Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infection and Redirects


  • This topic is locked This topic is locked
37 replies to this topic

#1 dbj15

dbj15

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 07 May 2011 - 04:57 PM

First of all,my appologies as my original post seems to have been put in the wrong forum and I don't see where to ask that it be removed from there which is why I am re posting here. This Win 7 Ultimate computer has been infected after having Googled for a term explanation! The infection originally started with the name Win7 Security 2011. I ran a iteration of rkill named iExplore.exe in safe mode and the log said it had found and removed a malware process. Since then, I have only seen the original infection pop up once but, I have not been allowed to run either Internet explorer nor Firefox to connect to any web page that has to do with antivirus programs such as malwarebytes or Superantispyware and I am not even allowed to go to the update file download web pages for them either. Most times when I ask to go to a particular web page, I am redirected to an advertisement and many times I can see briefly in the address bar the word Google-Analytics and sometime a misspelled GUGLE. All help to clean this computer will be greatly appreciated. Thank You dds.txt log file here ********************************************************************************************************************
.
DDS (Ver_11-03-05.01) - NTFSx86
Run by David at 14:46:15.26 on Sat 05/07/2011
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_24
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.3071.2091 [GMT -7:00]
.
AV: AntiVir Desktop *Enabled/Updated* {090F9C29-64CE-6C6F-379C-5901B49A85B7}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: AntiVir Desktop *Enabled/Updated* {B26E7DCD-42F4-63E1-0D2C-6273CF1DCF0A}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\PROGRA~1\WinTV\HCWTVS~1.EXE
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\Windows\system32\conhost.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\System32\svchost.exe -k HPZ12
C:\Program Files\REALTEK\11n USB Wireless LAN Utility\RtlService.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\REALTEK\11n USB Wireless LAN Utility\RtWlan.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\PROGRA~1\WinTV\HCEB44~1.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\MSN Toolbar\Platform\5.0.1449.0\mswinext.exe
C:\Program Files\Free Download Manager\fdm.exe
C:\Program Files\Vista Start Menu\VistaStartMenu.exe
C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k HPService
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
C:\Program Files\Opera\Opera.exe
C:\Users\David\Desktop\dds.scr
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.rr.com/index.cfm
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Search Toolbar: {9d425283-d487-4337-bab6-ab8354a81457} - c:\program files\search toolbar\SearchToolbar.dll
BHO: FDMIECookiesBHO Class: {cc59e0f9-7e43-44fa-9faa-8377850bf205} - c:\program files\free download manager\iefdm2.dll
BHO: Bing Bar BHO: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn toolbar\platform\5.0.1449.0\npwinext.dll
BHO: Foxit PDF Creator Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: Search Toolbar: {9d425283-d487-4337-bab6-ab8354a81457} - c:\program files\search toolbar\SearchToolbar.dll
TB: @c:\program files\msn toolbar\platform\5.0.1449.0\npwinext.dll,-100: {8dcb7100-df86-4384-8842-8fa844297b3f} - c:\program files\msn toolbar\platform\5.0.1449.0\npwinext.dll
TB: Foxit PDF Creator Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Free Download Manager] "c:\program files\free download manager\fdm.exe" -autorun
uRun: [VistaStartMenu] "c:\program files\vista start menu\VistaStartMenu.exe"
uRun: [LightScribe Control Panel] c:\program files\common files\lightscribe\LightScribeControlPanel.exe -hidden
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
mRun: [Bing Bar] "c:\program files\msn toolbar\platform\5.0.1449.0\mswinext.exe"
mRun: [Microsoft Default Manager] "c:\program files\microsoft\search enhancement pack\default manager\DefMgr.exe" -resume
mRun: [Malwarebytes' Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
uPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Download all with Free Download Manager - file://c:\program files\free download manager\dlall.htm
IE: Download selected with Free Download Manager - file://c:\program files\free download manager\dlselected.htm
IE: Download video with Free Download Manager - file://c:\program files\free download manager\dlfvideo.htm
IE: Download with Free Download Manager - file://c:\program files\free download manager\dllink.htm
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\david\appdata\roaming\mozilla\firefox\profiles\ll90hdr3.default\
FF - prefs.js: browser.search.selectedEngine - Bing
FF - prefs.js: browser.startup.homepage - hxxp://www.bing.com/?pc=ZUGO&form=ZGAPHP
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=ZUGO&form=ZGAADF&q=
FF - plugin: c:\program files\foxit software\foxit reader\plugins\npFoxitReaderPlugin.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\3.0.40818.0\npctrlui.dll
FF - plugin: c:\program files\msn toolbar\platform\5.0.1449.0\npwinext.dll
.
============= SERVICES / DRIVERS ===============
.
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-5-10 67656]
R1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\drivers\vwififlt.sys [2009-7-13 48128]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-5-1 136360]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-5-1 269480]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-5-1 61960]
R2 HauppaugeTVServer;HauppaugeTVServer;c:\progra~1\wintv\HCWTVS~1.EXE [2011-5-1 933888]
R2 Realtek11nSU;Realtek11nSU;c:\program files\realtek\11n usb wireless lan utility\RtlService.exe [2011-5-1 36864]
R3 HCW85BDA;Hauppauge WinTV 885 Video Capture;c:\windows\system32\drivers\HCW85BDA.sys [2011-5-1 1129344]
R3 netr73;USB Wireless 802.11 b/g Adaptor Driver for Vista;c:\windows\system32\drivers\netr73.sys [2009-6-10 545792]
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\drivers\Rt86win7.sys [2009-6-10 139776]
R3 RTL8192su;Realtek RTL8192SU Wireless LAN 802.11n USB 2.0 Network Adapter;c:\windows\system32\drivers\rtl8192su.sys [2011-5-1 581120]
R3 VST_DPV;VST_DPV;c:\windows\system32\drivers\VSTDPV3.SYS [2009-7-13 980992]
R3 VSTHWBS2;VSTHWBS2;c:\windows\system32\drivers\VSTBS23.SYS [2009-7-13 266752]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
.
=============== Created Last 30 ================
.
2011-05-07 16:59:14 339968 --sha-w- c:\users\david\appdata\local\ubh.exe
2011-05-07 11:30:49 -------- d-----w- c:\users\david\appdata\local\TaskManager
2011-05-07 11:30:46 -------- d-----w- c:\program files\Free Extended Task Manager
2011-05-07 11:30:34 -------- d-----w- c:\progra~2\TaskManager
2011-05-07 01:23:15 -------- d-----w- c:\users\david\appdata\local\Panther
2011-05-07 01:23:09 114688 ----a-w- c:\users\david\appdata\local\qiq.exe
2011-05-05 10:22:49 -------- d-----w- c:\progra~2\LightScribe
2011-05-04 19:04:09 -------- d-----w- c:\users\david\appdata\local\Opera
2011-05-04 18:43:23 -------- d-----w- c:\users\david\appdata\roaming\Easy Duplicate Finder
2011-05-04 18:43:23 -------- d-----w- c:\progra~2\Easy Duplicate Finder
2011-05-04 18:43:22 -------- d-----w- c:\program files\Easy Duplicate Finder
2011-05-04 17:48:15 0 ----a-w- c:\users\david\appdata\local\Ubuqu.bin
2011-05-04 17:48:14 -------- d-----w- c:\users\david\appdata\local\{9E1C673B-97ED-4F35-8193-5223F6B6B4D6}
2011-05-04 00:07:40 -------- d-----w- C:\PDF-Collections
2011-05-03 06:21:50 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-05-03 06:17:16 -------- d-----w- c:\program files\DVDVideoSoft
2011-05-03 06:17:16 -------- d-----w- c:\program files\common files\DVDVideoSoft
2011-05-03 05:25:10 49152 ----a-w- c:\windows\system\npptools.dll
2011-05-03 05:24:58 49152 ----a-w- c:\windows\system32\npptools.dll
2011-05-03 05:10:42 131072 ----a-r- c:\users\david\appdata\roaming\microsoft\installer\{3254fd51-9910-48c4-ac9b-af3691c1544c}\NewShortcut3_3254FD51991048C4AC9BAF3691C1544C.exe
2011-05-03 05:10:42 131072 ----a-r- c:\users\david\appdata\roaming\microsoft\installer\{3254fd51-9910-48c4-ac9b-af3691c1544c}\NewShortcut1_3254FD51991048C4AC9BAF3691C1544C.exe
2011-05-03 05:10:42 -------- d-----w- c:\program files\WinPcap
2011-05-03 05:09:44 -------- d-----w- C:\TubeHunter
2011-05-03 05:08:28 -------- d-----w- c:\windows\Downloaded Installations
2011-05-02 22:25:48 -------- d-----w- c:\users\david\appdata\roaming\Foxit Software
2011-05-02 22:25:34 -------- d-----w- c:\program files\Ask.com
2011-05-02 22:25:21 -------- d-----w- c:\program files\Foxit Software
2011-05-02 22:09:18 -------- d-----w- C:\4CleanOuts
2011-05-02 21:47:28 -------- d-----w- C:\4All-Linux
2011-05-02 21:27:52 -------- d-----w- C:\BrdComs4XP
2011-05-02 10:42:53 -------- d-----w- C:\PcCloneFlexBkUpCD
2011-05-02 10:41:45 -------- d-----w- C:\GetDiz
2011-05-02 10:41:13 -------- d-----w- C:\Hauppauge
2011-05-02 10:40:41 -------- d-----w- C:\TubeHunter Ultra
2011-05-02 10:38:32 -------- d-----w- C:\Helps+Reffs
2011-05-02 10:31:30 -------- d-----w- C:\EzBCD-Info
2011-05-02 10:28:43 -------- d-----w- C:\4WIT's
2011-05-02 10:27:44 -------- d-----w- C:\Walls
2011-05-02 10:27:11 -------- d-----w- C:\USB-Holds
2011-05-02 10:14:35 -------- d-----w- c:\users\david\appdata\roaming\IrfanView
2011-05-02 10:14:35 -------- d-----w- c:\program files\IrfanView
2011-05-02 09:37:03 -------- d-----w- c:\program files\Free Hide Folder
2011-05-02 09:10:40 -------- d-----w- c:\windows\system32\ShellExt
2011-05-02 09:01:54 -------- d-----w- C:\4AveryLabelPrnt
2011-05-02 08:56:29 319488 ----a-w- c:\windows\system32\spool\prtprocs\w32x86\hpfpp02t.dll
2011-05-02 08:55:13 -------- d-----w- c:\program files\Microsoft
2011-05-02 08:55:12 -------- d-----w- c:\program files\MSN Toolbar
2011-05-02 08:54:57 -------- d-----w- c:\program files\Bing Bar Installer
2011-05-02 08:54:31 -------- d-----w- c:\program files\common files\HP
2011-05-02 08:54:31 -------- d-----w- c:\program files\common files\Hewlett-Packard
2011-05-02 08:54:01 125440 ----a-w- c:\windows\system32\hpf3l02t.dll
2011-05-02 08:53:46 -------- d-----w- c:\program files\HP
2011-05-02 08:53:01 -------- d-----w- c:\users\david\appdata\roaming\Avira
2011-05-02 08:51:41 970752 ----a-w- c:\windows\system32\hpwtiop4.dll
2011-05-02 08:51:41 718336 ----a-w- c:\windows\system32\hpwwiax5.dll
2011-05-02 08:51:41 454504 ----a-w- c:\windows\system32\hpzids01.dll
2011-05-02 08:51:41 372736 ----a-w- c:\windows\system32\hppldcoi.dll
2011-05-02 08:51:41 294912 ----a-w- c:\windows\system32\hpovst11.dll
2011-05-02 08:49:02 -------- d-----w- c:\program files\Mythicsoft
2011-05-01 23:58:20 499712 ----a-w- c:\windows\system32\msvcp71.dll
2011-05-01 23:58:20 348160 ----a-w- c:\windows\system32\msvcr71.dll
2011-05-01 23:58:19 1060864 ----a-w- c:\windows\system32\mfc71.dll
2011-05-01 23:58:19 -------- d-----w- c:\windows\system32\Hauppauge
2011-05-01 23:58:11 -------- d-----w- c:\program files\common files\IviSDK
2011-05-01 23:58:09 32768 ----a-w- c:\program files\common files\installshield\engine\6\intel 32\objectps.dll
2011-05-01 23:58:09 225280 ----a-w- c:\program files\common files\installshield\iscript\IScript.dll
2011-05-01 23:58:09 176128 ----a-w- c:\program files\common files\installshield\engine\6\intel 32\iuser.dll
2011-05-01 23:58:08 77824 ----a-w- c:\program files\common files\installshield\engine\6\intel 32\ctor.dll
2011-05-01 23:58:08 212992 ------w- c:\program files\common files\installshield\engine\6\intel 32\ILog.dll
2011-05-01 23:56:26 96256 ----a-w- c:\windows\system32\hcwcp.ax
2011-05-01 23:56:26 66048 ----a-w- c:\windows\system32\hcwxds.dll
2011-05-01 23:56:26 140800 ----a-w- c:\windows\system32\hcw85enc.ax
2011-05-01 23:56:26 139264 ----a-w- c:\windows\system32\hcwecppp.ax
2011-05-01 23:56:26 115712 ----a-w- c:\windows\system32\hcw85prop.ax
2011-05-01 23:56:26 1129344 ----a-w- c:\windows\system32\drivers\HCW85BDA.sys
2011-05-01 23:12:18 -------- d-----w- C:\4ExternalUSB-Enclosures
2011-05-01 22:57:32 -------- d-----w- c:\program files\Nero
2011-05-01 22:57:17 -------- d-----w- c:\progra~2\Nero
2011-05-01 22:43:17 -------- d-----w- C:\Supps
2011-05-01 21:46:39 -------- d-----w- C:\DJ
2011-05-01 21:26:28 -------- d-----w- c:\users\david\appdata\roaming\Vista Start Menu
2011-05-01 21:26:15 -------- d-----w- c:\program files\Vista Start Menu
2011-05-01 21:10:42 -------- d-----w- c:\program files\Ashampoo
2011-05-01 20:41:54 -------- d-----w- c:\users\david\appdata\local\Thunderbird
2011-05-01 19:38:53 -------- d-----w- c:\program files\Cisco
2011-05-01 19:38:17 581120 ----a-r- c:\windows\system32\drivers\rtl8192su.sys
2011-05-01 19:38:16 614400 ------r- c:\windows\Rtlihvs.dll
2011-05-01 19:38:16 380928 ------r- c:\windows\RtlUI2.exe
2011-05-01 19:38:16 188416 ------r- c:\windows\RTLExtUI.dll
2011-05-01 19:38:15 614400 ------r- c:\windows\system32\Rtlihvs.dll
2011-05-01 19:38:08 380928 ------r- c:\windows\system32\RtlUI2.exe
2011-05-01 19:38:08 188416 ------r- c:\windows\system32\RTLExtUI.dll
2011-05-01 19:37:58 451072 ----a-w- c:\windows\system32\ISSRemoveSP.exe
2011-05-01 19:37:58 -------- d-----w- c:\program files\REALTEK
2011-05-01 19:30:03 -------- d-----w- c:\program files\UltraISO
2011-05-01 19:30:03 -------- d-----w- c:\program files\common files\EZB Systems
2011-05-01 18:29:07 -------- d-----w- c:\program files\Frhed
2011-05-01 18:26:26 -------- d-----w- c:\users\david\appdata\roaming\Free Download Manager
2011-05-01 18:26:18 -------- d-----w- c:\program files\Search Toolbar
2011-05-01 18:26:07 -------- d-----w- c:\program files\Free Download Manager
2011-05-01 18:18:35 -------- d-----w- C:\2Do
2011-05-01 17:51:07 -------- d-----w- c:\program files\VideoLAN
2011-05-01 16:44:13 -------- d-----w- c:\users\david\appdata\local\Mozilla
2011-05-01 16:40:35 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-05-01 16:40:35 -------- d-----w- c:\program files\Avira
2011-05-01 16:40:35 -------- d-----w- c:\progra~2\Avira
2011-05-01 15:35:43 -------- d-sh--w- c:\windows\Installer
2011-05-01 12:44:11 -------- d-----w- c:\users\david\appdata\roaming\Malwarebytes
2011-05-01 12:20:30 -------- d-----w- c:\windows\Panther
2011-05-01 12:11:51 -------- d-----w- c:\users\david\appdata\roaming\SUPERAntiSpyware.com
2011-05-01 12:11:51 -------- d-----w- c:\progra~2\SUPERAntiSpyware.com
2011-05-01 12:11:47 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-05-01 12:06:33 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-01 12:06:32 -------- d-----w- c:\progra~2\Malwarebytes
2011-05-01 12:06:29 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-05-01 12:06:29 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-01 11:55:53 -------- d-----w- C:\Dwns
2011-05-01 11:34:57 -------- d-----w- c:\windows\system32\wbem\Performance
2011-04-13 17:29:25 -------- d-----w- C:\UltraISO
.
==================== Find3M ====================
.
2011-05-07 07:48:42 506880 ----a-w- c:\windows\system32\SnippingTool.exe
2011-05-07 07:48:41 290304 ----a-w- c:\windows\system32\notepad.exe
2011-05-07 07:48:41 290304 ----a-w- c:\windows\notepad.exe
2011-05-07 07:48:18 246784 ----a-w- c:\windows\system32\wbem\WmiApSrv.exe
2011-05-07 07:48:10 3290112 ----a-w- c:\windows\system32\sppsvc.exe
2011-05-07 07:48:09 183808 ----a-w- c:\windows\system32\msiexec.exe
.
============= FINISH: 14:46:33.23 ===============

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 12 May 2011 - 02:44 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.


We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.


In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply





Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".


information and logs:

  • In your next post I need the following

  • .logs from DDS
  • log from RKUnHooker
  • let me know of any problems you may have had

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 dbj15

dbj15
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 12 May 2011 - 03:26 PM

To Cryptodan4Reply and Gringo if he has taken over my post.Hello.As I stated in the post,Iam not allowed to download any kind of antivirus updates.Because of that,I am not allowed to run Malwarebytes
not SuperAntiSpyware as they both say they are unable to download their updates and so they will not run any scans even though I am trying from safe mode! The portable of SuperAntiSpy acted the same.
I next downlloaded Gmer, disconnected from the web, deactivated my antivira and activated and saw Gmer run it's scan run.Saved the log to the desktop,and rebooted.At least I tried to.The first reboot ended up running about 20 minutes before finaly showing just the desktop graphic.No Icons and No Taskbar.I rebooted again and again waited for about 20 minutes and came up with the same screen but it started up
with the following messages;TR/PatchedGen found in the file C:\Program Files\WindowsNT\..\Wordpad.exe , TR/PatchedGen found in C:\windows\explorer.exe TR/PatchedGen found in desktop.ini[.shellclassinfo]localized ResourceName=@%SystemRoot% \System32.dll,-21787 Unfinished boots continued numerous times. I then did the F8 advanced Utility and selected to look at the System Restore available points. After selecteing an available time back 3 days earlier whic was as far back as it listed, it came back with this message."System restore failed to extract (E:\Windows\System32\migwiz\dllmanifests\BITSExtensions-Server)From the restore point. The restore point was damaged or was deleted during the restore.Further Reboots resulted in the same resulting no taskbar and no desktop backround graphic.
*******************************************************************************************************
Hello Gringo.If you have taken over my post, I am not as the system stands able to do as your directions
asked me to do,so I ask what you think I should do next? Thank you for your attention to my problems.

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 12 May 2011 - 03:47 PM

Hello

here is the first thing I want you to do


Resetting Router

Letís try to reset the router to its default configuration.
  • This can be done by inserting something tiny like a paper clip end or pencil tip into a small hole labeled "reset" located on the back of the router.
  • Press and hold down the small button inside until the lights on the front of the router blink off and then on again (usually about 10 seconds).
  • If you donít know the router's default password, you can look it up. Here
  • You also need to reconfigure any security settings you had in place prior to the reset.
  • You may also need to consult with your Internet service provider to find out which DNS servers your network should be using or you can use OpenDNS
Note: After resetting your router, it is important to set a non-default password, and if possible, username, on the router. This will assist in eliminating the possibility of the router being hijacked again.

flush the DNS:

Now lets flush the DNS on the computer:

  • click on Start
  • select run
  • enter cmd and hit enter
  • a black window will open.
  • please enter the following text into that window and hit enter:


    ipconfig /flushdns

Now lets check the router again

Create and Run Batch File
Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:
@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

It should look like this: Posted Image <--XP
Double-click on router.bat to run it. it will open notepad when done please post back the results

gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 15 May 2011 - 02:26 AM

Hello

48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 dbj15

dbj15
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 16 May 2011 - 09:08 AM

As I said in the last reply,Other than reseting the router which changed nothing ,I am not able to do anything further as there is no longer a desktop or taskbar.Please see where I said " The restore point was damaged or was deleted during the restore.Further Reboots resulted in the same resulting no taskbar and no desktop backround graphic" I am at a stand still other than a command prompt.Thank you.

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 16 May 2011 - 09:24 AM

Try this please. You will need a USB drive.

Download http://unetbootin.sourceforge.net/unetbootin-xpud-windows-latest.exe & http://noahdfear.net/downloads/bootable/xPUD/xpud-0.9.2.iso to the desktop of your clean computer
  • Insert your USB drive
  • Press Start > My Computer > right click your USB drive > choose Format > Quick format
  • Double click the unetbootin-xpud-windows-387.exe that you just downloaded
  • Press Run then OK
  • Select the DiskImage option then click the browse button located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file you downloaded
  • Verify the correct drive letter is selected for your USB device then click OK
  • It will install a little bootable OS on your USB device
  • Once the files have been written to the device you will be prompted to reboot ~ do not reboot and instead just Exit the UNetbootin interface
  • After it has completed do not choose to reboot the clean computer simply close the installer
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer
  • Boot the Sick computer
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt

    Please note - all text entries are case sensitive
Copy and paste the report.txt for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 dbj15

dbj15
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 17 May 2011 - 12:55 AM

Thanks Gringo.That's quite a useful tool that iso.The following is the report.txt contents.Thanks for your time spent on my seemingly dead horse computer. ***************************************************
Mon May 16 19:42:56 UTC 2011
Driver report for /mnt/sda2/Windows/System32/drivers

fbce2f43185104ae8bf4d32571b19203 1394bus.sys
Microsoft Corporation

6d2aca41739bfe8cb86ee8e85f29697d 1394ohci.sys
Microsoft Corporation

98d81ca942d19f7d9153b095162ac013 acpipmi.sys
Microsoft Corporation

f0e07d144c8685b8774bc32fc8da4df0 acpi.sys
Microsoft Corporation

21e785ebd7dc90a06391141aac7892fb adp94xx.sys
Adaptec

0c676bc278d5b59ff5abd57bbe9123f2 adpahci.sys
Adaptec

7c7b5ee4b7b822ec85321fe23a27db33 adpu320.sys
Adaptec

ddc040fdb01ef1712a6b13e52afb104c afd.sys
Microsoft Corporation

57ec4aef73660166074d8f7f31c0d4fd agilevpn.sys
Microsoft Corporation

507812c3054c21cef746b6ee3d04dd6e AGP440.sys
Microsoft Corporation

0d40bcf52ea90fc7df2aeab6503dea44 aliide.sys
Acer Laboratories

3c6600a0696e90a463771c7422e23ab5 AMDAGP.SYS
Microsoft Corporation

cd5914170297126b6266860198d1d4f0 amdide.sys
Microsoft Corporation

00dda200d71bac534bf56a9db5dfd666 amdk8.sys
Microsoft Corporation

3cbf30f5370fda40dd3e87df38ea53b6 amdppm.sys
Microsoft Corporation

2101a86c25c154f8314b24ef49d7fbc2 amdsata.sys
Advanced Micro Devices

ea43af0c423ff267355f74e7a53bdaba amdsbs.sys
AMD Technologies

b81c2b5616f6420a9941ea093a92b150 amdxata.sys
Advanced Micro Devices

feb834c02ce1e84b6a38f953ca067706 appid.sys
Microsoft Corporation

5d6f36c46fd283ae1b57bd2e9feb0bc7 arcsas.sys
Adaptec

2932004f49677bd84dbc72edb754ffb3 arc.sys
Adaptec

add2ade1c2b285ab8378d2daaf991481 asyncmac.sys
Microsoft Corporation

338c86357871c167a96ab976519bf59e atapi.sys
Microsoft Corporation

bca15585efdde7eba8568bdfb75983a3 ataport.sys
Microsoft Corporation

47b879406246ffdced59e18d331a0e7d avgntflt.sys
Avira Gmb

5fedef54757b34fb611b9ec8fb399364 avipbb.sys
Avira Gmb

bd8869eb9cde6bbe4508d869929869ee b57nd60x.sys
Broadcom Corporation

2b8ee031fd700ab942ebe60665440e83 battc.sys
Microsoft Corporation

195f3a7a28a63aa819a551e8b09ec3b6 BdaSup.sys
Microsoft Corporation

505506526a9d467307b3c393dedaf858 beep.sys
Microsoft Corporation

2287078ed48fcfc477b05b20cf38f36f blbdrive.sys
Microsoft Corporation

fcafaef6798d7b51ff029f99a9898961 bowser.sys
Microsoft Corporation

9f9acc7f7ccde8a15c282d3f88b43309 BrFiltLo.sys
Brother Industries

56801ad62213a41f6497f96dee83755a BrFiltUp.sys
Brother Industries

77361d72a04f18809d0efb6cceb74d4b bridge.sys
Microsoft Corporation

845b8ce732e67f3b4133164868c666ea BrSerId.sys
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries

203f0b1e73adadbbb7b7b1fabd901f6b BrSerWdm.sys
Brother Industries

bd456606156ba17e60a04e18016ae54b BrUsbMdm.sys
Brother Industries

af72ed54503f717a43268b3cc5faec2e BrUsbSer.sys
Brother Industries

ed3df7c56ce0084eb2034432fc56565a bthmodem.sys
Microsoft Corporation

1a231abec60fd316ec54c66715543cec bxvbdx.sys
Broadcom Corporation

77ea11b065e0a8ab902d78145ca51e10 cdfs.sys
Microsoft Corporation

ba6e70aa0e6091bc39de29477d866a77 cdrom.sys
Microsoft Corporation

3fe3fe94a34df6fb06e6418d0f6a0060 circlass.sys
Microsoft Corporation

a6388a5abf92c7927c085db0a958125f Classpnp.sys
Microsoft Corporation

dea805815e587dad1dd2c502220b5616 CmBatt.sys
Microsoft Corporation

c537b1db64d495b9b4717b4d6d9edbf2 cmdide.sys
CMD Technology

1b675691ed940766149c93e8f4488d68 cng.sys
Microsoft Corporation

a6023d3823c37043986713f118a89bee compbatt.sys
Microsoft Corporation

f1724ba27e97d627f808fb0ba77a28a6 CompositeBus.sys
Microsoft Corporation

b7efef22ff426ec4158a177cb3b558d3 crashdmp.sys
Microsoft Corporation

2c4ebcfc84a9b44f209dff6c6e6c61d1 crcdisk.sys
Microsoft Corporation

27c9490bdd0ae48911ab8cf1932591ed csc.sys
Microsoft Corporation

8e09e52ee2e3ceb199ef3dd99cf9e3fb dfsc.sys
Microsoft Corporation

1a050b0274bfb3890703d490f330c0da discache.sys
Microsoft Corporation

9e9c3566083e3a152d4d5c5311a852ab Diskdump.sys
Microsoft Corporation

565003f326f99802e68ca78f2a68e9ff disk.sys
Microsoft Corporation

8b30250d573a8f6b4bd23195160d8707 djsvs.sys
Adaptec

b918e7c5f9bf77202f89e1a9539f2eb4 drmkaud.sys
Microsoft Corporation

27f9288af019e6daca281ede51ff5928 drmk.sys
Microsoft Corporation

5428227d4730ebdfc842e9fb593f8c8a Dumpata.sys
Microsoft Corporation

62a63ef2f3053b461cb327e4d69aaa74 dumpfve.sys
Microsoft Corporation

5fcd3320aae71506b43f9e12e4e72172 dxapi.sys
Microsoft Corporation

39806cfeddcc55e686a49bccd2972f23 dxgkrnl.sys
Microsoft Corporation

f9ba894f72f78a5b74eecd97394f97e0 dxgmms1.sys
Microsoft Corporation

1b6242b20cb56f85a158e67f09ee84fe dxg.sys
Microsoft Corporation

0ed67910c8c326796faa00b2bf6d9d3c elxstor.sys
Emulex

8fc3208352dd3912c94367a206ab3f11 errdev.sys
Microsoft Corporation

024e1b5cac09731e4d868e64dbfb4ab0 evbdx.sys
Broadcom Corporation

2dc9108d74081149cc8b651d3a26207f exfat.sys
Microsoft Corporation

7e0ab74553476622fb6ae36f73d97d35 fastfat.sys
Microsoft Corporation

e817a017f82df2a1f8cfdbda29388b29 fdc.sys
Microsoft Corporation

6cf00369c97f3cf563be99be983d13d8 fileinfo.sys
Microsoft Corporation

42c51dc94c91da21cb9196eb64c45db9 filetrace.sys
Microsoft Corporation

87907aa70cb3c56600f1c2fb8841579b flpydisk.sys
Microsoft Corporation

7520ec808e0c35e0ee6f841294316653 fltMgr.sys
Microsoft Corporation

1a16b57943853e598cff37fe2b8cbf1d fsdepends.sys
Microsoft Corporation

a574b4360e438977038aae4bf60d79a2 fs_rec.sys
Microsoft Corporation

5592f5dba26282d24d2b080eb438a4d7 fvevol.sys
Microsoft Corporation

5a50439aac7bb7763237a88f0f3a337f FWPKCLNT.SYS
Microsoft Corporation

65ee0c7a58b65e74ae05637418153938 GAGP30KX.SYS
Microsoft Corporation

0e44dbf63bb0169d57446aec21881ff2 HCW85BDA.sys
Hauppauge Computer Works

c44e3c2bab6837db337ddee7544736db hcw85cir.sys
Hauppauge Computer Works

717a2207fd6f13ad3e664c7d5a43c7bf hdaudbus.sys
Microsoft Corporation

3530cad25deba7dc7de8bb51632cbc5f HdAudio.sys
Microsoft Corporation

1d58a7f3e11a9731d0eaaaa8405acc36 hidbatt.sys
Microsoft Corporation

89448f40e6df260c206a193a4683ba78 hidbth.sys
Microsoft Corporation

b682e1cc0fdc7ac04b71d1fa9a07ef21 hidclass.sys
Microsoft Corporation

cf50b4cf4a4f229b9f3c08351f99ca5e hidir.sys
Microsoft Corporation

6c26122f1931d4d7810240f32ddce890 hidparse.sys
Microsoft Corporation

25072fb35ac90b25f9e4e3bacf774102 hidusb.sys
Microsoft Corporation

295fdc419039090eb8b49ffdbb374549 HpSAMD.sys
Hewlett-Packard

c531c7fd9e8b62021112787c4e2c5a5a http.sys
Microsoft Corporation

8305f33cde89ad6c7a0763ed0b5a8d42 hwpolicy.sys
Microsoft Corporation

f151f0bdc47f4a28b1b20a0818ea36d6 i8042prt.sys
Microsoft Corporation

934af4d7c5f457b9f0743f4299b77b67 iaStorV.sys
Intel Corporation

4173ff5708f3236cf25195fecd742915 iirsp.sys
Intel Corp

a0f12f2c9ba6c72f3987ce780e77c130 intelide.sys
Microsoft Corporation

3b514d27bfc4accb4037bc6685f766e0 intelppm.sys
Microsoft Corporation

709d1761d3b19a932ff0238ea6d50200 ipfltdrv.sys
Microsoft Corporation

e4454b6c37d7ffd5649611f6496308a7 IPMIDrv.sys
Microsoft Corporation

a5fa468d67abcdaa36264e463a7bb0cd ipnat.sys
Microsoft Corporation

9f7e491fb0ba0f9e370163834fc1fe31 irda.sys
Microsoft Corporation

42996cff20a3084a56017b7902307e9f irenum.sys
Microsoft Corporation

1f32bb6b38f62f7df1a7ab7292638a35 isapnp.sys
Microsoft Corporation

adef52ca1aeae82b50df86b56413107e kbdclass.sys
Microsoft Corporation

3d9f0ebf350edcfd6498057301455964 kbdhid.sys
Microsoft Corporation

e36a061ec11b373826905b21be10948f ksecdd.sys
Microsoft Corporation

26c046977e85b95036453d7b88ba1820 ksecpkg.sys
Microsoft Corporation

f762edd3acca095f5af4d719f3b8ae3d ks.sys
Microsoft Corporation

f7611ec07349979da9b0ae1f18ccc7a6 lltdio.sys
Microsoft Corporation

eb119a53ccf2acc000ac71b065b78fef lsi_fc.sys
LSI Corporation

dc9dc3d3daa0e276fd2ec262e38b11e9 lsi_sas2.sys
LSI Corporation

8ade1c877256a22e49b75d1cc9161f9c lsi_sas.sys
LSI Corporation

0a036c7d7cab643a7f07135ac47e0524 lsi_scsi.sys
LSI Corporation

6703e366cc18d3b6e534f5cf7df39cee luafv.sys
Microsoft Corporation

d68e165c3123aba3b1282eddb4213bd8 mbamswissarmy.sys
Malwarebytes Corporation

836e0e09ca9869be7eb39ef2cf3602c7 mbam.sys
Malwarebytes Corporation

ef08d2ebe3eabba43cc57eee001027b6 mcd.sys
Microsoft Corporation

0fff5b045293002ab38eb1fd1fc2fb74 megasas.sys
LSI Corporation

dcbab2920c75f390caf1d29f675d03d6 MegaSR.sys
LSI Corporation

f001861e5700ee84e2d4e52c712f4964 modem.sys
Microsoft Corporation

79d10964de86b292320e9dfe02282a23 monitor.sys
Microsoft Corporation

fb18cc1d4c2e716b6b903b0ac0cc0609 mouclass.sys
Microsoft Corporation

2c388d2cd01c9042596cf3c8f3c7b24d mouhid.sys
Microsoft Corporation

921c18727c5920d6c0300736646931c2 mountmgr.sys
Microsoft Corporation

2af5997438c55fb79d33d015c30e1974 mpio.sys
Microsoft Corporation

ad2723a7b53dd1aacae6ad8c0bfbf4d0 mpsdrv.sys
Microsoft Corporation

b1be47008d20e43da3adc37c24cdb89d mrxdav.sys
Microsoft Corporation

deffa295bd1895c6ed8e3078412ac60b mrxsmb10.sys
Microsoft Corporation

24d76abe5dcad22f19d105f76fdf0ce1 mrxsmb20.sys
Microsoft Corporation

f4a054be78af7f410129c4b64b07dc9b mrxsmb.sys
Microsoft Corporation

4326d168944123f38dd3b2d9c37a0b12 msahci.sys
Microsoft Corporation

455029c7174a2dbb03dba8a0d8bddd9a msdsm.sys
Microsoft Corporation

daefb28e3af5a76abcc2c3078c07327f msfs.sys
Microsoft Corporation

3e1e5767043c5af9367f0056295e9f84 mshidkmdf.sys
Microsoft Corporation

0a4e5757ae09fa9622e3158cc1aef114 msisadrv.sys
Microsoft Corporation

ed46c223ae46c6866ab77cdc41c404b7 msiscsi.sys
Microsoft Corporation

8c0860d6366aaffb6c5bb9df9448e631 mskssrv.sys
Microsoft Corporation

3ea8b949f963562cedbb549eac0c11ce mspclock.sys
Microsoft Corporation

f456e973590d663b1073e9c463b40932 mspqm.sys
Microsoft Corporation

0e008fc4819d238c51d7c93e7b41e560 msrpc.sys
Microsoft Corporation

fc6b9ff600cc585ea38b12589bd4e246 mssmbios.sys
Microsoft Corporation

b42c6b921f61a6e55159b8be6cd54a36 mstee.sys
Microsoft Corporation

33599130f44e1f34631cea241de8ac84 MTConfig.sys
Microsoft Corporation

159fad02f64e6381758c990f753bcc80 mup.sys
Microsoft Corporation

0e1787aa6c9191d3d319e8bafe86f80c ndiscap.sys
Microsoft Corporation

23759d175a0a9baaf04d05047bc135a8 ndis.sys
Microsoft Corporation

e4a8aec125a2e43a9e32afeea7c9c888 ndistapi.sys
Microsoft Corporation

b30ae7f2b6d7e343b0df32e6c08fce75 ndisuio.sys
Microsoft Corporation

267c415eadcbe53c9ca873dee39cf3a4 ndiswan.sys
Microsoft Corporation

af7e7c63dcef3f8772726f86039d6eb4 ndproxy.sys
Microsoft Corporation

80b275b1ce3b0e79909db7b39af74d51 netbios.sys
Microsoft Corporation

dd52a733bf4ca5af84562a5e2f963b91 netbt.sys
Microsoft Corporation

e87fe6daf5a1b0845a0e376f4269f75b netio.sys
Microsoft Corporation

76b1157ef850830c5ece61d3e591ca8b netr73.sys
Ralink Technology

1d85c4b390b0ee09c7a46b91efb2c097 nfrd960.sys
IBM Corp

1db262a9f8c087e8153d89bef3d2235f npfs.sys
Microsoft Corporation

6623e51595c0076755c29c00846c4eb2 npf.sys
tHbVS_VERSION_INFO?aStringFileInfobDCompanyNameCACETechnologiesl"FileDescriptionnpf.sys(NT/x)KernelDrivervFileVersion...nInternalNameNPF+TME`LegalCopyrightCopyright-CACETechnologies.Copyright-NetGroup,PolitecnicodiTorino.(LegalTrademarksbOriginalFilenamenpf.sysbProductNameWinPcap:vProductVersion...,BuildDescriptionDVarFileInfo$Translation*

e9a0a4d07e53d8fea2bb8387a3293c58 nsiproxy.sys
Microsoft Corporation

3795dcd21f740ee799fb7223234215af ntfs.sys
Microsoft Corporation

f9756a98d69098dca8945d62858a812c null.sys
Microsoft Corporation

5a0983915f02bae73267cc2a041f717d NV_AGP.SYS
Microsoft Corporation

b0881dda5a8160422561ffab7f0008b1 nvlddmkm.sys
NVIDIA Corporation

3f3d04b1d08d43c16ea7963954ec768d nvraid.sys
NVIDIA Corporation

c99f251a5de63c6f129cf71933aced0f nvstor.sys
NVIDIA Corporation

26384429fcd85d83746f63e798ab1480 nwifi.sys
Microsoft Corporation

08a70a1f2cdde9bb49b885cb817a66eb ohci1394.sys
Microsoft Corporation

6270ccae2a86de6d146529fe55b3246a pacer.sys
Microsoft Corporation

2ea877ed5dd9713c5ac74e8ea7348d14 parport.sys
Microsoft Corporation

ff4218952b51de44fe910953a3e686b9 partmgr.sys
Microsoft Corporation

eb0a59f29c19b86479d36b35983daadc parvdm.sys
Microsoft Corporation

afe86f419014db4e5593f69ffe26ce0a pciide.sys
Microsoft Corporation

ede040d666ff81bf1978d0f19f799e7a pciidex.sys
Microsoft Corporation

c858cb77c577780ecc456a892e7e7d0f pci.sys
Microsoft Corporation

f396431b31693e71e8a80687ef523506 pcmcia.sys
Microsoft Corporation

250f6b43d2b613172035c6747aeeb19f pcw.sys
Microsoft Corporation

9e0104ba49f4e6973749a02bf41344ed PEAuth.sys
Microsoft Corporation

d72708c9f49500c13d7d067e169b7715 portcls.sys
Microsoft Corporation

85b1e3a0c7585bc4aae6899ec6fcf011 processr.sys
Microsoft Corporation

ab95ecf1f6659a60ddc166d8315b0751 ql2300.sys
QLogic Corporation

b4dd51dd25182244b86737dc51af2270 ql40xx.sys
QLogic Corporation

584078ca1b95ca72df2a27c336f9719d qwavedrv.sys
Microsoft Corporation

30a81b53c766d0133bb86d234e5556ab rasacd.sys
Microsoft Corporation

d9f91eafec2815365cbe6d167e4e332a rasl2tp.sys
Microsoft Corporation

0fe8b15916307a6ac12bfb6a63e45507 raspppoe.sys
Microsoft Corporation

631e3e205ad6d86f2aed6a4a8e69f2db raspptp.sys
Microsoft Corporation

44101f495a83ea6401d886e7fd70096b rassstp.sys
Microsoft Corporation

835d7e81bf517a3b72384bdcc85e1ce6 rdbss.sys
Microsoft Corporation

0d8f05481cb76e70e1da06ee9f0da9df rdpbus.sys
Microsoft Corporation

1e016846895b15a99f9a176a05029075 RDPCDD.sys
Microsoft Corporation

c5ff95883ffef704d50c40d21cfb3ab5 rdpdr.sys
Microsoft Corporation

5a53ca1598dd4156d44196d200c94b8a RDPENCDD.sys
Microsoft Corporation

44b0a53cd4f27d50ed461dae0c0b4e1f RDPREFMP.sys
Microsoft Corporation

801371ba9782282892d00aadb08ee367 rdpwd.sys
Microsoft Corporation

4ea225bf1cf05e158853f30a99ca29a7 rdyboost.sys
Microsoft Corporation

b4090006a82eeb608c358ab5d37de85a rmcast.sys
Microsoft Corporation

7400cfab5cf36f2294e80b3f3bda3ebc RNDISMP.sys
Microsoft Corporation

564297827d213f52c7a3a2ff749568ca rootmdm.sys
Microsoft Corporation

032b0d36ad92b582d869879f5af5b928 rspndr.sys
Microsoft Corporation

7dfd48e24479b68b258d8770121155a0 Rt86win7.sys
Realtek Corporation

e6c83c48d3ff1d24c834a8d34d284215 rtl8192su.sys
Realtek Semiconductor

34ee0c44b724e3e4ce2eff29126de5b5 sbp2port.sys
Microsoft Corporation

a95c54b2ac3cc9c73fcdf9e51a1d6b51 scfilter.sys
Microsoft Corporation

f9882099e58ecf8b0e1c7afa5d2cc56d scsiport.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys
Macrovision Corporation

9ad8b8b515e3df6acd4212ef465de2d1 serenum.sys
Microsoft Corporation

5fb7fcea0490d821f26f39cc5ea3d1e2 serial.sys
Microsoft Corporation

79bffb520327ff916a582dfea17aa813 sermouse.sys
Microsoft Corporation

edb05bd63148796f23ea78506404a538 serscan.sys
Microsoft Corporation

9f976e1eb233df46fce808d9dea3eb9c sffdisk.sys
Microsoft Corporation

932a68ee27833cfd57c1639d375f2731 sffp_mmc.sys
Microsoft Corporation

4f1e5b0fe7c8050668dbfade8999aefb sffp_sd.sys
Microsoft Corporation

db96666cc8312ebc45032f30b007a547 sfloppy.sys
Microsoft Corporation

2565cac0dc9fe0371bdce60832582b2e SISAGP.SYS
Microsoft Corporation

a9f0486851becb6dda1d89d381e71055 sisraid2.sys
Silicon Integrated Systems

3727097b55738e2f554972c3be5bc1aa sisraid4.sys
Silicon Integrated Systems

3e21c083b8a01cb70ba1f09303010fce smb.sys
Microsoft Corporation

2e467e6ca8e0a140c08011844c0d3936 smclib.sys
Microsoft Corporation

95cf1ae7527fb70f7816563cbc09d942 spldr.sys
Microsoft Corporation

d16d818e9930a6e5b4f6476dd0998d1a spsys.sys
Microsoft Corporation

dce7e10feaabd4cae95948b3de5340bb srv2.sys
Microsoft Corporation

b5665baa2120b8a54e22e9cd07c05106 srvnet.sys
Microsoft Corporation

2ba4ebc7dfba845a1edbe1f75913be33 srv.sys
Microsoft Corporation

a36ee93698802cd899f98bfd553d8185 ssmdrv.sys
Avira Gmb

db32d325c192b801df274bfd12a7e72b stexstor.sys
Promise Technology

55dca8693ed545fd7f2f93776e294ae2 storport.sys
Microsoft Corporation

d5751969dc3e4b88bf482ac8ec9fe019 storvsc.sys
Microsoft Corporation

45b44fc9e5ac0db02b19d515ee809de5 stream.sys
Microsoft Corporation

e58c78a848add9610a4db6d214af5224 swenum.sys
Microsoft Corporation

949c35bf4ae6c110a924ab5e2175dda7 tape.sys
Microsoft Corporation

e64444523add154f86567c469bc0b17f tcpipreg.sys
Microsoft Corporation

2cc3d75488abd3ec628bbb9a4fc84efc tcpip.sys
Microsoft Corporation

52639c994fe3cd975bfe7428b939b320 tdi.sys
Microsoft Corporation

1875c1490d99e70e449e3afae9fcbadf tdpipe.sys
Microsoft Corporation

7551e91ea999ee9a8e9c331d5a9c31f3 tdtcp.sys
Microsoft Corporation

cb39e896a2a83702d1737bfd402b3542 tdx.sys
Microsoft Corporation

c36f41ee20e6999dbf4b0425963268a5 termdd.sys
Microsoft Corporation

98ae6fa07d12cb4ec5cf4a9bfa5f4242 tssecsrv.sys
Microsoft Corporation

3e461d890a97f9d4c168f5fda36e1d00 tunnel.sys
Microsoft Corporation

750fbcb269f4d7dd2e420c56b795db6d UAGP35.SYS
Microsoft Corporation

09cc3e16f8e5ee7168e01cf8fcbe061a udfs.sys
Microsoft Corporation

44e8048ace47befbfdc2e9be4cbc8880 ULIAGPKX.SYS
Microsoft Corporation

049b3a50b3d646baeeee9eec9b0668dc umbus.sys
Microsoft Corporation

7550ad0c6998ba1cb4843e920ee0feac umpass.sys
Microsoft Corporation

b71da871254d96d0349639d03e4c1cc1 usb8023.sys
Microsoft Corporation

2190f65ec7e9ae7a301e01e4261acef8 USBCAMD2.sys
Microsoft Corporation

47d88f155eb4e4be60ebd76ac8d17db7 USBCAMD.sys
Microsoft Corporation

8455c4ed038efd09e99327f9d2d48ffa usbccgp.sys
Microsoft Corporation

04ec7cec62ec3b6d9354eee93327fc82 usbcir.sys
Microsoft Corporation

18e71ea0e063037a5c3c8272a5262b7c usbd.sys
Microsoft Corporation

1c333bfd60f2fed2c7ad5daf533cb742 usbehci.sys
Microsoft Corporation

ee6ef93ccfa94fae8c6ab298273d8ae2 usbhub.sys
Microsoft Corporation

a6fb7957ea7afb1165991e54ce934b74 usbohci.sys
Microsoft Corporation

f6d1c957c5bf4f274aad1da7059916e4 usbport.sys
Microsoft Corporation

797d862fe0875e75c7cc4c1ad7b30252 usbprint.sys
Microsoft Corporation

fb9f340ecacdaeb939372cc543e72c6d usbrpm.sys
Microsoft Corporation

d8889d56e0d27e57ed4591837fe71d27 USBSTOR.SYS
Microsoft Corporation

78780c3ebce17405b1ccd07a3a8a7d72 usbuhci.sys
Microsoft Corporation

a059c4c3edb09e07d21a8e5c0aabd3cb vdrvroot.sys
Microsoft Corporation

17c408214ea61696cec9c66e388b14f3 vgapnp.sys
Microsoft Corporation

8e38096ad5c8570a6f1570a61e251561 vga.sys
Microsoft Corporation

3be6e1f3a4f1afec8cee0d7883f93583 vhdmp.sys
Microsoft Corporation

c829317a37b4bea8f39735d4b076e923 VIAAGP.SYS
Microsoft Corporation

e02f079a6aa107f06b16549c6e5c7b74 viac7.sys
Microsoft Corporation

e43574f6a56a0ee11809b48c09e4fd3c viaide.sys
VIA Technologies

15c126d1b55814b9e5cab10a9c1f4c67 videoprt.sys
Microsoft Corporation

ec2bbab4b84d0738c6c83d2234dc36fe VMBusHID.sys
Microsoft Corporation

379b349f65f453d2a6e75ea6b7448e49 vmbus.sys
Microsoft Corporation

5423d8437051e89dd34749f242c98648 vms3cap.sys
Microsoft Corporation

957e346ca948668f2496a6ccf6ff82cc vmstorfl.sys
Microsoft Corporation

384e5a2aa49934295171e499f86ba6f3 volmgr.sys
Microsoft Corporation

b5bb72067ddddbbfb04b2f89ff8c3c87 volmgrx.sys
Microsoft Corporation

58df9d2481a56edde167e51b334d44fd volsnap.sys
Microsoft Corporation

9dfa0cc2f8855a04816729651175b631 vsmraid.sys
VIA Technologies

682fcf7d2eb5158cd30408e976562408 VSTBS23.SYS
Conexant

bc0c7ea89194c299f051c24119000e17 VSTCNXT3.SYS
Conexant

ceb4e3b6890e1e42dca6694d9e59e1a0 VSTDPV3.SYS
Conexant

90567b1e658001e79d7c8bbd3dde5aa6 vwifibus.sys
Microsoft Corporation

7090d3436eeb4e7da3373090a23448f7 vwififlt.sys
Microsoft Corporation

a3f04cbea6c2a10e6cb01f8b47611882 vwifimp.sys
Microsoft Corporation

de3721e89c653aa281428c8a69745d90 wacompen.sys
Microsoft Corporation

692a712062146e96d28ba0b7d75de31b wanarp.sys
Microsoft Corporation

cb45a417c8ef7ba6bac67edcdded8700 watchdog.sys
Microsoft Corporation

9950e3d0f08141c7e89e64456ae7dc73 Wdf01000.sys
Microsoft Corporation

fe7a7675c26fe936226641ef32ae9bb5 WdfLdr.sys
Microsoft Corporation

1112a9badacb47b7c0bb0392e3158dff wd.sys
Microsoft Corporation

8b9a943f3b53861f2bfaf6c186168f79 wfplwf.sys
Microsoft Corporation

5cf95b35e59e2a38023836fff31be64c wimmount.sys
Microsoft Corporation

d41f4ea6727415013405c7ffdd250dd8 winhv.sys
Microsoft Corporation

0217679b8fca58714c3bf2726d2ca84e wmiacpi.sys
Microsoft Corporation

9a5b1059fe015db5269fbb25acbf841d wmilib.sys
Microsoft Corporation

6db3276587b853bf886b69528fdb048c ws2ifsl.sys
Microsoft Corporation

6f9b6c0c93232cff47d0f72d6db1d21e WUDFPf.sys
Microsoft Corporation

f91ff1e51fca30b3c3981db7d5924252 WUDFRd.sys
Microsoft Corporation

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 17 May 2011 - 07:47 AM

  • Boot the computer with the USB drive again.
  • Click on File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see driver.sh.
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh -f
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:

    explorer.exe

  • Press Enter
  • If succesful, the script will search this file.
  • After it has finished a report will be located in the USB drive as filefind.txt

Please note - all text entries are case sensitive

Copy and paste the filefind.txt for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 dbj15

dbj15
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 18 May 2011 - 05:24 PM

I have the contents of the filefind.txt but before I show it,I want to relate what happened when I tried to boot the sick computer with the USB Linux tool. As the computer started to boot from the USB drive, it stopped with an error that the uncompress failed and the system was halted.I tried again with the same result.I put the USB stick in the clean computer,got the same result and the following popped up "USB BootProblem Found Virus:Win32/Expiro.AE file:G:\SETUP.EXE
filelocalcopy:\\?\C:\ProgramData\Microsoft\Microsoft Antimalware\LocalCopy\{EDA808BA-74CB-4582-8EE9-208D135DE56C}-SETUP.EXE
G: was the USB stick. I allowed the deletion,reformatted the stick,and recreated the Linux tool as per your instructions. I then
was able to boot the sick system and acquire the following filefind.txt *****************************************************************************************************************************

Search results for explorer.exe

abc6379205de2618851c4fcbf72112eb /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX0/h/explorer.exe
1.5K Aug 16 2005

42b3c416ffad7189801aa02d7f5174ea /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX0/procs/explorer.exe
357.5K May 7 21:48

abc6379205de2618851c4fcbf72112eb /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX1/h/explorer.exe
1.5K Aug 16 2005

7d4aa4565818b7d1ab015fad1a851381 /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX1/procs/explorer.exe
357.5K May 7 21:48

abc6379205de2618851c4fcbf72112eb /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX2/h/explorer.exe
1.5K Aug 16 2005

9087d38a7eda3262a1973b1cb80116d1 /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX2/procs/explorer.exe
357.5K May 7 21:49

abc6379205de2618851c4fcbf72112eb /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX3/h/explorer.exe
1.5K Aug 16 2005

89a54d605385f674903eaaa60fe428cc /mnt/sda2/Users/David/AppData/Local/Temp/RarSFX3/procs/explorer.exe
357.5K May 7 21:49

0862495e0c825893db75ef44faea8e93 /mnt/sda2/Windows/explorer.exe
2.7M Feb 26 06:23

2ea92dad82f4c674195b66a4143b8997 /mnt/sda2/Windows/winsxs/x86_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16385_none_518afd35db100430/explorer.exe
2.6M May 10 00:18

Thank you again for your assistance.

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 20 May 2011 - 09:24 AM

hello

that looks ok

Reboots resulted in the same resulting no taskbar and no desktop backround graphic"

can you press Ctrl,Alt and delete at the same time to bring up the task manager?

If you can I want you to go to file and select new task and when the run box appairs type in explorer.exe and see if things come back


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 dbj15

dbj15
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 22 May 2011 - 04:14 AM

Hello again. Yes,I was able to bring up the Task Manager.I did so in safe mode.When I try to run explorer.exe, I get the following result. "The version of this file is either corrupted or not compatible with the version of windows you are running.Check your computer's system information to see whether you need an x86(32bit) or x64 (64bit) version of the program and then contact the software publisher" While still in the DOS box, I typed cmd again and typed scf.exe/scannow When finished the result stated "Windows Resource Protection found corrupt files but was unable to fix some of them.Details are in CBS.Log If you are at all interested in the log file,I could probably copy it off at the command prompt onto a USB stick to past it in a reply to you. I await your next thoughts.Thank You.

Edited by dbj15, 22 May 2011 - 04:17 AM.


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 23 May 2011 - 01:58 AM

sent you a pm
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:12 AM

Posted 25 May 2011 - 04:40 PM

  • Boot the computer with the USB drive again.
  • Click on File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see driver.sh.
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh -f
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:

    explorer.exe

  • Press Enter
  • If succesful, the script will search this file.
  • After it has finished a report will be located in the USB drive as filefind.txt

Please note - all text entries are case sensitive

Copy and paste the filefind.txt for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 dbj15

dbj15
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:12 AM

Posted 27 May 2011 - 01:41 AM

Hello Gringo. It is 5-26-11@11:36PM my local time.Now I want to tell you what has occured since my last reply to you.I used your linux tool to copy the explore.exe file you provided to the windows directory after deleting the corrupted original explorer.exe.Having done so and then rebooted,the desktop and the taskbar returned!Now here is what seems to be the present Windows condition. This pops Up in notepad at the end of the bootup ontop of the desktop.
[.ShellClassInfo]LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-21787
***********************************************************************************************************************
I still have the redirect problem and I have tried many of the installed apps and all but Wordpad seem to run OK.My wife had a number of her files in the (Wordpad)RTF type.When she clicked to run the shortcut to wordpad to create one, it said that the shortcut to wordpad refered to a program no longer available at that location.Of course when she tried to open her files,the responce is "The file is not a valid win32 application" When I tried to remake the shortcut for her and entered "%ProgramFiles%\Windows NT\Accessories\wordpad.exe" I get a responce of "The file %ProgramFiles%\Windows NT\Accessories\wordpad.exe cannot be found" Again,thank you for your ongoing assistance with this computer.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users