Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Large Infection


  • This topic is locked This topic is locked
50 replies to this topic

#1 xxmattnxx

xxmattnxx

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 30 September 2010 - 01:29 AM

I'm helping a friend with a computer... here is my MB scan. I have removed the ones in this scan. Any help?

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4720

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

9/30/2010 12:26:26 AM
mbam-log-2010-09-30 (00-26-26).txt

Scan type: Full scan (C:|D:|E:|F:|G:|H:|I:|J:|L:|)
Objects scanned: 330077
Time elapsed: 59 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 17
Registry Values Infected: 2
Registry Data Items Infected: 6
Folders Infected: 1
Files Infected: 18

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOTCLSID{15c138b7-c828-88dc-9c89-aac4585eaad1} (Trojan.Hiloti) -> No action taken.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtSettings{15c138b7-c828-88dc-9c89-aac4585eaad1} (Trojan.Hiloti) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{15c138b7-c828-88dc-9c89-aac4585eaad1} (Trojan.Hiloti) -> No action taken.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> No action taken.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> No action taken.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> No action taken.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> No action taken.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftDirectXMSA (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftDirectXMSB (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnumRootLEGACY_SVRWSC (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSvrWsc (Trojan.Agent) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunsvetokuyepebeham (Trojan.Hiloti) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionNetworkuid (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit (Spyware.Zbot) -> Data: c:windowssystem32sdra64.exe -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit (Spyware.Zbot) -> Data: system32sdra64.exe -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit (Hijack.UserInit) -> Bad: (C:WINDOWSsystem32userinit.exe,C:WINDOWSsystem32sdra64.exe,) Good: (userinit.exe) -> No action taken.

Folders Infected:
C:WINDOWSsystem32lowsec (Stolen.data) -> No action taken.

Files Infected:
C:WINDOWSahemupewu.dll (Trojan.Hiloti) -> No action taken.
C:Documents and SettingsOwnerLocal SettingsTemp1DBD.tmp (Rootkit.TDSS) -> No action taken.
C:Documents and SettingsOwnerLocal SettingsTemp2479.tmp (Rootkit.TDSS) -> No action taken.
C:Documents and SettingsOwnerMy DocumentsDownloadsregistryfix.exe (Rogue.Installer) -> No action taken.
C:System Volume Information_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}RP2A0005098.exe (Rogue.SecurityTool) -> No action taken.
C:WINDOWSmdmspe.dll (Trojan.Hiloti) -> No action taken.
C:WINDOWSsystem32kine.bwo (Trojan.Oficla) -> No action taken.
C:WINDOWSsystem32configsystemprofileLocal SettingsTemporary Internet Files2470.tmp (Spyware.Zbot) -> No action taken.
C:WINDOWSTemp1DBA.tmp (Rogue.SecurityTool) -> No action taken.
C:WINDOWSTemp1DBE.tmp (Trojan.Hiloti) -> No action taken.
C:WINDOWSTemp247C.tmp (Trojan.Hiloti) -> No action taken.
C:WINDOWSsystem32lowseclocal.ds (Stolen.data) -> No action taken.
C:WINDOWSsystem32lowsecuser.ds (Stolen.data) -> No action taken.
C:WINDOWSsystem32lowsecuser.ds.lll (Stolen.data) -> No action taken.
C:Documents and SettingsAll UsersDocumentsServeradmin.txt (Malware.Trace) -> No action taken.
C:Documents and SettingsAll UsersDocumentsServerserver.dat (Malware.Trace) -> No action taken.
C:WINDOWSsystem32sdra64.exe (Spyware.Zbot) -> No action taken.
C:WINDOWSsystem32svrwsc.exe (Trojan.Agent) -> No action taken.

sorry.. here is the log after the removal of selected items
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4720

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

9/30/2010 12:30:02 AM
mbam-log-2010-09-30 (00-30-02).txt

Scan type: Full scan (C:|D:|E:|F:|G:|H:|I:|J:|L:|)
Objects scanned: 330077
Time elapsed: 59 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 17
Registry Values Infected: 2
Registry Data Items Infected: 6
Folders Infected: 1
Files Infected: 18

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOTCLSID{15c138b7-c828-88dc-9c89-aac4585eaad1} (Trojan.Hiloti) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtSettings{15c138b7-c828-88dc-9c89-aac4585eaad1} (Trojan.Hiloti) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{15c138b7-c828-88dc-9c89-aac4585eaad1} (Trojan.Hiloti) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftDirectXMSA (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftDirectXMSB (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnumRootLEGACY_SVRWSC (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSvrWsc (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunsvetokuyepebeham (Trojan.Hiloti) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionNetworkuid (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit (Spyware.Zbot) -> Data: c:windowssystem32sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit (Spyware.Zbot) -> Data: system32sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit (Hijack.UserInit) -> Bad: (C:WINDOWSsystem32userinit.exe,C:WINDOWSsystem32sdra64.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:WINDOWSsystem32lowsec (Stolen.data) -> Delete on reboot.

Files Infected:
C:WINDOWSahemupewu.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:Documents and SettingsOwnerLocal SettingsTemp1DBD.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:Documents and SettingsOwnerLocal SettingsTemp2479.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:Documents and SettingsOwnerMy DocumentsDownloadsregistryfix.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:System Volume Information_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}RP2A0005098.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:WINDOWSmdmspe.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:WINDOWSsystem32kine.bwo (Trojan.Oficla) -> Quarantined and deleted successfully.
C:WINDOWSsystem32configsystemprofileLocal SettingsTemporary Internet Files2470.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
C:WINDOWSTemp1DBA.tmp (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:WINDOWSTemp1DBE.tmp (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:WINDOWSTemp247C.tmp (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:WINDOWSsystem32lowseclocal.ds (Stolen.data) -> Delete on reboot.
C:WINDOWSsystem32lowsecuser.ds (Stolen.data) -> Delete on reboot.
C:WINDOWSsystem32lowsecuser.ds.lll (Stolen.data) -> Delete on reboot.
C:Documents and SettingsAll UsersDocumentsServeradmin.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:Documents and SettingsAll UsersDocumentsServerserver.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:WINDOWSsystem32sdra64.exe (Spyware.Zbot) -> Delete on reboot.
C:WINDOWSsystem32svrwsc.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Unfortunatly in the middle of an online scan with eset the computer froze, upon reboot the computer has gone into perpetual reboot right after the windows loading screen. Am I better off trying to rescue the files and reformatting or can anyone help?

EDIT: Posts merged ~BP

Edited by Budapest, 02 October 2010 - 03:30 AM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 02 October 2010 - 06:34 AM

Hi wink.gif ,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

It looks like the TDSS infection has borked your machine.

We have to use a recovery system to try and boot the Pc so we can attempt to fix the problem.

Installing Java and Kaspersky online scan with Ubuntu

http://noahdfear.net/downloads/kavscan.sh
http://noahdfear.net/downloads/ujava.sh

Try this please. You will need a USB drive.
  • Download UNetbootin to the desktop of your working computer.
  • Download xpud-0.9.2.iso from noahdfear.net and save it to the desktop as well.
  • Once the download(s) have completed, double click the unetbootin-xpud-windows-387.exe file to run the installer.
  • Select the DiskImage option then click the browse button located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file
  • Verify the correct drive letter is selected for your usb device then click OK
  • Once the files have been written to the device you will be prompted to reboot ~ do not reboot and instead just Exit the UNetbootin interface.
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer
  • Boot the Sick computer
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt

    Please note - all text entries are case sensitive
Copy and paste the report.txt for my review
Posted Image
m0le is a proud member of UNITE

#3 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 02 October 2010 - 11:23 PM

I get the following message when i try to run the boot from the flashdrive

BOOTMGR is missing
Press Ctrl+Alt+Del to restart




#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 03 October 2010 - 04:06 AM

Unbootable PCs can be fixed but let's try a different source for the rescue - CD

Download http://noahdfear.net/downloads/rst.sh to the USB drive
  • Insert the USB drive and CD in the Sick computer and boot the computer from the CD again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see rst.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh
  • Press Enter
  • After it has finished a report will be located at sdb1 named enum.log
  • Plug that USB back into the clean computer and open it
Please note: If you have an ethernet connection you can access the internet by way of xPUD (Firefox). You can perform all these steps on your sick computer. When you download the download will reside in the Download folder. It can be found under the File tab also. You can similarly access our thread by way of this OS too so you can send the logs that way.

Please also note - all text entries are case sensitive

Copy and paste the enum.log for my review
Posted Image
m0le is a proud member of UNITE

#5 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 03 October 2010 - 03:15 PM

did I miss a step? What cd?

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 03 October 2010 - 05:17 PM

Yes, that would help whistling.gif Here's the instructions for burning the CD.

Download GETxPUD.exe to the desktop of your clean computer
  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.



Posted Image
m0le is a proud member of UNITE

#7 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 03 October 2010 - 08:20 PM

here is the log

37.5M Oct 4 2010 /mnt/sda1/WINDOWS/system32/config/software
612.0K Oct 2 00:44 /mnt/sda2/MiniNT/system32/config/software
8.0M Oct 4 2010 /mnt/sda1/WINDOWS/system32/config/system

37.3M Sep 30 02:18 /sda1/~/RP3/~SOFTWARE
37.3M Sep 30 06:35 /sda1/~/RP4/~SOFTWARE
7.6M Sep 30 02:18 /sda1/~/RP3/~SYSTEM
7.6M Sep 30 06:35 /sda1/~/RP4/~SYSTEM


Quick question... is there much of a chance we will lose any of the files on the infected pc? if so and if this is going to be quite a multistep process is there a quick way to back those up?

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 04 October 2010 - 04:50 PM

QUOTE
Quick question... is there much of a chance we will lose any of the files on the infected pc? if so and if this is going to be quite a multistep process is there a quick way to back those up?


At the moment the files are okay, it's just not being able to boot the PC to view them that's the problem. If the boot issue seems to be impossible to fix then we will attempt a rescue of whatever we are able to rescue.

Okay, two points to use and they only go back to 30th September and may not be far enough back to solve the boot problem. Let's try it and see.

Let's see if there is an available registry backup we can use to help get your computer booting properly
  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh -r
  • Type 3
  • Press Enter
  • After it has finished a report will be located at sdb1 named restore.log
  • Please try to boot into normal Windows now and indicate if you were successful

Please note - all text entries are case sensitive

Copy and paste the restore.log from your USB drive for my review
Posted Image
m0le is a proud member of UNITE

#9 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 04 October 2010 - 07:58 PM

Here is the log, and no unfortunately it doesn't boot. The windows loading screen comes up, does its few seconds of loading then the screen goes dark just like it would before it would boot to a log in screen then you can hear the sound of the harddisk powering down and the computer resets.



SOFTWARE hive restored from RP3
SYSTEM hive restored from RP3
SECURITY hive restored from RP3
SAM hive restored from RP3


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 05 October 2010 - 07:42 PM

Okay, never mind. We are going to use the xPUD again

Try this please. You will need a USB drive.

Download GETxPUD.exe to the desktop of your clean computer
  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Download xPUDtestdisk.exe and save it to the USB device
  • Double click xPUDtestdisk.exe to extract the contents to your USB device
  • Remove the USB & CD and insert it in the sick computer
  • Boot the Sick computer with the CD you just burned
  • The computer must be set to boot from the CD
  • Gently tap F12 and choose to boot from the CD
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Press Tool at the top
  • Choose Open Terminal
  • Type testdisk/testdisk_static
  • Press Enter
    • The TestDisk command window will open
    • Choose Create and press Enter
    • TestDisk will now detect all local hard drives
    • Use the arrow (up and down) keys to highlight the disk called /dev/sda if it represents your primary hard drive and press Enter
    • If your not sure then note everything you see and post it for my review
    • Select Intel (even if you have an AMD processor) and press Enter
    • Select Advanced and press Enter
    • Select [Boot] and press Enter
    • Select [Dump] and press Enter
    • Select [Quit] to exit
  • A log will be created in the root of the usb device
  • Remove the USB drive and insert back in your working computer

    Please note - all text entries are case sensitive
Copy and paste the resultant log for my review
Posted Image
m0le is a proud member of UNITE

#11 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 05 October 2010 - 08:07 PM



Tue Oct 5 19:03:29 2010
Command line: TestDisk

TestDisk 6.12-WIP, Data Recovery Utility, April 2010
Christophe GRENIER <grenier@cgsecurity.org>
http://www.cgsecurity.org
OS: Linux, kernel 2.6.31.2 (#5 SMP Mon Dec 7 11:56:35 UTC 2009) i686
Compiler: GCC 4.4 - Jul 27 2010 17:00:22
ext2fs lib: 1.41.9, ntfs lib: 10:0:0, reiserfs lib: 0.3.1-rc8, ewf lib: 20080501
/dev/sda: LBA, HPA, LBA48, DCO support
/dev/sda: size 390721968 sectors
/dev/sda: user_max 390721968 sectors
/dev/sda: native_max 390721968 sectors
/dev/sda: dco 390721968 sectors
/dev/sdb: LBA, HPA, LBA48, DCO support
/dev/sdb: size 976773168 sectors
/dev/sdb: user_max 976773168 sectors
/dev/sdb: native_max 976773168 sectors
/dev/sdb: dco 976773168 sectors
Warning: can't get size for Disk /dev/mapper/control - 0 B - CHS 1 1 1, sector size=512
/dev/sr0 is not an ATA disk
Hard disk list
Disk /dev/sda - 200 GB / 186 GiB - CHS 24321 255 63, sector size=512 - ATA WDC WD2000JD-22H
Disk /dev/sdb - 500 GB / 465 GiB - CHS 60801 255 63, sector size=512 - ATA WDC WD5000AAKS-0
Disk /dev/sdc - 8036 MB / 7663 MiB - CHS 1020 248 62, sector size=512 - SanDisk SanDisk Cruzer
Disk /dev/sr0 - 67 MB / 64 MiB - CHS 32770 1 1 (RO), sector size=2048 - TSSTcorp CD/DVDW TS-H552B

Partition table type (auto): Intel
Disk /dev/sda - 200 GB / 186 GiB - ATA WDC WD2000JD-22H
Partition table type: Intel

Interface Advanced
Geometry from i386 MBR: head=255 sector=63
NTFS at 553/0/1
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
set_FAT_info: name from BS used
get_geometry_from_list_part_aux head=255 nbr=4
get_geometry_from_list_part_aux head=8 nbr=1
get_geometry_from_list_part_aux head=16 nbr=1
get_geometry_from_list_part_aux head=32 nbr=1
get_geometry_from_list_part_aux head=64 nbr=1
get_geometry_from_list_part_aux head=128 nbr=1
get_geometry_from_list_part_aux head=240 nbr=1
get_geometry_from_list_part_aux head=255 nbr=4
2 * FAT32 0 1 1 552 254 63 8883882
FAT32, 4548 MB / 4337 MiB
1 P HPFS - NTFS 553 0 1 24319 254 63 381816855
NTFS, 195 GB / 182 GiB

fat32_boot_sector
2 * FAT32 0 1 1 552 254 63 8883882
FAT32, 4548 MB / 4337 MiB
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
Boot sector
OK

Backup boot sector
OK

Sectors are identical.

A valid FAT Boot sector must be present in order to access
any data; even if the partition is not bootable.
Boot sector Backup boot sector
0000 e9a70052 45434f56 ...RECOV e9a70052 45434f56 ...RECOV
0008 45525900 02082200 ERY...". 45525900 02082200 ERY...".
0010 02000000 00f80000 ........ 02000000 00f80000 ........
0018 3f00ff00 3f000000 ?...?... 3f00ff00 3f000000 ?...?...
0020 a88e8700 d3210000 .....!.. a88e8700 d3210000 .....!..
0028 00000000 02000000 ........ 00000000 02000000 ........
0030 01000600 00000000 ........ 01000600 00000000 ........
0038 00000000 00000000 ........ 00000000 00000000 ........
0040 800029df 2b3b4220 ..).+;B 800029df 2b3b4220 ..).+;B
0048 20202020 20202020 20202020 20202020
0050 20204641 54333220 FAT32 20204641 54333220 FAT32
0058 20208bd0 c1e20280 ...... 20208bd0 c1e20280 ......
0060 e60166c1 e807663b ..f...f; e60166c1 e807663b ..f...f;
0068 46f8742a 668946f8 F.t*f.F. 46f8742a 668946f8 F.t*f.F.
0070 660346f4 660fb65e f.F.f..^ 660346f4 660fb65e f.F.f..^
0078 2880e30f 740f3a5e (...t.:^ 2880e30f 740f3a5e (...t.:^
0080 100f8390 00660faf .....f.. 100f8390 00660faf .....f..
0088 5e246603 c3bbe007 ^$f..... 5e246603 c3bbe007 ^$f.....
0090 b90100e8 cf008bda ........ b90100e8 cf008bda ........
0098 668b8700 7e6625ff f...~f%. 668b8700 7e6625ff f...~f%.
00A0 ffff0f66 3df8ffff ...f=... ffff0f66 3df8ffff ...f=...
00A8 0fc333c9 8ed98ec1 ..3..... 0fc333c9 8ed98ec1 ..3.....
00B0 8ed166bc f47b0000 ..f..{.. 8ed166bc f47b0000 ..f..{..
00B8 bd007c66 0fb64610 ..|f..F. bd007c66 0fb64610 ..|f..F.
00C0 66f76624 660fb756 f.f$f..V 66f76624 660fb756 f.f$f..V
00C8 0e660356 1c668956 .f.V.f.V 0e660356 1c668956 .f.V.f.V
00D0 f46603c2 668946fc .f..f.F. f46603c2 668946fc .f..f.F.
00D8 66c746f8 ffffffff f.F..... 66c746f8 ffffffff f.F.....
00E0 668b462c 6650e8af f.F,fP.. 668b462c 6650e8af f.F,fP..
00E8 00bb7000 b90100e8 ..p..... 00bb7000 b90100e8 ..p.....
00F0 7300bf00 07b10bbe s....... 7300bf00 07b10bbe s.......
00F8 a97df3a6 742a03f9 .}..t*.. a97df3a6 742a03f9 .}..t*..
0100 83c71581 ff000972 .......r 83c71581 ff000972 .......r
0108 ec66404a 75db6658 .f@Ju.fX ec66404a 75db6658 .f@Ju.fX
0110 e847ff72 cfbeb47d .G.r...} e847ff72 cfbeb47d .G.r...}
0118 ac84c074 09b40ebb ...t.... ac84c074 09b40ebb ...t....
0120 0700cd10 ebf2cd19 ........ 0700cd10 ebf2cd19 ........
0128 6658ff75 09ff750f fX.u..u. 6658ff75 09ff750f fX.u..u.
0130 6658bb00 206683f8 fX.. f.. 6658bb00 206683f8 fX.. f..
0138 0272da66 3df8ffff .r.f=... 0272da66 3df8ffff .r.f=...
0140 0f73d266 50e85000 .s.fP.P. 0f73d266 50e85000 .s.fP.P.
0148 0fb64e0d e81600c1 ..N..... 0fb64e0d e81600c1 ..N.....
0150 e10503d9 665853e8 ....fXS. e10503d9 665853e8 ....fXS.
0158 00ff5b72 d88a5640 ..[r..V@ 00ff5b72 d88a5640 ..[r..V@
0160 ea000000 20666066 .... f`f ea000000 20666066 .... f`f
0168 6a006650 536a0066 j.fPSj.f 6a006650 536a0066 j.fPSj.f
0170 68100001 008bf4b8 h....... 68100001 008bf4b8 h.......
0178 00428a56 40cd13be .B.V@... 00428a56 40cd13be .B.V@...
0180 cc7d7294 67834424 .}r.g.D$ cc7d7294 67834424 .}r.g.D$
0188 06206667 ff442408 . fg.D$. 06206667 ff442408 . fg.D$.
0190 e2e383c4 106661c3 .....fa. e2e383c4 106661c3 .....fa.
0198 66486648 660fb656 fHfHf..V 66486648 660fb656 fHfHf..V
01A0 0d66f7e2 660346fc .f..f.F. 0d66f7e2 660346fc .f..f.F.
01A8 c353544c 44522020 .STLDR c353544c 44522020 .STLDR
01B0 20202020 0d0a496e ..In 20202020 0d0a496e ..In
01B8 76616c69 64205379 valid Sy 76616c69 64205379 valid Sy
01C0 7374656d 20446973 stem Dis 7374656d 20446973 stem Dis
01C8 6b206f72 0d0a4469 k or..Di 6b206f72 0d0a4469 k or..Di
01D0 736b2049 2f4f2065 sk I/O e 736b2049 2f4f2065 sk I/O e
01D8 72726f72 0d0a5072 rror..Pr 72726f72 0d0a5072 rror..Pr
01E0 65737320 61206b65 ess a ke 65737320 61206b65 ess a ke
01E8 7920746f 20726573 y to res 7920746f 20726573 y to res
01F0 74617274 0d0a0000 tart.... 74617274 0d0a0000 tart....
01F8 00000000 000055aa ......U. 00000000 000055aa ......U.
0200 52526141 00000000 RRaA.... 52526141 00000000 RRaA....
0208 00000000 00000000 ........ 00000000 00000000 ........
0210 00000000 00000000 ........ 00000000 00000000 ........
0218 00000000 00000000 ........ 00000000 00000000 ........
0220 00000000 00000000 ........ 00000000 00000000 ........
0228 00000000 00000000 ........ 00000000 00000000 ........
0230 00000000 00000000 ........ 00000000 00000000 ........
0238 00000000 00000000 ........ 00000000 00000000 ........
0240 00000000 00000000 ........ 00000000 00000000 ........
0248 00000000 00000000 ........ 00000000 00000000 ........
0250 00000000 00000000 ........ 00000000 00000000 ........
0258 00000000 00000000 ........ 00000000 00000000 ........
0260 00000000 00000000 ........ 00000000 00000000 ........
0268 00000000 00000000 ........ 00000000 00000000 ........
0270 00000000 00000000 ........ 00000000 00000000 ........
0278 00000000 00000000 ........ 00000000 00000000 ........
0280 00000000 00000000 ........ 00000000 00000000 ........
0288 00000000 00000000 ........ 00000000 00000000 ........
0290 00000000 00000000 ........ 00000000 00000000 ........
0298 00000000 00000000 ........ 00000000 00000000 ........
02A0 00000000 00000000 ........ 00000000 00000000 ........
02A8 00000000 00000000 ........ 00000000 00000000 ........
02B0 00000000 00000000 ........ 00000000 00000000 ........
02B8 00000000 00000000 ........ 00000000 00000000 ........
02C0 00000000 00000000 ........ 00000000 00000000 ........
02C8 00000000 00000000 ........ 00000000 00000000 ........
02D0 00000000 00000000 ........ 00000000 00000000 ........
02D8 00000000 00000000 ........ 00000000 00000000 ........
02E0 00000000 00000000 ........ 00000000 00000000 ........
02E8 00000000 00000000 ........ 00000000 00000000 ........
02F0 00000000 00000000 ........ 00000000 00000000 ........
02F8 00000000 00000000 ........ 00000000 00000000 ........
0300 00000000 00000000 ........ 00000000 00000000 ........
0308 00000000 00000000 ........ 00000000 00000000 ........
0310 00000000 00000000 ........ 00000000 00000000 ........
0318 00000000 00000000 ........ 00000000 00000000 ........
0320 00000000 00000000 ........ 00000000 00000000 ........
0328 00000000 00000000 ........ 00000000 00000000 ........
0330 00000000 00000000 ........ 00000000 00000000 ........
0338 00000000 00000000 ........ 00000000 00000000 ........
0340 00000000 00000000 ........ 00000000 00000000 ........
0348 00000000 00000000 ........ 00000000 00000000 ........
0350 00000000 00000000 ........ 00000000 00000000 ........
0358 00000000 00000000 ........ 00000000 00000000 ........
0360 00000000 00000000 ........ 00000000 00000000 ........
0368 00000000 00000000 ........ 00000000 00000000 ........
0370 00000000 00000000 ........ 00000000 00000000 ........
0378 00000000 00000000 ........ 00000000 00000000 ........
0380 00000000 00000000 ........ 00000000 00000000 ........
0388 00000000 00000000 ........ 00000000 00000000 ........
0390 00000000 00000000 ........ 00000000 00000000 ........
0398 00000000 00000000 ........ 00000000 00000000 ........
03A0 00000000 00000000 ........ 00000000 00000000 ........
03A8 00000000 00000000 ........ 00000000 00000000 ........
03B0 00000000 00000000 ........ 00000000 00000000 ........
03B8 00000000 00000000 ........ 00000000 00000000 ........
03C0 00000000 00000000 ........ 00000000 00000000 ........
03C8 00000000 00000000 ........ 00000000 00000000 ........
03D0 00000000 00000000 ........ 00000000 00000000 ........
03D8 00000000 00000000 ........ 00000000 00000000 ........
03E0 00000000 72724161 ....rrAa 00000000 72724161 ....rrAa
03E8 ce390600 0a000000 .9...... 9eb60600 c0320a00 .....2..
03F0 00000000 00000000 ........ 00000000 00000000 ........
03F8 00000000 000055aa ......U. 00000000 000055aa ......U.
0400 00000000 00000000 ........ 00000000 00000000 ........
0408 00000000 00000000 ........ 00000000 00000000 ........
0410 00000000 00000000 ........ 00000000 00000000 ........
0418 00000000 00000000 ........ 00000000 00000000 ........
0420 00000000 00000000 ........ 00000000 00000000 ........
0428 00000000 00000000 ........ 00000000 00000000 ........
0430 00000000 00000000 ........ 00000000 00000000 ........
0438 00000000 00000000 ........ 00000000 00000000 ........
0440 00000000 00000000 ........ 00000000 00000000 ........
0448 00000000 00000000 ........ 00000000 00000000 ........
0450 00000000 00000000 ........ 00000000 00000000 ........
0458 00000000 00000000 ........ 00000000 00000000 ........
0460 00000000 00000000 ........ 00000000 00000000 ........
0468 00000000 00000000 ........ 00000000 00000000 ........
0470 00000000 00000000 ........ 00000000 00000000 ........
0478 00000000 00000000 ........ 00000000 00000000 ........
0480 00000000 00000000 ........ 00000000 00000000 ........
0488 00000000 00000000 ........ 00000000 00000000 ........
0490 00000000 00000000 ........ 00000000 00000000 ........
0498 00000000 00000000 ........ 00000000 00000000 ........
04A0 00000000 00000000 ........ 00000000 00000000 ........
04A8 00000000 00000000 ........ 00000000 00000000 ........
04B0 00000000 00000000 ........ 00000000 00000000 ........
04B8 00000000 00000000 ........ 00000000 00000000 ........
04C0 00000000 00000000 ........ 00000000 00000000 ........
04C8 00000000 00000000 ........ 00000000 00000000 ........
04D0 00000000 00000000 ........ 00000000 00000000 ........
04D8 00000000 00000000 ........ 00000000 00000000 ........
04E0 00000000 00000000 ........ 00000000 00000000 ........
04E8 00000000 00000000 ........ 00000000 00000000 ........
04F0 00000000 00000000 ........ 00000000 00000000 ........
04F8 00000000 00000000 ........ 00000000 00000000 ........
0500 00000000 00000000 ........ 00000000 00000000 ........
0508 00000000 00000000 ........ 00000000 00000000 ........
0510 00000000 00000000 ........ 00000000 00000000 ........
0518 00000000 00000000 ........ 00000000 00000000 ........
0520 00000000 00000000 ........ 00000000 00000000 ........
0528 00000000 00000000 ........ 00000000 00000000 ........
0530 00000000 00000000 ........ 00000000 00000000 ........
0538 00000000 00000000 ........ 00000000 00000000 ........
0540 00000000 00000000 ........ 00000000 00000000 ........
0548 00000000 00000000 ........ 00000000 00000000 ........
0550 00000000 00000000 ........ 00000000 00000000 ........
0558 00000000 00000000 ........ 00000000 00000000 ........
0560 00000000 00000000 ........ 00000000 00000000 ........
0568 00000000 00000000 ........ 00000000 00000000 ........
0570 00000000 00000000 ........ 00000000 00000000 ........
0578 00000000 00000000 ........ 00000000 00000000 ........
0580 00000000 00000000 ........ 00000000 00000000 ........
0588 00000000 00000000 ........ 00000000 00000000 ........
0590 00000000 00000000 ........ 00000000 00000000 ........
0598 00000000 00000000 ........ 00000000 00000000 ........
05A0 00000000 00000000 ........ 00000000 00000000 ........
05A8 00000000 00000000 ........ 00000000 00000000 ........
05B0 00000000 00000000 ........ 00000000 00000000 ........
05B8 00000000 00000000 ........ 00000000 00000000 ........
05C0 00000000 00000000 ........ 00000000 00000000 ........
05C8 000055aa 4f7d4000 ..U.O}@. 000055aa 4f7d4000 ..U.O}@.
05D0 00000000 6f7b4000 ....o{@. 00000000 6f7b4000 ....o{@.
05D8 00000000 90078b00 ........ 00000000 90078b00 ........
05E0 e3974000 58078b00 ..@.X... e3974000 58078b00 ..@.X...
05E8 9f7ad477 a8078b00 .z.w.... 9f7ad477 a8078b00 .z.w....
05F0 64fb1200 1b7c4100 d....|A. 64fb1200 1b7c4100 d....|A.
05F8 00000000 6bbf55aa ....k.U. 00000000 6bbf55aa ....k.U.

FAT32
sector_size 512 512
cluster_size 8 8
reserved 34 34
fats 2 2
dir_entries 0 0
sectors 0 0
media F8 F8
fat_length 0 0
secs_track 63 63
heads 255 255
hidden 63 63
total_sect 8883880 8883880
fat32_length 8659 8659
flags 0000 0000
version 0.0 0.0
root_cluster 2 2
info_sector 1 1
backup_boot 6 6
free_count 408014 439966
next_free 10 668352

fat32_boot_sector
2 * FAT32 0 1 1 552 254 63 8883882
FAT32, 4548 MB / 4337 MiB
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
Boot sector
OK

Backup boot sector
OK

Sectors are identical.

A valid FAT Boot sector must be present in order to access
any data; even if the partition is not bootable.

fat32_boot_sector
2 * FAT32 0 1 1 552 254 63 8883882
FAT32, 4548 MB / 4337 MiB
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
FAT32 at 0/1/1
Info: size boot_sector 8883880, partition 8883882
FAT1 : 34-8692
FAT2 : 8693-17351
start_rootdir : 17352 root cluster : 2
Data : 17352-8883879
sectors : 8883880
cluster_size : 8
no_of_cluster : 1108316 (2 - 1108317)
fat_length 8659 calculated 8659
Boot sector
OK

Backup boot sector
OK

Sectors are identical.

A valid FAT Boot sector must be present in order to access
any data; even if the partition is not bootable.
Boot sector Backup boot sector
0000 e9a70052 45434f56 ...RECOV e9a70052 45434f56 ...RECOV
0008 45525900 02082200 ERY...". 45525900 02082200 ERY...".
0010 02000000 00f80000 ........ 02000000 00f80000 ........
0018 3f00ff00 3f000000 ?...?... 3f00ff00 3f000000 ?...?...
0020 a88e8700 d3210000 .....!.. a88e8700 d3210000 .....!..
0028 00000000 02000000 ........ 00000000 02000000 ........
0030 01000600 00000000 ........ 01000600 00000000 ........
0038 00000000 00000000 ........ 00000000 00000000 ........
0040 800029df 2b3b4220 ..).+;B 800029df 2b3b4220 ..).+;B
0048 20202020 20202020 20202020 20202020
0050 20204641 54333220 FAT32 20204641 54333220 FAT32
0058 20208bd0 c1e20280 ...... 20208bd0 c1e20280 ......
0060 e60166c1 e807663b ..f...f; e60166c1 e807663b ..f...f;
0068 46f8742a 668946f8 F.t*f.F. 46f8742a 668946f8 F.t*f.F.
0070 660346f4 660fb65e f.F.f..^ 660346f4 660fb65e f.F.f..^
0078 2880e30f 740f3a5e (...t.:^ 2880e30f 740f3a5e (...t.:^
0080 100f8390 00660faf .....f.. 100f8390 00660faf .....f..
0088 5e246603 c3bbe007 ^$f..... 5e246603 c3bbe007 ^$f.....
0090 b90100e8 cf008bda ........ b90100e8 cf008bda ........
0098 668b8700 7e6625ff f...~f%. 668b8700 7e6625ff f...~f%.
00A0 ffff0f66 3df8ffff ...f=... ffff0f66 3df8ffff ...f=...
00A8 0fc333c9 8ed98ec1 ..3..... 0fc333c9 8ed98ec1 ..3.....
00B0 8ed166bc f47b0000 ..f..{.. 8ed166bc f47b0000 ..f..{..
00B8 bd007c66 0fb64610 ..|f..F. bd007c66 0fb64610 ..|f..F.
00C0 66f76624 660fb756 f.f$f..V 66f76624 660fb756 f.f$f..V
00C8 0e660356 1c668956 .f.V.f.V 0e660356 1c668956 .f.V.f.V
00D0 f46603c2 668946fc .f..f.F. f46603c2 668946fc .f..f.F.
00D8 66c746f8 ffffffff f.F..... 66c746f8 ffffffff f.F.....
00E0 668b462c 6650e8af f.F,fP.. 668b462c 6650e8af f.F,fP..
00E8 00bb7000 b90100e8 ..p..... 00bb7000 b90100e8 ..p.....
00F0 7300bf00 07b10bbe s....... 7300bf00 07b10bbe s.......
00F8 a97df3a6 742a03f9 .}..t*.. a97df3a6 742a03f9 .}..t*..
0100 83c71581 ff000972 .......r 83c71581 ff000972 .......r
0108 ec66404a 75db6658 .f@Ju.fX ec66404a 75db6658 .f@Ju.fX
0110 e847ff72 cfbeb47d .G.r...} e847ff72 cfbeb47d .G.r...}
0118 ac84c074 09b40ebb ...t.... ac84c074 09b40ebb ...t....
0120 0700cd10 ebf2cd19 ........ 0700cd10 ebf2cd19 ........
0128 6658ff75 09ff750f fX.u..u. 6658ff75 09ff750f fX.u..u.
0130 6658bb00 206683f8 fX.. f.. 6658bb00 206683f8 fX.. f..
0138 0272da66 3df8ffff .r.f=... 0272da66 3df8ffff .r.f=...
0140 0f73d266 50e85000 .s.fP.P. 0f73d266 50e85000 .s.fP.P.
0148 0fb64e0d e81600c1 ..N..... 0fb64e0d e81600c1 ..N.....
0150 e10503d9 665853e8 ....fXS. e10503d9 665853e8 ....fXS.
0158 00ff5b72 d88a5640 ..[r..V@ 00ff5b72 d88a5640 ..[r..V@
0160 ea000000 20666066 .... f`f ea000000 20666066 .... f`f
0168 6a006650 536a0066 j.fPSj.f 6a006650 536a0066 j.fPSj.f
0170 68100001 008bf4b8 h....... 68100001 008bf4b8 h.......
0178 00428a56 40cd13be .B.V@... 00428a56 40cd13be .B.V@...
0180 cc7d7294 67834424 .}r.g.D$ cc7d7294 67834424 .}r.g.D$
0188 06206667 ff442408 . fg.D$. 06206667 ff442408 . fg.D$.
0190 e2e383c4 106661c3 .....fa. e2e383c4 106661c3 .....fa.
0198 66486648 660fb656 fHfHf..V 66486648 660fb656 fHfHf..V
01A0 0d66f7e2 660346fc .f..f.F. 0d66f7e2 660346fc .f..f.F.
01A8 c353544c 44522020 .STLDR c353544c 44522020 .STLDR
01B0 20202020 0d0a496e ..In 20202020 0d0a496e ..In
01B8 76616c69 64205379 valid Sy 76616c69 64205379 valid Sy
01C0 7374656d 20446973 stem Dis 7374656d 20446973 stem Dis
01C8 6b206f72 0d0a4469 k or..Di 6b206f72 0d0a4469 k or..Di
01D0 736b2049 2f4f2065 sk I/O e 736b2049 2f4f2065 sk I/O e
01D8 72726f72 0d0a5072 rror..Pr 72726f72 0d0a5072 rror..Pr
01E0 65737320 61206b65 ess a ke 65737320 61206b65 ess a ke
01E8 7920746f 20726573 y to res 7920746f 20726573 y to res
01F0 74617274 0d0a0000 tart.... 74617274 0d0a0000 tart....
01F8 00000000 000055aa ......U. 00000000 000055aa ......U.
0200 52526141 00000000 RRaA.... 52526141 00000000 RRaA....
0208 00000000 00000000 ........ 00000000 00000000 ........
0210 00000000 00000000 ........ 00000000 00000000 ........
0218 00000000 00000000 ........ 00000000 00000000 ........
0220 00000000 00000000 ........ 00000000 00000000 ........
0228 00000000 00000000 ........ 00000000 00000000 ........
0230 00000000 00000000 ........ 00000000 00000000 ........
0238 00000000 00000000 ........ 00000000 00000000 ........
0240 00000000 00000000 ........ 00000000 00000000 ........
0248 00000000 00000000 ........ 00000000 00000000 ........
0250 00000000 00000000 ........ 00000000 00000000 ........
0258 00000000 00000000 ........ 00000000 00000000 ........
0260 00000000 00000000 ........ 00000000 00000000 ........
0268 00000000 00000000 ........ 00000000 00000000 ........
0270 00000000 00000000 ........ 00000000 00000000 ........
0278 00000000 00000000 ........ 00000000 00000000 ........
0280 00000000 00000000 ........ 00000000 00000000 ........
0288 00000000 00000000 ........ 00000000 00000000 ........
0290 00000000 00000000 ........ 00000000 00000000 ........
0298 00000000 00000000 ........ 00000000 00000000 ........
02A0 00000000 00000000 ........ 00000000 00000000 ........
02A8 00000000 00000000 ........ 00000000 00000000 ........
02B0 00000000 00000000 ........ 00000000 00000000 ........
02B8 00000000 00000000 ........ 00000000 00000000 ........
02C0 00000000 00000000 ........ 00000000 00000000 ........
02C8 00000000 00000000 ........ 00000000 00000000 ........
02D0 00000000 00000000 ........ 00000000 00000000 ........
02D8 00000000 00000000 ........ 00000000 00000000 ........
02E0 00000000 00000000 ........ 00000000 00000000 ........
02E8 00000000 00000000 ........ 00000000 00000000 ........
02F0 00000000 00000000 ........ 00000000 00000000 ........
02F8 00000000 00000000 ........ 00000000 00000000 ........
0300 00000000 00000000 ........ 00000000 00000000 ........
0308 00000000 00000000 ........ 00000000 00000000 ........
0310 00000000 00000000 ........ 00000000 00000000 ........
0318 00000000 00000000 ........ 00000000 00000000 ........
0320 00000000 00000000 ........ 00000000 00000000 ........
0328 00000000 00000000 ........ 00000000 00000000 ........
0330 00000000 00000000 ........ 00000000 00000000 ........
0338 00000000 00000000 ........ 00000000 00000000 ........
0340 00000000 00000000 ........ 00000000 00000000 ........
0348 00000000 00000000 ........ 00000000 00000000 ........
0350 00000000 00000000 ........ 00000000 00000000 ........
0358 00000000 00000000 ........ 00000000 00000000 ........
0360 00000000 00000000 ........ 00000000 00000000 ........
0368 00000000 00000000 ........ 00000000 00000000 ........
0370 00000000 00000000 ........ 00000000 00000000 ........
0378 00000000 00000000 ........ 00000000 00000000 ........
0380 00000000 00000000 ........ 00000000 00000000 ........
0388 00000000 00000000 ........ 00000000 00000000 ........
0390 00000000 00000000 ........ 00000000 00000000 ........
0398 00000000 00000000 ........ 00000000 00000000 ........
03A0 00000000 00000000 ........ 00000000 00000000 ........
03A8 00000000 00000000 ........ 00000000 00000000 ........
03B0 00000000 00000000 ........ 00000000 00000000 ........
03B8 00000000 00000000 ........ 00000000 00000000 ........
03C0 00000000 00000000 ........ 00000000 00000000 ........
03C8 00000000 00000000 ........ 00000000 00000000 ........
03D0 00000000 00000000 ........ 00000000 00000000 ........
03D8 00000000 00000000 ........ 00000000 00000000 ........
03E0 00000000 72724161 ....rrAa 00000000 72724161 ....rrAa
03E8 ce390600 0a000000 .9...... 9eb60600 c0320a00 .....2..
03F0 00000000 00000000 ........ 00000000 00000000 ........
03F8 00000000 000055aa ......U. 00000000 000055aa ......U.
0400 00000000 00000000 ........ 00000000 00000000 ........
0408 00000000 00000000 ........ 00000000 00000000 ........
0410 00000000 00000000 ........ 00000000 00000000 ........
0418 00000000 00000000 ........ 00000000 00000000 ........
0420 00000000 00000000 ........ 00000000 00000000 ........
0428 00000000 00000000 ........ 00000000 00000000 ........
0430 00000000 00000000 ........ 00000000 00000000 ........
0438 00000000 00000000 ........ 00000000 00000000 ........
0440 00000000 00000000 ........ 00000000 00000000 ........
0448 00000000 00000000 ........ 00000000 00000000 ........
0450 00000000 00000000 ........ 00000000 00000000 ........
0458 00000000 00000000 ........ 00000000 00000000 ........
0460 00000000 00000000 ........ 00000000 00000000 ........
0468 00000000 00000000 ........ 00000000 00000000 ........
0470 00000000 00000000 ........ 00000000 00000000 ........
0478 00000000 00000000 ........ 00000000 00000000 ........
0480 00000000 00000000 ........ 00000000 00000000 ........
0488 00000000 00000000 ........ 00000000 00000000 ........
0490 00000000 00000000 ........ 00000000 00000000 ........
0498 00000000 00000000 ........ 00000000 00000000 ........
04A0 00000000 00000000 ........ 00000000 00000000 ........
04A8 00000000 00000000 ........ 00000000 00000000 ........
04B0 00000000 00000000 ........ 00000000 00000000 ........
04B8 00000000 00000000 ........ 00000000 00000000 ........
04C0 00000000 00000000 ........ 00000000 00000000 ........
04C8 00000000 00000000 ........ 00000000 00000000 ........
04D0 00000000 00000000 ........ 00000000 00000000 ........
04D8 00000000 00000000 ........ 00000000 00000000 ........
04E0 00000000 00000000 ........ 00000000 00000000 ........
04E8 00000000 00000000 ........ 00000000 00000000 ........
04F0 00000000 00000000 ........ 00000000 00000000 ........
04F8 00000000 00000000 ........ 00000000 00000000 ........
0500 00000000 00000000 ........ 00000000 00000000 ........
0508 00000000 00000000 ........ 00000000 00000000 ........
0510 00000000 00000000 ........ 00000000 00000000 ........
0518 00000000 00000000 ........ 00000000 00000000 ........
0520 00000000 00000000 ........ 00000000 00000000 ........
0528 00000000 00000000 ........ 00000000 00000000 ........
0530 00000000 00000000 ........ 00000000 00000000 ........
0538 00000000 00000000 ........ 00000000 00000000 ........
0540 00000000 00000000 ........ 00000000 00000000 ........
0548 00000000 00000000 ........ 00000000 00000000 ........
0550 00000000 00000000 ........ 00000000 00000000 ........
0558 00000000 00000000 ........ 00000000 00000000 ........
0560 00000000 00000000 ........ 00000000 00000000 ........
0568 00000000 00000000 ........ 00000000 00000000 ........
0570 00000000 00000000 ........ 00000000 00000000 ........
0578 00000000 00000000 ........ 00000000 00000000 ........
0580 00000000 00000000 ........ 00000000 00000000 ........
0588 00000000 00000000 ........ 00000000 00000000 ........
0590 00000000 00000000 ........ 00000000 00000000 ........
0598 00000000 00000000 ........ 00000000 00000000 ........
05A0 00000000 00000000 ........ 00000000 00000000 ........
05A8 00000000 00000000 ........ 00000000 00000000 ........
05B0 00000000 00000000 ........ 00000000 00000000 ........
05B8 00000000 00000000 ........ 00000000 00000000 ........
05C0 00000000 00000000 ........ 00000000 00000000 ........
05C8 000055aa 4f7d4000 ..U.O}@. 000055aa 4f7d4000 ..U.O}@.
05D0 00000000 6f7b4000 ....o{@. 00000000 6f7b4000 ....o{@.
05D8 00000000 90078b00 ........ 00000000 90078b00 ........
05E0 e3974000 58078b00 ..@.X... e3974000 58078b00 ..@.X...
05E8 9f7ad477 a8078b00 .z.w.... 9f7ad477 a8078b00 .z.w....
05F0 64fb1200 1b7c4100 d....|A. 64fb1200 1b7c4100 d....|A.
05F8 00000

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 06 October 2010 - 07:37 PM

We need to check for unsigned drivers and also locate a copy of a file, all using xPUD.
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer.
  • Boot the Sick computer using the xPUD disk
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt

    Please note - all text entries are case sensitive
Copy and paste the report.txt for my review


Also please look for this file
  • Boot the computer with the USB drive again.
  • Click on File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see driver.sh.
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh -f
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:
    userinit.*
  • Press Enter
  • If succesful, the script will search this file.
  • After it has finished a report will be located in the USB drive as filefind.txt

Please note - all text entries are case sensitive

Copy and paste the filefind.txt for my review
Posted Image
m0le is a proud member of UNITE

#13 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 06 October 2010 - 08:54 PM

Wed Oct 6 19:15:59 UTC 2010
Driver report for /mnt/sda2/MiniNT/system32/drivers

2b3ab725f78e3e5bf476c4a4764c486a 1394bus.sys
Microsoft Corporation

f5e227af17514d92c180b7723573a7de 1394vdbg.sys
Microsoft Corporation

8f7eafefb200fe37be8642fd1be3b4c3 a320raid.sys
Adaptec

6abb91494fe6c59089b9336452ab2ea3 abp480n5.sys
Microsoft Corporation

9859c0f6936e723e4892d7141b1327d5 acpiec.sys
Microsoft Corporation

94ddd4b3acbd7a9558e1762cd58386f9 acpi.sys
Microsoft Corporation

9a11864873da202c996558b2106b0bbc adpu160m.sys
Microsoft Corporation

5e30228eaebf369c24cd0b87a93a2a4a ADPU320.sys
Adaptec

b3dde3cd2bca8aecd114f67435b3b147 aec6280.sys
H`vVS_VERSION_INFO?rStringFileInfoNbNCompanyNameACARDTechnologyCorp.bFileDescriptionAECvFileVersion,,,PLegalCopyrightACARDTechnologyCorp@bOriginalFilenameaec.sysr)ProductNameACARDAECATA-PCIIDEControllertProductVersionRev..:CommentsForMSIonboardDVarFileInfo$Translation*

c31bb78c5065c78b9270d2a91fdec112 aec6880.sys
tHwVS_VERSION_INFOnn?baStringFileInfoBNCompanyNameACARDTechnologyCorp.-FileDescriptionAECPCIUltraATARAIDAdapterDriver*FileVersion.bInternalNameaec.sys~-LegalCopyrightCopyrightAcardTechnologyCorp.-@bOriginalFilenameaec.sysProductNameAcardAEC-PCIUltraATARAIDController.ProductVersion.DVarFileInfo$Translationt

51b1872b62d1c335bac53313913c8d5b afd.sys
Microsoft Corporation

c23ea9b5f46c7f7910db3eab648ff013 aha154x.sys
Microsoft Corporation

19dd0fb48b0c18892f70e2e7d61a1529 aic78u2.sys
Microsoft Corporation

b7fe594a7468aa0132deb03fb8e34326 aic78xx.sys
Microsoft Corporation

1140ab9938809700b46bb88e46d72a96 aliide.sys
Acer Laboratories

79f5add8d24bd6893f2903a3e2f3fad6 amsint.sys
Microsoft Corporation

69eb0cc7714b32896ccbfd5edcbea447 asc3350p.sys
Microsoft Corporation

5d8de112aa0254b907861e9e9c31d597 asc3550.sys
Advanced System Products

62d318e9a0c8fc9b780008e724283707 asc.sys
Advanced System Products

03f403b07a884fc2aa54a0916c410931 asyncmac.sys
Microsoft Corporation

95b858761a00e1d4f81f79a0da019aca atapi.sys
Microsoft Corporation

9528b988ac46697efbcab6017e6525a0 b1cbase.sys
AVM GmbH

da1f27d85e0d1525f6621372e7b685e9 beep.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
Microsoft Corporation

f3ec03299634490e97bbce94cd2954c7 cd20xrnt.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys
Microsoft Corporation

049a38451f2611caf2fd528e023a0b5a cdfs.sys
Microsoft Corporation

6506e033ad04cfec9ee56dbefd1083dd cdrom.sys
Microsoft Corporation

4e86b33aff1a6af46889cbcf90f0c8f0 classpnp.sys
Microsoft Corporation

e5dcb56c533014ecbc556a8357c929d5 cmdide.sys
CMD Technology

3ee529119eed34cd212a215e8c40d4b6 cpqarray.sys
Microsoft Corporation

e550e7418984b65a78299d248f0a7f36 dac2w2k.sys
Mylex Corporation

683789caa3864eb46125ae86ff677d34 dac960nt.sys
Microsoft Corporation

e7a6557d0c8ff263a0b3b4bb9d08af10 dgapci.sys
Digi International

9ae322f68cb80e6b1681b3a650e93edd digirlpt.sys
Digi International

99a1ffd0e527d3b88e34735d85eaaa04 dimaint.sys
Eicon Technology

188eb90ac2b70c41fdd41ee36ae2a592 diskdump.sys
Microsoft Corporation

d1b16340ceaceecbf52340a0cbdf43e1 disk.sys
Microsoft Corporation

e18132d39407aadca6b1d19adf408a8a dmboot.sys
Microsoft Corp

aca44e9a8e2ff7c833664263c8478629 dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
Microsoft Corp

40f3b93b4e5b0126f2f5c0a7a5e22660 dpti2o.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
Microsoft Corporation

3d1383ae689ebc3a0f938b0aaece5596 dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys
Microsoft Corporation

4063a77fa6f2c8cd48cbe9ac6eb8d213 em556n4.sys
Com Corporation

80d1b490b60e74e002dc116ec5d41748 enum1394.sys
Microsoft Corporation

52016d76b6f9810186dfdd5ccd53fa79 et4000.sys
Microsoft Corporation

e61a31e02f488b4735e61364e2e9343f fast100.sys
Promise Technology

e4a3a8f3e60b542a747b10e86faa5dad fastfat.sys
Microsoft Corporation

d4bcb167794fa92d374fce68f65814a4 fasttrak.sys
Promise Technology

8958fc7f2df3c4f0a363a8644583485c fasttx2k.sys
Promise Technology

19c5c7eac0190a42522290bf002f64ea fdc.sys
Microsoft Corporation

8f70d1f7606f7442e2f7383f3701d728 flpydisk.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys
Microsoft Corporation

af2e5a5e7caddbdf02d3c5b40c339500 ft100i.sys
Promise Technology

f0196b7a8fe3098099721675db361272 ft100.sys
Promise Technology

6ac26732762483366c3969c9e4d2259d ftdisk.sys
Microsoft Corporation

b16e2511bb8acd1180db6c3b25ea5f0f fttx2.sys
Promise Technology

151b49e5cc28b76d84225ae2b69e02da hidclass.sys
Microsoft Corporation

d099d5a07e97b09ca6a8070ca58678e7 hidparse.sys
Microsoft Corporation

1de6783b918f540149aa69943bdfeba8 hidusb.sys
Microsoft Corporation

b028377dea0546a5fcfba928a8aefae0 hpn.sys
Microsoft Corporation

28af0055d23aeb3eaefda362342704fd hpt366.sys
Microsoft Corporation

a59c16c709ba100c0f1d70f404cf129f hpt371.sys
HighPoint Technologies

cd983677b18396fd9d8788366a63d31f hpt374.sys
HighPoint Technologies

2257091b43b02f8edde2789f8d4d4286 hpt3xxNT.sys
HighPoint Technologies

fe654f3e72975bd8a8cb5379b67d7f0d hpt3xx.sys
HighPoint Technologies

24bd4052a2c5eb5dadc6cc69b57f0ffa hptpro.sys
HighPoint Technologies

aeb15ed12bb5a2ce62d900a97207e78b i2omgmt.sys
Microsoft Corporation

83e0f7a55077ba8d13421f0febbae2fa i2omp.sys
Microsoft Corporation

7080f46568108cc6ea73e460ee6ee702 i8042prt.sys
Microsoft Corporation

a565427f99247530a0676d6610fc971d iaStor.sys
Intel Corporation

4a40e045faee58631fd8d91afc620719 ini910u.sys
Microsoft Corporation

17c67d4ffd7217bc851969c550131108 inport.sys
Microsoft Corporation

3049227da71a4a68515dcdce3030eacd intelide.sys
Microsoft Corporation

8f1604ad7f8f8b6339e53d93c46187a8 io8.sys
Perle Systems

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
Microsoft Corporation

f56dd863ba732a4e8ee58d486c31250f ipinip.sys
Microsoft Corporation

fc672ad6e9676814a0c844912f2abcff ipnat.sys
Microsoft Corporation

1c4802409cfd4a7051f458b744cfcaa5 ipsec.sys
Microsoft Corporation

e504f706ccb699c2596e9a3da1596e87 isapnp.sys
Microsoft Corporation

1e7f78c2fc393356cd884c6fde7966f9 kbdclass.sys
Microsoft Corporation

4e33c6dea3bcc50776f02a1c1ae28671 kbdhid.sys
Microsoft Corporation

abc70e8b89cce44731a346deb764bf95 ksecdd.sys
Microsoft Corporation

29f4584e6bdf44b39123622a65e25314 ks.sys
Microsoft Corporation

db35284e9acd15ec5337a50023d5394c lbrtfdc.sys
Toshiba Corporation

64e8b7c65eb4796939c0f64f8170821b loop.sys
Microsoft Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
Microsoft Corporation

9c46695db5d49d9a7333807430a43be2 mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
Microsoft Corporation

7760873e4ec17f288e61f00044dea000 modem.sys
Microsoft Corporation

81fb25d6ee5e0728d2c0630c58d7d908 mouclass.sys
Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys
Microsoft Corporation

d4face53a1c48cf8419b4cf494d2ee2e mountmgr.sys
Microsoft Corporation

0cb6f0f2a8f34b3984d7a7a4ca135e13 mraid35x.sys
American Megatrends

a1831538e119363d0d90d757ac8a2012 msfs.sys
Microsoft Corporation

08c56887f06473b09fc1b39e7dec0fb6 mup.sys
Microsoft Corporation

3b350e5a2a5e951453f3993275a4523a ndis.sys
Microsoft Corporation

59fc3fb44d2669bc144fd87826bb571f ndproxy.sys
Microsoft Corporation

20aba9f035e3a98877480e34fcc4dcb3 npfs.sys
Microsoft Corporation

e3ae9c79498210a5f39fe5a9ad62bc55 ntfs.sys
Microsoft Corporation

73c1e1f395918bc2c6dd67af7591a3ad null.sys
Microsoft Corporation

52c36c911f83f200130b2f84e01f3511 ohci1394.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
Microsoft Corporation

67fd105f525a94c0246c9088e85a2f3b parport.sys
Microsoft Corporation

3334430c29dc338092f79c38ef7b4cd0 partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
Microsoft Corporation

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
Microsoft Corporation

146d37a214304bd3432cfd3360ff067f pciidex.sys
Microsoft Corporation

9390447f3b1be5064a3ebe98c555a1e5 pci.sys
Microsoft Corporation

4ca446e011e2f61ac45eb2e3bc3f1584 pcmcia.sys
Microsoft Corporation

f50f7c27f131afe7beba13e14a3b9416 perc2hib.sys
Microsoft Corporation

6c14b9c19ba84f73d3a86dba11133101 perc2.sys
Microsoft Corporation

33d363e8a6c7c81cd653e8d118f4a519 ppa3.sys
Microsoft Corporation

0a63fb54039eb5662433caba3b26dba7 ql1080.sys
QLogic Corporation

6503449e1d43a0ff0201ad5cb1b8c706 ql10wnt.sys
Microsoft Corporation

156ed0ef20c15114ca097a34a30d8a01 ql12160.sys
QLogic Corporation

70f016bebde6d29e864c1230a07cc5e6 ql1240.sys
Microsoft Corporation

907f0aeea6bc451011611e732bd31fcf ql1280.sys
QLogic Corporation

231aa81e1ce4f7b6fbc77121155a67eb ramdisk.sys
Microsoft Corporation

f18e651e4b6c7d8bd367454e016ab5d4 rndismp.sys
Microsoft Corporation

c4cc1f6343c1879b446840e807305bb8 sbp2port.sys
Microsoft Corporation

f1d2d6d805ae2856f3d923e949ad917d scsiport.sys
Microsoft Corporation

65a7c4d86c153c82e33a552c217abb29 serenum.sys
Microsoft Corporation

dc7cbfec14b1b38bcf32aba922ffeaad serial.sys
Microsoft Corporation

4589eaa485a6216e6bec50f95a5d2c5c setupdd.sys
Microsoft Corporation

4e1b8866f3d208dee3906a191cb493e3 sfloppy.sys
Microsoft Corporation

57121c6ede17cb2622cec8b965eff709 Si3112r.sys
Silicon Image

5bd41932588cd58795fd5acbc1e19048 Si3112.sys
Silicon Image

80b86f9b9ec4cd0e25627e4a7c54826a slip.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys
Microsoft Corporation

83c0f71f86d3bdaf915685f3d568b20e sparrow.sys
Adaptec

9addfd4855a56b3dea541ef760c258d4 spddlang.sys
Microsoft Corporation

f4901a7692349f01d20e39a7f3d1d3d6 speed.sys
Perle Systems

c0e7e159415c1d10a88297b7eba01066 streamip.sys
Microsoft Corporation

064740c5c02de46723c4b8200ee876df swenum.sys
Microsoft Corporation

1ff3217614018630d0a6758630fc698c symc810.sys
Symbios Logic

070e001d95cf725186ef8b20335f933c symc8xx.sys
LSI Logic

80ac1c4abbe2df3b738bf15517a51f2c sym_hi.sys
LSI Logic

bf4fab949a382a8e105f46ebb4937058 sym_u3.sys
LSI Logic

d1570ddee0b8ad173a689f1a9a343b57 tape.sys
Microsoft Corporation

fd6a09d156139030729cf5f08f5d0cb9 tdi.sys
Microsoft Corporation

e51a3f6a0f6f868beeb7785764dc219c tffsport.sys
M-Systems

699450901c5ccfd82357cbc531cedd23 tosdvd.sys
Microsoft Corporation

f2790f6af01321b172aa62f8e1e187d9 toside.sys
Microsoft Corporation

5b96ede913bfa5384725ce1cc4e2b6e4 u133.sys
Promise Technology

01ca8ec606522d2f60820b0c0086fdd5 udfs.sys
Microsoft Corporation

de4b6c93d1774d7a89d784d8fe8cc640 ulsata.sys
Promise Technology

1b698a51cd528d8da4ffaed66dfc51b9 ultra.sys
Promise Technology
Promise Technology
Promise Technology
Promise Technology
Promise Technology

164cfae1d766905f56c432acfc54f28c update.sys
Microsoft Corporation

567d6c305295fea98e02fd3e5258ca89 usb8023.sys
Microsoft Corporation

79fee3cfec5b14194dbe0a703d82b2a4 usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
Microsoft Corporation

2d0c2f3836f72e85d41d9c50aeeb5423 usbehci.sys
Microsoft Corporation

d7bf70ac85e48b6c4df953401eccb75a usbhub.sys
Microsoft Corporation

4e7d2f6df7a7e02d80fe0b109f0c9f02 usbohci.sys
Microsoft Corporation

2ecaba73e8a4e58499bcc1fdb534ef34 usbport.sys
Microsoft Corporation

4923c60f9c381eae679db04021d26abb usbstor.sys
Microsoft Corporation

49ec068278d85bc1e20ac7f3d315e940 usbuhci.sys
Microsoft Corporation

08d2edfd7261242b8aea27f1fe11e120 vga.sys
Microsoft Corporation

fe2a9e925030fd316680680a2eb9ea63 viaide.sys
Microsoft Corporation

f314359357b6960eb727620470ffc9cf viapdsk.sys
VIA Technologies

ebe101c01d80a42868f57b327be1b564 viasraid.sys
VIA Technologies

9b900adeee167b99207ececccb5712a9 videoprt.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
Microsoft Corporation

Driver report for /mnt/sda2/i386/Apps/App00922/support/symnet/symnet/system32/drivers

609c6dd111864032f59ee662425aef33 symdns.sys
Symantec Corporation

41d43c212a0ea9f33689c5fd4ff37a8e symfw.sys
Symantec Corporation

019e21dcb4d621380799f92de454d8f6 symids.sys
Symantec Corporation

1f055b52cfcb6158acb5f79c154623b8 symndis.sys
Symantec Corporation

281f3398b1fd6d9a6bc7c1aed19fce3e symredrv.sys
Symantec Corporation

2d7b6c9da22f54b38843e5a9f99775fc symtdi.sys
Symantec Corporation

Driver report for /mnt/sda1/WINDOWS/system32/drivers
ddda278cea665a90e9f8f5834635147f
d6829acfa6315db9a963d3ede2bcbcff PciBus.sys has NO Company Name!

c1536905ad2067812a238bce998f4bff 1394bus.sys
Microsoft Corporation

6abb91494fe6c59089b9336452ab2ea3 ABP480N5.SYS
Microsoft Corporation

9859c0f6936e723e4892d7141b1327d5 acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys
Microsoft Corporation

9a11864873da202c996558b2106b0bbc adpu160m.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys
Microsoft Corporation

7e775010ef291da96ad17ca4b17137d7 afd.sys
Microsoft Corporation

0ebb674888cbdefd5773341c16dd6a07 AFS2K.SYS
tH`VS_VERSION_INFO?a|StringFileInfoXbVBuildDateThuOct::PSTCommentsHCompanyNameOakTechnologyInc.LFileDescriptionAudioFileSystembFileVersion...nInternalNameAFSk.sysh"LegalCopyrightCopyright©OakTechnologyInc.(LegalTrademarks<nOriginalFilenameAFSk.sys>PrivateBuild...()(ProductNameAFSBProductVersion...()XSpecialBuildWindows/XPfreebuild.DVarFileInfo$Translationtd

08fd04aa961bdc77fb983f328334e3d7 agp440.sys
Microsoft Corporation

03a7e0922acfe1b07d5db2eeb0773063 agpcpq.sys
Microsoft Corporation

c23ea9b5f46c7f7910db3eab648ff013 aha154x.sys
Microsoft Corporation

19dd0fb48b0c18892f70e2e7d61a1529 aic78u2.sys
Microsoft Corporation

b7fe594a7468aa0132deb03fb8e34326 aic78xx.sys
Microsoft Corporation

1140ab9938809700b46bb88e46d72a96 aliide.sys
Acer Laboratories

cb08aed0de2dd889a8a820cd8082d83c alim1541.sys
Microsoft Corporation

95b4fb835e28aa1336ceeb07fd5b9398 amdagp.sys
Advanced Micro Devices

d7701d7e72243286cc88c9973d891057 amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys
Microsoft Corporation

79f5add8d24bd6893f2903a3e2f3fad6 amsint.sys
Microsoft Corporation

82ce157ff3701ab50769b2654d0b0215 AnyDVD.sys
HkVS_VERSION_INFOaa?+b~StringFileInfoZbComments<CompanyNameSlySoft,Inc.RFileDescriptionAnyDVDFilterDriverbFileVersion....aInternalNameANYDVDl$LegalCopyrightCopyright-SlySoft,Inc.LegalTrademarksAnyDVDandSlySoftaretrademarksofSlySoft,Inc.>vOriginalFilenameAnyDVD.sysbPrivateBuildRelease.aProductNameAnyDVDbProductVersion...JSpecialBuildWindows/XP/DVarFileInfo$Translation

b5b8a80875c1dededa8b02765642c32f arp1394.sys
Microsoft Corporation

69eb0cc7714b32896ccbfd5edcbea447 asc3350p.sys
Microsoft Corporation

5d8de112aa0254b907861e9e9c31d597 asc3550.sys
Advanced System Products

62d318e9a0c8fc9b780008e724283707 asc.sys
Advanced System Products

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys
Microsoft Corporation

d649c57da6fa762c64013747e5d7d2d6 ati1btxx.sys
ATI Technologies

60b6aa2dc1521da343f781b70eb7895a ati1mdxx.sys
ATI Technologies

6fdc61e8e8e17f6ecc2d9a10fa8df347 ati1pdxx.sys
ATI Technologies

9d318099bf3876a4af4bc75966d27603 ati1raxx.sys
ATI Technologies

bcaf267b10620f8c93f6e87ab726e145 ati1rvxx.sys
ATI Technologies

dac7d785cf62f5bd41441e9d6f5a6efe ati1snxx.sys
ATI Technologies

f7706dae7d101f1b19ce552d772ebfce ati1ttxx.sys
ATI Technologies

6f714b4720dd80ffa9f8d2731594ea4c ati1tuxx.sys
ATI Technologies

67ffbc158dd4d27ba3fc92c6acd87f73 ati1xbxx.sys
ATI Technologies

0d8cab1f08f7d3c4de228b49e12e596a ati1xsxx.sys
ATI Technologies

2d030c2f6b036ca0bc243e1b16d924d1 ati2mtaa.sys
ATI Technologies

8759322ffc1a50569c1e5528ee8026b7 ati2mtag.sys
ATI Technologies

993e7bd6438fe989e328c6b4bca246a9 atinbtxx.sys
ATI Technologies

ed4c2bf8403f4437987c0ba09cf48716 atinmdxx.sys
ATI Technologies

e90ac2b14e98f1a4372e5891b4278784 atinpdxx.sys
ATI Technologies

da36687d701c833430605a298731410b atinraxx.sys
ATI Technologies

a7a01b907db63898d40b0a14248ff9a2 atinrvxx.sys
ATI Technologies

ceddee2e0591894d19654d458fd3b9be atinsnxx.sys
ATI Technologies

d80a8f6c0a717446496c3a06d33b0d9c atinttxx.sys
ATI Technologies

edd66332608d27f4fd5069bcd0bc5164 atintuxx.sys
ATI Technologies

3e7d485cbd0b0d9f6ea2ad9442411831 atinxbxx.sys
ATI Technologies

77b575d7aab35d5908ae6ce681608d62 atinxsxx.sys
ATI Technologies

9916c1225104ba14794209cfa8012159 atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68 audstub.sys
Microsoft Corporation

ae96075a3aed5c40f1ead477ea94acd7 bcmwl5.sys
Broadcom Corporation

da1f27d85e0d1525f6621372e7b685e9 beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys
Microsoft Corporation

b279426e3c0c344893ed78a613a73bde bthenum.sys
Microsoft Corporation

fca6f069597b62d42495191ace3fc6c1 bthmodem.sys
Microsoft Corporation

80602b8746d3738f5886ce3d67ef06b6 bthpan.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys
Microsoft Corporation

bb68cebffd181e18a26112d1b9f90f3d bthprint.sys
Microsoft Corporation

61364cd71ef63b0f038b7e9df00f1efa bthusb.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
Microsoft Corporation

0be5aef125be881c4f854c554f2b025c ccdecode.sys
Microsoft Corporation

f3ec03299634490e97bbce94cd2954c7 cd20xrnt.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys
Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys
Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys
Microsoft Corporation

e5dcb56c533014ecbc556a8357c929d5 cmdide.sys
CMD Technology

3ee529119eed34cd212a215e8c40d4b6 cpqarray.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys
Microsoft Corporation

e550e7418984b65a78299d248f0a7f36 dac2w2k.sys
Mylex Corporation

683789caa3864eb46125ae86ff677d34 dac960nt.sys
Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys
Microsoft Corporation

ddda278cea665a90e9f8f5834635147f disk.sys

d992fe1274bde0f84ad826acae022a41 dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 dmusic.sys
Microsoft Corporation

77ce63a8a34ae23d9fe4c7896d1debe7 Dot4Prt.sys
Microsoft Corporation

3e4b043f8bc6be1d4820cc6c9c500306 dot4.sys
Microsoft Corporation

40f3b93b4e5b0126f2f5c0a7a5e22660 dpti2o.sys
Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys
Microsoft Corporation

ac9cf17ee2ae003c98eb4f5336c38058 e100b325.sys
Intel Corporation

ce37e3d51912e59c80c6d84337c0b4cd ElbyCDFL.sys
H`dVS_VERSION_INFO?(bStringFileInfotbCommentsCloneCDDriver<CompanyNameSlySoft,Inc.VFileDescriptionElbyCDIOFilterDrivervFileVersion,,,:rInternalNameElbyCDFL.syst(LegalCopyrightCopyright©-SlySoft,Inc.-LegalTrademarksCloneCDisatrademarkofElaborateBytesAGBrOriginalFilenameElbyCDFL.sys&PrivateBuildNobProductNameCloneCD:vProductVersion,,,LSpecialBuildWindows/XP/VISTADVarFileInfo$Translation*

309ac30471a0f1c3a89dee1c81230576 ElbyCDIO.sys
H`BttVS_VERSION_INFO?(StringFileInfobFCompanyNameElaborateBytesAGr%FileDescriptionElbyCDWindowsNT//XPI/OdrivervFileVersion,,,tInternalNameElbyCDIO~-LegalCopyrightCopyright©-ElaborateBytesAGQLegalTrademarksCloneDVD,CloneCD,elbyandElaborateBytesaretrademarksofElaborateBytesAGBrOriginalFilenameElbyCDIO.sys&PrivateBuildNotProductNameCDRTools:vProductVersion,,,FSpecialBuildWindowsNT//XPDVarFileInfo$Translation*

bdd170fecb0e496a914318009d85b819 Entech.sys
HVS_VERSION_INFO?a<StringFileInfobComments<CompanyNameEnTechTaiwanz)FileDescriptionPowerStripsupportNTkernel-modedriver(FileVersion.vInternalNameENTECH.SYSr'LegalCopyrightCopyright©EnTechTaiwan.-r%LegalTrademarksPowerStripforWindows//NT/>vOriginalFilenameENTECH.SYSPrivateBuildvProductNamePowerStrip.ProductVersion.SpecialBuildDVarFileInfo$Translationt$(,

80d1b490b60e74e002dc116ec5d41748 enum1394.sys
Microsoft Corporation

38d332a6d56af32635675f132548343e fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys
Microsoft Corporation

d45926117eb9fa946a6af572fbe1caa3 fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltmgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys
Microsoft Corporation

3a74c423cf6bcca6982715878f450a3b gagp30kx.sys
Microsoft Corporation

8182ff89c65e4d38b2de4bb0fb18564e GEARAspiWDM.sys
GEAR Software

ab9896065bcee85e90616cfaf9ad89a6 gidv2.sys
tHCVS_VERSION_INFOStringFileInfob^CompanyNameStrikeForceTechnologies,Inc.bFileDescriptionGuardedIDvKeyboardFilter:rFileVersion,,,,InternalNamegidvLegalCopyrightCopyright©StrikeForceTechnologies,Inc.`LegalTrademarksStrikeForceTechnologiesInc<nOriginalFilenamegidv.sysnProductNameGuardedID:vProductVersion,,,DVarFileInfo$Translationt

52d390504a7087a0f591cdf64cdc6ecb grmn0200.sys
GARMIN Corp

95bbfdaef6f9c25fae80713766456f7c grmn0400.sys
GARMIN Corp

167115b180488785d578b616ac968ea7 grmn1200.sys
GARMIN Corp

fd396ca96d4f129bb463ed7dcef453ca grmngen.sys
GARMIN Corp

d956358054e99e6ffac69cd87e893a89 grmnusb.sys
GARMIN Corp

c818b973110a1c9f7763dd39bffd0fd3 hardlock.sys
ttHppVS_VERSION_INFOUU?aStringFileInfoBTCompanyNameAladdinKnowledgeSystemst&FileDescriptionHardlockDeviceDriverforWindowsNT*FileVersion.:rInternalNamehardlock.sys/LegalCopyrightCopyright-AladdinKnowledgeSystems.BrOriginalFilenamehardlock.sysl&ProductNameHardlockDeviceDriverforWindowsNT.ProductVersion.DVarFileInfo$Translationt

2dd25f060dc9f79b5cdf33d90ed93669 Haspnt.sys
*;tH`hhVS_VERSION_INFOAA?aStringFileInfoBTCompanyNameAladdinKnowledgeSystemsz)FileDescriptionHASPKernelDeviceDriverforWindowsNT*FileVersion..aInternalNameHASPNT/LegalCopyrightCopyright-AladdinKnowledgeSystems.>vOriginalFilenameHASPNT.SYSj%ProductNameWindowsNTHASPKernelDeviceDriver.ProductVersion.DVarFileInfo$Translationt*

573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys
Windows Server DDK provider

160b24fd894e79e71c983ea403a6e6e7 Hdaudio.sys
Windows Server DDK provider

7bd2de4c85eb4241eed57672b16a7d8d hidbth.sys
Microsoft Corporation

1af592532532a402ed7c060f6954004f hidclass.sys
Microsoft Corporation

bb1a6fb7d35a91e599973fa74a619056 hidir.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys
Microsoft Corporation

b028377dea0546a5fcfba928a8aefae0 hpn.sys
Microsoft Corporation

d03d10f7ded688fecf50f8fbf1ea9b8a HPZid412.sys
HP

89f41658929393487b6b7d13c8528ce3 HPZipr12.sys
HP

abcb05ccdbf03000354b9553820e39f8 HPZius12.sys
HP

970178e8e003eb1481293830069624b9 hsfbs2s2.sys
Conexant

74cf3f2e4e40c4a2e18d39d6300a5c24 HSF_CNXT.sys
Conexant

1225ebea76aac3c84df6c54fe5e5d8be hsfcxts2.sys
Conexant

ebb354438a4c5a3327fb97306260714a hsfdpsp2.sys
Conexant

b2dfc168d6f7512faea085253c5a37ad HSF_DP.sys
Conexant

698204d9c2832e53633e53a30a53fc3d HSF_DPV.sys
Conexant

b6b0721a86e51d141ec55c3cc1ca5686 HSFHWBS2.sys
Conexant

f80a415ef82cd06ffaf0d971528ead38 http.sys
Microsoft Corporation

9368670bd426ebea5e8b18a62416ec28 i2omgmt.sys
Microsoft Corporation

f10863bf1ccc290babd1a09188ae49e0 i2omp.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys
Microsoft Corporation

0acebb31989cbf9a5663fe4a33d28d21 ialmnt5.sys
Intel Corporation

2aae7be67911f4aec9ad28e9cfb9096f igxpmp32.sys
Intel Corporation

083a052659f5310dd8b6a6cb05edcf8e imapi.sys
Microsoft Corporation

4a40e045faee58631fd8d91afc620719 ini910u.sys
Microsoft Corporation

b5466a9250342a7aa0cd1fba13420678 intelide.sys
Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys
Microsoft Corporation

e3c49b5bb2ffa13ac1c0485233c4607d intelsmb.sys
Intel Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys
Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys
Microsoft Corporation

9ef487a186dea361aa06913a75b3fa99 kbdhid.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys
Microsoft Corporation

b467646c54cc746128904e1654c750c1 ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys
Microsoft Corporation

efcc6d56fe8ba50bb7ecf300b60a66a3 L8042MOU.SYS
Logitech

452ecfc32a4b5d9a761e113f149e1b9e LHidKE.Sys
Logitech

9c92312dd1ab42e627710fb89bbbcd1e LHidUsbK.sys
Logitech

95871e8c4aecfed95f884d2d10b8bcfb LMouKE.Sys
Logitech

c7dd7d9739785bd3a6b8499eec1dee7e mbamswissarmy.sys
Malwarebytes Corporation

67b48a903430c6d4fb58cbaca1866601 mbam.sys
Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
Microsoft Corporation

e68cf7be06219f22ed5d3a36159424dc mdc8021x.sys
Meetinghouse Data Communications

e246a32c445056996074a397da56e815 mdmxsdk.sys
Conexant

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys
Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys
Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys
Microsoft Corporation

3f4bb95e5a44f3be34824e8e7caf0737 mraid35x.sys
American Megatrends

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys
Microsoft Corporation

f3aefb11abc521122b67095044169e98 mrxsmb.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 mskssrv.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e mspclock.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d mspqm.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys
Microsoft Corporation

e53736a9e30c45fa9e7b5eac55056d1d mstee.sys
Microsoft Corporation

c53775780148884ac87c455489a0c070 mtlmnt5.sys
Smart Link

54886a652bf5685192141df304e923fd mtlstrm.sys
Smart Link

6dda78a0be692b61b668fab860f276cf mtxparhm.sys
Matrox Graphics

2f625d11385b1a94360bfc70aaefdee1 mup.sys
Microsoft Corporation

b538dcd9816ea35fa4f637cfc261aaa8 mutohpen.sys
Microsoft Corporation

e1cdf20697d992cf83ff86dd04df1285 mxnic.sys
Macronix International

5b50f1b2a2ed47d560577b221da734db nabtsfec.sys
Microsoft Corporation

7ff1f1fd8609c149aa432f95a8163d97 ndisip.sys
Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys
Microsoft Corporation

1ab3d00c991ab086e69db84b6c0ed78f ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys
Microsoft Corporation

6215023940cfd3702b46abc304e1d45a ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys
Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys
Microsoft Corporation

15a72d5b8f0b6a718207f14bd5ebb8ff NTIDrvr.sys
NewTech Infosystems

576b34ceae5b7e5d9fd2775e93b3db53 ntmtlfax.sys
Smart Link

73c1e1f395918bc2c6dd67af7591a3ad null.sys
Microsoft Corporation

2b298519edbfcf451d43e0f1e8f1006d nv4_mini.sys
NVIDIA Corporation

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys
Microsoft Corporation

ca33832df41afb202ee7aeb05145922f ohci1394.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
Microsoft Corporation

803715cf245d5308c2644925ceaf275d OVCam2.sys
Microsoft Corporation

fddd1aeb9f81ef1e6e48ae1edc2a97d6 OVCD.sys
Microsoft Corporation

6e07c71e89c17c96d206a6a91d247f3b OVCodek2.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
Microsoft Corporation

d6829acfa6315db9a963d3ede2bcbcff PciBus.sys

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys
Microsoft Corporation

f50f7c27f131afe7beba13e14a3b9416 perc2hib.sys
Microsoft Corporation

6c14b9c19ba84f73d3a86dba11133101 perc2.sys
Microsoft Corporation

e82a496c3961efc6828b508c310ce98f portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys
Parallel Technologies

0a63fb54039eb5662433caba3b26dba7 ql1080.sys
QLogic Corporation

6503449e1d43a0ff0201ad5cb1b8c706 ql10wnt.sys
Microsoft Corporation

156ed0ef20c15114ca097a34a30d8a01 ql12160.sys
QLogic Corporation

70f016bebde6d29e864c1230a07cc5e6 ql1240.sys
Microsoft Corporation

907f0aeea6bc451011611e732bd31fcf ql1280.sys
QLogic Corporation

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys
Microsoft Corporation

6728e45b66f93c08f11de2e316fc70dd rdpwd.sys
Microsoft Corporation

e9aaa0092d74a9d371659c4c38882e12 recagent.sys
Smart Link

f828dd7e1419b6653894a8f97a0094c5 redbook.sys
Microsoft Corporation

e205c313417da6fa7afe85912a310a65 RegKill.sys
HbllVS_VERSION_INFO?(bStringFileInfobFCompanyNameElaborateBytesAGfFileDescriptionElbyDelayLowerFilterDrivervFileVersion,,,<InternalNameElbyDelay.sys~-LegalCopyrightCopyright©-ElaborateBytesAGMLegalTrademarkselbyCloneDVD,elbyandElaborateBytesaretrademarksofElaborateBytesAGDOriginalFilenameElbyDelay.sys&PrivateBuildNotProductNameCDRTools:vProductVersion,,,LSpecialBuildWindows/XP/VISTADVarFileInfo$Translation*

851c30df2807fcfa21e4c681a7d6440e rfcomm.sys
Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys
Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c rmcast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys
Microsoft Corporation

726548542afeca56257ff01eb13bb6d7 rndismpx.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys
Microsoft Corporation

2262f37983e91e97e10de301e96367e0 RtkHDAud.sys
Realtek Semiconductor

0dbcc071a268e0340a2ba6bdd98bace4 s3gnbm.sys
SGraphics

b244960e5a1db8e9d5d17086de37c1e4 sbp2port.sys
Microsoft Corporation

76c465f570e90c28942d52ccb2580a10 scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys
Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys
Microsoft Corporation

6b33d0ebd30db32e27d1d78fe946a754 sisagp.sys
Silicon Integrated Systems

866d538ebe33709a5c9f5c62b73b7d14 slip.sys
Microsoft Corporation

d9673011648a71ed1e1f77b831bc85e6 slnt7554.sys
Smart Link

2c1779c0feb1f4a6033600305eba623a slntamr.sys
Smart Link

f9b8e30e82ee95cf3e1d3e495599b99c slnthal.sys
Smart Link

db56bb2c55723815cf549d7fc50cfceb slwdmsup.sys
Smart Link

895be38a993b9bd5abbe570d63d88a2e smbali.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys
Microsoft Corporation

489703624dac94ed943c2abda022a1cd sonydcam.sys
Microsoft Corporation

83c0f71f86d3bdaf915685f3d568b20e sparrow.sys
Adaptec

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys
Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys
Microsoft Corporation

da852e3e0bf1cea75d756f9866241e57 srv.sys
Microsoft Corporation

77813007ba6265c4b6098187e6ed79d2 streamip.sys
Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys
Microsoft Corporation

ed67900e1553b2fc56daa64aab4b304f Sunkfilt39.sys
Alcor Micro Corp

9152dc78005a58a17e79390aa0853bb1 Sunkfilt.sys
Alcor Micro Corp

3941d127aef12e93addf6fe6ee027e0f swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys
Microsoft Corporation

1ff3217614018630d0a6758630fc698c symc810.sys
Symbios Logic

070e001d95cf725186ef8b20335f933c symc8xx.sys
LSI Logic

80ac1c4abbe2df3b738bf15517a51f2c sym_hi.sys
LSI Logic

bf4fab949a382a8e105f46ebb4937058 sym_u3.sys
LSI Logic

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys
Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys
Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e termdd.sys
Microsoft Corporation

699450901c5ccfd82357cbc531cedd23 tosdvd.sys
Microsoft Corporation

f2790f6af01321b172aa62f8e1e187d9 toside.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys
Microsoft Corporation

d85938f272d1bcf3db3a31fc0a048928 uagp35.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys
Microsoft Corporation

1b698a51cd528d8da4ffaed66dfc51b9 ultra.sys
Promise Technology
Promise Technology
Promise Technology
Promise Technology
Promise Technology

402ddc88356b1bac0ee3dd1580c76a31 update.sys
Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys
Microsoft Corporation

b6cc50279d6cd28e090a5d33244adc9a usb8023x.sys
Microsoft Corporation

4b8a9c16b6d9258ed99c512aecb8c555 usbaapl.sys
Apple

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys
Microsoft Corporation

2825e0e294686a26506690059e1f437a usbccid.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys
Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys
Microsoft Corporation

a717c8721046828520c9edf31288fc00 usbprint.sys
Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4 usbscan.sys
Microsoft Corporation

1c888b000c2f9492f4b15b5b6b84873e usbser.sys
Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9 usbstor.sys
Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys
Microsoft Corporation

63bbfca7f390f4c49ed4b96bfb1633e0 usbvideo.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys
Microsoft Corporation

754292ce5848b3738281b4f3607eaef4 viaagp.sys
Microsoft Corporation

3b3efcda263b8ac14fdf9cbdd0791b2e viaide.sys
Microsoft Corporation

e28726b72c46821a28830e077d39a55b videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys
Microsoft Corporation

aced8c149b30f8496c237bcba3727b48 wacompen.sys
Microsoft Corporation

0308aef61941e4af478fa1a0f83812f5 wadv07nt.sys
Intel Corporation

714038a8aa5de08e12062202cd7eaeb5 wadv08nt.sys
Intel Corporation

7bb3aa595e4507a788de1cdc63f4c8c4 wadv09nt.sys
Intel Corporation

36e6c405b6143d09687f4056fd9a0d10 wadv11nt.sys
Intel Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys
Microsoft Corporation

352fa0e98bc461ce1ce5d41f64db558d watv06nt.sys
Intel Corporation

791cc45de6e50445be72e8ad6401ff45 watv10nt.sys
Intel Corporation

6768acf64b18196494413695f0c3a00f wdmaud.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys
Microsoft Corporation

cf4def1bf66f06964dc0d91844239104 wpdusb.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
Microsoft Corporation

c98b39829c2bbd34e454150633c62c78 wstcodec.sys
Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311 WudfPf.sys
Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b WudfRd.sys
Microsoft Corporation




Search results for userinit.*

e931e0a2b8bf0019db902e98d03662cb /mnt/sda2/MiniNT/system32/userinit.exe
21.5K Aug 29 2002

a93aee1928a9d7ce3e16d24ec7380f89 /mnt/sda1/WINDOWS/ServicePackFiles/i386/userinit.exe
25.5K Apr 14 2008

02659cceeb680995408131981d42e349 /mnt/sda1/WINDOWS/I386/USERINIT.EX_
10.9K Aug 4 2004

a93aee1928a9d7ce3e16d24ec7380f89 /mnt/sda1/WINDOWS/system32/userinit.exe
25.5K Apr 14 2008

39b1ffb03c2296323832acbae50d2aff /mnt/sda1/WINDOWS/$NtServicePackUninstall$/userinit.exe
24.0K Aug 4 2004




#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:51 PM

Posted 08 October 2010 - 07:20 PM

We're going to crash your PC on purpose to get a STOP code which we can use to diagnose the PC.

We Need to Diagnose Your BlueScreen
  1. When you boot your machine, press F8 to list the startup options, exactly as you would if you were trying to enter Safe Mode
  2. Select "Disable Automatic Restart on System Failure", as shown here:
  3. When your system BSODs, write down the STOP error code, as well as any written out error message back here. The STOP error will always appear, but the message may not. You are looking for this:

Posted Image
m0le is a proud member of UNITE

#15 xxmattnxx

xxmattnxx
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:03:51 PM

Posted 08 October 2010 - 08:23 PM

STOP: c000021a [fatal system error]
The Windows Logong Process system process terminated unexpectedly with a status of 0xc0000005 (0x00000000 0x00000000). The system has been shut down




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users