Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

XP won't load after System Restore virus removal attempt


  • This topic is locked This topic is locked
45 replies to this topic

#1 JasonBC

JasonBC

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 31 October 2011 - 10:27 PM

Hello -

I have followed the steps found on this site for removing the System Restore virus from XP SP3.

http://www.bleepingcomputer.com/virus-removal/remove-system-restore

I ran RKill and TDSSKiller in Safe Mode as described, and they appeared to be successful. However, after rebooting via TDSSKiller app to run Malwarebytes, the PC hung up at the blue Windows XP splash screen.

I have tried to load Windows normally and via every Safe Mode option with the same result. To be clear, the first black XP screen appears when I load XP normally, and when using Safe Mode I initially see a black screen with Safe Mode in the corners, but then the PC hangs up at the second, blue XP screen that appears just before the OS should finally appear.

I also tried to boot from a XP install disc, but I got a blue screen telling me that Windows has been terminated because there was a problem.

Unsurprisingly, this event comes at a very inconvenient time. I have a deadline this week, and people are waiting on files from me. For this reason, doing a clean install of XP at the moment is not the most desirable option.

Any guidance will be appreciated.

JC

Edited by JasonBC, 31 October 2011 - 11:00 PM.


BC AdBot (Login to Remove)

 


#2 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 31 October 2011 - 11:18 PM

Hi, :welcome:

Lets give it a try.

We will need to view the system status from an external environment. You will need a USB drive and a CD to burn. There will be several steps to follow.

Download GETxPUD.exe to the desktop of your clean computer
  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Next download driver.sh to your USB drive
  • Also Download Query.exe to the USB drive. In your working computer, navigate to the USB drive and click on the Query.exe. A folder and a file, query.sh, will be extracted.
  • Remove the USB & CD and insert them in the sick computer
  • Boot the Sick computer with the CD you just burned
  • The computer must be set to boot from the CD
  • In some computers you need to tap F12 and choose to boot from the CD, in others is the Esc key. Please consult your computer's documentation.
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Then type bash driver.sh -af
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:

    Winlogon.exe

  • Press Enter
  • If successful, the script will search for this file.
  • After it has completed the search enter the next file to be searched
  • Type the following:

    volsnap.sys

  • Press Enter
  • If successful, the script will search for this file.
  • After it has completed the search enter the next file to be searched
  • Type the following:

    explorer.exe

  • Press Enter
  • After it has completed the search enter the next file to be searched
  • Type the following:

    Userinit.exe

  • Press Enter
  • After the search is completed type Exit and press Enter.
  • After it has finished a report will be located in the USB drive as filefind.txt
  • While still in the Open Terminal, type bash query.sh
  • Press Enter
  • After it has finished a report will be located in the USB drive as RegReport.txt
  • Then type dd if=/dev/sda of=mbr.bin bs=512 count=1


    Leave a space among the following Statements:

    dd is the executable application used to create the backup
    if=/dev/sda is the device the backup is created from - the hard drive when only one HDD exists
    of=mbr.bin is the backup file to create - note the lack of a path - it will be created in the directory currently open in the Terminal
    bs=512 is the number of bytes in the backup
    count=1 says to backup just 1 sector


    It is extremely important that the if and of statements are correctly entered.

  • Press Enter
  • After it has finished a report will be located in the USB drive as mbr.bin
  • Plug the USB back into the clean computer, zip the mbr.bin, and except for the mbr.bin zipped file, post the contents of the report.txt, filefind.txt and RegReport.txt in your next reply. The mbr.bin zipped file must be attached to your reply.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#3 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 12:24 AM

Thanks so much for the speedy reply.

Please find the contents of the report.txt, filefind.txt and RegReport.txt files below, and I've attached the zipped MBR.bin file.

report.txt

Mon Oct 31 23:37:00 UTC 2011
Driver report for /mnt/sda1/WINDOWS/system32/drivers

c1536905ad2067812a238bce998f4bff 1394bus.sys
Microsoft Corporation

9859c0f6936e723e4892d7141b1327d5 acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys
Microsoft Corporation

7e775010ef291da96ad17ca4b17137d7 afd.sys
Microsoft Corporation

d7701d7e72243286cc88c9973d891057 amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys
Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f arp1394.sys
Microsoft Corporation

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys
Microsoft Corporation

97129408c8760f3421c1551ba3f3899d ati2mtag.sys
ATI Technologies

dc6957811ff95f2dd3004361b20d8d3f AtiHdmi.sys
ATI

9916c1225104ba14794209cfa8012159 atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68 audstub.sys
Microsoft Corporation

c2f56b680c4207521630c013e0ece002 bcmidi2.sys
tHOVS_VERSION_INFO?bStringFileInfo>bCommentsBCMIDI(Release)rncompiledby:rnAdministrator@W.localrnDate://rnRevision:n'CompanyNameBehringerSpezielleStudiotechnikGmbHbFileDescriptionBCMIDIbFileVersion...DInternalNameBCMIDI-ReleaseZLegalCopyrightCopyrightBehringer@bOriginalFilenameBCMIDI.SYSd"ProductNameUSBDriverforB-ControlF/R:vProductVersion,,,DVarFileInfo$Translationt

da1f27d85e0d1525f6621372e7b685e9 beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys
Microsoft Corporation

9714b7c918c6543d69074ec101f86ac4 cdr4_xp.sys
Sonic Solutions

0d856d16c08440bfb566d6cdd9948d4e cdralw2k.sys
Sonic Solutions

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys
Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys
Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys
Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25 disk.sys
Microsoft Corporation

d992fe1274bde0f84ad826acae022a41 dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 DMusic.sys
Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys
Microsoft Corporation

4342f977e9315ffc695ed33e35652d1b echo24.sys
tH`bVS_VERSION_INFOvv?btStringFileInfoBRCompanyNameEchoDigitalAudioCorp..FileDescriptionWDMdriverforGina,Layla,Mona,andMia*FileVersion.vInternalNameecho.sysLegalCopyrightCopyright©EchoDigitalAudioCorp.->vOriginalFilenameecho.sys|.ProductNameWDMdriverforGina,Layla,Mona,andMia.ProductVersion.DVarFileInfo$TranslationtPbT

80d1b490b60e74e002dc116ec5d41748 enum1394.sys
Microsoft Corporation

38d332a6d56af32635675f132548343e fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys
Microsoft Corporation

d45926117eb9fa946a6af572fbe1caa3 fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltMgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys
Microsoft Corporation

ff76e5cef809ac94f3b3d07e77a65483 gbxavs.sys
b(HXhxph(bh(%pCThXVS_VERSION_INFOq?,StringFileInfobbCommentsPCompanyNameNativeInstrumentsGmbHPFileDescriptionMaschineController:rFileVersion..®HInternalNameMaschineControllerFLegalCopyrightCopyright(LegalTrademarksPOriginalFilenameMaschineControllerPrivateBuildn'ProductNameNativeInstrumentsMaschineController>rProductVersion..(IA)$SpecialBuildDVarFileInfo$Translation(`*

e75a4234021368fdac7b6c8cef1a3201 gbxusb.sys
H`VS_VERSION_INFOq?,StringFileInfobbCommentsPCompanyNameNativeInstrumentsGmbHPFileDescriptionMaschineController:rFileVersion..®HInternalNameMaschineControllerFLegalCopyrightCopyright(LegalTrademarksPOriginalFilenameMaschineControllerPrivateBuildn'ProductNameNativeInstrumentsMaschineController>rProductVersion..(IA)$SpecialBuildDVarFileInfo$Translation*

573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys
Windows Server DDK provider

1af592532532a402ed7c060f6954004f hidclass.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys
Microsoft Corporation

f6aacf5bce2893e0c1754afeb672e5c9 http.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys
Microsoft Corporation

083a052659f5310dd8b6a6cb05edcf8e imapi.sys
Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys
Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys
Microsoft Corporation

b07084095f8c03aadb9811c9df14b5e4 jraid.sys
tH``PPVS_VERSION_INFOa'a'?baStringFileInfoBRCompanyNameJMicronTechnologyCorp.^FileDescriptionJMicronJMBXRAIDDriverXFileVersion...builtby:WinDDKnInternalNameJRAID.SYSdLegalCopyrightCopyright©JMicron-<nOriginalFilenameJRAID.SYSVProductNameJMicronJMBXRAIDDriver:vProductVersion...DVarFileInfo$Translationt

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys
Microsoft Corporation

9ef487a186dea361aa06913a75b3fa99 kbdhid.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys
Microsoft Corporation

56c128e5a723f41fc254cdc01e31cf8e KMW_KBD.sys
tH`VS_VERSION_INFO?aStringFileInfoBXCompanyNameKensingtonTechnologyGrouph"LegalCopyrightCopyrightACCOBrands,Inc.(ProductNameKMWtProductVersion...DCommentsKensingtonMouseWorkstFileVersion...FileDescriptionKensingtonMouseWorksKeyboardClassFilterDriver@bOriginalFilenameKMW_Kbd.sysbInternalNameKMW_Kbd.sys*SpecialBuildDVarFileInfo$Translationt*

a6c9eeea7d0fb4749fe5027d8625b038 KMW_LIB.sys
tHrVS_VERSION_INFO?aStringFileInfoBXCompanyNameKensingtonTechnologyGrouph"LegalCopyrightCopyrightACCOBrands,Inc.(ProductNameKMWtProductVersion...DCommentsKensingtonMouseWorkstFileVersion...r%FileDescriptionKensingtonMouseWorksLibraryDriver@bOriginalFilenameKMW_LIB.sysbInternalNameKMW_LIB.sys*SpecialBuildDVarFileInfo$TranslationtT

56ab6419f4a49b91964c5c6ded4b0fbe KMW_SYS.sys
tH[VS_VERSION_INFO?aStringFileInfoBXCompanyNameKensingtonTechnologyGrouph"LegalCopyrightCopyrightACCOBrands,Inc.(ProductNameKMWtProductVersion...DCommentsKensingtonMouseWorkstFileVersion...j!FileDescriptionKensingtonMouseWorksWDMDriver@bOriginalFilenameKMW_SYS.sysbInternalNameKMW_SYS.sys*SpecialBuildDVarFileInfo$Translationtdwb

ef593601f3a79bf852fdade89df41223 KMW_USB.sys
tH!VS_VERSION_INFO?aStringFileInfoBXCompanyNameKensingtonTechnologyGrouph"LegalCopyrightCopyrightACCOBrands,Inc.(ProductNameKMWtProductVersion...DCommentsKensingtonMouseWorkstFileVersion....FileDescriptionKensingtonMouseWorksUSBLowerFilterDriver@bOriginalFilenameKMW_USB.sysbInternalNameKMW_USB.sys*SpecialBuildDVarFileInfo$TranslationtX?d

f4113231a526f7f7a3242048c3c2a67c kore2avs.sys
HdVS_VERSION_INFOa?StringFileInfobCommentsPCompanyNameNativeInstrumentsGmbHLFileDescriptionKoreControllervFileVersion...DInternalNameKoreControllerFLegalCopyrightCopyright(LegalTrademarksLOriginalFilenameKoreControllerPrivateBuildj%ProductNameNativeInstrumentsKoreController@ProductVersion..(IA)$SpecialBuildDVarFileInfo$Translation*

8481f266d67ce78e130ef63d29ab6e95 kore2usb.sys
HtVS_VERSION_INFOa?StringFileInfobCommentsPCompanyNameNativeInstrumentsGmbHLFileDescriptionKoreControllervFileVersion...DInternalNameKoreControllerFLegalCopyrightCopyright(LegalTrademarksLOriginalFilenameKoreControllerPrivateBuildj%ProductNameNativeInstrumentsKoreController@ProductVersion..(IA)$SpecialBuildDVarFileInfo$Translation*

b467646c54cc746128904e1654c750c1 ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys
Microsoft Corporation

6b5d093711eadd77c789b0150dc4879c ma_cmidi.sys
tH@[VS_VERSION_INFO?bbStringFileInfo>EbCompanyNameM-Audioz)FileDescriptionM-AudioUSBMIDIKeyboardWindowsDriver.aFileVersion..XInternalNameUSBMIDIKeyboardInterfaceLegalCopyrightCopyright-MIDIMAN,Inc.Allrightsreserved.|*LegalTrademarksAllMIDIMANandM-Audiotrademarksapply.BrOriginalFilenameMA_CMIDI.SYSh$ProductNameM-AudioUSBMIDIKeyboardInterfaceaProductVersion..DVarFileInfo$Translationtlp

69a6268d7f81e53d568ab4e7e991caf3 mbam.sys
Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
Microsoft Corporation

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys
Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys
Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys
Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726 mqac.sys
Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys
Microsoft Corporation

60ae98742484e7ab80c3c1450e708148 mrxsmb.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 MSKSSRV.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e MSPCLOCK.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d MSPQM.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys
Microsoft Corporation

2f625d11385b1a94360bfc70aaefdee1 mup.sys
Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys
Microsoft Corporation

1ab3d00c991ab086e69db84b6c0ed78f ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys
Microsoft Corporation

6215023940cfd3702b46abc304e1d45a ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys
Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys
Microsoft Corporation

73c1e1f395918bc2c6dd67af7591a3ad null.sys
Microsoft Corporation

8267b7f5aef78b52d1de30716921fcef nvnusbaudio.sys
tH`VS_VERSION_INFO?btStringFileInfolBDCompanyNameNovationDMSLtd.FileDescriptionNovationUSBAudioDrivernFileVersion...bInternalNameNvnUsbAudiot(LegalCopyrightCopyright-NovationDMSLtd.HOriginalFilenamenvnusbaudio.sysTProductNameNovationUSBAudioDrivernProductVersion...DVarFileInfo$Translationt

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys
Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740 nwrdr.sys
Microsoft Corporation

ca33832df41afb202ee7aeb05145922f ohci1394.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
Microsoft Corporation

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys
Microsoft Corporation

e82a496c3961efc6828b508c310ce98f portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys
Parallel Technologies

153d02480a0a2f45785522e814c634b6 PxHelp20.sys
Sonic Solutions

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys
Microsoft Corporation

6728e45b66f93c08f11de2e316fc70dd rdpwd.sys
Microsoft Corporation

f828dd7e1419b6653894a8f97a0094c5 redbook.sys
Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys
Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c rmcast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys
Microsoft Corporation

eeb84629064abcb6198864d25bf15b1a Rtenicxp.sys
Realtek Semiconductor

4aaa8312732655f93a254d1fa695eb79 RtkHDAud.sys
Realtek Semiconductor

b244960e5a1db8e9d5d17086de37c1e4 sbp2port.sys
Microsoft Corporation

72aecf54aac22b20956d08610972b5a1 SBREDrv.sys
m?nStringFileInfoeBCompanyNameSunbeltSoftwarePFileDescriptionAnti-RootkitEnginetFileVersion..tInternalNameSBRE.sys=LegalCopyrightCopyright-SunbeltSoftware.Allrightsreserved.LegalTrademarksSUNBELTSOFTWAREandthe"S"logoareregisteredtrademarksofSunbeltSoftware.CounterSpySDKisatrademarkofSunbeltSoftware.:tOriginalFilenameSBRE.sysvProductNameCounterSpytProductVersion..VProductBuildDate//::AMDVarFileInfo$TranslationtPADDINGXXPAD

76c465f570e90c28942d52ccb2580a10 scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys
Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys
Microsoft Corporation

bcc773872041aa59bc9a6cf770fb32e2 snapman.sys
Acronis

489703624dac94ed943c2abda022a1cd sonydcam.sys
Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys
Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys
Microsoft Corporation

3bb03f2ba89d2be417206c373d2af17c srv.sys
Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys
Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys
Microsoft Corporation

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys
Microsoft Corporation

fb9f32acc1d3ad523f7ec900b66fc1bb tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys
Microsoft Corporation

3b7b6779eb231f731bba8f9fe67aadfc tdrpman.sys
Acronis

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e termdd.sys
Microsoft Corporation

b0b3122bff3910e0ba97014045467778 tifsfilt.sys
Acronis

13bfe330880ac0ce8672d00aa5aff738 timntr.sys
Acronis

699450901c5ccfd82357cbc531cedd23 tosdvd.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys
Microsoft Corporation

679b92294c3cbb4bcfc40aa1c8521062 uks11ldr.sys
tHHHVS_VERSION_INFO?StringFileInfobbCompanyNameMIDIMANj)CommentsRevisedbyDougFetterSoftwareWizardry:tFileDescriptionUKSLDR*FileVersion.tInternalNameUKSLDRl$LegalCopyrightCopyright-Midiman,Inc.:tOriginalFilenameUKSLDRProductNameMidimanUSBKeystationLoader.ProductVersion.DVarFileInfo$Translationth-j

402ddc88356b1bac0ee3dd1580c76a31 update.sys
Microsoft Corporation

57af81fbaa297c254541cddfbe8d2cb4 USB11LDR.SYS
tHPPVS_VERSION_INFO?StringFileInfobbCompanyNameMIDIMANj)CommentsRevisedbyDougFetterSoftwareWizardry:tFileDescriptionUSBLDR*FileVersion.tInternalNameUSBLDRl$LegalCopyrightCopyright-Midiman,Inc.:tOriginalFilenameUSBLDRb!ProductNameMidimanUSBMidiSportxLoader.ProductVersion.DVarFileInfo$Translationt

30f4bc860686599dc751357d8a7881fa usb22ldr.sys
tHPPVS_VERSION_INFO?StringFileInfobbCompanyNameMIDIMANj)CommentsRevisedbyDougFetterSoftwareWizardry:tFileDescriptionUSBLDR*FileVersion.tInternalNameUSBLDRl$LegalCopyrightCopyright-Midiman,Inc.:tOriginalFilenameUSBLDRb!ProductNameMidimanUSBMidiSportxLoader.ProductVersion.DVarFileInfo$Translationt

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys
Microsoft Corporation

e919708db44ed8543a7c017953148330 USBAUDIO.sys
Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys
Microsoft Corporation

359a92fa19cb9dd031f7c55eca968096 USBMN1X1.SYS
tHOVS_VERSION_INFO?bStringFileInfoEBCommentsDevelopedbyM-AudiobCompanyNameM-AudioFileDescriptionM-AudioUSBMidixMidiInterfaceWindowsDriver.aFileVersion..XInternalNameUSBMidixMidiInterfaceLegalCopyrightCopyright-MIDIMAN,Inc.Allrightsreserved.|*LegalTrademarksAllMIDIMANandM-Audiotrademarksapply.BrOriginalFilenameUSBMMX.SYSh$ProductNameM-AudioUSBMidixMidiInterfaceaProductVersion..DVarFileInfo$Translationtdh

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys
Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9 USBSTOR.SYS
Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys
Microsoft Corporation

e28726b72c46821a28830e077d39a55b videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys
Microsoft Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys
Microsoft Corporation

d918617b46457b9ac28027722e30f647 wdf01000.sys
Microsoft Corporation

399c974dda25fd3e59f22bab787f662b wdfldr.sys
Microsoft Corporation

6768acf64b18196494413695f0c3a00f wdmaud.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys
Microsoft Corporation

cf4def1bf66f06964dc0d91844239104 wpdusb.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311 WudfPf.sys
Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b WudfRd.sys
Microsoft Corporation

filefind.txt

Search results for Winlogon.exe

ed0ef0a136dec83df69f04118870003e /mnt/sda1/WINDOWS/system32/winlogon.exe
496.0K Apr 14 2008

ed0ef0a136dec83df69f04118870003e /mnt/sda1/WINDOWS/system32/dllcache/winlogon.exe
496.0K Apr 14 2008


Search results for volsnap.sys

4c8fcb5cc53aab716d810740fe59d025 /mnt/sda1/WINDOWS/system32/dllcache/volsnap.sys
51.1K Apr 14 2008

4c8fcb5cc53aab716d810740fe59d025 /mnt/sda1/WINDOWS/system32/drivers/volsnap.sys
51.1K Apr 14 2008


Search results for explorer.exe

12896823fb95bfb3dc9b46bcaedc9923 /mnt/sda1/WINDOWS/system32/dllcache/explorer.exe
1009.5K Apr 14 2008

12896823fb95bfb3dc9b46bcaedc9923 /mnt/sda1/WINDOWS/explorer.exe
1009.5K Apr 14 2008


Search results for Userinit.exe

a93aee1928a9d7ce3e16d24ec7380f89 /mnt/sda1/WINDOWS/system32/dllcache/userinit.exe
25.5K Apr 14 2008

a93aee1928a9d7ce3e16d24ec7380f89 /mnt/sda1/WINDOWS/system32/userinit.exe
25.5K Apr 14 2008

Regreport.txt

Remote Registry Report

Hive </mnt/sda1/WINDOWS/system32/config/software>
\Microsoft\Windows NT\CurrentVersion> Value <ProductName> of type REG_SZ, data length 42 [0x2a]
Microsoft Windows XP
\Microsoft\Windows NT\CurrentVersion> Value <CSDVersion> of type REG_SZ, data length 30 [0x1e]
Service Pack 3
\Microsoft\Windows NT\CurrentVersion> Value <SystemRoot> of type REG_SZ, data length 22 [0x16]
F:\WINDOWS
\Microsoft\Windows NT\CurrentVersion\Windows> Value <AppInit_DLLs> of type REG_SZ, data length 2 [0x2]
(...)\Windows NT\CurrentVersion\Winlogon> Value <Shell> of type REG_SZ, data length 26 [0x1a]
Explorer.exe
(...)\Windows NT\CurrentVersion\Winlogon> Value <Userinit> of type REG_SZ, data length 68 [0x44]
C:\WINDOWS\system32\userinit.exe,
(...)\Windows NT\CurrentVersion\Winlogon\Notify> Node has 13 subkeys and 0 values
<!SASWinLogon>
<AtiExtEvent>
<crypt32chain>
<cryptnet>
<cscdll>
<dimsntfy>
<ScCertProp>
<Schedule>
<sclgntfy>
<SensLogn>
<termsrv>
<WgaLogon>
<wlballoon>
\Microsoft\Windows\CurrentVersion\Run> Node has 1 subkeys and 9 values
<OptionalComponents>
size type value name [value if type DWORD]
4 REG_SZ <GEST>
64 REG_SZ <JMB36X IDE Setup>
80 REG_SZ <36X Raid Configurer>
26 REG_SZ <ATIModeChange>
150 REG_SZ <StartCCC>
24 REG_SZ <kmw_run.exe>
2 REG_SZ <MSWheel>
122 REG_SZ <SunJavaUpdateSched>
136 REG_SZ <iiovsVgraP.exe>
(...)\Windows\CurrentVersion\policies\system> Node has 0 subkeys and 6 values
4 REG_DWORD <dontdisplaylastusername> 0 [0x0]
4 REG_DWORD <legalnoticecaption> 1 [0x1]
8 REG_SZ <legalnoticetext>
4 REG_DWORD <shutdownwithoutlogon> 1 [0x1]
4 REG_DWORD <undockwithoutlogon> 1 [0x1]
4 REG_DWORD <DisableTaskMgr> 1 [0x1]


Hive </mnt/sda1/Documents and Settings/PCAudioLabs User/NTUSER.DAT>
(...)\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 1 values
size type value name [value if type DWORD]
62 REG_SZ <ctfmon.exe>
(...)\Windows\CurrentVersion\Policies\Explorer> Node has 0 subkeys and 1 values
4 REG_DWORD <NoDriveTypeAutoRun> 145 [0x91]
(...)\Windows\CurrentVersion\Policies\System> Node has 0 subkeys and 0 values

#4 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 01 November 2011 - 10:19 AM

Please find the contents of the report.txt, filefind.txt and RegReport.txt files below, and I've attached the zipped MBR.bin file.


The zipped MBR.bin was not attached. Please try to attach it again.

Thanks.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#5 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 10:40 AM

Here it is

Attached Files

  • Attached File  mbr.zip   597bytes   3 downloads


#6 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 01 November 2011 - 02:29 PM

  • Download NTBR_CD by noahdfear.
  • Extract its contents to the desktop.
  • Once extracted, open the NTBR_CD folder and click on the BurnItCD application.
  • Insert a blank CD when prompted. The .iso image will be burned to the CD.
  • Boot the computer with the CD you just burned and follow the prompts.
  • Press Enter for English.
  • At the menu type 1 to select MBRWORK then hit Enter

    This screen will show the hard drive configuration.
    Posted Image
  • Type 5 to Install standard MBR code then hit Enter
  • Type 1 to select Standard then hit Enter
  • Type Y then hit Enter to confirm
  • Type E then hit Enter to exit
  • Back at the menu, type 6 to Quit.
  • Press Ctrl+Alt+Del to restart the machine.
  • Eject the CD upon restart and boot normally.

If successful, run Combofix as follows:

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link or this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      If AVG or CA Internet Security Suite is installed, you must remove these programs before using Combofix. If any of these applications will not uninstall, it is first recommended to uninstall it with AppRemover by Opswat. http://www.appremover.com/supported-applications. Do not use AppRemover on Norton

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • Install the Recovery Console if prompted.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" .
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

Please do not install any new programs or update anything (always allow your antivirus/antispyware to update) unless told to do so while we are fixing your problem. If combofix alerts to a new version and offers to update, please let it. It is essential we always use the latest version.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#7 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 07:59 PM

I followed these instructions through the last step before Combofix

14. Eject the CD upon restart and boot normally.

but the system still hangs at the blue XP splash screen as before. Should I repeat the MBRWORK process?

Thanks again.

JC

#8 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 01 November 2011 - 08:24 PM

Attempt to boot in Safe Mode. What's the result?

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#9 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 08:46 PM

Same. XP hangs at the same screen as in Normal mode. What next?

#10 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 01 November 2011 - 09:01 PM

Very strange. Is this a desktop or a tower PC?

Boot to xPUD.

Click on File and expand mnt. Check the sda1 folder. Is there a TDSS report saved in that folder? Is yes, copy that file to the USB drive and post its contents in your next reply.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#11 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 09:22 PM

The PC is rackmounted.


There is a TDSS file named TDSSKiller.2.6.14.0_31.10.2011_19.02.19_log.txt

The contents are as follows :


19:02:19.0562 0976 TDSS rootkit removing tool 2.6.14.0 Oct 28 2011 11:11:01
19:02:19.0640 0976 ============================================================
19:02:19.0640 0976 Current date / time: 2011/10/31 19:02:19.0640
19:02:19.0640 0976 SystemInfo:
19:02:19.0640 0976
19:02:19.0640 0976 OS Version: 5.1.2600 ServicePack: 3.0
19:02:19.0640 0976 Product type: Workstation
19:02:19.0640 0976 ComputerName: PCAUDIOLABS-DAW
19:02:19.0640 0976 UserName: PCAudioLabs User
19:02:19.0640 0976 Windows directory: C:\WINDOWS
19:02:19.0640 0976 System windows directory: C:\WINDOWS
19:02:19.0640 0976 Processor architecture: Intel x86
19:02:19.0640 0976 Number of processors: 4
19:02:19.0640 0976 Page size: 0x1000
19:02:19.0640 0976 Boot type: Safe boot
19:02:19.0640 0976 ============================================================
19:02:22.0625 0976 Initialize success
19:02:24.0140 1000 ============================================================
19:02:24.0140 1000 Scan started
19:02:24.0140 1000 Mode: Manual;
19:02:24.0140 1000 ============================================================
19:02:24.0921 1000 Abiosdsk - ok
19:02:24.0937 1000 abp480n5 - ok
19:02:24.0937 1000 ACPI - ok
19:02:24.0953 1000 ACPIEC - ok
19:02:24.0968 1000 adpu160m - ok
19:02:24.0984 1000 aec - ok
19:02:25.0000 1000 AFD - ok
19:02:25.0000 1000 Aha154x - ok
19:02:25.0015 1000 aic78u2 - ok
19:02:25.0031 1000 aic78xx - ok
19:02:25.0046 1000 AliIde - ok
19:02:25.0062 1000 amsint - ok
19:02:25.0078 1000 Arp1394 - ok
19:02:25.0093 1000 asc - ok
19:02:25.0093 1000 asc3350p - ok
19:02:25.0109 1000 asc3550 - ok
19:02:25.0140 1000 AsyncMac - ok
19:02:25.0156 1000 atapi - ok
19:02:25.0171 1000 Atdisk - ok
19:02:25.0203 1000 ati2mtag - ok
19:02:25.0218 1000 AtiHdmiService - ok
19:02:25.0234 1000 Atmarpc - ok
19:02:25.0250 1000 audstub - ok
19:02:25.0265 1000 BCMIDI - ok
19:02:25.0281 1000 Beep - ok
19:02:25.0296 1000 cbidf2k - ok
19:02:25.0312 1000 cd20xrnt - ok
19:02:25.0328 1000 Cdaudio - ok
19:02:25.0328 1000 Cdfs - ok
19:02:25.0343 1000 Cdrom - ok
19:02:25.0359 1000 Changer - ok
19:02:25.0390 1000 CmdIde - ok
19:02:25.0406 1000 Cpqarray - ok
19:02:25.0421 1000 dac2w2k - ok
19:02:25.0437 1000 dac960nt - ok
19:02:25.0453 1000 Disk - ok
19:02:25.0468 1000 dmboot - ok
19:02:25.0484 1000 dmio - ok
19:02:25.0500 1000 dmload - ok
19:02:25.0515 1000 DMusic - ok
19:02:25.0531 1000 dpti2o - ok
19:02:25.0546 1000 drmkaud - ok
19:02:25.0562 1000 echo24 - ok
19:02:25.0593 1000 Fastfat - ok
19:02:25.0609 1000 Fdc - ok
19:02:25.0625 1000 Fips - ok
19:02:25.0640 1000 Flpydisk - ok
19:02:25.0640 1000 FltMgr - ok
19:02:25.0656 1000 Fs_Rec - ok
19:02:25.0671 1000 Ftdisk - ok
19:02:25.0687 1000 gbxavs - ok
19:02:25.0687 1000 gbxusb - ok
19:02:25.0703 1000 gbxusb_svc - ok
19:02:25.0718 1000 gdrv - ok
19:02:25.0718 1000 Gpc - ok
19:02:25.0734 1000 HDAudBus - ok
19:02:25.0765 1000 HidUsb - ok
19:02:25.0781 1000 hpn - ok
19:02:25.0781 1000 HTTP - ok
19:02:25.0796 1000 i2omgmt - ok
19:02:25.0812 1000 i2omp - ok
19:02:25.0828 1000 i8042prt - ok
19:02:25.0843 1000 Imapi - ok
19:02:25.0859 1000 ini910u - ok
19:02:25.0875 1000 IntcAzAudAddService - ok
19:02:25.0890 1000 IntelIde - ok
19:02:25.0906 1000 intelppm - ok
19:02:25.0906 1000 Ip6Fw - ok
19:02:25.0921 1000 IpFilterDriver - ok
19:02:25.0937 1000 IpInIp - ok
19:02:25.0953 1000 IpNat - ok
19:02:25.0953 1000 IPSec - ok
19:02:25.0968 1000 IRENUM - ok
19:02:25.0984 1000 isapnp - ok
19:02:26.0015 1000 JRAID - ok
19:02:26.0031 1000 Kbdclass - ok
19:02:26.0031 1000 kbdhid - ok
19:02:26.0046 1000 kmixer - ok
19:02:26.0062 1000 KMW_KBD - ok
19:02:26.0078 1000 KMW_SYS - ok
19:02:26.0078 1000 KMW_USB - ok
19:02:26.0093 1000 kore2avs - ok
19:02:26.0109 1000 kore2usb - ok
19:02:26.0125 1000 KSecDD - ok
19:02:26.0140 1000 lbrtfdc - ok
19:02:26.0187 1000 MA_CMIDI - ok
19:02:26.0203 1000 mnmdd - ok
19:02:26.0218 1000 Modem - ok
19:02:26.0234 1000 Mouclass - ok
19:02:26.0250 1000 mouhid - ok
19:02:26.0250 1000 MountMgr - ok
19:02:26.0265 1000 mraid35x - ok
19:02:26.0281 1000 MRxDAV - ok
19:02:26.0281 1000 MRxSmb - ok
19:02:26.0312 1000 Msfs - ok
19:02:26.0328 1000 MSKSSRV - ok
19:02:26.0343 1000 MSPCLOCK - ok
19:02:26.0343 1000 MSPQM - ok
19:02:26.0359 1000 mssmbios - ok
19:02:26.0375 1000 Mup - ok
19:02:26.0375 1000 NDIS - ok
19:02:26.0390 1000 NdisTapi - ok
19:02:26.0406 1000 Ndisuio - ok
19:02:26.0421 1000 NdisWan - ok
19:02:26.0421 1000 NDProxy - ok
19:02:26.0437 1000 NetBIOS - ok
19:02:26.0453 1000 NetBT - ok
19:02:26.0484 1000 NIC1394 - ok
19:02:26.0515 1000 Npfs - ok
19:02:26.0531 1000 Ntfs - ok
19:02:26.0546 1000 Null - ok
19:02:26.0562 1000 NvnUsbAudio - ok
19:02:26.0578 1000 NwlnkFlt - ok
19:02:26.0593 1000 NwlnkFwd - ok
19:02:26.0593 1000 ohci1394 - ok
19:02:26.0609 1000 Parport - ok
19:02:26.0625 1000 PartMgr - ok
19:02:26.0625 1000 ParVdm - ok
19:02:26.0640 1000 PCI - ok
19:02:26.0640 1000 PCIDump - ok
19:02:26.0656 1000 PCIIde - ok
19:02:26.0671 1000 Pcmcia - ok
19:02:26.0671 1000 PDCOMP - ok
19:02:26.0687 1000 PDFRAME - ok
19:02:26.0703 1000 PDRELI - ok
19:02:26.0718 1000 PDRFRAME - ok
19:02:26.0718 1000 perc2 - ok
19:02:26.0734 1000 perc2hib - ok
19:02:26.0781 1000 PptpMiniport - ok
19:02:26.0796 1000 PSched - ok
19:02:26.0796 1000 Ptilink - ok
19:02:26.0812 1000 PxHelp20 - ok
19:02:26.0828 1000 ql1080 - ok
19:02:26.0843 1000 Ql10wnt - ok
19:02:26.0843 1000 ql12160 - ok
19:02:26.0859 1000 ql1240 - ok
19:02:26.0875 1000 ql1280 - ok
19:02:26.0875 1000 RasAcd - ok
19:02:26.0890 1000 Rasl2tp - ok
19:02:26.0906 1000 RasPppoe - ok
19:02:26.0921 1000 Raspti - ok
19:02:26.0937 1000 Rdbss - ok
19:02:26.0937 1000 RDPCDD - ok
19:02:26.0953 1000 rdpdr - ok
19:02:26.0968 1000 RDPWD - ok
19:02:26.0984 1000 redbook - ok
19:02:27.0031 1000 RTLE8023xp - ok
19:02:27.0046 1000 SASDIFSV - ok
19:02:27.0078 1000 SASKUTIL - ok
19:02:27.0093 1000 sbp2port - ok
19:02:27.0109 1000 Secdrv - ok
19:02:27.0125 1000 serenum - ok
19:02:27.0140 1000 Serial - ok
19:02:27.0171 1000 Sfloppy - ok
19:02:27.0203 1000 Simbad - ok
19:02:27.0218 1000 snapman - ok
19:02:27.0234 1000 Sparrow - ok
19:02:27.0250 1000 splitter - ok
19:02:27.0265 1000 sr - ok
19:02:27.0281 1000 Srv - ok
19:02:27.0312 1000 swenum - ok
19:02:27.0312 1000 swmidi - ok
19:02:27.0343 1000 symc810 - ok
19:02:27.0343 1000 symc8xx - ok
19:02:27.0359 1000 sym_hi - ok
19:02:27.0375 1000 sym_u3 - ok
19:02:27.0375 1000 sysaudio - ok
19:02:27.0406 1000 Tcpip - ok
19:02:27.0406 1000 TDPIPE - ok
19:02:27.0421 1000 tdrpman - ok
19:02:27.0437 1000 TDTCP - ok
19:02:27.0453 1000 TermDD - ok
19:02:27.0484 1000 tifsfilter - ok
19:02:27.0484 1000 timounter - ok
19:02:27.0500 1000 TosIde - ok
19:02:27.0531 1000 Udfs - ok
19:02:27.0546 1000 UKS11LDR - ok
19:02:27.0562 1000 ultra - ok
19:02:27.0562 1000 Update - ok
19:02:27.0593 1000 USB22LDR - ok
19:02:27.0609 1000 usbaudio - ok
19:02:27.0625 1000 usbccgp - ok
19:02:27.0640 1000 usbehci - ok
19:02:27.0656 1000 usbhub - ok
19:02:27.0656 1000 USBSTOR - ok
19:02:27.0671 1000 usbuhci - ok
19:02:27.0687 1000 VgaSave - ok
19:02:27.0687 1000 ViaIde - ok
19:02:27.0703 1000 VolSnap - ok
19:02:27.0734 1000 Wanarp - ok
19:02:27.0750 1000 Wdf01000 - ok
19:02:27.0750 1000 WDICA - ok
19:02:27.0765 1000 wdmaud - ok
19:02:27.0859 1000 WudfPf - ok
19:02:27.0875 1000 WudfRd - ok
19:02:27.0937 1000 MBR (0x1B8) (5e12ecee90ab3e1730889e9c4b8f725d) \Device\Harddisk0\DR0
19:02:27.0968 1000 \Device\Harddisk0\DR0 ( Rootkit.Boot.SST.b ) - infected
19:02:27.0968 1000 \Device\Harddisk0\DR0 - detected Rootkit.Boot.SST.b (0)
19:02:27.0984 1000 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk1\DR1
19:02:27.0984 1000 \Device\Harddisk1\DR1 - ok
19:02:28.0000 1000 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk2\DR2
19:02:28.0015 1000 \Device\Harddisk2\DR2 - ok
19:02:28.0015 1000 MBR (0x1B8) (671b81004fdd1588fa9ed1331c9ceca9) \Device\Harddisk3\DR9
19:02:31.0953 1000 \Device\Harddisk3\DR9 - ok
19:02:31.0953 1000 Boot (0x1200) (2baf9fd28862a5c3adf9a5b905d11afa) \Device\Harddisk0\DR0\Partition0
19:02:31.0953 1000 \Device\Harddisk0\DR0\Partition0 - ok
19:02:31.0968 1000 Boot (0x1200) (3ad48a37fda30c52d72d9f666f87488b) \Device\Harddisk1\DR1\Partition0
19:02:31.0968 1000 \Device\Harddisk1\DR1\Partition0 - ok
19:02:31.0984 1000 Boot (0x1200) (caeb7fbc213e791491ce1bd4da15679d) \Device\Harddisk2\DR2\Partition0
19:02:31.0984 1000 \Device\Harddisk2\DR2\Partition0 - ok
19:02:32.0000 1000 Boot (0x1200) (2b278435a74f70f0ff014b14a3ccb45f) \Device\Harddisk3\DR9\Partition0
19:02:32.0000 1000 \Device\Harddisk3\DR9\Partition0 - ok
19:02:32.0000 1000 ============================================================
19:02:32.0000 1000 Scan finished
19:02:32.0000 1000 ============================================================
19:02:32.0031 0992 Detected object count: 1
19:02:32.0031 0992 Actual detected object count: 1
19:03:05.0125 0992 \Device\Harddisk0\DR0 ( Rootkit.Boot.SST.b ) - will be cured on reboot
19:03:05.0125 0992 \Device\Harddisk0\DR0 - ok
19:03:05.0125 0992 \Device\Harddisk0\DR0 ( Rootkit.Boot.SST.b ) - User select action: Cure
19:03:09.0406 0964 Deinitialize success

#12 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 01 November 2011 - 10:11 PM

What TDSS found was an infection in the master boot record. MBRWORK should have taken care of it. Please repeat the MBRWORK process once again and select the Standard MBR. Let me know the outcome.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#13 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 10:35 PM

Unfortunately, after repeating the MBRWORK process I get the same result when trying to boot in Safe and Normal modes.

Can you say what would be causing this now that the infection seems to have been removed?

Edited by JasonBC, 01 November 2011 - 10:44 PM.


#14 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:50 PM

Posted 01 November 2011 - 11:02 PM

It is so close. The first Splash screen is Black with the Windows' bar on the bottom, then second is blue with words loading Windows, and lastly the Welcome Screen prior to the desktop. You are saying it is hanging on the second splash screen, which is blue. Is there any activity whatsoever in the computer when this occurs?

Unless there is a secondary infection such as the zero access Trojan, this seems to be a new behavior of this infection.

I would like to run another tool, but you will need to create a bootable CD. You will need the XP install CD. Click here for instructions.

Test the CD, if able to boot, follow these steps:

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

Plug the flashdrive into the infected PC and boot the PC with the CD you just created.

  • Browse to your USB drive and doubleclick frst.exe.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the flash drive. Please copy and paste it to your next reply.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#15 JasonBC

JasonBC
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:50 AM

Posted 01 November 2011 - 11:28 PM

It is frustrating.

I see the black screen just as in the photo at the top of this post:

http://www.pcoptimizationsecrets.com/how-to-speed-up-your-pc-by-disabling-xp-splash-screen/

Where it hangs is on the screen exactly like the first one in the post below, but without the Windows is Starting Up message. Initially, the hourglass appears, but then there is no further activity even after up to 30 minutes.

http://forums.malwarebytes.org/index.php?showtopic=74060

A question: the only XP install disc I have is 10 yrs. old and it is not the one used to install on this machine. Will using it adversely affect what I need to do? If not I will proceed with your instructions.


I very much appreciate you working with me on this. My week is going to turn bad very quickly business-wise if I can't sort this out.

Jason




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users