My windows explorer is being a PITA

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by 424242424242424, Apr 28, 2007.

  1. 424242424242424

    424242424242424 Private E-2

    Last night I was hit with a few pop ups that most likely started some scripts on my computer. The computer boots all the way up to the desktop, icons and all then after virus protection and other programs launch an unknown program causes my windows explorer to not function. It boots then closes like 3-4 times in 3 second increments(like my computer is trying to fight but gives in) then explorer stops booting all together. I have no desktop icons, no task bar, no right click and no startmenu. The only way I can move around on my computer is by ctrl + alt + del. If I try to open explorer using WTM it starts the boot and close process back over again for a few seconds, leaving nothing but a background behind. Every thing else seems to be okay. I have one more problem, but I will get into that later.

    system:
    dell inspiron 9300

    Windows Xp sp2 with all the security updates.
    1g of ram
    1.6ghz intel cpu
    256mb video card
    80gb hard drive

    Things that I tried

    >Ran Hijack 1.99 and cleaned obvious threats a few of them will not delete.
    >Tried to make deletion of 2 keys in regedit, but they return after I delete.
    >Tried running in safe mode, but computer performance is horrible.
    >Ran McAfee v8 and found nothing.
    >Ran Adware 1.6r and found nothing but cookies.
    >Tried to delete a certain file in command prompt, but couldn't do because "It was being used by another application."

    I have the HJT log file ready.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    HijackThis logs alone are not adequate! To the best of your ability based on your malware problems, please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, renaming, running, and posting HijackThis logs as attachments.
    • Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support
    • Make sure you check version numbers and get all updates.
    • Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.
    • After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:
    Make sure you also rename HijackThis.exe as suggested in the procedures. Use analyse.exe for the new name. This is very important due to some new infections going around.
    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • CounterSpy - only for Windows XP, 2K, & NT users
      • AVG Antispyware log - ONLY IF NEEDED you were not able to run CounterSpy. - only for Windows XP, 2K, & NT users
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use two messages to attach all of these logs!
     
  3. 424242424242424

    424242424242424 Private E-2

    here it is
     

    Attached Files:

    Last edited by a moderator: Apr 30, 2007
  4. 424242424242424

    424242424242424 Private E-2

    and the other three
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    When you edit the log files to remove things like your user name, we cannot always make proper fixes for your problems. Especially when the fixes need to be inserted into automatic tools for removals. Please avoid doing that in the future. No one is going to learn that much about you based upon seeing a username in one of these logs files and you have to be a registered user to see them and your thread is just one among many tens of thousands. If you were so concerned about security, you should never have used a revealing name for your user account to begin with.

    Please uninstall Viewpoint Media Player as requested in step 0 of the READ ME.

    Also please do step 2 of the READ ME properly. You did not follow those instructions exactly as written.

    Also as requested in step 6 you were supposed to uninstall this very old Sun Java version: Java 2 Runtime Environment, SE v1.4.2_03

    Then update to the current Sun Java version for this link: Sun Java Runtime Environment


    Please install and name HijackThis as requested in the READ ME in step 7. You have it installed exactly where we specify not to install it and naming it like you did only makes it look like malware. Also HijackThis logs must be from Normal Boot mode and your is from safe mode. Please follow our directions. But doo not get a new log yet. First run this Virtumonde aka Trojan Vundo Removal

    Now please download the new version of GetRunKey (just updated): Using GetRunKey

    Now attach:
    • the log from VundoFix
    • a new GetRunKey log
    • a new ShowNew log
    • a new HJT log
     
    Last edited: Apr 30, 2007
  6. 424242424242424

    424242424242424 Private E-2

    I will get on what you ask and try to post by 10pm tonight.

    I made some progress and got my Desktop back.

    From the start I've been trying to get rid of the "gebcb.dll" and "efccbxw.dll" because I knew they are the problem. They will not go anywhere, so I went ahead and block them with my McAfee Unwanted Programs Policy. After doing that my desktop came back.

    They are still on my computer and fighting tough because my cpu is sluggish and running at 100%. So there is still work to be done. I might go ahead and unblock them to get my computer performance back. Maybe I will leave them blocked and reboot, since every thing on my computer boots in the order that it was installed and the malware/trogan/worm/etc. is last, my antivirus software might be able to stop it before it initiates.

    man this is slow.....
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No!!! You neeed to follow my directions only and nothing else or you will interfere with proper removal.
     
  8. 424242424242424

    424242424242424 Private E-2

    Last night before I shut down I ran "vundo fix" and killed the 2 processes mentioned. The computer seems to be fine now. I checked the registry for the 2 .dll files and they were no longer there. I'm gonna do that last thing you ask tonight.

    Here was the new HJT log you can compare to the previous post.
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The last thing I ask for contain requests for the below logs. You need to follow all the instructions in message # 5 and attach the below logs as requested and do not edit or add your comments to any of the logs! You are not finished removing this malware yet!!
    • the log from VundoFix
    • a new GetRunKey log - make sure you have the new version as requested.
    • a new ShowNew log
    • a new HJT log
     
  10. 424242424242424

    424242424242424 Private E-2

    I did not remove the Viewpoint Media Player and Myway search assistant. The viewpoint is apart of my AIM. If I delete VMP it will return because I still have AOL/AIM instant message software on my computer. Myway was on my computer from Dell, I don't know what it really does. Before I delete My WaySA I just want to make sure that this is not the program that pop up additional information on highlighted/underlined words on various webpages? Can you tell me the risk of both of them.

    I have the 4 log files that you ask for ready, do you want me to take care of this first or go ahead and post the current log files. It did say "recommended" and not "must/mandtory" in the read me for deletion of these rogue files.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not necessarily true. I remove them all the time and they typically only come back when my sons reinstall a AIM or install a new version. Also Viewpoint is considered a form or malware and should be remove. This is why a tool like this ViewpointKiller was created and why it is in an antispyware download folder. In fact you should run ViewpointKiller.

    MyWay is malware and thousands of people screamed at Dell about their stupidity of putting this on their PCs. At first Dell denied it was a problem but then eventually they even gave removal steps. If this was not malware, it should have been easily removable just by going to add/remove programs and uninstalling it. But that did not work. Thus, behavior is that of malware and MyWay (there are about 10 or so different names) is classified as malware and that is what you also see a bunch of them listed in the link in step 0 of the READ ME to be uninstalled! Are you saying you like having all those word underlined/highlighted??? If so, you are the first! Everyone else has come here complaining about them. If you want to keep this that's fine, it's your PC. Just be aware that it is defined like this:
    which means it is classified as adware which is a sub-category of the blanket term malware.


    You need to make sure you have followed all of my instructions, and then get new logs and attach them. We only say recommend at the end for Messenger Plus because some people insist on keeping this scurge of the internet. Most of what is in that list really should be mandatory for removal. That list begins with the below statement and it does not say recommended.
     
  12. 424242424242424

    424242424242424 Private E-2

    Viewpoint is gone. MyWaySA was removed, but as I suspected I was able to see it in my add/remove list.

    Here are 2of4 logs you asked for.
     

    Attached Files:

  13. 424242424242424

    424242424242424 Private E-2

    and the other two
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's continue with your cleanup by downloading a tool we will need - Pocket KillBox

    Save it to its own folder somewhere that you will be able to locate it later.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/myway
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"

    After clicking Fix, exit HJT.


    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Note for IE 7 users: You need to select Internet Options then the Advanced tab and then Reset Internet Explorer Settings!


    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Program Files\Common Files\Yazzle1281OinAdmin.exe
    C:\Program Files\Common Files\Yazzle1281OinUninstaller.exe
    C:\WINDOWS\system32\bcbeg.bak1
    C:\WINDOWS\system32\bcbeg.bak2
    C:\WINDOWS\system32\bcbeg.tmp
    C:\WINDOWS\system32\bcbeg.ini
    C:\WINDOWS\system32\bcbeg.ini2
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But if you do get this message, please let me know!)

    If Killbox does not reboot just reboot your PC yourself.

    Now please download ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main ATF Cleaner menu to close the program.


    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  16. 424242424242424

    424242424242424 Private E-2

    That was suppose to do the opposite, going by it's name. I was hesistant to use that script when my explorer was not working. It is downloaded with the name "startmenusubfolders.vbs" but finally when I decided to run it, a message popped up saying my startmenu and sub folders is now disable. I downloaded it because I thought it was a fix for the "no windows explorer" problem that I was having with my computer. It was from that website kelley's korner Tweakes and fixes. That was a noobie move :eek:

    So do I need to go back to the default setting?

    Will the restricted website list delete if I reset my web settings?
     
  17. 424242424242424

    424242424242424 Private E-2

    I get this when I open GetRunkey "Error: The system was unable to find the specified registry key or value"

    Status

    My computer seems fine now, works like new. I will keep using it to give you more feedback.

    It seems like the SQL slammer/blaster worm(the other problem that I hinted in the first post) that I get hit with is gone to.
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! A value of "1" activates the policy and a value of "0" or just deleting the registry subkey deactivates the policy.

    I cannot answer that! What I asked was did you set this up? Now I have to ask is this what you wanted to do? If not, then yes we need to remove that policy setting.


    No!
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not a problem! You could get a few of them. All it means is that a registry key being checked for does not exist which is okay! If it did exist, the log would show it and then we would check what the contents of the key was to see if it was a problem.


    The cleanup with Pocket Killbox did not work. You must have received the PendingFileRename Operations error I said you should tell me about.


    Run Windows Explorer and manually locate and delete the below files:
    C:\Program Files\Common Files\Yazzle1281OinUninstaller.exe
    C:\WINDOWS\system32\bcbeg.bak1
    C:\WINDOWS\system32\bcbeg.bak2
    C:\WINDOWS\system32\bcbeg.tmp
    C:\WINDOWS\system32\bcbeg.ini
    C:\WINDOWS\system32\bcbeg.ini2


    Don't worry about things you may see in C:\!Killbox they are backups from PocketKillbox and my final steps will remove them once we get to that point. (We are almost there!)

    After deleting the above files, attach a new log from ShowNew.
     
  20. 424242424242424

    424242424242424 Private E-2

    No I did not get the Operations error when using it. but when Pkb rebooted I went to the c:/!killbox file and saw that it still had these backups:

    C:\Program Files\Common Files\Yazzle1281OinUninstaller.exe
    C:\WINDOWS\system32\bcbeg.bak1
    C:\WINDOWS\system32\bcbeg.bak2
    C:\WINDOWS\system32\bcbeg.tmp
    C:\WINDOWS\system32\bcbeg.ini
    C:\WINDOWS\system32\bcbeg.ini2

    I went ahead and manually deleted as directed, then ran a search to make sure there were no multiples on my computer.

    Here is the gEtnew log.
     

    Attached Files:

  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  22. 424242424242424

    424242424242424 Private E-2

    My computer is working fine now.
    Everything is deleted and I am about to flush my system restore.

    I have a few questions

    1)Every since I've connected to the web, 11-11-05, I've been getting attacked by the SQL slammer worm. My fire wall blocks it every time, but Im still wondering why I get hit with it regularly? Is there some type of vulnerability in my computer or is there some type weakness that hackers are exploiting in my ISP?

    2)The "NoStartMenuSubFolders"
    I read the link but didn't understand how to go back to the default setting.
    What is the best way to change back the original setting.

    3)I read the "How to Protect yourself from malware!" link I didn't see anything that can prevent popups. The popups is responsible for what happen this weakend.

    4) Also, from the action that I carried out in post 7, after downloading the vundo.exe that was directed, I realized that I used an older version of vundofix.exe to kill off the 2 processes. The log is below.
     

    Attached Files:

  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I'm not sure! Do you have all of your Windows & Office updates (step 1 of the How to protect thread)? Do you or did you ever use SQL Server. Do you have a log showing exactly what it blocked?

    Have you read things like the below:
    http://www.cert.org/advisories/CA-2003-04.html
    http://www.symantec.com/security_response/writeup.jsp?docid=2003-012502-3306-99
    http://www.google.com/search?q=SQL+slammer&hl=en&start=10&sa=N

    Like this!

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Popups are not really malware in themselves. If you click on them and make the wrong choices of what to click on, that is discussed in the how to protect thread. Your browers (if you use FireFox as suggested in the How to protect link) and your firewall can normally also block popups. There are other popup blockers available but I personally don't see them as being necessary. I don't find popups to be a problem.

    This does not matter now as far as I can tell but in the future make sure you are using the links we give you for tools. Never assume you already have the correct version. Tools can sometimes change daily.
     
  24. 424242424242424

    424242424242424 Private E-2

    I didn't get that fixME.reg to work, could not merge.

    SqL server, I don't know what it is, so I most likely never used it. Is MSDE something that I can disable in the Administrative tools -services?
    This is a partial amount of the log file because it was to large to up load.
     

    Attached Files:

    Last edited: May 3, 2007
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Why not? What message did you receive?


    Does the info in the below link look familiar to you. Do you access websites in China? How about for gaming or cheats....etc?

    http://www.dshield.org/ipinfo.html?ip=220.248.243.034


    There as only one hit from that address in the log. This really may not be an issue. It could just be your firewall doing its normal job. Things like this happen all the time once hacker sites have obtained your IP address. This is why having a router with a hardware firewall and a software firewall too are so important.
     
  26. 424242424242424

    424242424242424 Private E-2

    With the fixME.reg this is the message that I get,

    "cannot import C:\Doc.&Sett.....\.....\desktop\text\fixME.reg:The specified file is not a registry script. You can only import binary registry files from within the registry editor."

    With the Sql the link that you posted is the data I see when I run a trace in my firewall. I play various online games, I use gamespy and battle.net and I used Imesh as my P2P server in the past.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That means you did not save the file properly. Double check the steps and follow them exactly. Make sure there you do not have a blank line above the REGEDIT4 line.

    Yes I know it is the IP address from your firewall. I got it from your log. I'm just tell you that the IP address is for a site in China. Thus is you have accessed sites there while playing your games or using P2P applications....etc. Some one may have your IP address and is trying to get to you. Your firewall is doing its job and is blocking the incoming attach. Just like all the other incoming items you see being blocked. When you play online games and use P2P, you are opening up incoming ports to your PC and are susceptible to attacks. This is something you chose to do. No matter how much protection you have, it cannot protect you from things you choose to do on your own.

    iMesh is malware and should never be used.
     
  28. 424242424242424

    424242424242424 Private E-2

    I got the fixME.reg to work.

    I guess thats every thing now. Thank you for helping me fix my computer.

    My computer seems to be at a safe point that I would like to keep it at, I'm going to disable/enable my system restore. Is it ok to do this now?
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    Follow the steps below in the order written, this System Restore step is covered.


    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  30. 424242424242424

    424242424242424 Private E-2

    I followed steps 1-8, then reset my system restore by turning it off/on. Now I'm going through step 10.

    Again thank you for all the help sir.
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds