012-10-13 09:18 1714856 ----a-w- c:\windows\sediag.exe

2013-02-24 15:07 . 2013-02-24 15:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Internet Content Filter

2013-02-24 15:06 . 2013-02-24 15:07 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee

2013-02-21 21:31 . 2011-07-13 02:55 2237440 ----a-r- C:\OTLPE.exe

2013-02-21 21:31 . 2013-02-21 21:31 -------- d-----w- C:\_OTL

2013-02-20 22:38 . 2013-02-20 22:38 -------- d-----w- c:\documents and settings\Tobie\Application Data\Malwarebytes

2013-02-20 22:38 . 2013-02-20 22:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2013-02-20 22:38 . 2013-02-21 00:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2013-02-20 22:38 . 2012-12-14 23:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys

2013-02-20 16:49 . 2013-02-20 16:49 10344 ----a-w- c:\windows\system32\drivers\symlcbrd.sys

2013-02-20 14:59 . 2013-02-20 14:59 -------- d-sh--w- c:\documents and settings\Administrator\PrivacIE

2013-02-20 14:59 . 2013-02-20 14:59 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache

2013-02-14 10:59 . 2013-02-14 10:59 -------- d-----w- c:\program files\Common Files\Skype

2013-02-14 10:59 . 2013-02-14 10:59 -------- d-----r- c:\program files\Skype

2013-01-31 05:14 . 2013-01-31 05:14 -------- d-----w- c:\documents and settings\Tobie\Application Data\Rags

2013-01-31 05:14 . 2013-01-31 05:14 -------- d-----w- c:\program files\RagsGame

2013-01-30 21:24 . 2013-01-30 21:24 -------- d-----w- c:\program files\Microsoft Synchronization Services

2013-01-30 21:24 . 2013-01-30 21:24 -------- d-----w- c:\program files\Microsoft SQL Server Compact Edition

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2013-01-26 03:55 . 2004-08-05 03:00 552448 ----a-w- c:\windows\system32\oleaut32.dll

2013-01-07 01:19 . 2007-02-28 09:53 2148864 ----a-w- c:\windows\system32\ntoskrnl.exe

2013-01-07 00:37 . 2007-02-28 09:16 2027520 ----a-w- c:\windows\system32\ntkrnlpa.exe

2013-01-04 01:20 . 2007-03-08 13:47 1867264 ----a-w- c:\windows\system32\win32k.sys

2013-01-02 06:49 . 2004-08-05 03:00 148992 ----a-w- c:\windows\system32\mpg2splt.ax

2013-01-02 06:49 . 2004-08-05 03:00 1292288 ----a-w- c:\windows\system32\quartz.dll

2012-12-26 20:16 . 2006-01-09 18:08 916480 ----a-w- c:\windows\system32\wininet.dll

2012-12-26 20:16 . 2004-08-05 03:00 43520 ----a-w- c:\windows\system32\licmgr10.dll

2012-12-26 20:16 . 2004-08-05 03:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl

2012-12-24 06:40 . 2004-08-05 03:00 385024 ----a-w- c:\windows\system32\html.iec

2012-12-16 12:23 . 2004-08-05 03:00 290560 ----a-w- c:\windows\system32\atmfd.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2012-11-18 39408]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-03-21 174872]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2005-12-16 761945]

"AzMixerSel"="c:\program files\Realtek\InstallShield\AzMixerSel.exe" [2005-06-12 53248]

"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2007-01-09 68640]

"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2007-01-09 52256]

"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-04-28 84640]

"osCheck"="c:\program files\Norton Internet Security\osCheck.exe" [2007-04-28 26248]

"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-05 59392]

"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-05 455168]

"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-05 455168]

"RTHDCPL"="RTHDCPL.EXE" [2007-05-28 16132608]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-04-20 142104]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-04-20 162584]

"Persistence"="c:\windows\system32\igfxpers.exe" [2007-04-20 138008]

"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" [2008-01-30 583048]

"ePower_DMC"="c:\acer\Empowering Technology\ePower\ePower_DMC.exe" [2007-05-24 475136]

"ICF"="c:\program files\Internet Content Filter\mfp.exe" [2012-10-13 3296424]

"eRecoveryService"="c:\acer\Empowering Technology\eRecovery\eRAgent.exe" [2006-06-01 413696]

"eDataSecurity Loader"="c:\acer\Empowering Technology\eDataSecurity\eDSloader.exe" [2007-03-30 342528]

"Boot"="c:\acer\Empowering Technology\ePower\Boot.exe" [2006-03-16 579584]

"Acer ePresentation HPD"="c:\acer\Empowering Technology\ePresentation\ePresentation.exe" [2007-03-02 208896]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\AWinNotifyVitaKey MC3000]

2012-11-13 22:19 2803200 ----a-w- c:\program files\Acer\Bio-Protection fingerprint solution\WinNotify.dll

.

[HKLM\~\startupfolder\C:^Documents and Settings^Tobie^Start Menu^Programs^Startup^Monitor Ink Alerts - HP Officejet Pro 8600 (Network).lnk]

path=c:\documents and settings\Tobie\Start Menu\Programs\Startup\Monitor Ink Alerts - HP Officejet Pro 8600 (Network).lnk

backup=c:\windows\pss\Monitor Ink Alerts - HP Officejet Pro 8600 (Network).lnkStartup

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IMJPMIG8.1]

2004-08-05 03:00 208952 ----a-w- c:\windows\ime\imjp8_1\imjpmig.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LManager]

2007-06-14 18:21 850704 ----a-w- c:\progra~1\LAUNCH~1\LManager.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]

2013-01-08 22:23 18709248 ----a-r- c:\program files\Skype\Phone\Skype.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]

2012-11-18 13:57 39408 ----a-w- c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ZPdtWzdVitaKey MC3000]

2012-11-13 22:19 3805184 ----a-w- c:\program files\Acer\Bio-Protection fingerprint solution\PdtWzd.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]

"SkypeUpdate"=2 (0x2)

"LiveUpdate Notice Service"=2 (0x2)

"LiveUpdate Notice Ex"=2 (0x2)

"LiveUpdate"=3 (0x3)

"LightScribeService"=2 (0x2)

"gusvc"=3 (0x3)

"gupdatem"=3 (0x3)

"gupdate"=2 (0x2)

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\CyberLink\\PowerDVD\\PowerDVD.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Microsoft Office\\Office14\\ONENOTE.EXE"=

"c:\\Program Files\\Microsoft Office\\Office14\\OUTLOOK.EXE"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

.

R2 mfeicfupdate;McAfee Internet Content Filter Update Service;c:\program files\Internet Content Filter\UpdateService.exe [2/24/2013 8:07 AM 1654080]

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2/10/2013 9:52 PM 106656]

S4 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [1/8/2013 3:19 PM 161536]

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - COMHOST

*NewlyCreated* - WINMGMT

.

Contents of the 'Scheduled Tasks' folder

.

2013-02-26 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2012-11-18 13:55]

.

2013-02-26 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2012-11-18 13:55]

.

2013-02-16 c:\windows\Tasks\Norton Internet Security - Run Full System Scan - Tobie.job

- c:\progra~1\NORTON~1\NORTON~1\Navw32.exe [2007-04-28 00:08]

.

.

------- Supplementary Scan -------

.

uStart Page = https://www.google.com/

mStart Page = hxxp://www.google.com

uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ycomp/defaults/su/*http://www.yahoo.com

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000

IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105

LSP: ICF.dll

TCP: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12

.

- - - - ORPHANS REMOVED - - - -

.

HKLM-Run-eLockMonitor - c:\acer\Empowering Technology\eLock\Monitor\LaunchMonitor.exe

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2013-02-26 11:43

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_110_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_110_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'winlogon.exe'(952)

c:\program files\Acer\Bio-Protection fingerprint solution\WinNotify.dll

c:\program files\Acer\Bio-Protection fingerprint solution\CustomRes.dll

c:\windows\system32\ATSC70.DLL

c:\windows\system32\ATSC70PBA.dll

.

- - - - - - - > 'lsass.exe'(1012)

c:\windows\system32\ICF.dll

.

- - - - - - - > 'explorer.exe'(2824)

c:\windows\system32\WININET.dll

c:\windows\system32\MSNCHATHOOK.DLL

c:\windows\system32\sysenv.dll

c:\windows\system32\CryptoAPI.dll

c:\windows\system32\ShowErrMsg.dll

c:\windows\system32\MFC71U.DLL

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Intel\Wireless\Bin\S24EvMon.exe

c:\program files\Common Files\Symantec Shared\ccSvcHst.exe

c:\program files\Common Files\Symantec Shared\AppCore\AppSvc32.exe

c:\windows\system32\agrsmsvc.exe

c:\program files\Symantec\LiveUpdate\ALUSchedulerSvc.exe

c:\program files\Intel\Wireless\Bin\EvtEng.exe

c:\program files\Intel\Intel Matrix Storage Manager\Iaantmon.exe

c:\program files\Intel\Wireless\Bin\RegSrvc.exe

c:\program files\CyberLink\Shared Files\RichVideo.exe

c:\windows\system32\wbem\wmiapsrv.exe

c:\acer\Empowering Technology\eLock\Service\eLockServ.exe

c:\windows\RTHDCPL.EXE

c:\windows\system32\igfxsrvc.exe

c:\windows\system32\wbem\unsecapp.exe

c:\docume~1\Tobie\LOCALS~1\Temp\RtkBtMnt.exe

c:\progra~1\Symantec\LIVEUP~1\LUCOMS~1.EXE

.

**************************************************************************

.

Completion time: 2013-02-26 11:47:01 - machine was rebooted

ComboFix-quarantined-files.txt 2013-02-26 18:46

.

Pre-Run: 34,674,413,568 bytes free

Post-Run: 35,074,260,992 bytes free

.

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

.

- - End Of File - - ECC24E9044F0526B83622E38322897CF

Link to post
Share on other sites

  • Staff

Hello keithg

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.
    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it or you can upload it here and send me the link - http://www.speedyshare.com/

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit

2.Unzip the contents to a folder in a convenient location.

3.Open the folder where the contents were unzipped and run mbar.exe

4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.

5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.

6.Wait while the system shuts down and the cleanup process is performed.

7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.

8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:

  • •Internet access
    •Windows Update
    •Windows Firewall

9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.

10.Verify that your system is now functioning normally.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and MBAR

Gringo

Link to post
Share on other sites

  • Staff

Greetings

I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools

Gringo

Link to post
Share on other sites

i still cannot print. and HPNETWORKCOMMUNICATOR pops up every 4 seconds. i think that removal tool i used 3 times ago removed something i needed to print.

i ran tds killer and malware root tool kit. neither found anything. so root tool kit didn't seem to create a log file. but here is TDS log file.

TDSSKiller.2.8.16.0_28.02.2013_10.00.51_log.txt

Link to post
Share on other sites

yeah, i read that . now that my recovery restore points should work...can't i just restore to say 3 months ago before the virus and before my printer broke? or did the virus perhaps load itself to all the previous restore points?

Link to post
Share on other sites

  • Staff

Hello keithg

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

 ClearJavaCache:: 

Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe

CFScriptB-4.gif

This will let ComboFix run again.

Restart if you have to.

Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  1. report from Combofix
  2. let me know of any problems you may have had
  3. How is the computer doing now after running the script?

Gringo

Link to post
Share on other sites

  • Staff

Greetings

I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools

Gringo

Link to post
Share on other sites

when i try to run combofix....it extracts then says there is a newer version do i wish to download it. i say yes, and it repeats...it extracts then asks if i want the new version again. i say yes, then it extracts, then asks me if i want the new version...repeats indefinitely.

if i say no to the update, it says it is expired and will run with limited functionality.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.