Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

DOJ Ransomware - Can't boot in Safe Mode


  • This topic is locked This topic is locked
26 replies to this topic

#1 kephyr

kephyr

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 13 February 2013 - 10:06 PM

I have a client's computer with what seems like the latest variant of the Moneypak virus. It goes to a black screen with the Dept of Justice and the usual violation of law garbage. Looking at the other topics, I started downloading Emsisoft Emergency kit on my computer while I started to reboot his into safe mode with command prompt. It went immediately to a BSOD with no fault indicated at the top but it goes on to say "Check for viruses... Remove any newly installed hard drives..... .. Run CHKDSK /F to check for hard drive corruption. "  The stop code is 0x0000007B.
 
I have tried to boot into safe mode with networking and just safe mode all with the same result.
 
Is there any hope for repairing this or do I have to tell him he's totally hosed and I need to reformat and reinstall everything?
 
I attached an image of the screen that I took with my phone. Obviously I can't get a screen shot of it.
 
Attached File  Kitson-DOJ_Moneypak.jpg   100.06KB   8 downloads
 
He has had the FBI Moneypak before and the last time I completely re-formatted him. Hopefully he's been doing some backups (but I doubt it). I really wanted to get a chance to look at his browsing history to try to figure out where he's getting this. He told me he was in his Bank of America account when it showed up.

Edited by bloopie, 14 February 2013 - 04:54 PM.
Moved topic from Am I Infected to the logs forum. ~bloopie


BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:03:47 PM

Posted 13 February 2013 - 10:13 PM

Disconnect the PC from LAN connection.Makesure PC doesnt have internet access.Can you boot into desktop now?



#3 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 14 February 2013 - 09:24 AM

I didn't plug it into the network when I put it on my bench, so it has not had internet access.

 

When I boot normal, it goes to the desktop and after loading all the startups, it comes up with the ransomware screen and a small error box to connect to the internet. The only way to dismiss that is to plug in the network cable (which I did try once to check -- error box dismissed but nothing else visibly changed, so I unplugged it again).



#4 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 14 February 2013 - 09:26 AM

Just realized I didn't give some particulars. The machine is a Dell Vostro 220 running Windows XP. Can't really access more details than that.



#5 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:03:47 PM

Posted 14 February 2013 - 10:45 AM

We could fix it.Let me ask our malware response team members to help you.

 

good luck



#6 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,538 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:04:47 PM

Posted 14 February 2013 - 02:39 PM

Which operating system is installed in the computer?


No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#7 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 16 February 2013 - 09:54 AM

Windows XP SP3



#8 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,538 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:04:47 PM

Posted 16 February 2013 - 07:39 PM

Lets give it a try.

We will need to view the system status from an external environment. You will need a USB drive and a CD to burn. There will be several steps to follow.

Download  GETxPUD.exe to the desktop of your clean computer

  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Next download driver.sh to your USB drive
  • Also Download Query.exe to the USB drive. In your working computer, navigate to the USB drive and click on the Query.exe. A folder and a file, query.sh, will be extracted.
  • Remove the USB & CD and insert them in the sick computer
  • Boot the Sick computer with the CD you just burned
  • The computer must be set to boot from the CD
  • In some computers you need to  tap F12 and choose to boot from the CD, in others is the Esc key. Please consult your computer's documentation.
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Then type bash driver.sh -af
  • Press Enter
  • You will be prompted to input a filename.
  • Type the following:

    Winlogon.exe

  • Press Enter
  • If successful, the script will search for this file.
  • After it has completed the search enter the next file to be searched
  • Type the following:

    volsnap.sys

  • Press Enter
  • If successful, the script will search for this file.
  • After it has completed the search enter the next file to be searched
  • Type the following:

    explorer.exe

  • Press Enter
  • After it has completed the search enter the next file to be searched
  • Type the following:

    Userinit.exe

  • Press Enter
  • After the search is completed type Exit and press Enter.
  • After it has finished a report will be located in the USB drive as filefind.txt
  • While still in the Open Terminal, type bash query.sh
  • Press Enter
  • After it has finished a report will be located in the USB drive as RegReport.txt
  • Then type dd if=/dev/sda of=mbr.txt bs=512 count=1


    Leave a space among the following Statements:

    dd is the executable application used to create the backup
    if=/dev/sda is the device the backup is created from - the hard drive when only one HDD exists
    of=mbr.txt is the backup file to create - note the lack of a path - it will be created in the directory currently open in the Terminal
    bs=512 is the number of bytes in the backup
    count=1 says to backup just 1 sector


    It is extremely important that the if and of statements are correctly entered.

  • Press Enter
  • After it has finished a report will be located in the USB drive as mbr.bin
  • Plug the USB back into the clean computer. Post the contents of the report.txt, filefind.txt and RegReport.txt in your next reply. The mbr.txt file must be attached to your reply as it is a hex file.

 

 


No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#9 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 18 February 2013 - 10:22 AM

Thanks for your help.  Here's the results:
 
report.txt:
 
Mon Feb 18 10:08:26 UTC 2013
Driver report for /mnt/sda1/WINDOWS/system32/drivers

9859c0f6936e723e4892d7141b1327d5  acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17  acpi.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557  aec.sys
Microsoft Corporation

1e44bc1e83d8fd2305f8d452db109cf9  afd.sys
Microsoft Corporation

0ebb674888cbdefd5773341c16dd6a07  AFS2K.SYS
tH`VS_VERSION_INFO?a|StringFileInfoXbVBuildDateThuOct::PSTCommentsHCompanyNameOakTechnologyInc.LFileDescriptionAudioFileSystembFileVersion...nInternalNameAFSk.sysh"LegalCopyrightCopyright©OakTechnologyInc.(LegalTrademarks<nOriginalFilenameAFSk.sys>PrivateBuild...()(ProductNameAFSBProductVersion...()XSpecialBuildWindows/XPfreebuild.DVarFileInfo$Translationtd

d7701d7e72243286cc88c9973d891057  amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1  amdk7.sys
Microsoft Corporation

7909577b7fde2c2bc6f0840d29f5d583  ampse.sys
genCompanyNameFileDescriptionFileVersionInte
tH`$$VS_VERSION_INFO?bbStringFileInfo^B@CompanyNameCommtouch,Inc.VFileDescriptionAMPScanEnginedrivertFileVersion...(InternalNameAMP>LegalCopyrightCopyright-.Commtouch,Inc.Allrightsreserved.<nOriginalFilenameampse.sys@ProductNameCommtouchAMPtProductVersion...DVarFileInfo$Translationt*

92b01ed9d7af833a35c59afc0258eba5  amp.sys
ttP$|#VS_VERSION_INFO?bbnStringFileInfoJB@CompanyNameCommtouch,Inc.FFileDescriptionAMPMinifiltertFileVersion...(InternalNameAMP>LegalCopyrightCopyright-.Commtouch,Inc.Allrightsreserved.bOriginalFilenameamp.sys@ProductNameCommtouchAMPtProductVersion...DVarFileInfo$Translationt

e83f8daeb216b325d86a71b42a1229b0  Apix.sys
tH`VS_VERSION_INFOtStringFileInfoPbBCompanyNameSafeCentral,IncFileDescriptionApixnFileVersion...*InternalNameApixPLegalCopyrightCopyright-,LegalTrademarks:tOriginalFilenameApix.sysPrivateBuild.aProductNameTSX_RnProductVersion...SpecialBuildDVarFileInfo$Translationt*

b5b8a80875c1dededa8b02765642c32f  arp1394.sys
Microsoft Corporation

b153affac761e7f5fcfa822b9c4e97bc  asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674  atapi.sys
Microsoft Corporation

9916c1225104ba14794209cfa8012159  atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba  atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836  atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38  atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68  audstub.sys
Microsoft Corporation

da1f27d85e0d1525f6621372e7b685e9  beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed  bridge.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4  bthport.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9  cbidf2k.sys
Microsoft Corporation

0be5aef125be881c4f854c554f2b025c  CCDECODE.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b  cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32  cdfs.sys
Microsoft Corporation

223dea13c9d064babc882b4727f6f905  cdr4_xp.sys
Sonic Solutions

9e26599599d178e71afb5599e146031a  cdralw2k.sys
Sonic Solutions

1f4260cc5b42272d71f79e570a27a4fe  cdrom.sys
Microsoft Corporation

84853b3fd012251690570e9e7e43343f  cercsr6.sys
Adaptec

b562592b7f5759c99e179ca467ecfb4c  cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719  classpnp.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73  cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f  crusoe.sys
Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6  diskdump.sys
Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25  disk.sys
Microsoft Corporation

a0500678a33802d8954153839301d539  DLABMFSM.SYS
Roxio

b8d2f68cac54d46281399f9092644794  DLABOIOM.SYS
Roxio

0ee93ab799d1cb4ec90b36f3612fe907  DLACDBHM.SYS
Roxio

87413b94ae1fabc117c4e8ae6725134e  DLADResM.SYS
Roxio

766a148235be1c0039c974446e4c0edc  DLAIFS_M.SYS
Roxio
Roxio

38267cca177354f1c64450a43a4f7627  DLAOPIOM.SYS
Roxio

fd363369fd313b46b5aeab1a688b52e9  DLAPoolM.SYS
Roxio
Roxio

336ae18f0912ef4fbe5518849e004d74  DLARTL_M.SYS
Roxio

fd85f682c1cc2a7ca878c7a448e6d87e  DLAUDFAM.SYS
Roxio

af389ce587b6bf5bbdcd6f6abe5eabc0  DLAUDF_M.SYS
Roxio

d992fe1274bde0f84ad826acae022a41  dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f  dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f  dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45  DMusic.sys
Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8  drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce  drmk.sys
Microsoft Corporation

5d3b71bb2bb0009d65d290e2ef374bd3  DRVMCDB.SYS
Sonic Solutions

c591ba9f96f40a1fd6494dafdcd17185  DRVNDDM.SYS
Roxio

fe97d0343acfdebdd578fc67cc91fa87  dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e  dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd  dxgthk.sys
Microsoft Corporation

38d332a6d56af32635675f132548343e  fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81  fdc.sys
Microsoft Corporation

d45926117eb9fa946a6af572fbe1caa3  fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0  flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0  fltMgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a  fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0  fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d  ftdisk.sys
Microsoft Corporation

573c7d0a32852b48f3058cfd8026f511  hdaudbus.sys
Windows Server DDK provider

1af592532532a402ed7c060f6954004f  hidclass.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d  hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1  hidusb.sys
Microsoft Corporation

d03d10f7ded688fecf50f8fbf1ea9b8a  HPZid412.sys
HP

89f41658929393487b6b7d13c8528ce3  HPZipr12.sys
HP

abcb05ccdbf03000354b9553820e39f8  HPZius12.sys
HP

f80a415ef82cd06ffaf0d971528ead38  http.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30  i8042prt.sys
Microsoft Corporation

707c1692214b1c290271067197f075f6  iaStor.sys
Intel Corporation

2da364ee62d4949620b6fae4ffea16a7  igxpmp32.sys
Intel Corporation

083a052659f5310dd8b6a6cb05edcf8e  imapi.sys
Microsoft Corporation

c9ef68bee3b1a62f34125a9fbbaac10c  IntcHdmi.sys
Intel Corporation

8c953733d8f36eb2133f5bb58808b66b  intelppm.sys
Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0  ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182  ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5  ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb  ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91  ipsec.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89  irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7  isapnp.sys
Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128  kbdclass.sys
Microsoft Corporation

9ef487a186dea361aa06913a75b3fa99  kbdhid.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378  kmixer.sys
Microsoft Corporation

b467646c54cc746128904e1654c750c1  ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1  ks.sys
Microsoft Corporation

d1f8be91ed4ddb671d42e473e3fe71ab  mcd.sys
Microsoft Corporation

a7da20ab18a1bdae28b0f349e57da0d1  mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6  mnmdd.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1  modem.sys
Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04  mouclass.sys
Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685  mouhid.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd  mountmgr.sys
Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726  mqac.sys
Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd  mrxdav.sys
Microsoft Corporation

7d304a5eb4344ebeeab53a2fe3ffb9f0  mrxsmb.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027  msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2  msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1  MSKSSRV.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e  MSPCLOCK.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d  MSPQM.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136  mssmbios.sys
Microsoft Corporation

e53736a9e30c45fa9e7b5eac55056d1d  MSTEE.sys
Microsoft Corporation

de6a75f5c270e756c5508d94b6cf68f5  mup.sys
Microsoft Corporation

5b50f1b2a2ed47d560577b221da734db  NABTSFEC.sys
Microsoft Corporation

7ff1f1fd8609c149aa432f95a8163d97  NdisIP.sys
Microsoft Corporation

1df7f42665c94b825322fae71721130d  ndis.sys
Microsoft Corporation

0109c4f3850dfbab279542515386ae22  ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849  ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab  ndiswan.sys
Microsoft Corporation

9282bd12dfb069d3889eb3fcc1000a9b  ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0  netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d  netbt.sys
Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea  nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d  nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b  nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a  npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca  ntfs.sys
Microsoft Corporation

73c1e1f395918bc2c6dd67af7591a3ad  null.sys
Microsoft Corporation

b305f3fad35083837ef46a0bbce2fc57  nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9  nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123  nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8  nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0  nwlnkspx.sys
Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740  nwrdr.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9  oprghdlr.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3  p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c  parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6  partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1  parvdm.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9  pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1  pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1  pcmcia.sys
Microsoft Corporation

e82a496c3961efc6828b508c310ce98f  portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26  processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424  psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd  ptilink.sys
 Parallel Technologies

49452bfcec22f36a7a9b9c2181bc3042  pxhelp20.sys
Sonic Solutions

fe0d99d6f31e4fad8159f690d68ded9c  rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6  rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee  raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99  raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242  raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101  rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a  rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332  rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1  rdpdr.sys
Microsoft Corporation

43af5212bd8fb5ba6eed9754358bd8f7  rdpwd.sys
Microsoft Corporation

f828dd7e1419b6653894a8f97a0094c5  redbook.sys
Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7  rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec  riodrv.sys
Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c  rmcast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d  rndismp.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7  rootmdm.sys
Microsoft Corporation

c6d34a1874cd2b212dc3e788091c64b4  Rtenicxp.sys
Realtek Semiconductor

5c8f36cdcb489111b24003af4dfe1fdc  RtkHDAud.sys
Realtek Semiconductor

76c465f570e90c28942d52ccb2580a10  scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4  sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677  secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce  serenum.sys
Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7  serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6  sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648  sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac  sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562  sfloppy.sys
Microsoft Corporation

8c462bb87c58ae4c89473ed651843a90  shdrv.sys
H`@VS_VERSION_INFOStringFileInfotbBCompanyNameSafeCentral,IncZFileDescriptionServiceHardeningDrivernFileVersion...&InternalNameSHPLegalCopyrightCopyright-,LegalTrademarks<nOriginalFilenameShDrv.sysPrivateBuild.aProductNameTSX_RnProductVersion...SpecialBuildDVarFileInfo$Translationt*

866d538ebe33709a5c9f5c62b73b7d14  SLIP.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa  smclib.sys
Microsoft Corporation

489703624dac94ed943c2abda022a1cd  sonydcam.sys
Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f  splitter.sys
Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d  sr.sys
Microsoft Corporation

47ddfc2f003f7f9f0592c6874962a2e7  srv.sys
Microsoft Corporation

77813007ba6265c4b6098187e6ed79d2  StreamIP.sys
Microsoft Corporation

3e5d89099ded9e86e5639f411693218f  stream.sys
Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f  swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01  swmidi.sys
Microsoft Corporation

8b83f3ed0f1688b4958f77cd6d2bf290  sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72  tape.sys
Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7  tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d  tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf  tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397  tdpipe.sys
Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61  tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e  termdd.sys
Microsoft Corporation

699450901c5ccfd82357cbc531cedd23  tosdvd.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9  tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c  tunmp.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9  udfs.sys
Microsoft Corporation

402ddc88356b1bac0ee3dd1580c76a31  update.sys
Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f  usb8023.sys
Microsoft Corporation

e919708db44ed8543a7c017953148330  USBAUDIO.sys
Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149  usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e  usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8  usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693  usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7  usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c  usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43  usbintel.sys
Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71  usbport.sys
Microsoft Corporation

a717c8721046828520c9edf31288fc00  usbprint.sys
Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4  usbscan.sys
Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9  USBSTOR.SYS
Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6  usbuhci.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f  vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1  vga.sys
Microsoft Corporation

e28726b72c46821a28830e077d39a55b  videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025  volsnap.sys
Microsoft Corporation

42870675b4d84acd81a9da69b83f14c5  VX3000.sys
Microsoft Corporation

e20b95baedb550f32dd489265c1da1f6  wanarp.sys
Microsoft Corporation

6768acf64b18196494413695f0c3a00f  wdmaud.sys
Microsoft Corporation

c1c748875ddcf61999d2e4ae8352bba4  windrvr.sys
tHLVS_VERSION_INFO?taBStringFileInfoB,CompanyNameJungobFileDescriptionWinDriverDeviceDriver.*FileVersion.bInternalNamewindrvr.sysRLegalCopyrightCopyrightJungo@bOriginalFilenamewindrvr.sysPProductNameWinDriverDeviceDriver.ProductVersion.DVarFileInfo$Translationt

2f31b7f954bed437f2c75026c65caf7b  wmilib.sys
Microsoft Corporation

cf4def1bf66f06964dc0d91844239104  wpdusb.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8  ws2ifsl.sys
Microsoft Corporation

c98b39829c2bbd34e454150633c62c78  WSTCODEC.SYS
Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311  WudfPf.sys
Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b  WudfRd.sys
Microsoft Corporation
 
 
 
filefind.txt:
 
 
Search results for winlogon.exe

ed0ef0a136dec83df69f04118870003e  /mnt/sda1/WINDOWS/system32/winlogon.exe
      496.0K Aug 31 21:19

ed0ef0a136dec83df69f04118870003e  /mnt/sda1/WINDOWS/system32/dllcache/winlogon.exe
      496.0K Aug 31 21:19

ed0ef0a136dec83df69f04118870003e  /mnt/sda1/WINDOWS/erdnt/cache/winlogon.exe
      496.0K Aug 31 21:19


Search results for volsnap.sys

4c8fcb5cc53aab716d810740fe59d025  /mnt/sda1/WINDOWS/system32/dllcache/volsnap.sys
       51.1K Apr 13  2008

4c8fcb5cc53aab716d810740fe59d025  /mnt/sda1/WINDOWS/system32/drivers/volsnap.sys
       51.1K Apr 13  2008


Search results for explorer.exe

12896823fb95bfb3dc9b46bcaedc9923  /mnt/sda1/WINDOWS/system32/dllcache/explorer.exe
     1009.5K Aug 31 21:19

12896823fb95bfb3dc9b46bcaedc9923  /mnt/sda1/WINDOWS/explorer.exe
     1009.5K Aug 31 21:19

12896823fb95bfb3dc9b46bcaedc9923  /mnt/sda1/WINDOWS/erdnt/cache/explorer.exe
     1009.5K Aug 31 21:19


Search results for userinit.exe

a93aee1928a9d7ce3e16d24ec7380f89  /mnt/sda1/WINDOWS/system32/dllcache/userinit.exe
       25.5K Apr 13  2008

a93aee1928a9d7ce3e16d24ec7380f89  /mnt/sda1/WINDOWS/system32/userinit.exe
       25.5K Apr 13  2008

a93aee1928a9d7ce3e16d24ec7380f89  /mnt/sda1/WINDOWS/erdnt/cache/userinit.exe
       25.5K Apr 13  2008
 
 
 
RegReport.txt:
 
Search results for winlogon.exe

ed0ef0a136dec83df69f04118870003e  /mnt/sda1/WINDOWS/system32/winlogon.exe
      496.0K Aug 31 21:19

ed0ef0a136dec83df69f04118870003e  /mnt/sda1/WINDOWS/system32/dllcache/winlogon.exe
      496.0K Aug 31 21:19

ed0ef0a136dec83df69f04118870003e  /mnt/sda1/WINDOWS/erdnt/cache/winlogon.exe
      496.0K Aug 31 21:19


Search results for volsnap.sys

4c8fcb5cc53aab716d810740fe59d025  /mnt/sda1/WINDOWS/system32/dllcache/volsnap.sys
       51.1K Apr 13  2008

4c8fcb5cc53aab716d810740fe59d025  /mnt/sda1/WINDOWS/system32/drivers/volsnap.sys
       51.1K Apr 13  2008


Search results for explorer.exe

12896823fb95bfb3dc9b46bcaedc9923  /mnt/sda1/WINDOWS/system32/dllcache/explorer.exe
     1009.5K Aug 31 21:19

12896823fb95bfb3dc9b46bcaedc9923  /mnt/sda1/WINDOWS/explorer.exe
     1009.5K Aug 31 21:19

12896823fb95bfb3dc9b46bcaedc9923  /mnt/sda1/WINDOWS/erdnt/cache/explorer.exe
     1009.5K Aug 31 21:19


Search results for userinit.exe

a93aee1928a9d7ce3e16d24ec7380f89  /mnt/sda1/WINDOWS/system32/dllcache/userinit.exe
       25.5K Apr 13  2008

a93aee1928a9d7ce3e16d24ec7380f89  /mnt/sda1/WINDOWS/system32/userinit.exe
       25.5K Apr 13  2008

a93aee1928a9d7ce3e16d24ec7380f89  /mnt/sda1/WINDOWS/erdnt/cache/userinit.exe
       25.5K Apr 13  2008
 
 
the mbr.txt is attachedAttached File  mbr.txt   512bytes   1 downloads



#10 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,538 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:04:47 PM

Posted 18 February 2013 - 12:34 PM

The RegReport and the filefind seems to be the same. Perhaps you pasted the wrong report.

 

Download http://noahdfear.net/downloads/rst.sh to the USB drive

  • Boot the Sick computer to xPUD again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see rst.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh
  • Press Enter
  • After it has finished a report will be located in the USB drive (sdb1) named enum.log
  • Plug that USB back into the clean computer and open it

Copy and paste the enum.log for my review
 

 


No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#11 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 18 February 2013 - 07:49 PM

Sorry about that. I did paste in the wrong report.

 

Here is the correct RegReport:

 

Remote Registry Report

Hive </mnt/sda1/WINDOWS/system32/config/software>
\Microsoft\Windows NT\CurrentVersion> Value <ProductName> of type REG_SZ, data length 42 [0x2a]
Microsoft Windows XP
\Microsoft\Windows NT\CurrentVersion> Value <CSDVersion> of type REG_SZ, data length 30 [0x1e]
Service Pack 3
\Microsoft\Windows NT\CurrentVersion> Value <SystemRoot> of type REG_SZ, data length 22 [0x16]
C:\WINDOWS
\Microsoft\Windows NT\CurrentVersion\Windows> Value <AppInit_DLLs> of type REG_SZ, data length 2 [0x2]
(...)\Windows NT\CurrentVersion\Winlogon> Value <Shell> of type REG_SZ, data length 26 [0x1a]
Explorer.exe
(...)\Windows NT\CurrentVersion\Winlogon> Value <Userinit> of type REG_SZ, data length 68 [0x44]
C:\WINDOWS\system32\userinit.exe,
(...)\Windows NT\CurrentVersion\Winlogon\Notify> Node has 13 subkeys and 0 values
  <cadmon>
  <crypt32chain>
  <cryptnet>
  <cscdll>
  <dimsntfy>
  <igfxcui>
  <ScCertProp>
  <Schedule>
  <sclgntfy>
  <SensLogn>
  <termsrv>
  <WgaLogon>
  <wlballoon>
\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 15 values
  size     type            value name             [value if type DWORD]
    66  REG_SZ            <IgfxTray>
    60  REG_SZ            <HotKeysCmds>
    66  REG_SZ            <Persistence>
    76  REG_SZ            <CSAM5 tray>
   136  REG_SZ            <Adobe ARM>
    98  REG_SZ            <SafeCentralUpdater>
   120  REG_SZ            <deskband_mgr.exe>
    92  REG_SZ            <HP Component Manager>
   110  REG_SZ            <PDVDDXSrv>
    46  REG_SZ            <VX3000>
   122  REG_SZ            <SunJavaUpdateSched>
   106  REG_SZ            <HP Software Update>
     2  REG_SZ            <>
   108  REG_SZ            <Windows Defender>
   102  REG_SZ            <DWQueuedReporting>
(...)\Windows\CurrentVersion\policies\system> Node has 0 subkeys and 6 values
     4  REG_DWORD         <dontdisplaylastusername>  0 [0x0]
     4  REG_DWORD         <legalnoticecaption>       1 [0x1]
     8  REG_SZ            <legalnoticetext>
     4  REG_DWORD         <shutdownwithoutlogon>     1 [0x1]
     4  REG_DWORD         <undockwithoutlogon>       1 [0x1]
     4  REG_DWORD         <DisableRegistryTools>     0 [0x0]
 

Hive </mnt/sda1/Documents and Settings/David/NTUSER.DAT>
(...)\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 5 values
  size     type            value name             [value if type DWORD]
   120  REG_SZ            <Skype>
   164  REG_SZ            <ISUSPM>
   114  REG_SZ            <Messenger (Yahoo!)>
    62  REG_SZ            <ctfmon.exe>
   104  REG_SZ            <MSMSGS>
(...)\Windows\CurrentVersion\Policies\Explorer> Node has 1 subkeys and 3 values
  <Run>
     4  REG_DWORD         <NoDriveTypeAutoRun>     323 [0x143]
     4  REG_DWORD         <NoDriveAutoRun>    67108863 [0x3ffffff]
     4  REG_DWORD         <NoDrives>                 0 [0x0]
(...)\Windows\CurrentVersion\Policies\System> Node has 0 subkeys and 2 values
     4  REG_DWORD         <DisableTaskMgr>           0 [0x0]
     4  REG_DWORD         <DisableRegistryTools>     0 [0x0]
\Software\Policies\Microsoft\Windows\System> Node has 0 subkeys and 0 values
 

Hive </mnt/sda1/WINDOWS/erdnt/Hiv-backup/Users/00000001/NTUSER.DAT>
> Node has 9 subkeys and 0 values
  <AppEvents>
  <Console>
  <Control Panel>
  <Environment>
  <Identities>
  <Keyboard Layout>
  <Printers>
  <Software>
  <UNICODE Program Groups>
 

Hive </mnt/sda1/WINDOWS/erdnt/Hiv-backup/Users/00000003/NTUSER.DAT>
> Node has 9 subkeys and 0 values
  <AppEvents>
  <Console>
  <Control Panel>
  <Environment>
  <Identities>
  <Keyboard Layout>
  <Printers>
  <Software>
  <UNICODE Program Groups>
 

Hive </mnt/sda1/WINDOWS/erdnt/Hiv-backup/Users/00000005/NTUSER.DAT>
(...)\Microsoft\Windows\CurrentVersion\Run> Node has 0 subkeys and 4 values
  size     type            value name             [value if type DWORD]
   120  REG_SZ            <Skype>
   164  REG_SZ            <ISUSPM>
   114  REG_SZ            <Messenger (Yahoo!)>
    62  REG_SZ            <ctfmon.exe>
(...)\Windows\CurrentVersion\Policies\Explorer> Node has 1 subkeys and 3 values
  <Run>
     4  REG_DWORD         <NoDriveTypeAutoRun>     323 [0x143]
     4  REG_DWORD         <NoDriveAutoRun>    67108863 [0x3ffffff]
     4  REG_DWORD         <NoDrives>                 0 [0x0]
(...)\Windows\CurrentVersion\Policies\System> Node has 0 subkeys and 0 values
\Software\Policies\Microsoft\Windows\System> Node has 0 subkeys and 0 values
 
 



#12 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 18 February 2013 - 07:50 PM

Here is the enum file:

 

31.0M Feb 16 15:07 /mnt/sda1/WINDOWS/system32/config/software
5.5M Feb 16 15:19 /mnt/sda1/WINDOWS/system32/config/system

30.5M Dec 29 03:01 /sda1/~/RP100/~SOFTWARE
30.5M Dec 30 03:57 /sda1/~/RP101/~SOFTWARE
30.5M Dec 31 17:19 /sda1/~/RP102/~SOFTWARE
30.5M Jan  1 16:28 /sda1/~/RP103/~SOFTWARE
30.5M Jan  2 16:36 /sda1/~/RP104/~SOFTWARE
30.5M Jan  3 22:26 /sda1/~/RP105/~SOFTWARE
30.5M Jan  4 03:17 /sda1/~/RP106/~SOFTWARE
30.5M Jan  4 19:10 /sda1/~/RP107/~SOFTWARE
30.5M Jan  6 02:39 /sda1/~/RP108/~SOFTWARE
30.5M Jan  7 02:51 /sda1/~/RP109/~SOFTWARE
30.5M Jan  8 16:10 /sda1/~/RP110/~SOFTWARE
30.5M Jan 10 19:14 /sda1/~/RP112/~SOFTWARE
30.3M Jan 11 02:58 /sda1/~/RP113/~SOFTWARE
30.3M Jan 11 23:18 /sda1/~/RP114/~SOFTWARE
30.6M Jan 12 08:00 /sda1/~/RP115/~SOFTWARE
30.6M Jan 12 21:23 /sda1/~/RP116/~SOFTWARE
30.6M Jan 13 21:13 /sda1/~/RP117/~SOFTWARE
30.6M Jan 13 23:22 /sda1/~/RP118/~SOFTWARE
30.6M Jan 14 01:51 /sda1/~/RP119/~SOFTWARE
30.6M Jan 15 02:57 /sda1/~/RP120/~SOFTWARE
30.6M Jan 15 21:48 /sda1/~/RP121/~SOFTWARE
30.6M Jan 16 01:27 /sda1/~/RP122/~SOFTWARE
30.6M Jan 16 02:16 /sda1/~/RP123/~SOFTWARE
30.6M Jan 16 17:56 /sda1/~/RP124/~SOFTWARE
30.6M Jan 17 03:18 /sda1/~/RP125/~SOFTWARE
30.6M Jan 17 22:00 /sda1/~/RP126/~SOFTWARE
30.6M Jan 18 03:05 /sda1/~/RP127/~SOFTWARE
30.6M Jan 18 16:57 /sda1/~/RP128/~SOFTWARE
30.6M Jan 18 22:34 /sda1/~/RP129/~SOFTWARE
30.6M Jan 19 03:17 /sda1/~/RP130/~SOFTWARE
30.6M Jan 20 03:24 /sda1/~/RP131/~SOFTWARE
29.2M Nov 17 02:46 /sda1/~/RP46/~SOFTWARE
29.2M Nov 17 15:59 /sda1/~/RP47/~SOFTWARE
29.2M Nov 18 16:18 /sda1/~/RP48/~SOFTWARE
29.2M Nov 19 01:16 /sda1/~/RP49/~SOFTWARE
29.2M Nov 19 23:43 /sda1/~/RP50/~SOFTWARE
29.2M Nov 20 14:13 /sda1/~/RP51/~SOFTWARE
29.2M Nov 20 17:58 /sda1/~/RP52/~SOFTWARE
29.2M Nov 21 03:38 /sda1/~/RP53/~SOFTWARE
29.2M Nov 22 03:35 /sda1/~/RP54/~SOFTWARE
29.2M Nov 23 01:58 /sda1/~/RP55/~SOFTWARE
29.2M Nov 24 02:42 /sda1/~/RP56/~SOFTWARE
29.2M Nov 24 08:00 /sda1/~/RP57/~SOFTWARE
29.2M Nov 25 04:30 /sda1/~/RP58/~SOFTWARE
29.2M Nov 25 23:10 /sda1/~/RP59/~SOFTWARE
29.2M Nov 26 02:16 /sda1/~/RP60/~SOFTWARE
29.2M Nov 27 02:59 /sda1/~/RP61/~SOFTWARE
29.2M Nov 28 03:18 /sda1/~/RP62/~SOFTWARE
29.2M Nov 30 00:42 /sda1/~/RP63/~SOFTWARE
29.2M Nov 30 12:39 /sda1/~/RP64/~SOFTWARE
29.2M Dec  1 14:07 /sda1/~/RP65/~SOFTWARE
28.9M Dec  1 20:02 /sda1/~/RP67/~SOFTWARE
28.9M Dec  1 20:18 /sda1/~/RP68/~SOFTWARE
29.1M Dec  1 22:30 /sda1/~/RP69/~SOFTWARE
29.1M Dec  1 22:33 /sda1/~/RP70/~SOFTWARE
29.1M Dec  1 22:43 /sda1/~/RP71/~SOFTWARE
29.1M Dec  1 22:52 /sda1/~/RP72/~SOFTWARE
29.1M Dec  1 22:52 /sda1/~/RP73/~SOFTWARE
29.1M Dec  2 08:00 /sda1/~/RP74/~SOFTWARE
29.1M Dec  2 14:34 /sda1/~/RP75/~SOFTWARE
29.1M Dec  2 14:37 /sda1/~/RP76/~SOFTWARE
29.1M Dec  3 15:20 /sda1/~/RP77/~SOFTWARE
29.1M Dec  3 17:05 /sda1/~/RP78/~SOFTWARE
29.1M Dec  3 17:11 /sda1/~/RP79/~SOFTWARE
29.1M Dec  3 23:54 /sda1/~/RP80/~SOFTWARE
30.4M Dec  4 20:34 /sda1/~/RP81/~SOFTWARE
30.4M Dec  5 03:14 /sda1/~/RP82/~SOFTWARE
30.5M Dec  7 21:09 /sda1/~/RP83/~SOFTWARE
30.5M Dec  8 21:16 /sda1/~/RP84/~SOFTWARE
30.5M Dec 11 16:28 /sda1/~/RP85/~SOFTWARE
30.5M Dec 13 02:58 /sda1/~/RP86/~SOFTWARE
30.5M Dec 13 03:14 /sda1/~/RP87/~SOFTWARE
30.5M Dec 14 20:37 /sda1/~/RP88/~SOFTWARE
30.5M Dec 15 20:50 /sda1/~/RP89/~SOFTWARE
30.5M Dec 16 23:53 /sda1/~/RP90/~SOFTWARE
30.5M Dec 18 00:00 /sda1/~/RP91/~SOFTWARE
30.5M Dec 18 17:17 /sda1/~/RP92/~SOFTWARE
30.5M Dec 19 17:33 /sda1/~/RP93/~SOFTWARE
30.5M Dec 20 21:08 /sda1/~/RP94/~SOFTWARE
30.5M Dec 21 06:45 /sda1/~/RP95/~SOFTWARE
30.5M Dec 21 08:00 /sda1/~/RP96/~SOFTWARE
30.5M Dec 22 18:53 /sda1/~/RP97/~SOFTWARE
30.5M Dec 25 18:19 /sda1/~/RP98/~SOFTWARE
30.5M Dec 28 15:16 /sda1/~/RP99/~SOFTWARE
30.6M Jan 21 15:26 /sda1/~/RP133/~SOFTWARE
30.6M Jan 21 16:31 /sda1/~/RP134/~SOFTWARE
30.6M Jan 22 03:12 /sda1/~/RP135/~SOFTWARE
30.6M Jan 22 19:49 /sda1/~/RP136/~SOFTWARE
30.6M Jan 22 20:41 /sda1/~/RP137/~SOFTWARE
30.6M Jan 23 02:54 /sda1/~/RP138/~SOFTWARE
30.6M Jan 23 20:22 /sda1/~/RP139/~SOFTWARE
30.6M Jan 23 20:35 /sda1/~/RP140/~SOFTWARE
30.6M Jan 23 20:58 /sda1/~/RP141/~SOFTWARE
30.6M Jan 24 02:05 /sda1/~/RP142/~SOFTWARE
30.6M Jan 24 14:24 /sda1/~/RP143/~SOFTWARE
30.6M Jan 26 22:06 /sda1/~/RP144/~SOFTWARE
30.6M Jan 26 22:13 /sda1/~/RP145/~SOFTWARE
30.6M Jan 29 17:03 /sda1/~/RP146/~SOFTWARE
30.6M Jan 29 21:43 /sda1/~/RP147/~SOFTWARE
30.6M Jan 30 02:28 /sda1/~/RP148/~SOFTWARE
30.6M Jan 30 20:59 /sda1/~/RP149/~SOFTWARE
30.6M Jan 31 02:56 /sda1/~/RP150/~SOFTWARE
30.6M Feb  1 03:33 /sda1/~/RP151/~SOFTWARE
30.6M Feb  1 03:37 /sda1/~/RP152/~SOFTWARE
30.5M Jan  9 23:51 /sda1/~/RP111/~SOFTWARE
30.6M Jan 21 02:08 /sda1/~/RP132/~SOFTWARE
30.6M Feb  1 19:21 /sda1/~/RP153/~SOFTWARE
29.2M Nov 16 23:58 /sda1/~/RP45/~SOFTWARE
28.9M Dec  1 14:09 /sda1/~/RP66/~SOFTWARE
30.6M Feb  1 21:17 /sda1/~/RP154/~SOFTWARE
30.6M Feb  2 02:47 /sda1/~/RP155/~SOFTWARE
30.6M Feb  2 18:27 /sda1/~/RP156/~SOFTWARE
30.6M Feb  3 03:41 /sda1/~/RP157/~SOFTWARE
30.6M Feb  4 01:39 /sda1/~/RP158/~SOFTWARE
30.6M Feb  4 20:27 /sda1/~/RP159/~SOFTWARE
30.6M Feb  5 02:38 /sda1/~/RP160/~SOFTWARE
30.6M Feb  5 15:31 /sda1/~/RP161/~SOFTWARE
30.6M Feb  5 15:40 /sda1/~/RP162/~SOFTWARE
30.6M Feb  6 03:40 /sda1/~/RP163/~SOFTWARE
30.6M Feb  7 02:11 /sda1/~/RP164/~SOFTWARE
30.6M Feb  8 02:33 /sda1/~/RP165/~SOFTWARE
30.6M Feb  8 05:35 /sda1/~/RP166/~SOFTWARE
30.6M Feb  8 16:16 /sda1/~/RP167/~SOFTWARE
30.6M Feb  9 05:37 /sda1/~/RP168/~SOFTWARE
30.6M Feb 10 04:16 /sda1/~/RP169/~SOFTWARE
30.6M Feb 10 22:50 /sda1/~/RP170/~SOFTWARE
30.6M Feb 11 08:00 /sda1/~/RP171/~SOFTWARE
30.6M Feb 12 02:58 /sda1/~/RP172/~SOFTWARE
30.6M Feb 14 02:01 /sda1/~/RP173/~SOFTWARE
30.6M Feb 14 02:09 /sda1/~/RP174/~SOFTWARE
30.6M Feb 16 14:56 /sda1/~/RP175/~SOFTWARE
29.0M Nov 14 21:24 /sda1/~/RP43/~SOFTWARE
29.2M Nov 15 22:36 /sda1/~/RP44/~SOFTWARE
5.3M Dec 29 03:01 /sda1/~/RP100/~SYSTEM
5.3M Dec 30 03:57 /sda1/~/RP101/~SYSTEM
5.3M Dec 31 17:19 /sda1/~/RP102/~SYSTEM
5.3M Jan  1 16:28 /sda1/~/RP103/~SYSTEM
5.3M Jan  2 16:36 /sda1/~/RP104/~SYSTEM
5.3M Jan  3 22:26 /sda1/~/RP105/~SYSTEM
5.3M Jan  4 03:17 /sda1/~/RP106/~SYSTEM
5.3M Jan  4 19:10 /sda1/~/RP107/~SYSTEM
5.3M Jan  6 02:39 /sda1/~/RP108/~SYSTEM
5.3M Jan  7 02:51 /sda1/~/RP109/~SYSTEM
5.3M Jan  8 16:10 /sda1/~/RP110/~SYSTEM
5.3M Jan 10 19:14 /sda1/~/RP112/~SYSTEM
5.3M Jan 11 02:58 /sda1/~/RP113/~SYSTEM
5.3M Jan 11 23:18 /sda1/~/RP114/~SYSTEM
5.3M Jan 12 08:00 /sda1/~/RP115/~SYSTEM
5.3M Jan 12 21:23 /sda1/~/RP116/~SYSTEM
5.3M Jan 13 21:13 /sda1/~/RP117/~SYSTEM
5.3M Jan 13 23:22 /sda1/~/RP118/~SYSTEM
5.3M Jan 14 01:51 /sda1/~/RP119/~SYSTEM
5.3M Jan 15 02:57 /sda1/~/RP120/~SYSTEM
5.3M Jan 15 21:48 /sda1/~/RP121/~SYSTEM
5.3M Jan 16 01:27 /sda1/~/RP122/~SYSTEM
5.3M Jan 16 02:16 /sda1/~/RP123/~SYSTEM
5.3M Jan 16 17:56 /sda1/~/RP124/~SYSTEM
5.3M Jan 17 03:18 /sda1/~/RP125/~SYSTEM
5.3M Jan 17 22:00 /sda1/~/RP126/~SYSTEM
5.3M Jan 18 03:05 /sda1/~/RP127/~SYSTEM
5.3M Jan 18 16:57 /sda1/~/RP128/~SYSTEM
5.3M Jan 18 22:34 /sda1/~/RP129/~SYSTEM
5.3M Jan 19 03:17 /sda1/~/RP130/~SYSTEM
5.3M Jan 20 03:24 /sda1/~/RP131/~SYSTEM
5.3M Nov 17 02:46 /sda1/~/RP46/~SYSTEM
5.3M Nov 17 15:59 /sda1/~/RP47/~SYSTEM
5.3M Nov 18 16:18 /sda1/~/RP48/~SYSTEM
5.3M Nov 19 01:16 /sda1/~/RP49/~SYSTEM
5.3M Nov 19 23:43 /sda1/~/RP50/~SYSTEM
5.3M Nov 20 14:13 /sda1/~/RP51/~SYSTEM
5.3M Nov 20 17:58 /sda1/~/RP52/~SYSTEM
5.3M Nov 21 03:38 /sda1/~/RP53/~SYSTEM
5.3M Nov 22 03:35 /sda1/~/RP54/~SYSTEM
5.3M Nov 23 01:58 /sda1/~/RP55/~SYSTEM
5.3M Nov 24 02:42 /sda1/~/RP56/~SYSTEM
5.3M Nov 24 08:00 /sda1/~/RP57/~SYSTEM
5.3M Nov 25 04:30 /sda1/~/RP58/~SYSTEM
5.3M Nov 25 23:10 /sda1/~/RP59/~SYSTEM
5.3M Nov 26 02:16 /sda1/~/RP60/~SYSTEM
5.3M Nov 27 02:59 /sda1/~/RP61/~SYSTEM
5.3M Nov 28 03:18 /sda1/~/RP62/~SYSTEM
5.3M Nov 30 00:42 /sda1/~/RP63/~SYSTEM
5.3M Nov 30 12:39 /sda1/~/RP64/~SYSTEM
5.3M Dec  1 14:07 /sda1/~/RP65/~SYSTEM
5.2M Dec  1 20:02 /sda1/~/RP67/~SYSTEM
5.2M Dec  1 20:18 /sda1/~/RP68/~SYSTEM
5.2M Dec  1 22:30 /sda1/~/RP69/~SYSTEM
5.2M Dec  1 22:33 /sda1/~/RP70/~SYSTEM
5.2M Dec  1 22:43 /sda1/~/RP71/~SYSTEM
5.2M Dec  1 22:52 /sda1/~/RP72/~SYSTEM
5.2M Dec  1 22:52 /sda1/~/RP73/~SYSTEM
5.2M Dec  2 08:00 /sda1/~/RP74/~SYSTEM
5.2M Dec  2 14:34 /sda1/~/RP75/~SYSTEM
5.2M Dec  2 14:37 /sda1/~/RP76/~SYSTEM
5.2M Dec  3 15:20 /sda1/~/RP77/~SYSTEM
5.2M Dec  3 17:05 /sda1/~/RP78/~SYSTEM
5.2M Dec  3 17:11 /sda1/~/RP79/~SYSTEM
5.2M Dec  3 23:54 /sda1/~/RP80/~SYSTEM
5.3M Dec  4 20:34 /sda1/~/RP81/~SYSTEM
5.3M Dec  5 03:14 /sda1/~/RP82/~SYSTEM
5.3M Dec  7 21:09 /sda1/~/RP83/~SYSTEM
5.3M Dec  8 21:16 /sda1/~/RP84/~SYSTEM
5.3M Dec 11 16:28 /sda1/~/RP85/~SYSTEM
5.3M Dec 13 02:58 /sda1/~/RP86/~SYSTEM
5.3M Dec 13 03:14 /sda1/~/RP87/~SYSTEM
5.3M Dec 14 20:37 /sda1/~/RP88/~SYSTEM
5.3M Dec 15 20:50 /sda1/~/RP89/~SYSTEM
5.3M Dec 16 23:53 /sda1/~/RP90/~SYSTEM
5.3M Dec 18 00:00 /sda1/~/RP91/~SYSTEM
5.3M Dec 18 17:17 /sda1/~/RP92/~SYSTEM
5.3M Dec 19 17:33 /sda1/~/RP93/~SYSTEM
5.3M Dec 20 21:08 /sda1/~/RP94/~SYSTEM
5.3M Dec 21 06:45 /sda1/~/RP95/~SYSTEM
5.3M Dec 21 08:00 /sda1/~/RP96/~SYSTEM
5.3M Dec 22 18:53 /sda1/~/RP97/~SYSTEM
5.3M Dec 25 18:19 /sda1/~/RP98/~SYSTEM
5.3M Dec 28 15:16 /sda1/~/RP99/~SYSTEM
5.3M Jan 21 15:26 /sda1/~/RP133/~SYSTEM
5.3M Jan 21 16:31 /sda1/~/RP134/~SYSTEM
5.3M Jan 22 03:12 /sda1/~/RP135/~SYSTEM
5.3M Jan 22 19:49 /sda1/~/RP136/~SYSTEM
5.3M Jan 22 20:41 /sda1/~/RP137/~SYSTEM
5.3M Jan 23 02:54 /sda1/~/RP138/~SYSTEM
5.3M Jan 23 20:22 /sda1/~/RP139/~SYSTEM
5.3M Jan 23 20:35 /sda1/~/RP140/~SYSTEM
5.3M Jan 23 20:58 /sda1/~/RP141/~SYSTEM
5.3M Jan 24 02:05 /sda1/~/RP142/~SYSTEM
5.3M Jan 24 14:24 /sda1/~/RP143/~SYSTEM
5.3M Jan 26 22:06 /sda1/~/RP144/~SYSTEM
5.3M Jan 26 22:13 /sda1/~/RP145/~SYSTEM
5.3M Jan 29 17:03 /sda1/~/RP146/~SYSTEM
5.3M Jan 29 21:43 /sda1/~/RP147/~SYSTEM
5.3M Jan 30 02:28 /sda1/~/RP148/~SYSTEM
5.3M Jan 30 20:59 /sda1/~/RP149/~SYSTEM
5.3M Jan 31 02:56 /sda1/~/RP150/~SYSTEM
5.3M Feb  1 03:33 /sda1/~/RP151/~SYSTEM
5.3M Feb  1 03:37 /sda1/~/RP152/~SYSTEM
5.3M Jan  9 23:51 /sda1/~/RP111/~SYSTEM
5.3M Jan 21 02:08 /sda1/~/RP132/~SYSTEM
5.3M Feb  1 19:21 /sda1/~/RP153/~SYSTEM
5.3M Nov 16 23:58 /sda1/~/RP45/~SYSTEM
5.2M Dec  1 14:09 /sda1/~/RP66/~SYSTEM
5.3M Feb  1 21:17 /sda1/~/RP154/~SYSTEM
5.3M Feb  2 02:47 /sda1/~/RP155/~SYSTEM
5.3M Feb  2 18:27 /sda1/~/RP156/~SYSTEM
5.3M Feb  3 03:41 /sda1/~/RP157/~SYSTEM
5.3M Feb  4 01:39 /sda1/~/RP158/~SYSTEM
5.3M Feb  4 20:27 /sda1/~/RP159/~SYSTEM
5.3M Feb  5 02:38 /sda1/~/RP160/~SYSTEM
5.3M Feb  5 15:31 /sda1/~/RP161/~SYSTEM
5.3M Feb  5 15:40 /sda1/~/RP162/~SYSTEM
5.3M Feb  6 03:40 /sda1/~/RP163/~SYSTEM
5.3M Feb  7 02:11 /sda1/~/RP164/~SYSTEM
5.3M Feb  8 02:33 /sda1/~/RP165/~SYSTEM
5.3M Feb  8 05:35 /sda1/~/RP166/~SYSTEM
5.3M Feb  8 16:16 /sda1/~/RP167/~SYSTEM
5.3M Feb  9 05:37 /sda1/~/RP168/~SYSTEM
5.3M Feb 10 04:16 /sda1/~/RP169/~SYSTEM
5.3M Feb 10 22:50 /sda1/~/RP170/~SYSTEM
5.3M Feb 11 08:00 /sda1/~/RP171/~SYSTEM
5.3M Feb 12 02:58 /sda1/~/RP172/~SYSTEM
5.3M Feb 14 02:01 /sda1/~/RP173/~SYSTEM
5.3M Feb 14 02:09 /sda1/~/RP174/~SYSTEM
5.3M Feb 16 14:56 /sda1/~/RP175/~SYSTEM
5.3M Nov 14 21:24 /sda1/~/RP43/~SYSTEM
5.3M Nov 15 22:36 /sda1/~/RP44/~SYSTEM
 



#13 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,538 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:04:47 PM

Posted 19 February 2013 - 12:42 AM

Let's start with the latest Restore Point.

 

 

  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh -r
  • Type 175
  • Press Enter
  • After it has finished a report will be located at sdb1 named restore.log
  • Please try to boot into normal Windows now and indicate if you were successful

Please note - all text entries are case sensitive

Copy and paste the restore.log from your USB drive for my review
 

 


No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#14 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:03:47 PM

Posted 19 February 2013 - 09:28 AM

After the restore, I restarted. It booted into Windows and then brought up the DOJ moneypak window again.

 

Here's the restore log:

 

SOFTWARE hive restored from RP175
SYSTEM hive restored from RP175
SECURITY hive restored from RP175
SAM hive restored from RP175
 



#15 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,538 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:04:47 PM

Posted 19 February 2013 - 12:05 PM

Let's call the next in line..

 

 

  • Boot the ailing computer to xPUD.
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh -r
  • Type 174
  • Press Enter
  • After it has finished a report will be located at sdb1 named restore.log
  • Please try to boot into normal Windows now and indicate if you were successful


Please note - all text entries are case sensitive

Copy and paste the restore.log from your USB drive for my review


No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users