Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Most .exe files won't run


  • This topic is locked This topic is locked
20 replies to this topic

#1 wildoatz

wildoatz

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 13 August 2012 - 02:42 PM

Saturday around 3:30pm I was surfing the web. I had multiple tabs open, a google search page and various pages relating to heritage breeds of domestic livestock. No hooky dooky porn sites or anything like that. While I was reading the info on the pages, Adobe Flash Updater popped up and wanted to update so I let it. While it was downloading/installing, Avast! blocked something - all I could catch was 'dbe', at the same time a dialog popped up about installing Microsoft Legacy CPL (thinking this had to do with the Flash update - I let it). At this time without any warning my screen went black and I started rebooting. When I got back to my desktop, SuperAntiSpyware loaded but I no longer saw Avast in my system tray. I ran SuperAntiSpyware and it found a bunch of tracking cookies but nothing that looked serious. Avast will not work. Internet Explorer will not work. CCleaner works. Malbytes Anti-Malware does not work. Even my programs like ConnectedText or ZBrush will not work. I get the blue circle icon like its opening but nothing happens and busy icon goes away. Sometimes I get the dialog do I want this program to make changes to my computer and I say yes but nothing still happens.

What I have tried so far:
1. Booted into safe mode with networking, no dice. No IE, no avast, no MBAM.
2. Safe mode with command prompt, ran chkdsk, no problems with hard drive.
3. F8 (Advanced Boot Menu) Last Known Good Configuration, no dice.
4. F8 Repair Windows - it loads all the files then I get an error message 'F3-F100-0010' which is supposed to be hard drive related but I do not believe it is the hard drive.
5. Microsoft Security Essentials I get an error message 0x80070643
6. Tried uninstalling and reinstalling avast & Mbam but i get error 1719 windows installer service cannot be accessed so I can't uninstall or reinstall anything on the system.
7. Tried downloading a .reg file from Microsoft's site to restore .exe file association
8. Tried installing programs from a USB drive in normal mode. Tried moving programs from usb stick to hard drive, Told me there was no room even though I know I have 30GB of free space on hard drive. I can move the programs from usb to hard drive while in safe mode though. Do not get the no room on hard drive message in safe mode.
9. Tried renaming the avast & mbam installers to programs that work such as calc.exe & StikyNot.exe (both in \windows\system32\) and overwriting those files but computer says I do not have permission though I have administrator privileges.
10. No previous restore points are listed though I know for sure I made a restore point on 8/4 or 8/5.
11. Have Tdsskiller.exe in my downloads folder. Will not run.
12. Have ComboFix.exe in my downloads folder. Will not run.
13. Have RKill.exe in my downloads folder. Will not run.
Tried renameing ComboFix.exe to various innocuous names such as 123.exe. Will not run. I of course have not backed up my data in awhile. Any help you could give me would be appreciated. Really do not want to have to reinstall all my programs again.

I am running Windows 7 Home Premium. I have a Toshiba 17" laptop with 4GB of memory and a 250GB hard drive.

Edited by wildoatz, 13 August 2012 - 02:47 PM.


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,622 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:34 PM

Posted 18 August 2012 - 02:45 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/465060 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows, you should not bother creating a GMER log.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 21 August 2012 - 12:27 PM

Please excuse my delay in replying. After posting, a freak hail storm hit my area and I've been without internet access until today. Don't know how long it's going to last since Verizon told me it might take until the 1st of Sept. to fix, but I'm posting while I can. I downloaded dds.com and tried to run it. Again I get the busy circle, but nothing happens. Is there any particular place I should run it from? Should I be running it from a command prompt?

I am more than sure that I have 64 bit windows but I'm unable to verify it because when I right click on My Computer, nothing happens. So I have not tried to create a GMER log. Should I try to create a GMER log anyway? Will it screw up the computer if I do have 64 bit Windows 7?

Thanks again for your help. I have started backing up my data in the event I have to do a reinstall. I'm just really trying to avoid having to reinstall my programs. I know I should do an image backup but with four kids, I just never seem to have the money to buy a backup drive or DVDs. Please bear with me on my internet service. So far it's been up for an hour and I hope this is permanent but I have no way of knowing for sure since all Verizon has told me for the past week is there is a service outage in my area. (No duh!)

Thanks again.

#4 Oh My!

Oh My!

    Adware and Spyware and Malware.....


  • Malware Response Instructor
  • 36,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:06:34 PM

Posted 21 August 2012 - 02:04 PM

Greetings wildoatz and :welcome: to BleepingComputer's Virus/Trojan/Spyware/Malware Removal forum.

My name is Oh My! and I am here to help you! Now that we are "friends" please call me Gary. :thumbup2:


===================================================


Ground Rules:

  • First, I would also like to inform you that most of us here at Bleeping Computer offer our expert assistance out of the goodness of our hearts. Please try to match our commitment to you with your patience toward us. If this was easy we would never have met. :)
  • Please do not run any tools or take any steps other than those I will provide for you while we work on your computer together. I need to be certain about the state of your computer in order to provide appropriate and effective steps for you to take. Most often "well intentioned" (and usually panic driven!) independent efforts can make things much worse for both of us. If at any point you would prefer to take your own steps please let me know, I will not be offended. I would be happy to focus on the many others who are waiting in line for assistance.
  • Please perform all steps in the order they are listed in each set of instructions. Some steps may be a bit complicated. If things are not clear, be sure to stop and let me know. We need to work on this together with confidence.
  • Please copy and paste all logs into your post unless directed otherwise. Please do not re-run any programs I suggest. If you encounter problems simply stop and tell me about it.
  • When you post your reply, do not use the Posted Image button but use the Posted Image button instead.
  • In the upper right hand corner of the topic you will see the Posted Image button. Click on this then choose Immediate E-Mail notification and then Proceed and you will be sent an email once I have posted a response.
  • If you do not reply to your topic after 5 days we assume it has been abandoned and I will close it.
  • When your computer is clean I will alert you of such. I will also provide for you detailed information about how you can combat future infections.
  • I would like to remind you to make no further changes to your computer unless I direct you to do so.
  • Now let's get started :thumbup2:

===================================================


Now that I am assisting you, you can expect that I will be very responsive to your situation. If you are able, I would request you check this thread at least once per day so that we can try to resolve your issues effectively and efficiently. If you are going to be delayed please be considerate and post that information so that I know you are still with me. Unfortunately, there are many people waiting to be assisted and not enough of us at BleepingComputer to go around. I appreciate your understanding and diligence.

Let's start with some diagnostic information we will extract before your computer boots up. Please perform the following for me.


===================================================


Farbar's Recovery Scan Tool

--------------------

I would like you to run Farbar's Recovery Scan Tool to check your Master Boot Record (MBR). For this you will need a USB flash drive and start on a clean computer.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.
For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

Plug the flashdrive into the infected PC and we will enter the System Recovery Options one of the two following ways:

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select English as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:

  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select English as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
Once you are in the System Recovery Options menu you will get the following options:

Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt

  • Select Command Prompt
  • In the command window type in Notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select Computer and find your flash drive letter and close the notepad.
  • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.

===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • FRST.txt

Gary
 
If I do not reply within 24 hours please send me a Personal Message.

"Lord, to whom would we go? You have the words that give eternal life. We believe, and we know you are the Holy One of God."

#5 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 21 August 2012 - 06:13 PM

Thank you very kindly Gary for your assistance. I downloaded Farbar's Recovery Scan Tool onto a USB stick and rebooted and went into Advanced Recovery Options as per your directions. I chose Repair Your Computer. Windows started loading files. Then as per my initial post I get a dialog box with the following error message "Error F3-F100-0010'. I can get into Safe Mode with Command Prompt. Should I try running that program on the USB stick from there?

I understand from my searches that particular error message indicates a problem with my hard drive. However I don't believe there is a problem with the hard drive. All my data is there and nothing seems corrupted. I am able to get non-essential programs such as Windows Calculator to run but all my AV/malware programs, recovery options, restore points etc. seem to have been disabled (as per my initial post). I have had viruses/malware before that made it seem like my hard drive was wiped, blue screens of death, etc. and there was nothing wrong with my computer. It was the virus trying to make me think something was wrong.

Verizon has been having network problems in my area and this is the first time in a week that I've been able to connect to the internet. While today it seems they are on their way to fixing this problem, I have no guarantees that I will have access in an hour or tomorrow. I swear to you that if by some miracle I do stumble upon a solution on my own I will post that to this thread as soon as I am able, but I have tried everything I can think of and am stumped. I ask that you do not close this thread if I do not reply in a timely fashion.

#6 Oh My!

Oh My!

    Adware and Spyware and Malware.....


  • Malware Response Instructor
  • 36,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:06:34 PM

Posted 21 August 2012 - 06:25 PM

Greetings wildoatz,

If you happen to come up with something that you think is beneficial I would request you simply post what you found rather than take any actions on your computer. We need to be on the same page and although the step you would take might help, it could very easily complicate matters as well. It is important for me to be sure I know exactly where we are at.

Since there may be an issue with your hard drive (I don't know yet) it was a wise decision on your part to back up your data while you have access to it, just in case.

Please allow me a bit of time to review your situation and I will post back as soon as possible.
Gary
 
If I do not reply within 24 hours please send me a Personal Message.

"Lord, to whom would we go? You have the words that give eternal life. We believe, and we know you are the Holy One of God."

#7 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 21 August 2012 - 07:13 PM

Thanks again Gary. I am able to run Fabar in Safe Mode with Command Prompt. The program does announce that it may not work correctly in Safe Mode. Do you want me to attempt a scan anyway?

#8 Oh My!

Oh My!

    Adware and Spyware and Malware.....


  • Malware Response Instructor
  • 36,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:06:34 PM

Posted 21 August 2012 - 07:30 PM

Greetings wildoatz,

Farbar's Recovery Scan Tool is not designed to run effectively in Safe Mode. I appreciate you asking before performing it on your own.

Please try the following for me.


===================================================


Run sfc /scannow from Elevated Command

--------------------

  • Boot into Safe Mode
  • Click Start and Type cmd
  • Right click on Posted Image and select Posted Image
  • If you are prompted for an administrator password or for a confirmation, type the password, or click Allow
  • Type the following at the Command Prompt and press Enter

    sfc /scannow

  • If the program asks you for an Installation Disk and you have one please insert it. If you are asked and you don't have it please stop and let me know.
  • Upon completion, if you are notified corrupted files were found and repaired please do the following
  • Copy and paste the following after the command prompt and press Enter

    findstr /c:"[SR]" %windir%\Logs\CBS\CBS.log >"%userprofile%\Desktop\sfcdetails.txt"

  • A sfcdetails.txt document will be placed on your desktop
  • Copy and paste the contents of that file in your reply
  • If sfc /scannow detected corrupted files please reboot your computer to see if you notice any difference

===================================================


BlueScreenView

----------

  • Boot into Safe Mode if you are unable to boot into Normal Mode
  • Download BlueScreenView and save it to your desktop
  • Double click the BlueScreenView.exe file then click OK
  • Select Run, Next, then Next again
  • Click Install
  • When the scanning is complete, select Edit and Select All
  • Then click File and Save Selected Items
  • Save the report as BSOD.txt
  • Open BSOD.txt in Notepad, copy the entire content and paste it into your next reply
More information about the program can be found here


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • Did SFC run successfully? If so, please copy and paste the log file
  • BSOD.txt

Gary
 
If I do not reply within 24 hours please send me a Personal Message.

"Lord, to whom would we go? You have the words that give eternal life. We believe, and we know you are the Holy One of God."

#9 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 21 August 2012 - 08:02 PM

Dear Gary:

I am replying to you from the desktop pc at my studio. My laptop that is having the problem is unable to connect to the internet whether I have an internet connection or not. Internet Explorer does not open in Normal Mode or Safe Mode with Networking. I get the busy circle and then, again, nothing happens. So I am unable to copy and paste from the laptop directly to this thread. Sorry. I run back and forth from the desktop pc to the laptop.

I was able to run sfc /scannow. I get the following message "Windows Resource Protection did not find any integrity violations."

#10 Oh My!

Oh My!

    Adware and Spyware and Malware.....


  • Malware Response Instructor
  • 36,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:06:34 PM

Posted 21 August 2012 - 08:12 PM

Greetings wildoatz,

Here are modified instructions. We will put BlueScreenView on hold for a bit.

Please perform the following.


===================================================


GET xPUD MBR Dump and Driver Search

--------------------

For this step you will need a USB device and a blank CD. I have provided step by step instructions for this process in order to simplify the detailed task.

  • Download GETxPUD.exe to the desktop of your clean computer
  • Double click the Posted Image icon
  • Click Run
  • Double click the Posted Image folder which should now be on your desktop
  • Double click on Posted Image
  • The program will download xpud_0.9.2.iso, and when it is finished it will open a BurnCDCC window

    Posted Image
  • Click on Start, insert a blank CD when instructed, then click OK
  • When completed, the CD will eject for removal
  • Next download driver.sh to your USB drive
  • Remove the USB & CD and insert both into the infected computer
  • Boot the infected computer with the CD you just burned
  • As the computer boots up gently tap F12 and choose to boot from the CD by using the keyboard arrow keys to highlight CD/DVD and then hit Enter
  • At the first screen select English
  • A Welcome to xPUD screen will appear
  • Press File
  • Under File System on the left hand side click on the triangle symbol to expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB (you should see the driver.sh file)
  • Double click on the folder that represents your USB drive (sdb1 ?).
  • If you do not see the USB device show up, please remove it, wait about 5 seconds, reinsert it, then click on the Refresh icon. It should then be added under mnt
  • On the top bar select Tool then select Open Terminal
  • Type bash driver.sh and press Enter
  • After it has finished a report will be located on your USB device named report.txt
  • Now type bash driver.sh -af and press Enter
  • You will be prompted to input a file name. Please type the following then press Enter:

    Winlogon.exe
  • After the search is completed please type the following then press Enter:

    volsnap.sys
  • After the search is completed please type the following then press Enter:

    explorer.exe
  • After the search is completed please type the following then press Enter:

    Userinit.exe
  • After the search is complete please type Exit and press Enter
  • A report will be located in the USB drive as filefind.txt
  • Now please type the following and press Enter. Makes sure there is a space between the different colors.

    dd if=/dev/sda of=mbr.bin bs=512 count=1
  • After it has finished (within just a few seconds) a file will be located on your USB drive named mbr.bin.
  • Remove the USB drive, insert it back in your working computer
  • Navigate to mbr.bin, zip the file, and attach it to your next reply
  • Copy and paste the contents of report.txt and filefind.txt in your reply

===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • report.txt
  • filefind.txt
  • mbr.zip (attach)

Edited by Oh My, 22 August 2012 - 01:50 PM.

Gary
 
If I do not reply within 24 hours please send me a Personal Message.

"Lord, to whom would we go? You have the words that give eternal life. We believe, and we know you are the Holy One of God."

#11 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 22 August 2012 - 01:36 PM

Dear Gary: Internet went down last night before I could reply. Stayed up until 4am then finally went to sleep. I was able to vaccinate the desktop pc & USB drive with Panda USB. I see your instructions changed but I just wanted to let you know I was unable to get the blue screen program to install off the desktop or the USB drive in normal mode or safe mode on the troubled laptop.

Following your instructions above: I have the xPUD CD in the drive & the USB drive with driver.sh inserted. When I get up to the part "•Type bash.sh and press Enter" it says "Command not found". I checked everything again and it says the same thing. command not found. The only files on the USB drive are the autorun.inf file created by Panda USB & the driver.sh file. Should I delete the autorun.inf file & try again?

Edited by wildoatz, 22 August 2012 - 01:37 PM.


#12 Oh My!

Oh My!

    Adware and Spyware and Malware.....


  • Malware Response Instructor
  • 36,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:06:34 PM

Posted 22 August 2012 - 01:43 PM

Greetings wildoatz,

When I thought through it more thoroughly last night I figured BlueScreenView would not run yet.

I do apologize. I made an error in my instructions. Please type this instead:

bash driver.sh
Gary
 
If I do not reply within 24 hours please send me a Personal Message.

"Lord, to whom would we go? You have the words that give eternal life. We believe, and we know you are the Holy One of God."

#13 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 22 August 2012 - 02:50 PM

report.txt:

Wed Aug 22 15:04:31 UTC 2012
Driver report for /mnt/sda3/Windows/System32/drivers
2865d8b22868ae9d543ea7a6f23beb7e fbd.sys has NO Company Name!

64edd3f59db321947969fdf1dd747323 1394bus.sys
Microsoft Corporation

a87d604aea360176311474c87a63bb88 1394ohci.sys
Microsoft Corporation

99f8e788246d495ce3794d7e7821d2ca acpipmi.sys
Microsoft Corporation

d81d9e70b8a6dd14d42d7b4efa65d5f2 acpi.sys
Microsoft Corporation

2f6b34b83843f0c5118b63ac634f5bf4 adp94xx.sys
Adaptec

597f78224ee9224ea1a13d6350ced962 adpahci.sys
Adaptec

e109549c90f62fb570b9540c4b148e54 adpu320.sys
Adaptec

1c7857b62de5994a75b054a9fd4c3825 afd.sys
Microsoft Corporation

7ecff9b22276b73f43a99a15a6094e90 agilevpn.sys
Microsoft Corporation

608c14dba7299d8cb6ed035a68a15799 AGP440.sys
Microsoft Corporation

98022774d9930ecbb292e70db7601df6 agrsm64.sys
tH`VS_VERSION_INFOYY?RStringFileInfo.BtCompanyNameLSICorpXFileDescriptionSoftModemDeviceDrivertFileVersion...nInternalNameLSISM.sysbLegalCopyrightCopyrightLSICorp-<nOriginalFilenameLSISM.sysJProductNameLSISoftModemDrivertProductVersion...DVarFileInfo$Translation*

5812713a477a3ad7363c7438ca2ee038 aliide.sys
Acer Laboratories

1ff8b4431c353ce385c875f194924c0c amdide.sys
Microsoft Corporation

7024f087cff1833a806193ef9d22cda9 amdk8.sys
Microsoft Corporation

1e56388b3fe0d031c44144eb8c4d6217 amdppm.sys
Microsoft Corporation

53d8d46d51d390abdb54eca623165cb7 amdsata.sys
Advanced Micro Devices

f67f933e79241ed32ff46a4f29b5120b amdsbs.sys
AMD Technologies

75c51148154e34eb3d7bb84749a758d5 amdxata.sys
Advanced Micro Devices

89a69c3f2f319b43379399547526d952 appid.sys
Microsoft Corporation

019af6924aefe7839f61c830227fe79c arcsas.sys
Adaptec

c484f8ceb1717c540242531db7845c4e arc.sys
Adaptec

df59b8e8df0bd2e0e303778a3806a17d aswFsBlk.sys
?baStringFileInfopB>CompanyNameAVASTSoftware|*FileDescriptionavast!FileSystemAccessBlockingDrivervFileVersion...:rInternalNameaswFsBlk.sysh"LegalCopyrightCopyright©AVASTSoftwareBrOriginalFilenameaswFsBlk.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt*

f8e6ab4f876feff69250f2e0c29ef004 aswMonFlt.sys
?baStringFileInfoB>CompanyNameAVASTSoftwareFileDescriptionavast!FileSystemMinifilterforWindows/VistavFileVersion...<InternalNameaswMonFlt.sysh"LegalCopyrightCopyright©AVASTSoftwareDOriginalFilenameaswMonFlt.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt*

aa92bc4bcba40ca3aa3ffd1be24f0c09 aswRdr2.sys
?bStringFileInfolB>CompanyNameAVASTSoftware^FileDescriptionavast!WFPRedirectDriverXFileVersion...builtby:WinDDKvInternalNameaswRdr.sysh"LegalCopyrightCopyright©AVASTSoftware>vOriginalFilenameaswRdr.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt

952edc2e81f85d1781958d4128bf59f8 aswRdr.sys
tH`VS_VERSION_INFOW?bStringFileInfolB>CompanyNameAVASTSoftwareTFileDescriptionavast!TDIRDRDriverXFileVersion...builtby:WinDDKvInternalNameaswRdr.sysr'LegalCopyrightCopyright©-AVASTSoftware>vOriginalFilenameaswRdr.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt

f06e230e1e8ca9437a6474b7b551cd37 aswSnx.sys
?batStringFileInfoPB>CompanyNameAVASTSoftwarebFileDescriptionavast!VirtualizationDrivervFileVersion...vInternalNameaswSnx.sysh"LegalCopyrightCopyright©AVASTSoftware>vOriginalFilenameaswSnx.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt*

3610ca74a69e380424f0452dec5c1317 aswSP.sys
?balStringFileInfoHB>CompanyNameAVASTSoftwaredFileDescriptionavast!selfprotectionmodulevFileVersion...nInternalNameaswSP.sysh"LegalCopyrightCopyright©AVASTSoftware<nOriginalFilenameaswSP.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt*

87de3e31cb0091d22351349869324065 aswTdi.sys
?bStringFileInfohB>CompanyNameAVASTSoftwareZFileDescriptionavast!TDIFilterDriverXFileVersion...builtby:WinDDKvInternalNameaswTdi.sysh"LegalCopyrightCopyright©AVASTSoftware>vOriginalFilenameaswTdi.sysPProductNameavast!AntivirusSystem,ProductVersion.DVarFileInfo$Translationt*

769765ce2cc62867468cea93969b2242 asyncmac.sys
Microsoft Corporation

02062c0b390b7729edc9e69c680a6f3c atapi.sys
Microsoft Corporation

a34fe1e025e88798e746f484956c0720 ataport.sys
Microsoft Corporation

aefaf27f1b7e52c705df4fb6c96732f6 atikmdag.sys
ATI Technologies

8149db73be27950ec72767a1193153a6 atikmpag.sys
Advanced Micro Devices

7c5d273e29dcc5505469b299c6f29163 AtiPcie.sys
Advanced Micro Devices

aefaf27f1b7e52c705df4fb6c96732f6 atipmdag.sys
ATI Technologies

b5ace6968304a3900eeb1ebfd9622df2 b57nd60a.sys
Broadcom Corporation

f4de2ae7a9e1badac70bc71ea2c17612 battc.sys
Microsoft Corporation

16a47ce2decc9b099349a5f840654746 beep.sys
Microsoft Corporation

61583ee3c3a17003c4acd0475646b4d3 blbdrive.sys
Microsoft Corporation

6c02a83164f5cc0a262f4199f0871cf5 bowser.sys
Microsoft Corporation

f09eee9edc320b5e1501f749fde686c8 BrFiltLo.sys
Brother Industries

b114d3098e9bdb8bea8b053685831be6 BrFiltUp.sys
Brother Industries

5c2f352a4e961d72518261257aae204b bridge.sys
Microsoft Corporation

43bea8d483bf1870f018e2d02e06a5bd BrSerId.sys
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries
Brother Industries

a6eca2151b08a09caceca35c07f05b42 BrSerWdm.sys
Brother Industries

b79968002c277e869cf38bd22cd61524 BrUsbMdm.sys
Brother Industries

a87528880231c54e75ea7a44943b38bf BrUsbSer.sys
Brother Industries

9da669f11d1f894ab4eb69bf546a42e8 bthmodem.sys
Microsoft Corporation

3e5b191307609f7514148c6832bb0842 bxvbda.sys
Broadcom Corporation

b8bd2bb284668c84865658c77574381a cdfs.sys
Microsoft Corporation

f036ce71586e93d94dab220d7bdf4416 cdrom.sys
Microsoft Corporation

d7cd5c4e1b71fa62050515314cfb52cf circlass.sys
Microsoft Corporation

acfad0b512226c7a83c7cb09fd55a9ad Classpnp.sys
Microsoft Corporation

0840155d0bddf1190f84a663c284bd33 CmBatt.sys
Microsoft Corporation

e19d3f095812725d88f9001985b94edd cmdide.sys
CMD Technology

9ac4f97c2d3e93367e2148ea940cd2cd cng.sys
Microsoft Corporation

102de219c3f61415f964c88e9085ad14 compbatt.sys
Microsoft Corporation

03edb043586cceba243d689bdda370a8 CompositeBus.sys
Microsoft Corporation

3e588b60ec061686ba05d33574a344c6 crashdmp.sys
Microsoft Corporation

1c827878a998c18847245fe1f34ee597 crcdisk.sys
Microsoft Corporation

9bb2ef44eaa163b29c4a4587887a0fe4 dfsc.sys
Microsoft Corporation

13096b05847ec78f0977f2c0f79e9ab3 discache.sys
Microsoft Corporation

9bbd8b5855bc6578957f82341f9cde5a Diskdump.sys
Microsoft Corporation

9819eee8b5ea3784ec4af3b137a5244c disk.sys
Microsoft Corporation

9b19f34400d24df84c858a421c205754 drmkaud.sys
Microsoft Corporation

21d26064aedb4988f785bb4a3a2c051e drmk.sys
Microsoft Corporation

839b5fe3d48e9f35b22c21a3d5103f6c Dumpata.sys
Microsoft Corporation

814db88f2641691575a455cf25354098 dumpfve.sys
Microsoft Corporation

bf24d6f2ed97fe830bfd52b246f98e67 dxapi.sys
Microsoft Corporation

f5bee30450e18e6b83a5012c100616fd dxgkrnl.sys
Microsoft Corporation

9cd68bddf322535c02adc8331013d13d dxgmms1.sys
Microsoft Corporation

fede0629ecb23650d48989517d4914da dxg.sys
Microsoft Corporation

0e5da5369a0fcaea12456dd852545184 elxstor.sys
Emulex

34a3c54752046e79a126e15c51db409b errdev.sys
Microsoft Corporation

dc5d737f51be844d8c82c695eb17372f evbda.sys
Broadcom Corporation

a510c654ec00c1e9bdd91eeb3a59823b exfat.sys
Microsoft Corporation

0adc83218b66a6db380c330836f3e36d fastfat.sys
Microsoft Corporation

2865d8b22868ae9d543ea7a6f23beb7e fbd.sys

d765d19cd8ef61f650c384f62fac00ab fdc.sys
Microsoft Corporation

655661be46b5f5f3fd454e2c3095b930 fileinfo.sys
Microsoft Corporation

5f671ab5bc87eea04ec38a6cd5962a47 filetrace.sys
Microsoft Corporation

c172a0f53008eaeb8ea33fe10e177af5 flpydisk.sys
Microsoft Corporation

da6b67270fd9db3697b20fce94950741 fltMgr.sys
Microsoft Corporation

d43703496149971890703b4b1b723eac fsdepends.sys
Microsoft Corporation

6bd9295cc032dd3077c671fccf579a7b fs_rec.sys
Microsoft Corporation

1f7b25b858fa27015169fe95e54108ed fvevol.sys
Microsoft Corporation

63b5129d7127e7757fcc9ea9d3763963 FWPKCLNT.SYS
Microsoft Corporation

8c778d335c9d272cfd3298ab02abe3b6 GAGP30KX.SYS
Microsoft Corporation

f2523ef6460fc42405b12248338ab2f0 hcw85cir.sys
Hauppauge Computer Works

97bfed39b6b79eb12cddbfeed51f56bb hdaudbus.sys
Microsoft Corporation

975761c778e33cd22498059b91e7373a HdAudio.sys
Microsoft Corporation

78e86380454a7b10a5eb255dc44a355f hidbatt.sys
Microsoft Corporation

7fd2a313f7afe5c4dab14798c48dd104 hidbth.sys
Microsoft Corporation

8b0e40e7e8bbf5acf390465609d89ff1 hidclass.sys
Microsoft Corporation

0a77d29f311b88cfae3b13f9c1a73825 hidir.sys
Microsoft Corporation

49ee2e52e6cd03947dad72f65367be06 hidparse.sys
Microsoft Corporation

9592090a7e2b61cd582b612b6df70536 hidusb.sys
Microsoft Corporation

39d2abcd392f3d8a6dce7b60ae7b8efc HpSAMD.sys
Hewlett-Packard

0ea7de1acb728dd5a369fd742d6eee28 http.sys
Microsoft Corporation

a5462bd6884960c9dc85ed49d34ff392 hwpolicy.sys
Microsoft Corporation

fa55c73d4affa7ee23ac4be53b4592d3 i8042prt.sys
Microsoft Corporation

aaaf44db3bd0b9d1fb6969b23ecc8366 iaStorV.sys
Intel Corporation

5c18831c61933628f5bb0ea2675b9d21 iirsp.sys
Intel Corp

f00f20e70c6ec3aa366910083a0518aa intelide.sys
Microsoft Corporation

ada036632c664caa754079041cf1f8c1 intelppm.sys
Microsoft Corporation

c9f0e1bd74365a8771590e9008d22ab6 ipfltdrv.sys
Microsoft Corporation

0fc1aea580957aa8817b8f305d18ca3a IPMIDrv.sys
Microsoft Corporation

af9b39a7e7b6caa203b3862582e9f2d0 ipnat.sys
Microsoft Corporation

05360b1ea5a2abf620d1d96ebd8bd8f1 irda.sys
Microsoft Corporation

3abf5e7213eb28966d55d58b515d5ce9 irenum.sys
Microsoft Corporation

2f7b28dc3e1183e5eb418df55c204f38 isapnp.sys
Microsoft Corporation

bc02336f1cba7dcc7d1213bb588a68a5 kbdclass.sys
Microsoft Corporation

0705eff5b42a9db58548eec3b26bb484 kbdhid.sys
Microsoft Corporation

97a7070aea4c058b6418519e869a63b4 ksecdd.sys
Microsoft Corporation

26c43a7c2862447ec59deda188d1da07 ksecpkg.sys
Microsoft Corporation

24fbf5cc5c04150073c315a7c83521ee ks.sys
Microsoft Corporation

6869281e78cb31a43e969f06b57347c4 ksthunk.sys
Microsoft Corporation

c8b3131857931ae76798a741cc52b021 Lbd.sys
Lavasoft

1538831cf8ad2979a04c423779465827 lltdio.sys
Microsoft Corporation

41e122f6d1448c94cc05196bc41d6bfb LPCFilter.sys
tH`xxVS_VERSION_INFO@@?StringFileInfobCommentsNCompanyNameCOMPALELECTRONICINC.<nFileDescriptionLPCFilterbFileVersion,,,nInternalNameLPCFilterLegalCopyrightCopyright©CompalElectronics,INC.-(LegalTrademarksDOriginalFilenameLPCFilter.sysPrivateBuildProductName<bProductVersion,,,SpecialBuildDVarFileInfo$Translationt*

1a93e54eb0ece102495a51266dcdb6a6 lsi_fc.sys
LSI Corporation

30f5c0de1ee8b5bc9306c1f0e4a75f93 lsi_sas2.sys
LSI Corporation

1047184a9fdc8bdbff857175875ee810 lsi_sas.sys
LSI Corporation

0504eacaff0d3c8aed161c4b0d369d4a lsi_scsi.sys
LSI Corporation

43d0f98e1d56ccddb0d5254cff7b356e luafv.sys
Microsoft Corporation

dc8490812a3b72811ae534f423b4c206 mbam.sys
Malwarebytes Corporation

3c9f072f9dca856b9fb7a20cbd4281ac mcd.sys
Microsoft Corporation

a55805f747c6edb6a9080d7c633bd0f4 megasas.sys
LSI Corporation

baf74ce0072480c3b6b7c13b2a94d6b3 MegaSR.sys
LSI Corporation

800ba92f7010378b09f9ed9270f07137 modem.sys
Microsoft Corporation

b03d591dc7da45ece20b3b467e6aadaa monitor.sys
Microsoft Corporation

7d27ea49f3c1f687d357e77a470aea99 mouclass.sys
Microsoft Corporation

d3bf052c40b0c4166d9fd86a4288c1e6 mouhid.sys
Microsoft Corporation

32e7a3d591d671a6df2db515a5cbe0fa mountmgr.sys
Microsoft Corporation

a44b420d30bd56e145d6a2bc8768ec58 mpio.sys
Microsoft Corporation

6c38c9e45ae0ea2fa5e551f2ed5e978f mpsdrv.sys
Microsoft Corporation

dc722758b8261e1abafd31a3c0a66380 mrxdav.sys
Microsoft Corporation

d711b3c1d5f42c0c2415687be09fc163 mrxsmb10.sys
Microsoft Corporation

9423e9d355c8d303e76b8cfbd8a5c30c mrxsmb20.sys
Microsoft Corporation

a5d9106a73dc88564c825d317cac68ac mrxsmb.sys
Microsoft Corporation

c25f0bafa182cbca2dd3c851c2e75796 msahci.sys
Microsoft Corporation

db801a638d011b9633829eb6f663c900 msdsm.sys
Microsoft Corporation

aa3fb40e17ce1388fa1bedab50ea8f96 msfs.sys
Microsoft Corporation

f9d215a46a8b9753f61767fa72a20326 mshidkmdf.sys
Microsoft Corporation

d916874bbd4f8b07bfb7fa9b3ccae29d msisadrv.sys
Microsoft Corporation

d931d7309deb2317035b07c9f9e6b0bd msiscsi.sys
Microsoft Corporation

49ccf2c4fea34ffad8b1b59d49439366 mskssrv.sys
Microsoft Corporation

bdd71ace35a232104ddd349ee70e1ab3 mspclock.sys
Microsoft Corporation

4ed981241db27c3383d72092b618a1d0 mspqm.sys
Microsoft Corporation

759a9eeb0fa9ed79da1fb7d4ef78866d msrpc.sys
Microsoft Corporation

0eed230e37515a0eaee3c2e1bc97b288 mssmbios.sys
Microsoft Corporation

2e66f9ecb30b4221a318c92ac2250779 mstee.sys
Microsoft Corporation

7ea404308934e675bffde8edf0757bcd MTConfig.sys
Microsoft Corporation

f9a18612fd3526fe473c1bda678d61c8 mup.sys
Microsoft Corporation

9f9a1f53aad7da4d6fef5bb73ab811ac ndiscap.sys
Microsoft Corporation

79b47fd40d9a817e932f9d26fac0a81c ndis.sys
Microsoft Corporation

30639c932d9fef22b31268fe25a1b6e5 ndistapi.sys
Microsoft Corporation

136185f9fb2cc61e573e676aa5402356 ndisuio.sys
Microsoft Corporation

53f7305169863f0a2bddc49e116c2e11 ndiswan.sys
Microsoft Corporation

015c0d8e0e0421b4cfd48cffe2825879 ndproxy.sys
Microsoft Corporation

86743d9f5d2b1048062b14b1d84501c4 netbios.sys
Microsoft Corporation

09594d1089c523423b32a4229263f068 netbt.sys
Microsoft Corporation

c8e033ea95337fdce489d1d0348b9a23 netio.sys
Microsoft Corporation

77889813be4d166cdab78ddba990da92 nfrd960.sys
IBM Corp

1e4c4ab5c9b8dd13179bbdc75a2a01f7 npfs.sys
Microsoft Corporation

e7f5ae18af4168178a642a9247c63001 nsiproxy.sys
Microsoft Corporation

a2f74975097f52a00745f9637451fdd8 ntfs.sys
Microsoft Corporation

9899284589f75fa8724ff3d16aed75c1 null.sys
Microsoft Corporation

270d7cd42d6e3979f6dd0146650f0e05 NV_AGP.SYS
Microsoft Corporation

0a92cb65770442ed0dc44834632f66ad nvraid.sys
NVIDIA Corporation

dab0e87525c10052bf65f06152f37e4a nvstor.sys
NVIDIA Corporation

1ea3749c4114db3e3161156ffffa6b33 nwifi.sys
Microsoft Corporation

3589478e4b22ce21b41fa1bfc0b8b8a0 ohci1394.sys
Microsoft Corporation

0557cf5a2556bd58e26384169d72438d pacer.sys
Microsoft Corporation

0086431c29c35be1dbc43f52cc273887 parport.sys
Microsoft Corporation

e9766131eeade40a27dc27d2d68fba9c partmgr.sys
Microsoft Corporation

b5b8b5ef2e5cb34df8dcf8831e3534fa pciide.sys
Microsoft Corporation

144497daa145ba0f7be896064146c058 pciidex.sys
Microsoft Corporation

94575c0571d1462a0f70bde6bd6ee6b3 pci.sys
Microsoft Corporation

b2e81d4e87ce48589f98cb8c05b01f2f pcmcia.sys
Microsoft Corporation

d6b9c2e1a11a3a4b26a182ffef18f603 pcw.sys
Microsoft Corporation

68769c3356b3be5d1c732c97b9a80d6e PEAuth.sys
Microsoft Corporation

663962900e7fea522126ba287715bb4a PGEffect.sys
Toshiba Corporation

32e11315b5126921ffd9074840ef13d3 portcls.sys
Microsoft Corporation

0d922e23c041efb1c3fac2a6f943c9bf processr.sys
Microsoft Corporation

a53a15a11ebfd21077463ee2c7afeef0 ql2300.sys
QLogic Corporation

4f6d12b51de1aaeff7dc58c4d75423c8 ql40xx.sys
QLogic Corporation

76707bb36430888d9ce9d705398adb6c qwavedrv.sys
Microsoft Corporation

5a0da8ad5762fa2d91678a8a01311704 rasacd.sys
Microsoft Corporation

471815800ae33e6f1c32fb1b97c490ca rasl2tp.sys
Microsoft Corporation

855c9b1cd4756c5e9a2aa58a15f58c25 raspppoe.sys
Microsoft Corporation

f92a2c41117a11a00be01ca01a7fcde9 raspptp.sys
Microsoft Corporation

e8b1e447b008d07ff47d016c2b0eeecb rassstp.sys
Microsoft Corporation

77f665941019a1594d887a74f301fa2f rdbss.sys
Microsoft Corporation

302da2a0539f2cf54d7c6cc30c1f2d8d rdpbus.sys
Microsoft Corporation

cea6cc257fc9b7715f1c2b4849286d24 RDPCDD.sys
Microsoft Corporation

bb5971a4f00659529a5c44831af22365 RDPENCDD.sys
Microsoft Corporation

216f3fa57533d98e1f74ded70113177a RDPREFMP.sys
Microsoft Corporation

e61608aa35e98999af9aaeeea6114b0a rdpwd.sys
Microsoft Corporation

34ed295fa0121c241bfef24764fc4520 rdyboost.sys
Microsoft Corporation

caf88d6573d21cd2aa27001ddbfdc74d rmcast.sys
Microsoft Corporation

fc6d5c50d846b795335deb3fce8b33f3 RNDISMP.sys
Microsoft Corporation

388d3dd1a6457280f3badba9f3acd6b1 rootmdm.sys
Microsoft Corporation

ddc86e4f8e7456261e637e3552e804ff rspndr.sys
Microsoft Corporation

7ea8d2eb9bbfd2ab8a3117a1e96d3b3a Rt64win7.sys
?bStringFileInfoBCompanyNameRealtek*

4e821c740a675f6d040be41d59a62b1d RtHDMIVX.sys
Realtek Semiconductor

490947a9aff7ca31ef2e08f5776105eb RTKVHD64.sys
Realtek Semiconductor

a8ed9726734d403217a4861a6788b144 rtl8192se.sys
Realtek Semiconductor

907c4464381b5ebdfdc60f6c7d0dedfc RtsUStor.sys
Realtek Semiconductor

ac03af3329579fffb455aa2daabbe22b sbp2port.sys
Microsoft Corporation

fd833bee2fd9befdc0afd1941a306d9e SBREDrv.sys
m?"StringFileInfoeBCompanyNameSunbeltSoftware^FileDescription-bitAnti-RootkitEnginetFileVersion..bInternalNameSBREdrv.sys=LegalCopyrightCopyright-SunbeltSoftware.Allrightsreserved.LegalTrademarksSUNBELTSOFTWAREandthe"S"logoareregisteredtrademarksofSunbeltSoftware.CounterSpySDKisatrademarkofSunbeltSoftware.@bOriginalFilenameSBREdrv.sysvProductNameCounterSpytProductVersion..VProductBuildDate//::AMDVarFileInfo$TranslationtPADD

253f38d0d7074c02ff8deb9836c97d2b scfilter.sys
Microsoft Corporation

1b1e264203d4ef9d3da1987ad70355ab scsiport.sys
Microsoft Corporation

3ea8a16169c26afbeb544e0e48421186 secdrv.sys
Macrovision Corporation

cb624c0035412af0debec78c41f5ca1b serenum.sys
Microsoft Corporation

c1d8e28b2c2adfaec4ba89e9fda69bd6 serial.sys
Microsoft Corporation

1c545a7d0691cc4a027396535691c3e3 sermouse.sys
Microsoft Corporation

a554811bcd09279536440c964ae35bbf sffdisk.sys
Microsoft Corporation

ff414f0baefeba59bc6c04b3db0b87bf sffp_mmc.sys
Microsoft Corporation

dd85b78243a19b59f0637dcf284da63c sffp_sd.sys
Microsoft Corporation

a9d601643a1647211a1ee2ec4e433ff4 sfloppy.sys
Microsoft Corporation

843caf1e5fde1ffd5ff768f23a51e2e1 sisraid2.sys
Silicon Integrated Systems

6a6c106d42e9ffff8b9fcb4f754f6da4 sisraid4.sys
Silicon Integrated Systems

548260a7b8654e024dc30bf8a7c5baa4 smb.sys
Microsoft Corporation

a80348ba03e96c70852959655ca3e084 smclib.sys
Microsoft Corporation

b9e31e5cacdfe584f34f730a677803f9 spldr.sys
Microsoft Corporation

fff95479c7ab1550f0750a5d01744211 spsys.sys
Microsoft Corporation

b4adebbf5e3677cce9651e0f01f7cc28 srv2.sys
Microsoft Corporation

27e461f0be5bff5fc737328f749538c3 srvnet.sys
Microsoft Corporation

441fba48bff01fdb9d5969ebc1838f0b srv.sys
Microsoft Corporation

f3817967ed533d08327dc73bc4d5542a stexstor.sys
Promise Technology

19cb37ac38b802be9c441d094521a29a storport.sys
Microsoft Corporation

001cc10fa5e71ae1119115e126c8750d stream.sys
Microsoft Corporation

d01ec09b6711a5f8e7e6564a4d0fbc90 swenum.sys
Microsoft Corporation

470c47daba9ca3966f0ab3f835d7d135 SynTP.sys
Synaptics

6e316c01cba8b785fe495f5cc4f48c6f tape.sys
Microsoft Corporation

df687e3d8836bfb04fcc0615bf15a519 tcpipreg.sys
Microsoft Corporation

acb82bda8f46c84f465c1afa517dc4b9 tcpip.sys
Microsoft Corporation

fd542b661bd22fa69ca789ad0ac58c29 tdcmdpst.sys
Toshiba Corporation

6f020a220388eca0ab6062dc27bd16b6 tdi.sys
Microsoft Corporation

3371d21011695b16333a3934340c4e7c tdpipe.sys
Microsoft Corporation

51c5eceb1cdee2468a1748be550cfbc8 tdtcp.sys
Microsoft Corporation

ddad5a7ab24d8b65f8d724f5c20fd806 tdx.sys
Microsoft Corporation

561e7e1f06895d78de991e01dd0fb6e5 termdd.sys
Microsoft Corporation

ce18b2cdfc837c99e5fae9ca6cba5d30 tssecsrv.sys
Microsoft Corporation

d11c783e3ef9a3c52c0ebe83cc5000e9 TsUsbFlt.sys
Microsoft Corporation

3566a8daafa27af944f5d705eaa64894 tunnel.sys
Microsoft Corporation

9c7191f4b2e49bff47a6c1144b5923fa TVALZFL.sys
Toshiba Corporation

550b567f9364d8f7684c3fb3ea665a72 TVALZ_O.SYS
Toshiba Corporation

b4dd609bd7e282bfc683cec7eaaaad67 UAGP35.SYS
Microsoft Corporation

ff4232a1a64012baa1fd97c7b67df593 udfs.sys
Microsoft Corporation

4bfe1bc28391222894cbf1e7d0e42320 ULIAGPKX.SYS
Microsoft Corporation

dc54a574663a895c8763af0fa1ff7561 umbus.sys
Microsoft Corporation

b2e8e8cb557b156da5493bbddcc1474d umpass.sys
Microsoft Corporation

d0fe8cb5f84303e73ff0754437fad3d1 usb8023.sys
Microsoft Corporation

aa33fc47ed58c34e6e9261e4f850b7eb usbaapl64.sys
Apple

292a8e03b3fce04e39b5be9b14132030 USBCAMD2.sys
Microsoft Corporation

6f1a3157a1c89435352ceb543cdb359c usbccgp.sys
Microsoft Corporation

af0892a803fdda7492f595368e3b68e7 usbcir.sys
Microsoft Corporation

cca2ab1752a61f29c3c941cd79d78cea usbd.sys
Microsoft Corporation

c025055fe7b87701eb042095df1a2d7b usbehci.sys
Microsoft Corporation

287c6c9410b111b68b52ca298f7b8c24 usbhub.sys
Microsoft Corporation

9840fc418b4cbd632d3d0a667a725c31 usbohci.sys
Microsoft Corporation

ae259c75f9a0b057b6bf9e9695632b09 usbport.sys
Microsoft Corporation

73188f58fb384e75c4063d29413cee3d usbprint.sys
Microsoft Corporation

c3ec945dec43c00e2ad4c98dddd064c7 usbrpm.sys
Microsoft Corporation

fed648b01349a3c8395a5169db5fb7d6 USBSTOR.SYS
Microsoft Corporation

62069a34518bcf9c1fd9e74b3f6db7cd usbuhci.sys
Microsoft Corporation

454800c2bc7f3927ce030141ee4f4c50 usbvideo.sys
Microsoft Corporation

c5c876ccfc083ff3b128f933823e87bd vdrvroot.sys
Microsoft Corporation

da4da3f5e02943c2dc8c6ed875de68dd vgapnp.sys
Microsoft Corporation

53e92a310193cb3c03bea963de7d9cfc vga.sys
Microsoft Corporation

2ce2df28c83aeaf30084e1b1eb253cbb vhdmp.sys
Microsoft Corporation

e5689d93ffe4e5d66c0178761240dd54 viaide.sys
VIA Technologies

e7353d59c9842bc7299faeb7e7e09340 videoprt.sys
Microsoft Corporation

d2aafd421940f640b407aefaaebd91b0 volmgr.sys
Microsoft Corporation

a255814907c89be58b79ef2f189b843b volmgrx.sys
Microsoft Corporation

0d08d2f3b3ff84e433346669b5e0f639 volsnap.sys
Microsoft Corporation

5e2016ea6ebaca03c04feac5f330d997 vsmraid.sys
VIA Technologies

36d4720b72b5c5d9cb2b9c29e9df67a1 vwifibus.sys
Microsoft Corporation

6a3d66263414ff0d6fa754c646612f3f vwififlt.sys
Microsoft Corporation

6a638fc4bfddc4d9b186c28c91bd1a01 vwifimp.sys
Microsoft Corporation

4e9440f4f152a7b944cb1663d3935a3e wacompen.sys
Microsoft Corporation

356afd78a6ed4457169241ac3965230c wanarp.sys
Microsoft Corporation

fc438d1430b28618e2d0c7c332a710ad watchdog.sys
Microsoft Corporation

441bd2d7b4f98134c3a4f9fa570fd250 Wdf01000.sys
Microsoft Corporation

1b409454d7a00110fdb06f7e0f155a88 WdfLdr.sys
Microsoft Corporation

72889e16ff12ba0f235467d6091b17dc wd.sys
Microsoft Corporation

611b23304bf067451a9fdee01fbdd725 wfplwf.sys
Microsoft Corporation

05ecaec3e4529a7153b3136ceb49f0ec wimmount.sys
Microsoft Corporation

f6ff8944478594d0e414d3f048f0d778 wmiacpi.sys
Microsoft Corporation

fc146f46872d4c5b529b89a5131fd1e6 wmilib.sys
Microsoft Corporation

6bcc1d7d2fd2453957c5479a32364e52 ws2ifsl.sys
Microsoft Corporation

d3381dc54c34d79b22cee0d65ba91b7c WUDFPf.sys
Microsoft Corporation

cf8d590be3373029d57af80914190682 WUDFRd.sys
Microsoft Corporation

filefind.txt:

Search results for winlogon.exe

8a7f34f0bbd076ec3815680a7309114f /mnt/sda3/Program Files (x86)/Malwarebytes' Anti-Malware/Chameleon/winlogon.exe
212.6K Jul 3 17:46

1151b1baa6f350b1db6598e0fea7c457 /mnt/sda3/Windows/erdnt/cache64/winlogon.exe
381.5K Nov 20 2010

1151b1baa6f350b1db6598e0fea7c457 /mnt/sda3/Windows/System32/winlogon.exe
381.5K Nov 20 2010

132328df455b0028f13bf0abee51a63a /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16385_none_cbb7f2bdeea2829c/winlogon.exe
380.0K Jul 14 2009

a93d41a4d4b0d91c072d11dd8af266de /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.20560_none_cc522fd507b468f8/winlogon.exe
380.5K Oct 28 2009

1151b1baa6f350b1db6598e0fea7c457 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636/winlogon.exe
381.5K Nov 20 2010

da3e2a6fa9660cc75b471530ce88453a /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16447_none_cbe534e7ee8042ad/winlogon.exe
380.5K Oct 28 2009


Search results for volsnap.sys

0d08d2f3b3ff84e433346669b5e0f639 /mnt/sda3/Windows/System32/drivers/volsnap.sys
288.9K Nov 20 2010

0d08d2f3b3ff84e433346669b5e0f639 /mnt/sda3/Windows/System32/DriverStore/FileRepository/volume.inf_amd64_neutral_df8bea40ac96ca21/volsnap.sys
288.9K Nov 20 2010

58f82eed8ca24b461441f9c3e4f0bf5c /mnt/sda3/Windows/winsxs/amd64_volume.inf_31bf3856ad364e35_6.1.7600.16385_none_71aba92815c60174/volsnap.sys
288.1K Jul 14 2009

0d08d2f3b3ff84e433346669b5e0f639 /mnt/sda3/Windows/winsxs/amd64_volume.inf_31bf3856ad364e35_6.1.7601.17514_none_73dcbcf012b4850e/volsnap.sys
288.9K Nov 20 2010


Search results for explorer.exe

ede56c6a14aa1e617925424a1eb751f8 /mnt/sda3/Users/Janet/Documents/Archives/Themes/windows_7_ultimate_black_by_nullz0rz/7 ultimate black/explorer.exe
2.5M Oct 29 2009

0 Apr 18 2011 Explorer.exe for Dark Soft big icons
0 Apr 18 2011 Explorer.exe for Dark Soft little icons

0af4ca8b0e7e744fe1325d423c051e5f /mnt/sda3/Users/Janet/Documents/Archives/Themes/dark_soft___big_updates_by_rajtheeban95-d2j8hb2/Dark Soft system files/Explorer.exe/Explorer.exe for Dark Soft big icons/x64/explorer.exe
2.7M Aug 8 2010

da6c14597c2e8d596a8835b12af811eb /mnt/sda3/Users/Janet/Documents/Archives/Themes/dark_soft___big_updates_by_rajtheeban95-d2j8hb2/Dark Soft system files/Explorer.exe/Explorer.exe for Dark Soft big icons/x86/explorer.exe
2.5M Feb 5 2010

a56d5da49a0cf072a86e13c95972073a /mnt/sda3/Users/Janet/Documents/Archives/Themes/dark_soft___big_updates_by_rajtheeban95-d2j8hb2/Dark Soft system files/Explorer.exe/Explorer.exe for Dark Soft little icons/x64/explorer.exe
2.7M Aug 8 2010

62a50afa8c9cfc72a81e273cf849e2b3 /mnt/sda3/Users/Janet/Documents/Archives/Themes/dark_soft___big_updates_by_rajtheeban95-d2j8hb2/Dark Soft system files/Explorer.exe/Explorer.exe for Dark Soft little icons/x86/explorer.exe
2.5M Mar 11 2010

66c7686e9779056f3a0b83996b4a3a11 /mnt/sda3/Users/Janet/Documents/Archives/Themes/Dynamic_Black_____by_DjabyTown/Dynamic Black/System Files/RTM/x64 (64-bit)/big taskbar/explorer.exe
3.1M Nov 10 2009

2bb457edba37215c7ebc0057674a5e48 /mnt/sda3/Users/Janet/Documents/Archives/Themes/Dynamic_Black_____by_DjabyTown/Dynamic Black/System Files/RTM/x64 (64-bit)/explorer.exe
3.1M Nov 10 2009

0371a06ef950bcdfc8a78e7b571869b3 /mnt/sda3/Users/Janet/Documents/Archives/Themes/Dynamic_Black_____by_DjabyTown/Dynamic Black/System Files/RTM/x86 (32-bit)/Big Taskbar/explorer.exe
2.8M Nov 13 2009

554ef8d42873217844cb12e433b6066a /mnt/sda3/Users/Janet/Documents/Archives/Themes/Dynamic_Black_____by_DjabyTown/Dynamic Black/System Files/RTM/x86 (32-bit)/explorer.exe
2.8M Nov 13 2009

332feab1435662fc6c672e25beb37be3 /mnt/sda3/Windows/erdnt/cache86/explorer.exe
2.7M Feb 25 2011

332feab1435662fc6c672e25beb37be3 /mnt/sda3/Windows/explorer.exe
2.7M Feb 25 2011

8b88ebbb05a0e56b7dcc708498c02b3e /mnt/sda3/Windows/SysWOW64/explorer.exe
2.5M Feb 25 2011

c235a51cb740e45ffa0ebfb9bafcda64 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16385_none_ada998b9936d7566/explorer.exe
2.7M Jul 14 2009

f170b4a061c9e026437b193b4d571799 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16404_none_adff19b5932d79ae/explorer.exe
2.7M Aug 3 2009

9aaaec8dac27aa17b053e6352ad233ae /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16450_none_adc508f19359a007/explorer.exe
2.7M Oct 31 2009

0862495e0c825893db75ef44faea8e93 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16768_none_adc24107935a7e25/explorer.exe
2.7M Feb 26 2011

700073016dac1c3d2e7e2ce4223334b6 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.20500_none_ae84b558ac4eb41c/explorer.exe
2.7M Aug 3 2009

b8ec4bd49ce8f6fc457721bfc210b67f /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.20563_none_ae46d6aeac7ca7c7/explorer.exe
2.7M Oct 31 2009

e38899074d4951d31b4040e994dd7c8d /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.20910_none_ae79ed04ac56c4a9/explorer.exe
2.7M Feb 26 2011

ac4c51eb24aa95b77f705ab159189e24 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.17514_none_afdaac81905bf900/explorer.exe
2.7M Nov 20 2010

332feab1435662fc6c672e25beb37be3 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.17567_none_afa79dc39081d0ba/explorer.exe
2.7M Feb 25 2011

3b69712041f3d63605529bd66dc00c48 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.21669_none_b0333b22a99da332/explorer.exe
2.7M Feb 26 2011

15bc38a7492befe831966adb477cf76f /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16385_none_b7fe430bc7ce3761/explorer.exe
2.5M Jul 14 2009

b95eeb0f4e5efbf1038a35b3351cf047 /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16404_none_b853c407c78e3ba9/explorer.exe
2.5M Aug 3 2009

2626fc9755be22f805d3cfa0ce3ee727 /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16450_none_b819b343c7ba6202/explorer.exe
2.5M Oct 31 2009

2af58d15edc06ec6fdacce1f19482bbf /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.16768_none_b816eb59c7bb4020/explorer.exe
2.5M Feb 26 2011

9ff6c4c91a3711c0a3b18f87b08b518d /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.20500_none_b8d95faae0af7617/explorer.exe
2.5M Aug 3 2009

c76153c7eca00fa852bb0c193378f917 /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.20563_none_b89b8100e0dd69c2/explorer.exe
2.5M Oct 31 2009

255cf508d7cfb10e0794d6ac93280bd8 /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7600.20910_none_b8ce9756e0b786a4/explorer.exe
2.5M Feb 26 2011

40d777b7a95e00593eb1568c68514493 /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.17514_none_ba2f56d3c4bcbafb/explorer.exe
2.5M Nov 20 2010

8b88ebbb05a0e56b7dcc708498c02b3e /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.17567_none_b9fc4815c4e292b5/explorer.exe
2.5M Feb 25 2011

0fb9c74046656d1579a64660ad67b746 /mnt/sda3/Windows/winsxs/wow64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.21669_none_ba87e574ddfe652d/explorer.exe
2.5M Feb 26 2011


Search results for Userinit.exe

bafe84e637bf7388c96ef48d4d3fdd53 /mnt/sda3/Windows/erdnt/cache64/userinit.exe
30.0K Nov 20 2010

61ac3efdfacfdd3f0f11dd4fd4044223 /mnt/sda3/Windows/erdnt/cache86/userinit.exe
26.0K Nov 20 2010

bafe84e637bf7388c96ef48d4d3fdd53 /mnt/sda3/Windows/System32/userinit.exe
30.0K Nov 20 2010

61ac3efdfacfdd3f0f11dd4fd4044223 /mnt/sda3/Windows/SysWOW64/userinit.exe
26.0K Nov 20 2010

6f8f1376a13114cc10c0e69274f5a4de /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_381dabbceb60feb2/userinit.exe
29.5K Jul 14 2009

bafe84e637bf7388c96ef48d4d3fdd53 /mnt/sda3/Windows/winsxs/amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_3a4ebf84e84f824c/userinit.exe
30.0K Nov 20 2010

61ac3efdfacfdd3f0f11dd4fd4044223 /mnt/sda3/Windows/winsxs/x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116/userinit.exe
26.0K Nov 20 2010

6de80f60d7de9ce6b8c2ddfdf79ef175 /mnt/sda3/Windows/winsxs/x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_dbff103933038d7c/userinit.exe
25.5K Jul 14 2009

When I try to attach mbr.bin to this post I get "Error You aren't permitted to upload this kind of file." Will try attaching it to an empty post.

#14 wildoatz

wildoatz
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:34 PM

Posted 22 August 2012 - 02:51 PM

Tried to attach mbr.bin to an empty post same error message as above "You aren't permitted to upload this kind of file.

#15 Oh My!

Oh My!

    Adware and Spyware and Malware.....


  • Malware Response Instructor
  • 36,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:06:34 PM

Posted 22 August 2012 - 04:29 PM

Greetings wildoatz,

"You aren't permitted to upload this kind of file.

The file needs to be zipped before sending.

In addition, please do this for me.


===================================================


xPUD Filefind using USB

--------------------

  • Insert the USB device into your infected computer
  • Boot the computer using GETxPUD.
  • Click on File
  • Expand mnt
  • Expand your USB (sdb1 sbc1, etc)
  • Confirm that you see driver.sh.
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh -af
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:

    fbd.sys

  • Press Enter
  • If succesful, the script will search this file.
  • After it has finished a report will be located in the USB drive as filefind.txt
  • Copy and paste the filefind.txt to your reply
Please note - all text entries are case sensitive


===================================================


Things I would like to see in your next reply. :thumbsup2:

  • mbr.zip file
  • filefind.txt

Gary
 
If I do not reply within 24 hours please send me a Personal Message.

"Lord, to whom would we go? You have the words that give eternal life. We believe, and we know you are the Holy One of God."




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users