1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Inactive Probable virus Windows cannot open files

Discussion in 'Malware and Virus Removal Archive' started by harrington2, 2009/08/09.

  1. 2009/08/09
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    [Inactive] Probable virus Windows cannot open files

    Most, but not all, files cannot be opened. Shortcut links destroyed. I can downdoad antivius tools but cannot open them. I was using Firefox when virus struck and now cannot open it but can open IE and access internet. Operating system is XP. I cannot open System Restore. Don Harrington:confused:
     
  2. 2009/08/09
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I'm sending you a PM about your issue.
     

  3. to hide this advert.

  4. 2009/08/09
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    This is the message, I just received:

    Delete the file, you just downloaded.

    Download new one from HERE.
    Restart computer in Safe Mode, and try to run it from there.
    Let me know.
     
  5. 2009/08/09
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Delete downloaded file, and download fresh one from HERE.

    Try to run it in Safe Mode.
     
  6. 2009/08/10
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    See, if this guy will run....

    Download [color= "#FF0000"]RootRepeal.zip[/color] (Mirror1, Mirror2) and unzip it to your Desktop.
    • Double click RootRepeal.exe to start the program
    • Click on the Report tab at the bottom of the program window
    • Click the Scan button
    • In the Select Scan dialog, check:

      • [*]Drivers
        [*]Files
        [*]Processes
        [*]SSDT
        [*]Stealth Objects
        [*]Hidden Services
    • Click the OK button
    • In the next dialog, select all drives showing
    • Click OK to start the scan
      Note: The scan can take some time. [color= "red"]DO NOT[/color] run any other programs while the scan is running
    • When the scan is complete, the Save Report button will become available
    • Click this and save the report to your Desktop as RootRepeal.txt
    • Go to File, then Exit to close the program
    Open RootRepeal.txt file with Notepad, copy, and paste all content into your next reply.
     
  7. 2009/08/11
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    Broni: I downloaded Rootappeal and saved to my desktop. I unzipped it and tried to open the exe file inboth normal and safe modes. In both cases I got the message that Windows cannot open this file.
    Don Harrington
     
  8. 2009/08/11
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Upload following files to http://www.virustotal.com/ for security check:
    - explorer.exe located @ C:\Windows
    - userinit.exe and svchost.exe located @ C:\Windows\System32
    Post scans results.
     
  9. 2009/08/12
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    File userinit.exe received on 2009.08.11 20:02:44 (UTC)
    Current status: finished

    Result: 0/41 (0.00%)
    Compact Print results
    Antivirus Version Last Update Result
    a-squared 4.5.0.24 2009.08.11 -
    AhnLab-V3 5.0.0.2 2009.08.11 -
    AntiVir 7.9.1.0 2009.08.11 -
    Antiy-AVL 2.0.3.7 2009.08.11 -
    Authentium 5.1.2.4 2009.08.11 -
    Avast 4.8.1335.0 2009.08.10 -
    AVG 8.5.0.406 2009.08.11 -
    BitDefender 7.2 2009.08.11 -
    CAT-QuickHeal 10.00 2009.08.11 -
    ClamAV 0.94.1 2009.08.11 -
    Comodo 1945 2009.08.11 -
    DrWeb 5.0.0.12182 2009.08.11 -
    eSafe 7.0.17.0 2009.08.11 -
    eTrust-Vet 31.6.6672 2009.08.11 -
    F-Prot 4.4.4.56 2009.08.10 -
    F-Secure 8.0.14470.0 2009.08.11 -
    Fortinet 3.120.0.0 2009.08.11 -
    GData 19 2009.08.11 -
    Ikarus T3.1.1.64.0 2009.08.11 -
    Jiangmin 11.0.800 2009.08.11 -
    K7AntiVirus 7.10.816 2009.08.11 -
    Kaspersky 7.0.0.125 2009.08.11 -
    McAfee 5706 2009.08.11 -
    McAfee+Artemis 5706 2009.08.11 -
    McAfee-GW-Edition 6.8.5 2009.08.11 -
    Microsoft 1.4903 2009.08.11 -
    NOD32 4326 2009.08.11 -
    Norman 6.01.09 2009.08.11 -
    nProtect 2009.1.8.0 2009.08.11 -
    Panda 10.0.0.14 2009.08.11 -
    PCTools 4.4.2.0 2009.08.11 -
    Prevx 3.0 2009.08.11 -
    Rising 21.42.14.00 2009.08.11 -
    Sophos 4.44.0 2009.08.11 -
    Sunbelt 3.2.1858.2 2009.08.11 -
    Symantec 1.4.4.12 2009.08.11 -
    TheHacker 6.3.4.3.381 2009.08.11 -
    TrendMicro 8.950.0.1094 2009.08.11 -
    VBA32 3.12.10.9 2009.08.10 -
    ViRobot 2009.8.11.1879 2009.08.11 -
    VirusBuster 4.6.5.0 2009.08.11 -
    Additional information
    File size: 24576 bytes
    MD5 : 39b1ffb03c2296323832acbae50d2aff
    SHA1 : e5aedcbe25a97c89101f1f3860ff846e94d70445
    SHA256: 5b5d71718108e132d10bafb0c217f469a1e3cc13f79ff8d9cbe3bf4918aff7b7
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0x50E5
    timedatestamp.....: 0x41107B78 (Wed Aug 4 08:00:24 2004)
    machinetype.......: 0x14C (Intel I386)

    ( 3 sections )
    name viradd virsiz rawdsiz ntrpy md5
    .text 0x1000 0x4DB8 0x4E00 6.01 16aee663ed180007a0bf5bf24b845096
    .data 0x6000 0x14C 0x200 1.86 cbb599f9267bf53209039d14a3574eb1
    .rsrc 0x7000 0xB60 0xC00 3.27 b388ab1541ccd9727979fb26a23f72e1

    ( 7 imports )

    > advapi32.dll: RegOpenKeyExA, ReportEventW, RegisterEventSourceW, DeregisterEventSource, OpenProcessToken, RegCreateKeyExW, RegSetValueExW, GetUserNameW, RegQueryValueExW, RegOpenKeyExW, RegQueryInfoKeyW, RegCloseKey, RegQueryValueExA
    > crypt32.dll: CryptProtectData
    > kernel32.dll: GetVersionExW, LocalFree, LocalAlloc, GetEnvironmentVariableW, SetEnvironmentVariableW, lstrlenW, lstrcpyW, FreeLibrary, GetProcAddress, LoadLibraryW, CompareFileTime, CloseHandle, lstrcatW, WaitForSingleObject, DelayLoadFailureHook, GetStartupInfoA, GetModuleHandleA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, LoadLibraryA, InterlockedCompareExchange, LocalReAlloc, GetSystemTime, lstrcmpW, GetCurrentThread, SetThreadPriority, CreateThread, GetFileAttributesExW, GetSystemDirectoryW, SetCurrentDirectoryW, FormatMessageW, lstrcmpiW, GetCurrentProcess, GetUserDefaultLangID, GetCurrentProcessId, ExpandEnvironmentStringsW, SetEvent, OpenEventW, Sleep, GetLastError, SearchPathW, CreateProcessW
    > msvcrt.dll: _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, __setusermatherr, __getmainargs, _acmdln, exit, _cexit, _XcptFilter, _exit, _c_exit, _initterm, _adjust_fdiv
    > ntdll.dll: RtlLengthSid, RtlCopySid, _itow, RtlFreeUnicodeString, DbgPrint, wcslen, wcscpy, wcscat, wcscmp, RtlInitUnicodeString, NtOpenKey, NtClose, _wcsicmp, memmove, NtQueryInformationToken, RtlConvertSidToUnicodeString
    > user32.dll: CreateWindowExW, DestroyWindow, RegisterClassExW, DefWindowProcW, LoadRemoteFonts, wsprintfW, GetSystemMetrics, GetKeyboardLayout, SystemParametersInfoW, GetDesktopWindow, LoadStringW, MessageBoxW, ExitWindowsEx, CharNextW
    > winspool.drv: SpoolerInit

    ( 0 exports )

    TrID : File type identification
    Win32 Executable MS Visual C++ (generic) (65.2%)
    Win32 Executable Generic (14.7%)
    Win32 Dynamic Link Library (generic) (13.1%)
    Generic Win/DOS Executable (3.4%)
    DOS Executable Generic (3.4%)
    ThreatExpert: http://www.threatexpert.com/report.aspx?md5=39b1ffb03c2296323832acbae50d2aff
    ssdeep: 384:DNkhB/JD1CzaxzOV6s9cKmdPGFQ273eLXVBYkkjuv1hkNLdbaLa4CwUJuUCSF4WL:gJDUaxgu5YEVBxkjuv7wbaLa4PU4b7
    PEiD : -
    RDS : NSRL Reference Data Set

    ( Gateway )

    Gateway Operating System Windows XP Pro Edition SP2: USERINIT.EXE, userinit.exe
    ( Microsoft )

    MSDN Disc 2428.4: userinit.exeMSDN Disc 2428.5: userinit.exeMSDN Disc 2428.8: userinit.exeOperating System Reinstallation CD Microsoft Windows XP Professional Service Pack 2: userinit.exeVirtual PC for Mac Windows XP Home Edition: userinit.exeVirtual PC for Mac Windows XP Professional Edition: userinit.exe


    ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.

    -------------------------------------------------------------------------------------
    File svchost.exe received on 2009.08.11 17:43:50 (UTC)
    Current status: finished

    Result: 0/41 (0.00%)
    Compact Print results
    Antivirus Version Last Update Result
    a-squared 4.5.0.24 2009.08.11 -
    AhnLab-V3 5.0.0.2 2009.08.11 -
    AntiVir 7.9.1.0 2009.08.11 -
    Antiy-AVL 2.0.3.7 2009.08.11 -
    Authentium 5.1.2.4 2009.08.11 -
    Avast 4.8.1335.0 2009.08.10 -
    AVG 8.5.0.406 2009.08.11 -
    BitDefender 7.2 2009.08.11 -
    CAT-QuickHeal 10.00 2009.08.11 -
    ClamAV 0.94.1 2009.08.11 -
    Comodo 1944 2009.08.11 -
    DrWeb 5.0.0.12182 2009.08.11 -
    eSafe 7.0.17.0 2009.08.11 -
    eTrust-Vet 31.6.6672 2009.08.11 -
    F-Prot 4.4.4.56 2009.08.10 -
    F-Secure 8.0.14470.0 2009.08.11 -
    Fortinet 3.120.0.0 2009.08.11 -
    GData 19 2009.08.11 -
    Ikarus T3.1.1.64.0 2009.08.11 -
    Jiangmin 11.0.800 2009.08.11 -
    K7AntiVirus 7.10.816 2009.08.11 -
    Kaspersky 7.0.0.125 2009.08.11 -
    McAfee 5706 2009.08.11 -
    McAfee+Artemis 5706 2009.08.11 -
    McAfee-GW-Edition 6.8.5 2009.08.11 -
    Microsoft 1.4903 2009.08.11 -
    NOD32 4326 2009.08.11 -
    Norman 6.01.09 2009.08.11 -
    nProtect 2009.1.8.0 2009.08.11 -
    Panda 10.0.0.14 2009.08.11 -
    PCTools 4.4.2.0 2009.08.11 -
    Prevx 3.0 2009.08.11 -
    Rising 21.42.14.00 2009.08.11 -
    Sophos 4.44.0 2009.08.11 -
    Sunbelt 3.2.1858.2 2009.08.11 -
    Symantec 1.4.4.12 2009.08.11 -
    TheHacker 6.3.4.3.380 2009.08.11 -
    TrendMicro 8.950.0.1094 2009.08.11 -
    VBA32 3.12.10.9 2009.08.10 -
    ViRobot 2009.8.11.1879 2009.08.11 -
    VirusBuster 4.6.5.0 2009.08.11 -
    Additional information
    File size: 14336 bytes
    MD5 : 8f078ae4ed187aaabc0a305146de6716
    SHA1 : da0ff4006859a7580aba81f486f692dead2014fe
    SHA256: 16593943861d03d508f37f60e41240dee14221e76f625835487f73d5010ac18a
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0x2509
    timedatestamp.....: 0x41107ED6 (Wed Aug 4 08:14:46 2004)
    machinetype.......: 0x14C (Intel I386)

    ( 3 sections )
    name viradd virsiz rawdsiz ntrpy md5
    .text 0x1000 0x2C00 0x2C00 6.29 6fc4d075dfb37185ffae8eacb467b822
    .data 0x4000 0x1F0 0x200 1.61 553c0ebbbc67abab785f2065a062b522
    .rsrc 0x5000 0x418 0x600 2.54 2997285df9158db5a62ffb42a2fd0d07

    ( 0 imports )


    ( 0 exports )

    TrID : File type identification
    Win32 Executable Generic (42.3%)
    Win32 Dynamic Link Library (generic) (37.6%)
    Generic Win/DOS Executable (9.9%)
    DOS Executable Generic (9.9%)
    Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
    ThreatExpert: http://www.threatexpert.com/report.aspx?md5=8f078ae4ed187aaabc0a305146de6716
    ssdeep: 384:cpiRrTp13SkhnRCwOV5JpeLCdw9rDpWCl8CbW:dT/3Ska6Lh8C
    PEiD : -
    RDS : NSRL Reference Data Set

    ( Gateway )

    Gateway Operating System Windows XP Pro Edition SP2: SVCHOST.EXE, svchost.exe
    ( Microsoft )

    MSDN Disc 2428.4: svchost.exeMSDN Disc 2428.5: svchost.exeMSDN Disc 2428.8: svchost.exeOperating System Reinstallation CD Microsoft Windows XP Professional Service Pack 2: svchost.exeVirtual PC for Mac Windows XP Home Edition: svchost.exeVirtual PC for Mac Windows XP Professional Edition: svchost.exe


    ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.

    ----------------------------------------------------------------------
    File explorer.exe received on 2009.08.10 21:36:02 (UTC)
    Current status: finished

    Result: 0/41 (0.00%)
    Compact Print results
    Antivirus Version Last Update Result
    a-squared 4.5.0.24 2009.08.10 -
    AhnLab-V3 5.0.0.2 2009.08.10 -
    AntiVir 7.9.0.248 2009.08.10 -
    Antiy-AVL 2.0.3.7 2009.08.10 -
    Authentium 5.1.2.4 2009.08.10 -
    Avast 4.8.1335.0 2009.08.10 -
    AVG 8.5.0.406 2009.08.10 -
    BitDefender 7.2 2009.08.10 -
    CAT-QuickHeal 10.00 2009.08.10 -
    ClamAV 0.94.1 2009.08.10 -
    Comodo 1936 2009.08.10 -
    DrWeb 5.0.0.12182 2009.08.10 -
    eSafe 7.0.17.0 2009.08.10 -
    eTrust-Vet 31.6.6670 2009.08.10 -
    F-Prot 4.4.4.56 2009.08.10 -
    F-Secure 8.0.14470.0 2009.08.10 -
    Fortinet 3.120.0.0 2009.08.10 -
    GData 19 2009.08.10 -
    Ikarus T3.1.1.64.0 2009.08.10 -
    Jiangmin 11.0.800 2009.08.10 -
    K7AntiVirus 7.10.815 2009.08.10 -
    Kaspersky 7.0.0.125 2009.08.10 -
    McAfee 5705 2009.08.10 -
    McAfee+Artemis 5705 2009.08.10 -
    McAfee-GW-Edition 6.8.5 2009.08.10 -
    Microsoft 1.4903 2009.08.10 -
    NOD32 4323 2009.08.10 -
    Norman 6.01.09 2009.08.10 -
    nProtect 2009.1.8.0 2009.08.10 -
    Panda 10.0.0.14 2009.08.10 -
    PCTools 4.4.2.0 2009.08.10 -
    Prevx 3.0 2009.08.10 -
    Rising 21.42.04.00 2009.08.10 -
    Sophos 4.44.0 2009.08.10 -
    Sunbelt 3.2.1858.2 2009.08.10 -
    Symantec 1.4.4.12 2009.08.10 -
    TheHacker 6.3.4.3.379 2009.08.10 -
    TrendMicro 8.950.0.1094 2009.08.10 -
    VBA32 3.12.10.9 2009.08.10 -
    ViRobot 2009.8.10.1877 2009.08.10 -
    VirusBuster 4.6.5.0 2009.08.10 -
    Additional information
    File size: 1033216 bytes
    MD5 : 97bd6515465659ff8f3b7be375b2ea87
    SHA1 : 972307a3ef93680afdd03603df20f2241047a934
    SHA256: 8b48dd5eb2a7f8ec8b607b1b0c9cbf7278b401024347971cbb6d0c9530d1c295
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0x1A8CE
    timedatestamp.....: 0x466FC588 (Wed Jun 13 12:23:04 2007)
    machinetype.......: 0x14C (Intel I386)

    ( 4 sections )
    name viradd virsiz rawdsiz ntrpy md5
    .text 0x1000 0x44AD9 0x44C00 6.36 7de882aa0da62b155286cb91c8f0fbd9
    .data 0x46000 0x1DB4 0x1800 1.30 25fdde5ea7a06e94390eb8773b825a55
    .rsrc 0x48000 0xB2278 0xB2400 6.63 b82ace172bfa53b11b99e63c7ac67c26
    .reloc 0xFB000 0x3720 0x3800 6.76 924c25a2a1584ac973811d65894c44fa

    ( 13 imports )

    > advapi32.dll: RegSetValueW, RegEnumKeyExW, GetUserNameW, RegNotifyChangeKeyValue, RegEnumValueW, RegQueryValueExA, RegOpenKeyExA, RegEnumKeyW, RegCloseKey, RegCreateKeyW, RegQueryInfoKeyW, RegOpenKeyExW, RegQueryValueExW, RegCreateKeyExW, RegSetValueExW, RegDeleteValueW, RegQueryValueW
    > browseui.dll: -, -, -, -
    > gdi32.dll: GetStockObject, CreatePatternBrush, OffsetViewportOrgEx, GetLayout, CombineRgn, CreateDIBSection, GetTextExtentPoint32W, StretchBlt, SetTextColor, CreateRectRgn, GetClipRgn, IntersectClipRect, GetViewportOrgEx, SetViewportOrgEx, SelectClipRgn, PatBlt, GetBkColor, CreateCompatibleDC, CreateCompatibleBitmap, OffsetWindowOrgEx, DeleteDC, SetBkColor, BitBlt, ExtTextOutW, GetTextExtentPointW, GetClipBox, GetObjectW, CreateRectRgnIndirect, SetBkMode, CreateFontIndirectW, DeleteObject, GetTextMetricsW, SelectObject, GetDeviceCaps, TranslateCharsetInfo, SetStretchBltMode
    > kernel32.dll: GetSystemDirectoryW, CreateThread, CreateJobObjectW, ExitProcess, SetProcessShutdownParameters, ReleaseMutex, CreateMutexW, SetPriorityClass, GetCurrentProcess, GetStartupInfoW, GetCommandLineW, SetErrorMode, LeaveCriticalSection, EnterCriticalSection, ResetEvent, LoadLibraryExA, CompareFileTime, GetSystemTimeAsFileTime, SetThreadPriority, GetCurrentThreadId, GetThreadPriority, GetCurrentThread, GetUserDefaultLangID, Sleep, GetBinaryTypeW, GetModuleHandleExW, SystemTimeToFileTime, GetLocalTime, GetCurrentProcessId, GetEnvironmentVariableW, UnregisterWait, GlobalGetAtomNameW, GetFileAttributesW, MoveFileW, lstrcmpW, LoadLibraryExW, FindClose, FindNextFileW, FindFirstFileW, lstrcmpiA, SetEvent, AssignProcessToJobObject, GetDateFormatW, GetTimeFormatW, FlushInstructionCache, lstrcpynW, GetSystemWindowsDirectoryW, SetLastError, GetProcessHeap, HeapFree, HeapReAlloc, HeapSize, HeapAlloc, GetUserDefaultLCID, ReadProcessMemory, OpenProcess, InterlockedCompareExchange, LoadLibraryA, QueryPerformanceCounter, UnhandledExceptionFilter, SetUnhandledExceptionFilter, VirtualFree, VirtualAlloc, ResumeThread, TerminateProcess, TerminateThread, GetSystemDefaultLCID, GetLocaleInfoW, CreateEventW, GetLastError, RegisterWaitForSingleObject, OpenEventW, WaitForSingleObject, GetTickCount, ExpandEnvironmentStringsW, GetModuleFileNameW, GetPrivateProfileStringW, lstrcmpiW, CreateProcessW, FreeLibrary, GetWindowsDirectoryW, LocalAlloc, CreateFileW, DeviceIoControl, LocalFree, GetQueuedCompletionStatus, CreateIoCompletionPort, SetInformationJobObject, CloseHandle, LoadLibraryW, GetModuleHandleW, ActivateActCtx, DeactivateActCtx, DelayLoadFailureHook, GetProcAddress, DeleteCriticalSection, CreateEventA, HeapDestroy, InitializeCriticalSection, GetFileAttributesExW, MulDiv, lstrlenW, InterlockedDecrement, InterlockedIncrement, GlobalAlloc, InterlockedExchange, GetModuleHandleA, GetVersionExA, GlobalFree, GetProcessTimes, lstrcpyW, GetLongPathNameW, InitializeCriticalSectionAndSpinCount
    > msvcrt.dll: _itow, free, memmove, realloc, _except_handler3, malloc, _ftol, _vsnwprintf
    > ntdll.dll: RtlNtStatusToDosError, NtQueryInformationProcess
    > ole32.dll: CoFreeUnusedLibraries, RegisterDragDrop, CreateBindCtx, RevokeDragDrop, CoInitializeEx, CoUninitialize, OleInitialize, CoRevokeClassObject, CoRegisterClassObject, CoMarshalInterThreadInterfaceInStream, CoCreateInstance, OleUninitialize, DoDragDrop
    > oleaut32.dll: -, -
    > shdocvw.dll: -, -, -
    > shell32.dll: -, SHGetFolderPathW, -, -, -, -, -, ExtractIconExW, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, ShellExecuteExW, -, -, -, -, -, -, -, SHBindToParent, -, -, -, SHParseDisplayName, -, -, -, -, -, -, SHGetSpecialFolderLocation, -, -, -, -, SHGetSpecialFolderPathW, -, -, -, -, -, SHChangeNotify, SHGetDesktopFolder, SHAddToRecentDocs, -, -, -, DuplicateIcon, -, -, -, -, -, -, -, -, SHUpdateRecycleBinIcon, SHGetFolderLocation, SHGetPathFromIDListA, -, -, -, -, -, -, -, SHGetPathFromIDListW, -, -, -
    > shlwapi.dll: StrCpyNW, -, -, -, -, StrRetToBufW, StrRetToStrW, -, -, -, -, SHQueryValueExW, PathIsNetworkPathW, -, AssocCreate, -, -, -, -, -, StrCatW, StrCpyW, -, -, -, -, -, -, -, SHGetValueW, -, StrCmpNIW, PathRemoveBlanksW, PathRemoveArgsW, PathFindFileNameW, StrStrIW, PathGetArgsW, -, StrToIntW, SHRegGetBoolUSValueW, SHRegWriteUSValueW, SHRegCloseUSKey, SHRegCreateUSKeyW, SHRegGetUSValueW, SHSetValueW, -, PathAppendW, PathUnquoteSpacesW, -, -, PathQuoteSpacesW, -, SHSetThreadRef, SHCreateThreadRef, -, -, -, PathCombineW, -, -, -, SHStrDupW, PathIsPrefixW, PathParseIconLocationW, AssocQueryKeyW, -, AssocQueryStringW, StrCmpW, -, -, -, -, -, -, -, -, SHRegQueryUSValueW, SHRegOpenUSKeyW, SHRegSetUSValueW, PathIsDirectoryW, PathFileExistsW, PathGetDriveNumberW, -, StrChrW, PathFindExtensionW, -, -, PathRemoveFileSpecW, PathStripToRootW, -, -, -, SHOpenRegStream2W, -, -, -, StrDupW, SHDeleteValueW, StrCatBuffW, SHDeleteKeyW, StrCmpIW, -, -, wnsprintfW, -, StrCmpNW, -, -
    > user32.dll: TileWindows, GetDoubleClickTime, GetSystemMetrics, GetSysColorBrush, AllowSetForegroundWindow, LoadMenuW, GetSubMenu, RemoveMenu, SetParent, GetMessagePos, CheckDlgButton, EnableWindow, GetDlgItemInt, SetDlgItemInt, CopyIcon, AdjustWindowRectEx, DrawFocusRect, DrawEdge, ExitWindowsEx, WindowFromPoint, SetRect, AppendMenuW, LoadAcceleratorsW, LoadBitmapW, SendNotifyMessageW, SetWindowPlacement, CheckMenuItem, EndDialog, SendDlgItemMessageW, MessageBeep, GetActiveWindow, PostQuitMessage, MoveWindow, GetDlgItem, RemovePropW, GetClassNameW, GetDCEx, SetCursorPos, ChildWindowFromPoint, ChangeDisplaySettingsW, RegisterHotKey, UnregisterHotKey, SetCursor, SendMessageTimeoutW, GetWindowPlacement, LoadImageW, SetWindowRgn, IntersectRect, OffsetRect, EnumDisplayMonitors, RedrawWindow, SubtractRect, TranslateAcceleratorW, WaitMessage, InflateRect, CallWindowProcW, GetDlgCtrlID, SetCapture, LockSetForegroundWindow, CopyRect, SystemParametersInfoW, FindWindowW, CreatePopupMenu, GetMenuDefaultItem, DestroyMenu, GetShellWindow, EnumChildWindows, GetWindowLongW, SendMessageW, RegisterWindowMessageW, GetKeyState, MonitorFromRect, MonitorFromPoint, RegisterClassW, SetPropW, GetWindowLongA, SetWindowLongW, FillRect, GetCursorPos, PtInRect, MessageBoxW, LoadStringW, ReleaseDC, GetDC, EnumDisplaySettingsExW, EnumDisplayDevicesW, PostMessageW, DispatchMessageW, TranslateMessage, GetMessageW, PeekMessageW, BeginPaint, EndPaint, SetWindowTextW, GetAsyncKeyState, InvalidateRect, GetWindow, ShowWindowAsync, TrackPopupMenuEx, UpdateWindow, DestroyIcon, IsRectEmpty, SetActiveWindow, GetSysColor, DrawTextW, IsHungAppWindow, SetTimer, GetMenuItemID, TrackPopupMenu, EndTask, SendMessageCallbackW, GetClassLongW, LoadIconW, OpenInputDesktop, CloseDesktop, SetScrollPos, ShowWindow, BringWindowToTop, GetDesktopWindow, CascadeWindows, CharUpperBuffW, SwitchToThisWindow, InternalGetWindowText, GetScrollInfo, GetMenuItemCount, ModifyMenuW, CreateWindowExW, DialogBoxParamW, MsgWaitForMultipleObjects, CharNextA, RegisterClipboardFormatW, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, PrintWindow, SetClassLongW, GetPropW, GetNextDlgGroupItem, GetNextDlgTabItem, ChildWindowFromPointEx, IsChild, NotifyWinEvent, TrackMouseEvent, GetCapture, GetAncestor, CharUpperW, SetWindowLongA, DrawCaption, InsertMenuW, IsWindowEnabled, GetMenuState, LoadCursorW, GetParent, IsDlgButtonChecked, DestroyWindow, EnumWindows, IsWindowVisible, GetClientRect, UnionRect, EqualRect, GetWindowThreadProcessId, GetForegroundWindow, KillTimer, GetClassInfoExW, DefWindowProcW, RegisterClassExW, GetIconInfo, SetScrollInfo, GetLastActivePopup, SetForegroundWindow, IsWindow, GetSystemMenu, IsIconic, IsZoomed, EnableMenuItem, SetMenuDefaultItem, MonitorFromWindow, GetMonitorInfoW, GetWindowInfo, GetFocus, SetFocus, MapWindowPoints, ScreenToClient, ClientToScreen, GetWindowRect, SetWindowPos, DeleteMenu, GetMenuItemInfoW, SetMenuItemInfoW, CharNextW
    > uxtheme.dll: GetThemeBackgroundContentRect, GetThemeBool, GetThemePartSize, DrawThemeParentBackground, OpenThemeData, DrawThemeBackground, GetThemeTextExtent, DrawThemeText, CloseThemeData, SetWindowTheme, GetThemeBackgroundRegion, -, GetThemeMargins, GetThemeColor, GetThemeFont, GetThemeRect, IsAppThemed

    ( 0 exports )

    TrID : File type identification
    Win32 Executable MS Visual C++ (generic) (65.2%)
    Win32 Executable Generic (14.7%)
    Win32 Dynamic Link Library (generic) (13.1%)
    Generic Win/DOS Executable (3.4%)
    DOS Executable Generic (3.4%)
    ThreatExpert: http://www.threatexpert.com/report.aspx?md5=97bd6515465659ff8f3b7be375b2ea87
    ssdeep: 12288:NRFHBdIwCDrA6hWVz0v/1oHWr2Rkf8I+skzaz1/g/J/vHyM:NzhOwCDE6hCOLakf8I+sko1/g/J//y
    PEiD : -
    RDS : NSRL Reference Data Set
    -


    ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.
     
  10. 2009/08/12
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Well, I'm starting to wonder, if we're dealing with any infection at all.
    What does make you think, your computer is infected.
    It may be simply a matter of serious system files corruption.
     
  11. 2009/08/12
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    I wonder if I did that correctly. I did upload each of the files. After each one the page that came up was a bit confusing. There was the statement saying "File has already been analysed" Under that was a Permalink and below that was a button saying "show last report ". I clicked on the latter and copied and pasted it to the forum. Would I have gotten something different if I clicked on the Permalink and sent that?

    Assuming that I did it right, are you saying there is no evidence of a virus? What could have suddenly caused most of my files to not be able to open? What could casue the same thing to all new downloaded files?
     
  12. 2009/08/12
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You did it correctly.

    Let's try one more thing...

    Please do an online scan with Kaspersky WebScanner
    Please note: You MUST use Internet Explorer for this scan to work. )

    Click on Kaspersky Online Scanner

    You will be promted to install an ActiveX component from Kaspersky, Click Yes.

    * The program will launch and then begin downloading the latest definition files:
    * Once the files have been downloaded click on NEXT
    * Now click on Scan Settings
    * In the scan settings make that the following are selected:
    o Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    o Scan Options:
    Scan Archives
    Scan Mail Bases

    * Click OK
    * Now under select a target to scan:
    Select My Computer
    * This will program will start and scan your system.
    * The scan will take a while so be patient and let it run.
    * Once the scan is complete it will display if your system has been infected.
    o Now click on the Save as Text button:
    * Save the file to your desktop.
    * Copy and paste that information in your next post.
     
  13. 2009/08/13
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    broni: I tried the Kaspersky online scan, 3 times in fact. I used IE and the download worked to 100% each time. On the update step, each time it failed. The message was "Update has failed. Program has failed to start. Error: Updater logic error related to process."
    On one try the final error message was slightly different "Error Failed to connect with update source "

    Don Harrington.
     
  14. 2009/08/13
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
  15. 2009/08/14
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    Broni: I could not get any of the online scanners listed to work. It seemed in general when they needed info from my computer they couldn't get it. Pands seemed to go further than the others but stopped with a message that updating was incomplete due to an error - Try again. I tried several times but got no further. Don Harrington
     
  16. 2009/08/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    OK. Here is the situation.
    So far, I see no indication, your computer is infected.
    We scanned some crucial files, and they came up clean.
    It looks to me, that there are simply some serious problems with your Windows installation.
    I really don't see what else I could do.
    I propose, you back up your data, and reinstall Windows.
     
  17. 2009/08/15
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    Broni, I could sense that was coming. I have "rescue discs" which I made when I bought the computer and of course I have the original Windows XP disc. A "system restoration guide" describes two methods of restore, Full system restore (Destructive) and Full System restore (with Backup).
    I can't see how I can backup data in individual programs since I can not open the program files.
    There are a few programs for which I no longer have the discs. I suppose those are gone.
    Any suggestions on how to proceed? Don Harrington.
     
  18. 2009/08/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You can't really backup programs. They have to be reinstalled.
    As for your data, Fab's AutoBackup: http://www.fpnet.fr/index2.php?lang=en&section=software should cover backing up most of your data.
    Make sure, you scan all those files with your AV before you move the data back to your fresh install.
     
  19. 2009/08/15
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    Broni: I responded yesterday but I don't see any sign that it got posted to the thread. I will try again. Your conclusion was not unexpected. I have rescue discs and of course the original Widows disc. The enclosure for the former describes two modes. Full System restore (Destructive) and Full System restore (with backup). The latter makes a backup before deleting. I assume this is what you are referring to. I can't make backups of individual programs as I cannot open them to do the backup. Any suggestions would be welcome. Don Harrington
     
  20. 2009/08/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Your reply posted (#16), and I replied (#17).
     
  21. 2009/08/17
    harrington2

    harrington2 Inactive Thread Starter

    Joined:
    2009/08/09
    Messages:
    9
    Likes Received:
    0
    Broni: I did successfully restore my computer as you advised. Thank you very very much for all your help. I never would have gotten thru this without your patience. Don Harrington
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.