Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Boot Process Freeze with XP PRO


  • This topic is locked This topic is locked
16 replies to this topic

#1 williamL

williamL

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 13 July 2011 - 12:34 PM

Hello,
my first post, excuse me if I haven't conformed with the rules.

Please help, any advice on a problem I have encountered would be appreciated.

A friend asked me to remove some malware that she had ‘acquired’, namely “XP Antivirus 2011”.
It is diverting all attempts to access the web to paying or other doubtful sites.
I researched this piece of malware and found on the Bleeping Computer advice on what to do.
This “uninstall guide” was entitled “Automated Removal Instructions for XP Anti-virus 2011, Vista XXX etc … using Malwarebytes’ Anti-Malware:”.

I duly downloaded “FixNCR.reg” onto a flash drive on my own PC and uploaded it onto the infected machine. I did have some trouble doing this as .reg files were automatically opened inside Notepad, and thus did not work. So I used File Folder to update the attributes of .reg files, such that I could ‘merge’ it into the registry. I also killed a three character-named process that was running and this seemed to free things up - I appeared to be making progress, and was able to actually get into the BleepingComputer website (previously impossible), intending to download RKILL as advised in your tutorial. This turned out to be difficult (as I could not find it), and the PC appeared to be overheating (hot here in France at the moment) so I came out. Letting the system cool down and restarting normally, it boots up by saying files and folders need to be checked, does this and then just sits there with a blue screen, details of the records in various files that it has checked on the C disk, seemingly finished but it goes no further.
Starting in SAFE mode it goes through various loading of modules the last ones being drivers, e.g.
Multi(0)disk(0)rdisk(0)partition(2)\WINDOWS\System32\Drivers\Mup.sys
The preceeding drivers in backward sequence were NDIS, KsecDD, Fastfat all with sys suffixes.
Staring with “last known good configuration” only leads into the checking of the disk files and then the complete stop. Using CTL/ALT/DEL has no effect.
I presume I have messed up the registry either by killing a process I should not have, or FixNCR has not worked correctly via the merge.
Of course I don’t look very clever, nor feel it, what now to do?
Details : ASUS F5Rseries laptop with WINXP PRO, 1024MB memory, 15” screen, duo T2130 chip, 802.11b/g wireless, graphic ATI Radeon Xpress 1100, 120GB spread over 2 disks. XP is at an unnknown level probably not up-to-date. There is of course no boot CD. The machine has many pending wWINDOWS updates, a host of useless software, all due to the fact the owner died and the widow has used it for months without great knowledge.
Many thanks, tomorrow is an important holiday, Juillet quatorze, and nobody will be working Friday so not much hope of getting professional help in the near future and anyway I have a reputation to preserve (lol).
WilliamL

Edited by hamluis, 13 July 2011 - 12:41 PM.
Moved from XP to Am I Infected.


BC AdBot (Login to Remove)

 


#2 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,761 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:11:26 AM

Posted 14 July 2011 - 08:58 AM

Hi, :welcome:

Lets give it a try.

We will need to view the system status from an external environment. You will need a USB drive and a CD to burn. There will be several steps to follow.

Download GETxPUD.exe to the desktop of your clean computer
  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Next download driver.sh to your USB drive
  • Also Download Query.exe to the USB drive. In your working computer, navigate to the USB drive and click on the Query.exe. A folder and a file, query.sh, will be extracted.
  • Remove the USB & CD and insert them in the sick computer
  • Boot the Sick computer with the CD you just burned
  • The computer must be set to boot from the CD
  • In some computers you need to tap F12 and choose to boot from the CD, in others is the Esc key. Please consult your computer's documentation.
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Then type bash driver.sh -af
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:

    Winlogon.exe

  • Press Enter
  • If successful, the script will search for this file.
  • After it has completed the search enter the next file to be searched
  • Type the following:

    volsnap.sys

  • Press Enter
  • If successful, the script will search for this file.
  • After it has completed the search enter the next file to be searched
  • Type the following:

    explorer.exe

  • Press Enter
  • After it has completed the search enter the next file to be searched
  • Type the following:

    Userinit.exe

  • Press Enter
  • After the search is completed type Exit and press Enter.
  • After it has finished a report will be located in the USB drive as filefind.txt
  • While still in the Open Terminal, type bash query.sh
  • Press Enter
  • After it has finished a report will be located in the USB drive as RegReport.txt
  • Then type dd if=/dev/sda of=mbr.bin bs=512 count=1


    Leave a space among the following Statements:

    dd is the executable application used to create the backup
    if=/dev/sda is the device the backup is created from - the hard drive when only one HDD exists
    of=mbr.bin is the backup file to create - note the lack of a path - it will be created in the directory currently open in the Terminal
    bs=512 is the number of bytes in the backup
    count=1 says to backup just 1 sector


    It is extremely important that the if and of statements are correctly entered.

  • Press Enter
  • After it has finished a report will be located in the USB drive as mbr.bin
  • Plug the USB back into the clean computer, zip the mbr.bin, and except for the mbr.bin zipped file, post the contents of the report.txt, filefind.txt and RegReport.txt in your next reply. The mbr.bin zipped file must be attached to your reply.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#3 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 14 July 2011 - 02:43 PM

Hello JSntgRvr,
this sounds very professional and rather competent.
Do I need a large capacity USB drive? I have a 4GB one handy, will that suffice?
If not will go out and buy one tomorrow.
Noted that the coding text needs to be entered with care.
Thanks,
WilliamL

#4 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,761 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:11:26 AM

Posted 14 July 2011 - 02:57 PM

4GB should be good enough.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#5 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 15 July 2011 - 03:24 AM

Hello again,
Have gone thr6ugh yr process, not quite satisfied since the 'bin' seems very small if you need it zipped. However here is the stuff, and I will run through the process again, after sending, to see if there is any difference.

A small point... after finishing 'Userinit.exe' file search, then typing "Exit" this didn't seem to work but 'exit' [all lower case] did work by taking me out to 'Open Terminal'.

Here are the three text files....

the first report is report.txt

Fri Jul 15 09:08:15 UTC 2011
Driver report for /mnt/sda2/windows/system32/drivers
2c1d0dc3bf44c2d01c02795dac592a09 mmioport.sys has NO Company Name!
951c402be32995aeadd8603237ef5531 mouclass.sys has NO Company Name!
c4a825ccc3b8482ff7691188890552ff SynCamd.sys has NO Company Name!
84a07bafdef13532e7ba10d8c55eacd3 SynMini.sys has NO Company Name!
9572cae9a9f2217310a9902d41cca04a SynPin.sys has NO Company Name!
59db0408898cf6b71fb19a1a80a93b84 SynSam.sys has NO Company Name!
260a9e1973baf9135be5d7d65027b55a SynScan.sys has NO Company Name!

7e9ac7c353e49ea7e8b53c64c9814c27 aavmker4.sys
ALWIL Software

9859c0f6936e723e4892d7141b1327d5 acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys
Microsoft Corporation

2f7f3e8da380325866e566f5d5ec23d5 AegisP.sys
Meetinghouse Data Communications

7e775010ef291da96ad17ca4b17137d7 afd.sys
Microsoft Corporation

08fd04aa961bdc77fb983f328334e3d7 agp440.sys
Microsoft Corporation

03a7e0922acfe1b07d5db2eeb0773063 agpcpq.sys
Microsoft Corporation

cb08aed0de2dd889a8a820cd8082d83c alim1541.sys
Microsoft Corporation

95b4fb835e28aa1336ceeb07fd5b9398 amdagp.sys
Advanced Micro Devices

d7701d7e72243286cc88c9973d891057 amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys
Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f arp1394.sys
Microsoft Corporation

b4d09e666cb1d72f2cfab3f8fb395518 aswFsBlk.sys
ALWIL Software

9c9a6c6e8805c43c372ad9aabea39fd9 aswmon2.sys
ALWIL Software

490f56adc670a08bafcccdbcb14a4259 aswmon.sys
ALWIL Software

4f25bb4a1299006ac04fa02d25a0e62d aswRdr.sys
ALWIL Software

f8abcec435cb0f918c12fd84b6eaee11 aswSP.sys
ALWIL Software

95c9ccf994e7c39322aa2ca44a6f8382 aswTdi.sys
ALWIL Software

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys
Microsoft Corporation

d649c57da6fa762c64013747e5d7d2d6 ati1btxx.sys
ATI Technologies

60b6aa2dc1521da343f781b70eb7895a ati1mdxx.sys
ATI Technologies

6fdc61e8e8e17f6ecc2d9a10fa8df347 ati1pdxx.sys
ATI Technologies

9d318099bf3876a4af4bc75966d27603 ati1raxx.sys
ATI Technologies

bcaf267b10620f8c93f6e87ab726e145 ati1rvxx.sys
ATI Technologies

dac7d785cf62f5bd41441e9d6f5a6efe ati1snxx.sys
ATI Technologies

f7706dae7d101f1b19ce552d772ebfce ati1ttxx.sys
ATI Technologies

6f714b4720dd80ffa9f8d2731594ea4c ati1tuxx.sys
ATI Technologies

67ffbc158dd4d27ba3fc92c6acd87f73 ati1xbxx.sys
ATI Technologies

0d8cab1f08f7d3c4de228b49e12e596a ati1xsxx.sys
ATI Technologies

2d030c2f6b036ca0bc243e1b16d924d1 ati2mtaa.sys
ATI Technologies

b1fa8f1dc0a49618e544287a92ac266e ati2mtag.sys
ATI Technologies

993e7bd6438fe989e328c6b4bca246a9 atinbtxx.sys
ATI Technologies

ed4c2bf8403f4437987c0ba09cf48716 atinmdxx.sys
ATI Technologies

e90ac2b14e98f1a4372e5891b4278784 atinpdxx.sys
ATI Technologies

da36687d701c833430605a298731410b atinraxx.sys
ATI Technologies

a7a01b907db63898d40b0a14248ff9a2 atinrvxx.sys
ATI Technologies

ceddee2e0591894d19654d458fd3b9be atinsnxx.sys
ATI Technologies

d80a8f6c0a717446496c3a06d33b0d9c atinttxx.sys
ATI Technologies

edd66332608d27f4fd5069bcd0bc5164 atintuxx.sys
ATI Technologies

3e7d485cbd0b0d9f6ea2ad9442411831 atinxbxx.sys
ATI Technologies

77b575d7aab35d5908ae6ce681608d62 atinxsxx.sys
ATI Technologies

e333010a50bf603acc350f6019e9ce02 atkacpi.sys
tH`((VS_VERSION_INFO.?(aStringFileInfodbCommentsCompanyNameRFileDescriptionATKACPIUtility@FileVersion,,,bInternalNameATK$LegalCopyright(LegalTrademarksbOriginalFilenameATKPrivateBuildJProductNameATKACPIUtility@ProductVersion,,,SpecialBuildDVarFileInfo$Translationt*

f38a6e25c67798ff5f4af85aced4fb87 atl02_xp.sys
?a^StringFileInfo:bb!CompanyNameAttansicTechnologycorporation.FileDescriptionAttansicFastEthernetControllerndisminiportdrivervFileVersion...tInternalNameatl_xpLegalCopyrightCopyright©-AttansicTechnologycorporation.@bLegalTrademarksAttansicLBrOriginalFilenameatl_xp.sysd"ProductNameAttansicFastEthernetController:vProductVersion...DVarFileInfo$Translationt

9916c1225104ba14794209cfa8012159 atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68 audstub.sys
Microsoft Corporation

0d93976f7801b7fcd8135cc77257bbd0 battc.sys
Microsoft Corporation

feaf7ec9f38a37945b6fb169617ec859 bcmwl564.sys
Broadcom Corporation

b89bcf0a25aeb3b47030ac83287f894a bcmwl5.sys
Broadcom Corporation

da1f27d85e0d1525f6621372e7b685e9 beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys
Microsoft Corporation

b279426e3c0c344893ed78a613a73bde bthenum.sys
Microsoft Corporation

fca6f069597b62d42495191ace3fc6c1 bthmodem.sys
Microsoft Corporation

80602b8746d3738f5886ce3d67ef06b6 bthpan.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys
Microsoft Corporation

bb68cebffd181e18a26112d1b9f90f3d bthprint.sys
Microsoft Corporation

61364cd71ef63b0f038b7e9df00f1efa bthusb.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
Microsoft Corporation

0be5aef125be881c4f854c554f2b025c ccdecode.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys
Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys
Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys
Microsoft Corporation

0f6c187d38d98f8df904589a5f94d411 CmBatt.sys
Microsoft Corporation

6e4c9f21f0fae8940661144f41b13203 compbatt.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys
Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys
Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25 disk.sys
Microsoft Corporation

d992fe1274bde0f84ad826acae022a41 dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 DMusic.sys
Microsoft Corporation

cb20f16afdba63707fb971e0922edec1 Dr71WU.sys
Ralink Technology

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys
Microsoft Corporation

62e42b76661f09bd18ff1a186122306c ewusbfake.sys
tHhbbVS_VERSION_INFO?aStringFileInfobCommentsCompanyNameHuaweiTechnologiesCo.,Ltd.fFileDescriptionUSBModem/SerialDeviceDriver<FileVersion...j%InternalNameHuaweiProprietaryUSBDeviceDriverLLegalCopyrightCopyright©HuaweiTechnologiesCo.,Ltd.-.Allrightsreserved.(LegalTrademarksBrOriginalFilenameewusbmdm.sysPrivateBuild=ProductNameHuaweiTechnologiesCo.,Ltd.USBModem/SerialDeviceDriver@ProductVersion...SpecialBuildbCommentsCompanyNameHuaweiTechnologiesCo.,Ltd.fFileDescriptionUSBModem/SerialDeviceDriver<FileVersion...j%InternalNameHuaweiProprietaryUSBDeviceDriverLLegalCopyrightCopyright©HuaweiTechnologiesCo.,Ltd.-.Allrightsreserved.(LegalTrademarksBrOriginalFilenameewusbmdm.sysPrivateBuild=ProductNameHuaweiTechnologiesCo.,Ltd.USBModem/SerialDeviceDriver@ProductVersion...SpecialBuildHVarFileInfo(bTranslationt

53f1160666435151b6fcf89d015fe620 ewusbmdm.sys
tHmbbVS_VERSION_INFO?aStringFileInfobCommentsCompanyNameHuaweiTechnologiesCo.,Ltd.fFileDescriptionUSBModem/SerialDeviceDriver:rFileVersion...j%InternalNameHuaweiProprietaryUSBDeviceDriverLLegalCopyrightCopyright©HuaweiTechnologiesCo.,Ltd.-.Allrightsreserved.(LegalTrademarksBrOriginalFilenameewusbmdm.sysPrivateBuild=ProductNameHuaweiTechnologiesCo.,Ltd.USBModem/SerialDeviceDriver>rProductVersion...SpecialBuildbCommentsCompanyNameHuaweiTechnologiesCo.,Ltd.fFileDescriptionUSBModem/SerialDeviceDriver:rFileVersion...j%InternalNameHuaweiProprietaryUSBDeviceDriverLLegalCopyrightCopyright©HuaweiTechnologiesCo.,Ltd.-.Allrightsreserved.(LegalTrademarksBrOriginalFilenameewusbmdm.sysPrivateBuild=ProductNameHuaweiTechnologiesCo.,Ltd.USBModem/SerialDeviceDriver>rProductVersion...SpecialBuildHVarFileInfo(bTranslationt

38d332a6d56af32635675f132548343e fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys
Microsoft Corporation

d45926117eb9fa946a6af572fbe1caa3 fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltMgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys
Microsoft Corporation

3a74c423cf6bcca6982715878f450a3b gagp30kx.sys
Microsoft Corporation

573c7d0a32852b48f3058cfd8026f511 Hdaudbus.sys
Windows Server DDK provider

2a013e7530beab6e569faa83f517e836 Hdaudio.sys
Windows Server DDK provider

7bd2de4c85eb4241eed57672b16a7d8d hidbth.sys
Microsoft Corporation

1af592532532a402ed7c060f6954004f hidclass.sys
Microsoft Corporation

bb1a6fb7d35a91e599973fa74a619056 hidir.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys
Microsoft Corporation

970178e8e003eb1481293830069624b9 hsfbs2s2.sys
Conexant

1225ebea76aac3c84df6c54fe5e5d8be hsfcxts2.sys
Conexant

ebb354438a4c5a3327fb97306260714a hsfdpsp2.sys
Conexant

f80a415ef82cd06ffaf0d971528ead38 http.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys
Microsoft Corporation

f24bb16c874390d5d95385b4cc662ad8 imagedrv.sys
Ahead Software

2d17d3e879d89ea70c72e72b5e7ddf1d imagesrv.sys
Ahead Software

083a052659f5310dd8b6a6cb05edcf8e imapi.sys
Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys
Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys
Microsoft Corporation

ee8cc26924a6f07972bbf04487ebd552 ipswuio.sys
Windows DDK provider

b43b36b382aea10861f7c7a37f9d4ae2 irbus.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys
Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys
Microsoft Corporation

b467646c54cc746128904e1654c750c1 ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys
Microsoft Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
Microsoft Corporation

195741aee20369980796b557358cd774 mdmxsdk.sys
Conexant

ef11104c29f22c1d2814ec9222f16c06 mfpcomp.sys
H`%VS_VERSION_INFO?StringFileInfob*CompanyNameNonebFileDescriptionmfpcompvFileVersion,,,bInternalNamemfpcompFLegalCopyrightCopyrightc@bOriginalFilenamemfpcomp.sys:rProductNameNonemfpcomp:vProductVersion,,,DVarFileInfo$Translation*

a570dbb0618a19b4fa214cb38265294a mfpec.sys
bHVS_VERSION_INFOvv?StringFileInfob*CompanyNameNoneFileDescriptionmfpecbFileVersion,,,,InternalNamemfpecFLegalCopyrightCopyrightc<nOriginalFilenamemfpec.sysvProductNameNonemfpec<bProductVersion,,,DVarFileInfo$Translationt

c0dddfb1719b5d58001a7054d6fd0fe2 mfpvbus.sys
H"VS_VERSION_INFO?StringFileInfob*CompanyNameNonebFileDescriptionmfpvbusvFileVersion,,,bInternalNamemfpvbusFLegalCopyrightCopyrightc@bOriginalFilenamemfpvbus.sys:rProductNameNonemfpvbus:vProductVersion,,,DVarFileInfo$Translation*

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys
Microsoft Corporation

2c1d0dc3bf44c2d01c02795dac592a09 mmioport.sys

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
Microsoft Corporation

1992e0d143b09653ab0f9c5e04b0fd65 modemcsa.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys
Microsoft Corporation

951c402be32995aeadd8603237ef5531 mouclass.sys

b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys
Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726 mqac.sys
Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys
Microsoft Corporation

f3aefb11abc521122b67095044169e98 mrxsmb.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 mskssrv.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e mspclock.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d mspqm.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys
Microsoft Corporation

e53736a9e30c45fa9e7b5eac55056d1d mstee.sys
Microsoft Corporation

c53775780148884ac87c455489a0c070 mtlmnt5.sys
Smart Link

54886a652bf5685192141df304e923fd mtlstrm.sys
Smart Link

6dda78a0be692b61b668fab860f276cf mtxparhm.sys
Matrox Graphics

2f625d11385b1a94360bfc70aaefdee1 mup.sys
Microsoft Corporation

b538dcd9816ea35fa4f637cfc261aaa8 mutohpen.sys
Microsoft Corporation

5b50f1b2a2ed47d560577b221da734db nabtsfec.sys
Microsoft Corporation

7ff1f1fd8609c149aa432f95a8163d97 NdisIP.sys
Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys
Microsoft Corporation

1ab3d00c991ab086e69db84b6c0ed78f ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys
Microsoft Corporation

9282bd12dfb069d3889eb3fcc1000a9b ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys
Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys
Microsoft Corporation

576b34ceae5b7e5d9fd2775e93b3db53 ntmtlfax.sys
Smart Link

73c1e1f395918bc2c6dd67af7591a3ad null.sys
Microsoft Corporation

2b298519edbfcf451d43e0f1e8f1006d nv4_mini.sys
NVIDIA Corporation

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys
Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740 nwrdr.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
Microsoft Corporation

07c02c892e8e1a72d6bf35004f0e9c5e PCASp50.sys
tH`FVS_VERSION_INFO?bStringFileInfoB|.CompanyNamePrintingCommunicationsAssoc.,Inc.(PCAUSA)p$FileDescriptionPCAUSANDIS.SPRProtocolDrivernFileVersion...bInternalNamePCASp.SYSDLegalCopyrightCopyright-PrintingCommunicationsAssoc.,Inc.(PCAUSA)@bOriginalFilenamePCASp.SYSXProductNamePCAUSARawetherforWindowsnProductVersion...DVarFileInfo$Translationt

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys
Microsoft Corporation

e82a496c3961efc6828b508c310ce98f portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys
Parallel Technologies

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys
Microsoft Corporation

6728e45b66f93c08f11de2e316fc70dd rdpwd.sys
Microsoft Corporation

e9aaa0092d74a9d371659c4c38882e12 recagent.sys
Smart Link

f828dd7e1419b6653894a8f97a0094c5 redbook.sys
Microsoft Corporation

851c30df2807fcfa21e4c681a7d6440e rfcomm.sys
Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys
Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c RMCast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys
Microsoft Corporation

726548542afeca56257ff01eb13bb6d7 rndismpx.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys
Microsoft Corporation

47f27af890da3e51c633fdd510910115 RtkHDAud.Sys
Realtek Semiconductor

daaf657c0b5bd0595669496857040f75 rtstor.sys
Realtek Semiconductor

0dbcc071a268e0340a2ba6bdd98bace4 s3gnbm.sys
SGraphics

76c465f570e90c28942d52ccb2580a10 scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys
Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys
Microsoft Corporation

6b33d0ebd30db32e27d1d78fe946a754 sisagp.sys
Silicon Integrated Systems

866d538ebe33709a5c9f5c62b73b7d14 slip.sys
Microsoft Corporation

d9673011648a71ed1e1f77b831bc85e6 slnt7554.sys
Smart Link

2c1779c0feb1f4a6033600305eba623a slntamr.sys
Smart Link

f9b8e30e82ee95cf3e1d3e495599b99c slnthal.sys
Smart Link

db56bb2c55723815cf549d7fc50cfceb slwdmsup.sys
Smart Link

895be38a993b9bd5abbe570d63d88a2e smbali.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys
Microsoft Corporation

b8c571fbf5a4b341a95cdf0de74d7b11 smserial.sys
Motorola

489703624dac94ed943c2abda022a1cd sonydcam.sys
Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys
Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys
Microsoft Corporation

0f6aefad3641a657e18081f52d0c15af srv.sys
Microsoft Corporation

77813007ba6265c4b6098187e6ed79d2 StreamIP.sys
Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys
Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys
Microsoft Corporation

3c6790d26d03fe5163e2bec490e51a7e symevent.sys
Symantec Corporation

c4a825ccc3b8482ff7691188890552ff SynCamd.sys

84a07bafdef13532e7ba10d8c55eacd3 SynMini.sys

9572cae9a9f2217310a9902d41cca04a SynPin.sys

7b261012505f80c731cd617ead63d2c5 SynPipe.sys
tHVS_VERSION_INFO?bStringFileInfobCommentsHCompanyNameSyntekAmericaInc.r%FileDescriptionSyntekUSB.VideoPipelineDriverbFileVersion...bInternalNameSynPipe.sys|,LegalCopyrightCopyright©SyntekAmericaInc.-lLegalTrademarksSynPipeisaregisteredtrademarkofSyntekAmericaInc.SynPipe™isatrademarkofSyntekAmericaInc.@bOriginalFilenameSynPipe.sysPrivateBuildj%ProductNameSyntekUSB.VideoPipelineDriverbProductVersion...SpecialBuildDVarFileInfo$Translationt*

59db0408898cf6b71fb19a1a80a93b84 SynSam.sys

260a9e1973baf9135be5d7d65027b55a SynScan.sys

69bf2dd9b1099d1aa3e7cf14b4b842cd SynTP.sys
Synaptics

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys
Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys
Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e termdd.sys
Microsoft Corporation

699450901c5ccfd82357cbc531cedd23 tosdvd.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys
Microsoft Corporation

d85938f272d1bcf3db3a31fc0a048928 uagp35.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys
Microsoft Corporation

402ddc88356b1bac0ee3dd1580c76a31 update.sys
Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys
Microsoft Corporation

b6cc50279d6cd28e090a5d33244adc9a usb8023x.sys
Microsoft Corporation

e919708db44ed8543a7c017953148330 usbaudio.sys
Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys
Microsoft Corporation

0daecce65366ea32b162f85f07c6753b usbohci.sys
Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys
Microsoft Corporation

a717c8721046828520c9edf31288fc00 usbprint.sys
Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4 usbscan.sys
Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9 usbstor.sys
Microsoft Corporation

63bbfca7f390f4c49ed4b96bfb1633e0 usbvideo.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys
Microsoft Corporation

754292ce5848b3738281b4f3607eaef4 viaagp.sys
Microsoft Corporation

e28726b72c46821a28830e077d39a55b videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys
Microsoft Corporation

aced8c149b30f8496c237bcba3727b48 wacompen.sys
Microsoft Corporation

0308aef61941e4af478fa1a0f83812f5 wadv07nt.sys
Intel Corporation

714038a8aa5de08e12062202cd7eaeb5 wadv08nt.sys
Intel Corporation

7bb3aa595e4507a788de1cdc63f4c8c4 wadv09nt.sys
Intel Corporation

36e6c405b6143d09687f4056fd9a0d10 wadv11nt.sys
Intel Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys
Microsoft Corporation

352fa0e98bc461ce1ce5d41f64db558d watv06nt.sys
Intel Corporation

791cc45de6e50445be72e8ad6401ff45 watv10nt.sys
Intel Corporation

6768acf64b18196494413695f0c3a00f wdmaud.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys
Microsoft Corporation

c1b3d9d75c3fb735f5fa3a5806aded57 wpdusb.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
Microsoft Corporation

c98b39829c2bbd34e454150633c62c78 wstcodec.sys
Microsoft Corporation


second file namely filefind.txt


Search results for Winlogon.exe

ed0ef0a136dec83df69f04118870003e /mnt/sda2/windows/system32/winlogon.exe
496.0K Apr 14 2008

01c3346c241652f43aed8e2149881bfe /mnt/sda2/windows/$NtServicePackUninstall$/winlogon.exe
490.5K Aug 4 2004

ed0ef0a136dec83df69f04118870003e /mnt/sda2/windows/ServicePackFiles/i386/winlogon.exe
496.0K Apr 14 2008


Search results for volsnap.sys

4c8fcb5cc53aab716d810740fe59d025 /mnt/sda2/windows/system32/drivers/volsnap.sys
51.1K Apr 13 2008

ee4660083deba849ff6c485d944b379b /mnt/sda2/windows/$NtServicePackUninstall$/volsnap.sys
51.1K Aug 4 2004

4c8fcb5cc53aab716d810740fe59d025 /mnt/sda2/windows/ServicePackFiles/i386/volsnap.sys
51.1K Apr 13 2008


Search results for explorer.exe

12896823fb95bfb3dc9b46bcaedc9923 /mnt/sda2/windows/explorer.exe
1009.5K Apr 14 2008

a0732187050030ae399b241436565e64 /mnt/sda2/windows/$NtUninstallKB938828$/explorer.exe
1008.0K Aug 4 2004

7712df0cdde3a5ac89843e61cd5b3658 /mnt/sda2/windows/$hf_mig$/kb938828/sp2qfe/explorer.exe
1009.0K Jun 13 2007

97bd6515465659ff8f3b7be375b2ea87 /mnt/sda2/windows/$NtServicePackUninstall$/explorer.exe
1009.0K Jun 13 2007

12896823fb95bfb3dc9b46bcaedc9923 /mnt/sda2/windows/ServicePackFiles/i386/explorer.exe
1009.5K Apr 14 2008


Search results for Userinit.exe

a93aee1928a9d7ce3e16d24ec7380f89 /mnt/sda2/windows/system32/userinit.exe
25.5K Apr 14 2008

39b1ffb03c2296323832acbae50d2aff /mnt/sda2/windows/$NtServicePackUninstall$/userinit.exe
24.0K Aug 4 2004

a93aee1928a9d7ce3e16d24ec7380f89 /mnt/sda2/windows/ServicePackFiles/i386/userinit.exe
25.5K Apr 14 2008


Search results for Exit


Search results for bash query.sh


Search results for dd if=/dev/sda of=m br.bin bs=512 count=1


Search results for Exit


third file which is regreport.txt



Remote Registry Report

Hive </mnt/sda2/windows/system32/config/software>
\Microsoft\Windows NT\CurrentVersion> Value <ProductName> of type REG_SZ, data length 42 [0x2a]
Microsoft Windows XP
\Microsoft\Windows NT\CurrentVersion> Value <CSDVersion> of type REG_SZ, data length 30 [0x1e]
Service Pack 3
\Microsoft\Windows NT\CurrentVersion> Value <SystemRoot> of type REG_SZ, data length 22 [0x16]
C:\WINDOWS
\Microsoft\Windows NT\CurrentVersion\Windows> Value <AppInit_DLLs> of type REG_SZ, data length 2 [0x2]
(...)\Windows NT\CurrentVersion\Winlogon> Value <Shell> of type REG_SZ, data length 26 [0x1a]
Explorer.exe
(...)\Windows NT\CurrentVersion\Winlogon> Value <Userinit> of type REG_SZ, data length 68 [0x44]
C:\WINDOWS\system32\userinit.exe,
(...)\Windows NT\CurrentVersion\Winlogon\Notify> Node has 13 subkeys and 0 values
<AtiExtEvent>
<crypt32chain>
<cryptnet>
<cscdll>
<dimsntfy>
<efcYSjGV>
<nnnllMcb>
<ScCertProp>
<Schedule>
<sclgntfy>
<SensLogn>
<termsrv>
<wlballoon>
\Microsoft\Windows\CurrentVersion\Run> Node has 1 subkeys and 3 values
<OptionalComponents>
size type value name [value if type DWORD]
114 REG_SZ <ATICCC>
102 REG_SZ <lxedmon.exe>
102 REG_SZ <EzPrint>
(...)\Windows\CurrentVersion\policies\system> Node has 0 subkeys and 5 values
4 REG_DWORD <dontdisplaylastusername> 0 [0x0]
4 REG_DWORD <legalnoticecaption> 1 [0x1]
8 REG_SZ <legalnoticetext>
4 REG_DWORD <shutdownwithoutlogon> 1 [0x1]
4 REG_DWORD <undockwithoutlogon> 1 [0x1]


Hive </mnt/sda2/Documents and Settings/Administrator/ntuser.dat>
(...)\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 1 values
size type value name [value if type DWORD]
64 REG_SZ <ASUSTPE>
(...)\Windows\CurrentVersion\Policies\Explorer> Node has 0 subkeys and 1 values
4 REG_DWORD <NoDriveTypeAutoRun> 145 [0x91]


Hive </mnt/sda2/Documents and Settings/Brian/ntuser.dat>
(...)\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 2 values
size type value name [value if type DWORD]
62 REG_SZ <ctfmon.exe>
148 REG_SZ <swg>
(...)\Windows\CurrentVersion\Policies\Explorer> Node has 0 subkeys and 1 values
4 REG_DWORD <NoDriveTypeAutoRun> 145 [0x91]
(...)\Windows\CurrentVersion\Policies\System> Node has 0 subkeys and 2 values
4 REG_DWORD <NoDispBackgroundPage> 0 [0x0]
4 REG_DWORD <NoDispScrSavPage> 0 [0x0]


Hive </mnt/sda2/Documents and Settings/Guest/ntuser.dat>
(...)\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 3 values
size type value name [value if type DWORD]
64 REG_SZ <ASUSTPE>
62 REG_SZ <ctfmon.exe>
148 REG_SZ <swg>
(...)\Windows\CurrentVersion\Policies\Explorer> Node has 0 subkeys and 1 values
4 REG_DWORD <NoDriveTypeAutoRun> 145 [0x91]

Attached Files

  • Attached File  mbr.zip   483bytes   2 downloads


#6 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,761 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:11:26 AM

Posted 15 July 2011 - 09:49 AM

We have an infected Master Boot Record and a possible infected file. Please follow these steps:

Boot to xPUD and Expand mnt.

  • Browse to the sda2/windows/ServicePackFiles/i386 folder. Locate the mouclass.sys file. Right click on it and select Copy.
  • Browse to the sda2/windows/system32/drivers folder. Locate the mouclass.sys file. Right click on it and select Rename. Rename the file to mouclass.sys.vir. Right click on the sda2/windows/system32/drivers and select Paste.

That should rename the mouclass.sys file and copy it from the sda2/windows/ServicePackFiles/i386 folder into the drivers folder.

Exit xPUD.

  • Download NTBR_CD by noahdfear.
  • Extract its contents to the desktop.
  • Once extracted, open the NTBR_CD folder and click on the BurnItCD application.
  • Insert a blank CD when prompted. The .iso image will be burned to the CD.
  • Boot the computer with the CD you just burned and follow the prompts.
  • Press Enter for English.
  • At the menu type 1 to select MBRWORK then hit Enter

    This screen will show the hard drive configuration.
    Posted Image
  • Type 5 to Install standard MBR code then hit Enter
  • Type 1 to select Standard then hit Enter
  • Type Y then hit Enter to confirm
  • Type E then hit Enter to exit
  • Back at the menu, type 6 to Quit.
  • Press Ctrl+Alt+Del to restart the machine.
  • Eject the CD upon restart and boot normally.

If ale to boot, get an Internet Connection run Combofix as follows:

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      If AVG or CA Internet Security Suite is installed, you must remove these programs before using Combofix. If any of these applications will not uninstall, it is first recommended to uninstall it with AppRemover by Opswat. http://www.appremover.com/supported-applications. Do not use AppRemover on Norton

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • Install the Recovery Console if prompted.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" .
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

Please do not install any new programs or update anything (always allow your antivirus/antispyware to update) unless told to do so while we are fixing your problem. If combofix alerts to a new version and offers to update, please let it. It is essential we always use the latest version.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#7 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 16 July 2011 - 04:45 AM

Super, thanks.
Have now a working machine, boot infection seemingly removed. Have internet access and downloaded combofix after disabling windows firewall and system mechanic. However combofix warns that AVAST 4.8 is active.
Cannot find it!
Not under avast or AWIL, whatever; having searched via install/remove and also on C disk in program files.
Any hints?

Thanks,
Will

#8 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,761 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:11:26 AM

Posted 16 July 2011 - 01:50 PM

1. Click on the Start menu.
2. Select Run...
3. Type wbemtest and click OK
4. Click on Connect
5. Under NameSpace type in or copy/paste root\SecurityCenter
6. Click on Connect
5. Click on Query
6. Type in or copy/paste SELECT * FROM AntiVirusProduct and click on Apply

Double click on each result to view the properties for that Antivirus product. Identify the product(s) installed and DELETE any records for an Antivirus software that is no longer installed.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#9 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 16 July 2011 - 05:44 PM

Hello (once again)...
Done all that and ran Combofix....

Report posted below

N.B. I have been using JV16 and System mechanic prior to this problem to clean up the laptop.
SFR is the French ISP.
Printer now is LEXMARK, was EPSON.
SkyTel and Rosetta are OK (in principle)
Mappy and Orange are all right but will remove them from trusted sites later.
Will be very interested in yr comments, thanks.
William L




ComboFix 11-07-15.03 - Brian 16/07/2011 23:54:42.1.2 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.895.400 [GMT 2:00]
Running from: c:\documents and settings\Brian\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\cookies.ini
c:\windows\system32\734914
c:\windows\system32\abLRBJlm.ini
.
.
((((((((((((((((((((((((( Files Created from 2011-06-16 to 2011-07-16 )))))))))))))))))))))))))))))))
.
.
2011-07-16 20:59 . 2011-07-16 21:00 -------- d-----w- c:\documents and settings\Brian\Application Data\ATI
2011-07-16 20:16 . 2011-07-16 20:16 -------- d-----w- c:\documents and settings\Brian\Local Settings\Application Data\Temp
2011-07-16 10:05 . 2011-07-16 10:05 22 --sha-w- c:\documents and settings\Brian\Application Data\Sys2662.Config.Repository.bin
2011-07-16 10:05 . 2011-07-16 10:05 -------- d-----w- c:\program files\jv16 PowerTools 2011
2011-07-16 09:52 . 2011-07-16 09:52 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-07-16 07:14 . 2011-07-16 07:14 -------- d-----w- c:\windows\system32\drivers
2011-07-13 19:20 . 2011-07-13 19:20 -------- d-----w- C:\FOUND.015
2011-07-13 13:36 . 2011-07-13 13:36 -------- d-----w- c:\documents and settings\Guest
2011-07-13 10:45 . 2011-07-13 10:45 -------- d-----w- C:\FOUND.014
2011-07-09 21:32 . 2011-07-09 21:32 -------- d-----w- C:\FOUND.013
2011-07-07 11:45 . 2011-07-07 11:45 -------- d-----w- c:\documents and settings\LocalService\Application Data\iolo
2011-07-07 11:45 . 2010-09-23 11:29 511328 ----a-w- c:\program files\Common Files\Microsoft Shared\CAPICOM\CAPICOM.DLL
2011-07-07 11:45 . 2011-06-21 08:48 2083464 ----a-w- c:\windows\system32\Incinerator32.dll
2011-07-07 11:45 . 2011-06-21 09:02 11776 ----a-w- c:\windows\system32\smrgdf.exe
2011-07-07 11:45 . 2011-06-21 09:02 29696 ----a-w- c:\windows\system32\iolobtdfg.exe
2011-07-07 11:45 . 2010-02-08 20:59 56200 ----a-w- c:\windows\system32\offreg.dll
2011-07-07 11:45 . 2011-07-07 11:45 -------- d-----w- c:\program files\iolo
2011-07-07 11:43 . 2011-07-07 11:43 74703 ----a-w- c:\windows\system32\mfc45.dll
2011-07-07 11:42 . 2011-07-07 11:42 -------- d-----w- c:\documents and settings\Brian\Application Data\iolo
2011-07-07 11:42 . 2011-07-07 11:42 -------- d-----w- c:\documents and settings\All Users\Application Data\iolo
2011-07-07 09:08 . 2011-07-07 09:08 16856 ----a-w- c:\program files\Mozilla Firefox\plugin-container.exe
2011-07-07 09:08 . 2011-07-07 09:08 719832 ----a-w- c:\program files\Mozilla Firefox\mozcpp19.dll
2011-06-23 06:15 . 2011-06-23 06:15 -------- d-----w- C:\FOUND.012
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-04-27 08:02 . 2011-04-27 08:02 1687552 --sha-w- c:\documents and settings\Brian\Local Settings\Application Data\cmv.exe
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0F6E720A-1A6B-40E1-A294-1D4D19F156C8}]
2009-10-15 08:53 165184 ----a-w- c:\program files\SFR\Kit\SFRNavErrorHelper.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-01-03 39408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATICCC"="c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-05-10 90112]
"lxedmon.exe"="c:\program files\Lexmark S600 Series\lxedmon.exe" [2009-10-01 766632]
"EzPrint"="c:\program files\Lexmark S600 Series\ezprint.exe" [2009-10-01 139944]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-13 15360]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ioloSystemService]
@="Service"
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG7_CC
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\b043dfff
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BEWINTERNET-FR-DMGP-V2SessionManager
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CardDetectorHUAWEI160
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\D-Link AirPlus G
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\GDI Manager
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MFP Manager
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ORAHSSSessionManager
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SMrhc7mfj0e75p
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SMshc5mfj0e75p
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\updateMgr
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ACMON]
2006-05-30 08:28 811008 ----a-w- c:\program files\ASUS\Splendid\ACMON.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
2005-05-03 01:43 69632 ----a-w- c:\windows\Alcmtr.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ASUS Live Update]
2006-02-21 13:20 180224 ----a-w- c:\program files\ASUS\ASUS Live Update\ALU.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ASUSTPE]
2006-10-14 09:43 69632 ----a-w- c:\windows\system32\ASUSTPE.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATKMEDIA]
2006-06-08 18:33 53248 ----a-w- c:\program files\ASUS\ATK Media\DMedia.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EPSON Stylus SX400 Series]
2007-12-17 04:00 188928 ----a-w- c:\windows\system32\spool\drivers\w32x86\3\E_FATIEGE.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Net4Switch]
2006-04-13 09:54 1101824 ----a-w- c:\program files\ASUS\Net4Switch\Net4Switch.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PowerForPhone]
2006-06-29 12:40 774144 ----a-w- c:\program files\ASUS\PowerForPhone\PowerForPhone.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Power_Gear]
2006-07-26 16:01 90112 ----a-w- c:\program files\ASUS\Power4 Gear\BatteryLife.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
2006-10-30 02:49 16269312 ----a-w- c:\windows\RTHDCPL.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Server Application]
2007-05-20 17:45 417792 ------w- c:\windows\system32\ServoApp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SkyTel]
2006-05-16 01:04 2879488 ----a-w- c:\windows\SkyTel.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SMSERIAL]
2006-03-21 05:54 544768 ----a-w- c:\windows\sm56hlpr.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
2006-05-25 03:02 786521 ----a-w- c:\program files\Synaptics\SynTP\SynTPEnh.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Wireless Console 2]
2005-10-17 15:09 987136 ----a-w- c:\program files\Wireless Console 2\wcourier.exe
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Rosetta Stone\\Rosetta Stone Version 3\\support\\bin\\win\\RosettaStoneLtdServices.exe"=
"c:\\Program Files\\Rosetta Stone\\Rosetta Stone Version 3\\RosettaStoneVersion3.exe"=
"c:\\WINDOWS\\System32\\lxedcoms.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"14135:UDP"= 14135:UDP:Server Application
"14135:TCP"= 14135:TCP:Server Application
"13621:UDP"= 13621:UDP:MFP Setup Wizard
"13878:UDP"= 13878:UDP:MFP Manager
"13364:UDP"= 13364:UDP:MFP Server Manager
"69:UDP"= 69:UDP:MFP Server Manager TFTP
.
R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [01/02/2009 12:38 114768]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [01/02/2009 12:38 20560]
R2 ioloSystemService;iolo System Service;c:\program files\iolo\Common\Lib\ioloServiceManager.exe [07/07/2011 13:45 722616]
R2 lxed_device;lxed_device;c:\windows\system32\lxedcoms.exe -service --> c:\windows\system32\lxedcoms.exe -service [?]
R3 SynMini;USB2.0 1.3M WebCam;c:\windows\system32\drivers\SynMini.sys [26/03/2008 16:24 1116544]
R3 SynScan;USB2.0 1.3M WebCam Still Image;c:\windows\system32\drivers\SynScan.sys [26/03/2008 16:25 7808]
R3 WUSBVBus;MFP Server Detector;c:\windows\system32\drivers\mfpvbus.sys [14/02/2009 17:26 10240]
S2 ALIWEHCD;MFP Server Enhanced Controller;c:\windows\system32\drivers\mfpec.sys [14/02/2009 17:26 34944]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [03/01/2011 11:47 136176]
S2 lxedCATSCustConnectService;lxedCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxedserv.exe [29/03/2011 15:46 98984]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [03/01/2011 11:47 136176]
S3 hwusbfake;Huawei DataCard USB Fake;c:\windows\system32\drivers\ewusbfake.sys [01/02/2009 10:10 99840]
S3 ipswuio;ipswuio;c:\windows\system32\drivers\ipswuio.sys [26/03/2008 17:27 34944]
.
Contents of the 'Scheduled Tasks' folder
.
2011-07-16 c:\windows\Tasks\User_Feed_Synchronization-{FEB5D2F4-2DAC-4EA2-B0A0-8481E20ABB65}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 02:31]
.
2011-07-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-03 09:47]
.
2011-07-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-03 09:47]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.wuuta.com/
mStart Page = hxxp://www.wuuta.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_43C348BC2E93EB2B.dll/cmsidewiki.html
Trusted Zone: mappy.com
Trusted Zone: orange.fr
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{831A05A7-D3FE-4EDD-9DEB-32CE8678A858}: NameServer = 93.188.165.180,93.188.160.240
TCP: Interfaces\{BDF9C23B-C874-4626-BCB2-2916EC846417}: NameServer = 93.188.165.180,93.188.160.240
FF - ProfilePath - c:\documents and settings\Brian\Application Data\Mozilla\Firefox\Profiles\rw21cuv8.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: browser.startup.homepage - hxxp://en-GB.start2.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-GB:official
FF - prefs.js: keyword.URL - hxxp://redirecterror.sfr.fr/?q=
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Yahoo! Toolbar: {635abd67-4fe9-1b23-4f01-e679fa7484c1} - %profile%\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
FF - user.js: keyword.URL - hxxp://redirecterror.sfr.fr/?q=
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
.
.
------- File Associations -------
.
JSEFile=NOTEPAD.EXE %1
.
- - - - ORPHANS REMOVED - - - -
.
SSODL-MicroStat-{bce20e99-4367-41a2-b44e-6787a0f778dd} - (no file)
Notify-efcYSjGV - efcYSjGV.dll
Notify-nnnllMcb - nnnllMcb.dll
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-17 00:01
Windows 5.1.2600 Service Pack 3 FAT NTAPI
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(860)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(2536)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\ATI Technologies\ATI.ACE\CLI.EXE
c:\windows\system32\lxedcoms.exe
c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\wscntfy.exe
c:\program files\ATI Technologies\ATI.ACE\cli.exe
c:\program files\iolo\System Mechanic\SMTrayNotify.exe
.
**************************************************************************
.
Completion time: 2011-07-17 00:03:27 - machine was rebooted
ComboFix-quarantined-files.txt 2011-07-16 22:03
.
Pre-Run: 45,487,620,096 bytes free
Post-Run: 45,523,566,592 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - A046366F7858DAAD194E1C37423967F0

#10 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,761 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:11:26 AM

Posted 16 July 2011 - 06:03 PM

Seems CHKDSK have been ran several times. Any reason for it?

Bring the computer to a command prompt (Start -> Run, type CMD and click OK.) At the prompt type the following and press Enter after each line:

ipconfig /flushdns (The space between g and / is needed)
Exit

Restart the computer.

I would recommend AVAST as an antivirus. Once installed and registered, perform a full scan.

Also perform an online scan at Eset. and let me know the outcome.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#11 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 18 July 2011 - 01:30 AM

Hello again JS, hope you are having/had a nice weekend.
Some progress, but not much.
I have a feeling that CHKDSK is used by System Mechanic (IOLO) as part of its tuning-up process. I used SM to do cleaning whilst trying to resolve the clutter and general junk that I found.
I ‘flushed’ as you requested, it appeared to work but did not give any details as to what was actually done.
I then rebooted and started using the IE browser to access the ESET webiste. I was unable to do so and noticed that the original symptons were still in evidence; namely inability to access malware checking sites, e.g. ESET, Kaspersky, and Avast. Also I was diverted at times to fee-paying websites such as EBAY, and other sites of dubious nature.
I then tried to access a security site that I have myself occasionally used for on-line scans, namely Norman, and after some attempts was able to initiate an on-line scan. It found some malware and I duly deleted them, and restarted the scan. It then took quite a while (and he second scan did not in fact finish) and the two logs are posted below.
The second log is truncated because there were some thousands of lines referring to Rosetta Stone, a big language learning system which is installed on the machine. It seems that Norman took exception to the files and labelled them, perhaps all of them, as damaged files. My wife has Rosetta, we have not had problems with it. I could uninstall it from the sick computer if you wish.
….but more likely the problem was with Norman. Probably we should ignore this aspect.
I used System Mechanic to check the various startup programs and was advised of FOUR dangerous modules linked with IE, namely
2 examples of toolband.dll in Program Files\Lexmark toolbar. These I deleted.
A third example of toolband.dll was apparently a browser help (BHO) object …
And another ‘BHO’ being bho.dll
All four associated with IE which was the original main browser.
These latter two BHO I could not delete.
On Firefox I can use google search, get the results, but neither can connect to Antimalware, Avast or ESET or when I do connect it refuses to do a download. I eventually managed a download from ‘filehippo’ of antimalware, and ran that. A quick scan showed up some errors and I deleted them, the log is posted below. I then ran a full scan, results also appended below.
We appear to have found various infections, I then went back to IE after rebooting.
Now cannot make connection with web on either Firefox or IE. Methinks that this is ‘whack a mole’, knock off an infection and it springs up elsewhere.
Will run antimalware again overnight, but before that check Sys Mech; and see if the previous infections have reappeared.
Sys Mech still shows the two dnagerous/suspicious BHO.
Good night.
Now the morning of Monday, managed to reestablish the internet conection, and sending this Monday morning.
William
NORMAN – 2 LOGS
Norman Malware Cleaner v2.02.01
Copyright © 1990 - 2011, Norman ASA.

Norman Scanner Engine Version: 6.07.10
nvcbin.def: Version: 6.07.00, Date: 2011/07/17 04:15:21, Variants: 10661574
nvcmacro.def: Version: 6.07.00, Date: 2011/02/01 15:21:31, Variants: 20465

Operating System: Windows XP Service Pack 3

Switches: /iagree

Scan started: 2011/07/17 10:37:11

Running pre-scan cleanup routine...
Potentially unwanted registry value: 'HKCR\scrfile\shell\open\command --> (null) = NOTEPAD.EXE %1'
Modified registry value: HKCR\scrfile\shell\open\command --> (Default) from 'NOTEPAD.EXE %1' to '"%1" /S'
Potentially unwanted registry value: 'HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows --> AppInit_DLLs = (null)'
Modified registry value: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows --> AppInit_DLLs from '(null)' to ''
Potentially unwanted registry value: 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System --> DisableRegistryTools = 0x00000000'
Deleted registry value: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System --> DisableRegistryTools = 0x00000000
Potentially unwanted registry value: 'HKU\S-1-5-21-2347432603-2021559965-3132521956-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer --> NoDrives = 0x00000000'
Deleted registry value: HKU\S-1-5-21-2347432603-2021559965-3132521956-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer --> NoDrives = 0x00000000
Potentially unwanted registry value: 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer --> NoDrives = 0x00000000'
Deleted registry value: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer --> NoDrives = 0x00000000

Number of malicious objects found: 5
Number of malicious objects cleaned: 5
Scanning time: 0s

Scanning system for FakeAV...

Number of malicious objects found: 0
Number of malicious objects cleaned: 0
Number of malicious files found: 0
Number of malicious files cleaned: 0
Scanning time: 0s

Scanning system for active rootkit activity...

Number of malicious objects found: 0
Number of malicious objects cleaned: 0
Number of malicious files found: 0
Number of malicious files cleaned: 0
Scanning time: 0s

Scanning running processes and process memory...

Number of objects found: 950
Number of objects scanned: 950
Number of objects not scanned: 0
Number of malicious memory objects found: 0
Number of malicious objects cleaned: 0
Number of malicious files found: 0
Number of malicious files cleaned: 0
Scanning time: 1m 5s
Scan aborted by user

Results:
Total number of files found: 0
Total number of archives unpacked: 0
Total number of objects found: 950
Total number of objects scanned: 950
Total number of objects not scanned: 0
Total number of malicious objects found: 5
Total number of malicious objects cleaned: 5
Total number of malicious files found: 0
Total number of malicious files cleaned: 0
Total number of objects quarantined: 5
Total scanning time: 1m 5s


SECOND SCAN (started again) shown below with Rosetta lines removed (many thousands)



Norman Malware Cleaner v2.02.01
Copyright © 1990 - 2011, Norman ASA.

Norman Scanner Engine Version: 6.07.10
nvcbin.def: Version: 6.07.00, Date: 2011/07/17 04:15:21, Variants: 10661574
nvcmacro.def: Version: 6.07.00, Date: 2011/02/01 15:21:31, Variants: 20465

Operating System: Windows XP Service Pack 3

Switches: /iagree /verbose /cleanrootkit

Scan started: 2011/07/17 10:47:12

Running pre-scan cleanup routine...

Number of malicious objects found: 0
Number of malicious objects cleaned: 0
Scanning time: 0s

Scanning system for FakeAV...

Number of malicious objects found: 0
Number of malicious objects cleaned: 0
Number of malicious files found: 0
Number of malicious files cleaned: 0
Scanning time: 0s

Scanning system for active rootkit activity...

Number of malicious objects found: 0
Number of malicious objects cleaned: 0
Number of malicious files found: 0
Number of malicious files cleaned: 0
Scanning time: 0s

Scanning running processes and process memory...

Number of objects found: 1299
Number of objects scanned: 1299
Number of objects not scanned: 0
Number of malicious memory objects found: 0
Number of malicious objects cleaned: 0
Number of malicious files found: 0
Number of malicious files cleaned: 0
Scanning time: 1m 14s

Running full scan...
C:\WINDOWS\system32\config\system.LOG: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\software.LOG: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\default.LOG: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\SECURITY.LOG: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\SAM.LOG: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\SECURITY: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\SOFTWARE: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\SYSTEM: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\DEFAULT: Error opening file for read: 0x00000020
C:\WINDOWS\system32\config\SAM: Error opening file for read: 0x00000020
C:\WINDOWS\system32\drivers\mouclass.sys.vir: File infected with W32/tdss.drv.gen8
Deleted file: C:\WINDOWS\system32\drivers\mouclass.sys.vir
C:\WINDOWS\system32\CatRoot2\tmp.edb: Error opening file for read: 0x00000020
C:\WINDOWS\system32\CatRoot2\edb.log: Error opening file for read: 0x00000020
C:\WINDOWS\Temp\fb_804.lck: Error opening file for read: 0x00000020
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff02adb23c5b5760b717f82a3e60a78b5f593c5c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\ff\0\ff041858a8faa6552694c72e9488303b649bea82: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\.......................

C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\00\f\00fa215f1d12d8b08f54e93a15c85214e6ae827c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\00\f\00fa215f1d12d8b08f54e93a15c85214e6ae827c: Damaged file
C:\Documents and Settings\All Users\Application Data\Rosetta Stone\Content\data\00\f\00fa215f1d12d8b08f54e93a15c85214e6ae827c: Damaged file
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG: Error opening file for read: 0x00000020
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat: Error opening file for read: 0x00000020
C:\Documents and Settings\NetworkService\ntuser.dat.LOG: Error opening file for read: 0x00000020
C:\Documents and Settings\NetworkService\NTUSER.DAT: Error opening file for read: 0x00000020
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG: Error opening file for read: 0x00000020
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat: Error opening file for read: 0x00000020
C:\Documents and Settings\LocalService\ntuser.dat.LOG: Error opening file for read: 0x00000020
C:\Documents and Settings\LocalService\NTUSER.DAT: Error opening file for read: 0x00000020
C:\Documents and Settings\Brian\ntuser.dat.LOG: Error opening file for read: 0x00000020
C:\Documents and Settings\Brian\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG: Error opening file for read: 0x00000020
C:\Documents and Settings\Brian\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat: Error opening file for read: 0x00000020
C:\Documents and Settings\Brian\Local Settings\Application Data\cmv.exe: File infected with W32/Suspicious_Gen2.LQLJN
Deleted file: C:\Documents and Settings\Brian\Local Settings\Application Data\cmv.exe
ANTIMALWARE – QUICK SCAN LOG
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7035

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

17/07/2011 23:30:44
mbam-log-2011-07-17 (23-30-21).txt

Scan type: Quick scan
Objects scanned: 171523
Time elapsed: 2 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 5
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Brian\Local Settings\Application Data\cmv.exe" -a "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{831A05A7-D3FE-4EDD-9DEB-32CE8678A858}\NameServer (Trojan.DNSChanger) -> Bad: (93.188.165.180,93.188.160.240) Good: () -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{BDF9C23B-C874-4626-BCB2-2916EC846417}\NameServer (Trojan.DNSChanger) -> Bad: (93.188.165.180,93.188.160.240) Good: () -> No action taken.
HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (NOTEPAD.EXE %1) Good: (regedit.exe "%1") -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

ANTIMALWARE – FULL SCAN LOG
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7035

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

17/07/2011 23:58:42
mbam-log-2011-07-17 (23-58-33).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 301226
Time elapsed: 23 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\system volume information\_restore{34d68daf-79fa-487b-a9ef-b4d3a903e416}\RP425\A0096759.exe (Trojan.FakeAlert) -> No action taken.
c:\system volume information\_restore{34d68daf-79fa-487b-a9ef-b4d3a903e416}\RP501\A0121267.exe (Spyware.Agent) -> No action taken.
XP NETWORKING DIIAGNOSTICS
Last diagnostic run time: 07/18/11 00:38:22 Gateway Diagnostic
Gateway

info The following proxy configuration is being used by IE: Automatically Detect Settings:Disabled Automatic Configuration Script: Proxy Server: Proxy Bypass list:
info This computer has the following default gateway entry(ies): 192.168.1.1
info This computer has the following IP address(es): 192.168.1.10
info The default gateway is in the same subnet as this computer
info The default gateway entry is a valid unicast address
info The default gateway address was resolved via ARP in 1 try(ies)
info The default gateway was reached via ICMP Ping in 1 try(ies)
warn Hostname www.microsoft.com could not be resolved (Error code 0x2afc). Could be either gateway or DNS issue
action Automated repair: Renew IP address
action Releasing the current IP address...
action Successfully released the current IP address
action Renewing the IP address...
action Successfully renewed the current IP address
info This computer has the following default gateway entry(ies): 192.168.1.1
info This computer has the following IP address(es): 192.168.1.10
info The default gateway is in the same subnet as this computer
info The default gateway entry is a valid unicast address
info The default gateway address was resolved via ARP in 1 try(ies)
info The default gateway was reached via ICMP Ping in 1 try(ies)
warn Hostname www.microsoft.com could not be resolved (Error code 0x2afc). Could be either gateway or DNS issue
action Automated repair: Reset network connection
action Disabling the network adapter
action Enabling the network adapter
info Network adapter successfully enabled
error Unexpected error from iphlpapi: The pipe is being closed.
error Unexpected error from iphlpapi: The pipe is being closed.
error Failed with error 0x800700E8: The pipe is being closed.



IP Layer Diagnostic
Corrupted IP routing table

info The default route is valid
info The loopback route is valid
info The local host route is valid
info The local subnet route is valid
Invalid ARP cache entries

action The ARP cache has been flushed



IP Configuration Diagnostic
Invalid IP address

info Valid IP address detected: 192.168.1.10



Wireless Diagnostic
Wireless - Service disabled

Wireless - User SSID

Wireless - First time setup

Wireless - Radio off

Wireless - Out of range

Wireless - Hardware issue

Wireless - Novice user

Wireless - Ad-hoc network

Wireless - Less preferred

Wireless - 802.1x enabled

Wireless - Configuration mismatch

Wireless - Low SNR




WinSock Diagnostic
WinSock status

info All base service provider entries are present in the Winsock catalog.
info The Winsock Service provider chains are valid.
info Provider entry MSAFD Tcpip [TCP/IP] passed the loopback communication test.
info Provider entry MSAFD Tcpip [UDP/IP] passed the loopback communication test.
info Provider entry RSVP UDP Service Provider passed the loopback communication test.
info Provider entry RSVP TCP Service Provider passed the loopback communication test.
info Connectivity is valid for all Winsock service providers.



Network Adapter Diagnostic
Network location detection

info Using home Internet connection
Network adapter identification

info Network connection: Name=Wireless Network Connection 2, Device=ASUS 802.11g Network Adapter, MediaType=LAN, SubMediaType=WIRELESS
info Network connection: Name=Local Area Connection, Device=Attansic L2 Fast Ethernet 10/100 Base-T Adapter, MediaType=LAN, SubMediaType=LAN
info Network connection: Name=Internet Connection, Device=Internet Connection, MediaType=SHARED ACCESS HOST RAS, SubMediaType=NONE
info Both Ethernet and Wireless connections available, prompting user for selection
action User input required: Select network connection
info Ethernet connection selected
Network adapter status

info Network connection status: Connected



HTTP, HTTPS, FTP Diagnostic
HTTP, HTTPS, FTP connectivity

warn HTTP: Error 12007 connecting to www.microsoft.com: The server name or address could not be resolved
warn HTTPS: Error 12007 connecting to www.microsoft.com: The server name or address could not be resolved
warn FTP (Passive): Error 12007 connecting to ftp.microsoft.com: The server name or address could not be resolved
warn HTTP: Error 12007 connecting to www.hotmail.com: The server name or address could not be resolved
warn HTTPS: Error 12007 connecting to www.passport.net: The server name or address could not be resolved
warn FTP (Active): Error 12007 connecting to ftp.microsoft.com: The server name or address could not be resolved
error Could not make an HTTP connection.
error Could not make an HTTPS connection.
error Could not make an FTP connection.
END OF LOGS

#12 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 18 July 2011 - 01:50 AM

Good morning JS,
having working connect to internet on my machines but not on sick laptop.
Herewith latest XP diagnostic of sick laptop.
Works neither with Firefox or IE.
WilliamL

Last diagnostic run time: 07/18/11 08:38:47
Gateway Diagnostic
Gateway

info The following proxy configuration is being used by IE: Automatically Detect Settings:Disabled Automatic Configuration Script: Proxy Server: Proxy Bypass list:
info This computer has the following default gateway entry(ies): 192.168.1.1
info This computer has the following IP address(es): 192.168.1.10
info The default gateway is in the same subnet as this computer
info The default gateway entry is a valid unicast address
info The default gateway address was resolved via ARP in 1 try(ies)
info The default gateway was reached via ICMP Ping in 1 try(ies)
warn Hostname www.microsoft.com could not be resolved (Error code 0x2afc). Could be either gateway or DNS issue
action Automated repair: Renew IP address
action Releasing the current IP address...
action Successfully released the current IP address
action Renewing the IP address...
action Successfully renewed the current IP address
info This computer has the following default gateway entry(ies): 192.168.1.1
info This computer has the following IP address(es): 192.168.1.10
info The default gateway is in the same subnet as this computer
info The default gateway entry is a valid unicast address
info The default gateway address was resolved via ARP in 1 try(ies)
info The default gateway was reached via ICMP Ping in 1 try(ies)
warn Hostname www.microsoft.com could not be resolved (Error code 0x2afc). Could be either gateway or DNS issue
action Automated repair: Reset network connection
action Disabling the network adapter
action Enabling the network adapter
info Network adapter successfully enabled
error Unexpected error from iphlpapi: The pipe is being closed.
error Unexpected error from iphlpapi: The pipe is being closed.
error Failed with error 0x800700E8: The pipe is being closed.

IP Layer Diagnostic
Corrupted IP routing table

info The default route is valid
info The loopback route is valid
info The local host route is valid
info The local subnet route is valid
Invalid ARP cache entries

action The ARP cache has been flushed

IP Configuration Diagnostic
Invalid IP address

info Valid IP address detected: 192.168.1.10

Wireless Diagnostic
Wireless - Service disabled

Wireless - User SSID

Wireless - First time setup

Wireless - Radio off

Wireless - Out of range

Wireless - Hardware issue

Wireless - Novice user

Wireless - Ad-hoc network

Wireless - Less preferred

Wireless - 802.1x enabled

Wireless - Configuration mismatch

Wireless - Low SNR


WinSock Diagnostic
WinSock status

info All base service provider entries are present in the Winsock catalog.
info The Winsock Service provider chains are valid.
info Provider entry MSAFD Tcpip [TCP/IP] passed the loopback communication test.
info Provider entry MSAFD Tcpip [UDP/IP] passed the loopback communication test.
info Provider entry RSVP UDP Service Provider passed the loopback communication test.
info Provider entry RSVP TCP Service Provider passed the loopback communication test.
info Connectivity is valid for all Winsock service providers.

Network Adapter Diagnostic
Network location detection

info Using home Internet connection
Network adapter identification

info Network connection: Name=Wireless Network Connection 2, Device=ASUS 802.11g Network Adapter, MediaType=LAN, SubMediaType=WIRELESS
info Network connection: Name=Local Area Connection, Device=Attansic L2 Fast Ethernet 10/100 Base-T Adapter, MediaType=LAN, SubMediaType=LAN
info Network connection: Name=Internet Connection, Device=Internet Connection, MediaType=SHARED ACCESS HOST RAS, SubMediaType=NONE
info Both Ethernet and Wireless connections available, prompting user for selection
action User input required: Select network connection
info Ethernet connection selected
Network adapter status

info Network connection status: Connected

HTTP, HTTPS, FTP Diagnostic
HTTP, HTTPS, FTP connectivity

warn HTTP: Error 12007 connecting to www.microsoft.com: The server name or address could not be resolved
warn HTTPS: Error 12007 connecting to www.microsoft.com: The server name or address could not be resolved
warn FTP (Passive): Error 12007 connecting to ftp.microsoft.com: The server name or address could not be resolved
warn HTTP: Error 12007 connecting to www.hotmail.com: The server name or address could not be resolved
warn HTTPS: Error 12007 connecting to www.passport.net: The server name or address could not be resolved
warn FTP (Active): Error 12007 connecting to ftp.microsoft.com: The server name or address could not be resolved
error Could not make an HTTP connection.
error Could not make an HTTPS connection.
error Could not make an FTP connection.

#13 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,761 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:11:26 AM

Posted 18 July 2011 - 06:54 AM

Lets check some settings in your system:
  • Enter your Control Panel and double-click on Network Connections
  • Then right click on your Default Connection
    • Usually Local Area Connection for Cable and DSL, or AOL Connection.
  • Left click on Properties
  • Double-Click on the Internet Protocol (TCP/IP) item
  • Select the radio dial that says Obtain DNS Servers Automatically
  • Press OK twice to get out of the properties screen
  • Restart the computer
Go to Start->Run->Type CMD and click Ok. The MSDOS Window will be displayed. At the command prompt, type the following and press Enter after each line:


netsh int ip reset C:\Resetlog.txt
netsh winsock reset catalog
ipconfig /flushdns
(The space between g and / is needed)
Exit

Restart the computer. Attempt to connect and let me know the outcome.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#14 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 18 July 2011 - 09:38 AM

SV, thanks for this. Our household awaits each of your missives with bated breath.
Did the CMD stuff, looked OK.
Then entered ESET site easily via IE, and initiated on-line scan.
Found threats ….. copy of logtext

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudCgp.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined

C:\Documents and Settings\Brian\Application Data\Sun\Java\Deployment\cache\6.0\44\1e8e536c-4e2e736a a variant of Java/TrojanDownloader.OpenStream.NCE trojan cleaned by deleting - quarantined

C:\System Volume Information\_restore{34D68DAF-79FA-487B-A9EF-B4D3A903E416}\RP501\A0121161.ini Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined

C:\Qoobox\Quarantine\C\WINDOWS\system32\abLRBJlm.ini.vir Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined

Seems to be working correctly now, am about to start installing 31 security updates that are needed.
Will install a virus checker, probably AVG-Free (if you do not like that one and still prefer AVAST please say so).
I will continue to run on-line checkers for a few days, ESET, Kaspersky, Antimalware and any others you care to recommend.
A hint as to what went wrong (if possible) would be appreciated…. Apart from the fact that security updates were clearly not done.
Many thanks, I will make a donation ‘tout-suite’.

WilliamL

#15 williamL

williamL
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 18 July 2011 - 03:21 PM

JS, thanks again. When using Microsoft Update we have acquired "Microsoft Security Essentials", which is a new 'program to me. Hopefully it can co-exist with AVG. Any thoughts about the two dll's, namely 'bho' and 'toolband'?
Thanks,
WilliamL




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users