From: thanatoid on
"Mumia W." <paduille.4061.mumia.w+nospam(a)earthlink.net> wrote
in news:f_WdnSXuiLXIR8_RnZ2dnUVZ_gydnZ2d(a)earthlink.com:

<SNIP>

>>>>> QUESTION 1. It could not have messed up the processor -
>> first, I do not believe that is /possible/, second, DOS
>> seems to run fine.
>
> I still think it's a hardware (mainboard) problem.

First of all, allow me to /seriously/ congratulate you on your
superior maturity AND being enough of a human being to actually
have the right to a place in a tech help NG. Thank you.

Yesterday I "burned" LinuxMint9 to a USB stick and unplugged
both infected HD cables, and it ran fine. I also (largely to
please someone who keeps on insisting that both my mouse and
keyboard failed mechanically at the exact same time a bat file
out of nowhere was running in my temp directory) switched the 3
computer-end cables of my KVM.

Everything works fine.

>>>>> QUESTION 2. AFAIK, the level1 and level2 caches clear
>>>>> upon a
>> reboot, just like RAM does. I considered whether a batch
>> file could alter properties of RAM and stay in it ANYWAY,
>> but I do NOT believe that is possible.
>
> It is not.

Thank you, I really didn't think so either, but I have learned
over 20 years that ANYTHING is possible when it comes to
computers.

>> Also, there are NO RAM cleaning
>> utilities on the Hiren's disk which would lead me to
>> believe RAM is irrelevant as long as one reboots.
>>
>>>>> QUESTION 3. Since I wiped the CMOS/BIOS
>
> Wholly unnecessary.

Other helpful people (ahem) agree, but I like to be thorough.
And it is my first virus, and (as above0 - ANYTHING is possible.
(I have had stuff happen to me which is absolutely
unbelievable.)

>> (I still do NOT
>> understand the difference between them, although some
>> people have tried to explain to me), and have restored (a
>> few times) and then /written/ a new MBR, PLUS restored a
>> perfect Acronis C: image, I have NO idea where this damn
>> thing is living.
>>
>
> It's not living. Your mainboard is dying.

With all due respect, really I don't think so. The Compaq EVO
series have an impressive built-in testing and error warning
capability, plus I have run several hardware diag programs from
Hiren's bootsaver. Everything is fine.

>>>>> QUESTION 4:
>> IF the infected computer /is/ history, and I build a new
>> one and using a Linux version which can read FAT32 Windows
>> partitions, copy various standard format data from the
>> infected HD into Linux - I am risk free, aren't I?
>
> Yes.

/deep sigh of relief/ Thank you.

>> Thank you and again, I apologize for the multi-post.
>
> Even though DOS works, a hardware problem is still most
> likely. DOS and Windows have different ways of accessing
> the keyboard, so the way DOS accesses it might avoid the
> problem whereas Windows might not.

Hmm. You do have a point. But it DOES work perfectly under Linux
Mint!
Frankly, being a slightly nervous type, I think my perception of
"problems" running DSL from memory were more of a stress-related
semi-hallucination. People helping me in other groups also seem
to think so.

> Anyway, the fact that the problem exhibits under Linux
> means that it's not malware related.

See above. If Linux Mint runs perfectly (its design is WAY too
similar to WinXP, but life sucks and then you die), then I
really think I was wrong about the DSL exhibiting the same
behavior. It is VERY easy to get a menu pop to pop just barely
touching the mouse button (it's the ORIGINAL MS Mouse from the
early 90's and it has light-touch Omron switches which I put in
myself since the original lines were a little "not right" due
to its age, I presume. I've been using it for about 5 years, and
IMHO it remains the best product MS ever created.

Thank you /very/ much for your help. Needless to say, I am
continuing to work on the problem, and will post with further
developments.

Cheers.
From: FromTheRafters on
"thanatoid" <waiting(a)the.exit.invalid> wrote in message
news:Xns9DC59947E1C99thanexit(a)188.40.43.230...

[...]

>>>>>> QUESTION 4:
>>> IF the infected computer /is/ history, and I build a new
>>> one and using a Linux version which can read FAT32 Windows
>>> partitions, copy various standard format data from the
>>> infected HD into Linux - I am risk free, aren't I?
>>
>> Yes.
>
> /deep sigh of relief/ Thank you.

No.

[...]


From: thanatoid on
"FromTheRafters" <erratic(a)nomail.afraid.org> wrote in
news:i2vdn1$mni$1(a)news.eternal-september.org:

> "thanatoid" <waiting(a)the.exit.invalid> wrote in message
> news:Xns9DC59947E1C99thanexit(a)188.40.43.230...
>
> [...]
>
>>>>>>> QUESTION 4:
>>>> IF the infected computer /is/ history, and I build a new
>>>> one and using a Linux version which can read FAT32 Windows
>>>> partitions, copy various standard format data from the
>>>> infected HD into Linux - I am risk free, aren't I?
>>>
>>> Yes.
>>
>> /deep sigh of relief/ Thank you.
>
> No.

Thanks for the somewhat cryptic-yet-usable reply.

I have to check all the data with a Linux AV program (or two or
three). Right? Or is there /even/ more to it?

I am successfully running LinuxMint9 booted from a flashstick,
with the infected drive's 2 cables disconnected, on the infected
computer. I can get some latest AV software for Linux and test
the infected drive. Right?
From: FromTheRafters on
"thanatoid" <waiting(a)the.exit.invalid> wrote in message
news:Xns9DC5A2AB1103Fthanexit(a)188.40.43.230...
> "FromTheRafters" <erratic(a)nomail.afraid.org> wrote in
> news:i2vdn1$mni$1(a)news.eternal-september.org:
>
>> "thanatoid" <waiting(a)the.exit.invalid> wrote in message
>> news:Xns9DC59947E1C99thanexit(a)188.40.43.230...
>>
>> [...]
>>
>>>>>>>> QUESTION 4:
>>>>> IF the infected computer /is/ history, and I build a new
>>>>> one and using a Linux version which can read FAT32 Windows
>>>>> partitions, copy various standard format data from the
>>>>> infected HD into Linux - I am risk free, aren't I?
>>>>
>>>> Yes.
>>>
>>> /deep sigh of relief/ Thank you.
>>
>> No.
>
> Thanks for the somewhat cryptic-yet-usable reply.

Well, for the sake of completeness, malformed data is well known to
exploit vulnerabilities in application software. Some malware is OS
independent and makes use (misuse / abuse) of the environment offered by
application software. The underlying OS has little to nothing to do with
it.

> I have to check all the data with a Linux AV program (or two or
> three). Right? Or is there /even/ more to it?

One AV is plenty. Bear in mind that the AV running on Linux (or any
other OS) isn't there to protect the machine (despite what marketing may
tell you), it is there to detect viruses and some other malware types.
Protecting the machine is the administrators job. As for how to scan the
data, it is entirely up to you. I'm not saying your phantom batchfile is
likely to exhibit this behavior, just that your comments and question-
answered may have been incomplete.

On a side note, it may be wrong to assume that a batchfile or bash
script command console window means that the malware is necessarily
limited to that environment. An exploit can be the 'foot in the door'
that gets a command shell, and building a script file is no biggie once
that is accomplished. Executing the script may exploit yet another
vulnerability for privilege escalation.

> I am successfully running LinuxMint9 booted from a flashstick,
> with the infected drive's 2 cables disconnected, on the infected
> computer. I can get some latest AV software for Linux and test
> the infected drive. Right?

Yes, as long as the environment supports it. With no drives, I don't
suppose Linux could have much of a swap partition for instance.


From: thanatoid on
"FromTheRafters" <erratic(a)nomail.afraid.org> wrote in
news:i2vovt$5h4$1(a)news.eternal-september.org:

> "thanatoid" <waiting(a)the.exit.invalid> wrote in message
> news:Xns9DC5A2AB1103Fthanexit(a)188.40.43.230...

>> Thanks for the somewhat cryptic-yet-usable reply.
>
> Well, for the sake of completeness, malformed data is well
> known to exploit vulnerabilities in application software.
> Some malware is OS independent and makes use (misuse /
> abuse) of the environment offered by application software.
> The underlying OS has little to nothing to do with it.

I'm sorry... the terminology has me a little stumped. I assume
"env" means the OS.
I don't have ANY applications that run in Linux OR Windows,
except from my 5 hrs or so with Linux Mint I see that it appears
to read a DOS CD, so it will probably read a FAT32 Windows drive
as well.

>> I have to check all the data with a Linux AV program (or
>> two or three). Right? Or is there /even/ more to it?
>
> One AV is plenty. Bear in mind that the AV running on Linux
> (or any other OS) isn't there to protect the machine
> (despite what marketing may tell you), it is there to
> detect viruses and some other malware types.

That's what I want, just to check the infected drive.

> Protecting the
> machine is the administrators job.

Well, I tried to create myself an admin account in LinuxMint and
all that happened is my entire DL folder (I'm giving in... I
agree to use that despicable term when talking about Linux... In
Windows, it's still *directories*) vaporized. I thought flash
sticks SAVED changes? And the reason I needed to be an admin is
that I DL'd a couple of Linux AV packages but the system would
not let a lowly user install ANYTHING.

The reason I DL'd a couple of Linux AV's is that the Linux Avira
for Linux boot disk someone else suggested is a ***Windows
exe***, and I only have it (HAD IT before trying to become an
admin) on a USB stick, and my uninfected Win machine is a 95B
with no USB... and 33.6 modem... But I am going to go and DL it
anyway... it should only take 8-15 hours... The burner works
fine, so I will be able to boot the infected machine from it and
check the infected drive.

> As for how to scan the
> data, it is entirely up to you. I'm not saying your phantom
> batchfile is likely to exhibit this behavior, just that
> your comments and question- answered may have been
> incomplete.

Well, aside from taking great offense at my crime of
multiposting to 3 semi-live groups and 1 dead-as-the-Gates-of-
hell group, the second complaint was that my post was the
absolute /opposite/ of incomplete.

There is NO pleasing humans, is there.

> On a side note, it may be wrong to assume that a batchfile
> or bash script command console window means that the
> malware is necessarily limited to that environment. An
> exploit can be the 'foot in the door' that gets a command
> shell, and building a script file is no biggie once that is
> accomplished. Executing the script may exploit yet another
> vulnerability for privilege escalation.

Well, not if you just zap the hard drive...?

>> I am successfully running LinuxMint9 booted from a
>> flashstick, with the infected drive's 2 cables
>> disconnected, on the infected computer. I can get some
>> latest AV software for Linux and test the infected drive.
>> Right?
>
> Yes, as long as the environment supports it. With no
> drives, I don't suppose Linux could have much of a swap
> partition for instance.

I /thought/ I could partition the flash stick (it is my first
USB device EVER and I got it 3 weeks ago for unrelated reasons -
and I /am/ impressed - but I am not sure of anything ATM.

I'm not sure why I would need a swap drive when I have 1 GB of
memory (I could add the other 1GB stick I have but 98SELite and
XP run perfectly with 1 GB) and run everything from a 4GB flash
stick. Can I use another USB stick and make it a Linux swap
drive?

[I know, Manatee Mammaries.. OFF-TOPIC! KF him!]

Sigh.

Thank you for the clarifications.

I'm not sure I am capable of saying much more ATM.