i.e. not responding

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by smokinbls, Aug 13, 2004.

  1. smokinbls

    smokinbls the title thing is overrated

    no


    .

    yes i found system32.dll what should i do with it?

    i am posting this.
    then i will try findnfix again
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Where was the system32.dll file and see if you can right click on it and get properties information. I want company info and version etc. For an example of what I mean on a file that will give you this info.
    Goto c:\windows\system32 and right click on wsock32.dll and select Properties, then the version tab. Look at each of the items in the box labeled Item name:

    You can use Windows Explorer to copy files. Just run it and go to c:\windows find notepad.exe and right click on it and select 'Copy'. Now with Windows Explorer highlight (select) the c:\windows\system32 directory and then in the right window right click the mouse and select paste. This will copy notepad.exe into your c:\windows\system32 folder. Now right click on this copy of notepad.exe and select 'Rename' and change the name to netdc.exe. Tell me if this rename works. If not, tell me the exact error message.
     
  3. smokinbls

    smokinbls the title thing is overrated

    ok here is the log from findnfix
    re downloaded it again ( 3rd time )
     

    Attached Files:

    • log.txt
      File size:
      13.3 KB
      Views:
      9
  4. smokinbls

    smokinbls the title thing is overrated

    c:\windows\system32


    there is no value tab


    i did know how to do this

    cannot rename notepad.exe a file with the name already exists specify a different file name

    i checked for it and did not find it. the only thing that i found that looks like it is
    net1.exe
    net.exe
    i di not do anything to them i.e. click them or open them
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Configure Windows XP Search properly. Click Start, Search, All files and folders, enter c:\windows\system32\ctlbfdm.dll in the file name box provided, then click More advanced options and make sure you have checked:
    - Search system folders
    - Search hidden files and folders
    - Search subfolders

    The click the Search button. Tell me if you find any matches at all and where they are.

    Then I want you to Run Registrar lite again but this time do the following:
    - copy the following into the address bar or expand the same key by hand:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs

    - Rename the Folder Windows to NotWindows (in the left hand pane of reglite)
    - Double Click "AppInit_DLLs" again and clear the data value:
    c:\windows\system32\ctlbfdm.dll < delete this line , 'Apply' and 'ok' to set.
    - Rename the NotWindows folder back to its original name Windows
    - Restart computer in safe mode
    - This should make the file visible if we could not find it before. So run that Search for c:\windows\system32\ctlbfdm.dll I gave you above again and see what you get now.
    - Also while in safe mode. Run HijackThis again and have it fix:
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\DOCUME~1\BRYANS~1\LOCALS~1\Temp\sp.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\BRYANS~1\LOCALS~1\Temp\sp.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\System32\netdc.exe
    O18 - Filter: text/html - {48F64383-91E5-4BBA-B06B-93813F5C39B9} - C:\WINDOWS\System32\eppaeja.dll
    O18 - Filter: text/plain - {48F64383-91E5-4BBA-B06B-93813F5C39B9} - C:\WINDOWS\System32\eppaeja.dll

    C:\Documents and Settings\bryan stadler\Local Settings\Temp\sp.html
    c:\windows\system32\ctlbfdm.dll
    C:\WINDOWS\System32\eppaeja.dll
    C:\WINDOWS\system32\aekpn.dll
    C:\WINDOWS\system32\pjb.dll

    Now click Start > Run, and enter cmd so you should see a command prompt.

    At the prompt type and enter: cd c:\windows\system32

    Now enter the following commands and keep track of the results for each step and let me know exactly what happens (you had a problem doing this back in message #47, we need to get this to work. Make sure you type lines properly and if you get an error, tell me what line you just typed and the exact error message.)
    attrib -h -r -s BRIDGE.DLL
    ren BRIDGE.DLL BRIDGE.BAD
    attrib -h -r -s D2KPAX.DLL
    ren D2KPAX.DLL D2KPAX.BAD
    attrib -h -r -s MSXSLAB.DLL
    ren MSXSLAB.DLL MSXSLAB.BAD
    attrib -h -r -s SYSTEM32.DLL
    ren SYSTEM32.DLL SYSTEM32.BAD

    Reboot normal

    Also let me know the resuluts of all the above steps.
    Also post another HijackThis attachment .
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    And by the way,

    net1.exe
    net.exe

    are okay. They are part of Windows.
     
  7. smokinbls

    smokinbls the title thing is overrated

    found nothing
    look at post 93 and 95 we took care of it there

    this waS not there ( i opened up Registrar lite and pasted the line but the value was blank )


    more to come need to reboot in safe mood
     
    Last edited: Sep 20, 2004
  8. smokinbls

    smokinbls the title thing is overrated

    should be for c:\windows\system32\ctlbfdm.dll
    i could not reedit
     
  9. smokinbls

    smokinbls the title thing is overrated

    done

    was i suposed to look this up?

    did this again and got the exact same thing.
    new HJT log
    also netdc.exe is in my task mgr only while on-line, and i looked everwhere in EXPLORER and did not find it.
     

    Attached Files:

    Last edited: Sep 20, 2004
  10. smokinbls

    smokinbls the title thing is overrated

    forget about the other HJT log file this is a new one
    f2 is back it alwasys comes back
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not according to the log from FINDnFix in message #103. Take a look in there and you will see references to ctlbfdm.dll in the area with AppInit_DLLs.
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sorry! I left out a line. The below were to be deleted in safe mode.

    C:\Documents and Settings\bryan stadler\Local Settings\Temp\sp.html
    c:\windows\system32\ctlbfdm.dll
    C:\WINDOWS\System32\eppaeja.dll
    C:\WINDOWS\system32\aekpn.dll
    C:\WINDOWS\system32\pjb.dll
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes, you must be doing something wrong. These also show in FINDnFIX's log.

    Are you sure you are entering the commands exactly as I gave with spaces as given. Try using cut and paste. Where you able to do this command correctly:
    cd c:\windows\system32

    Did your prompt now show that you are in the c:\windows\system32 directory?
     
  14. smokinbls

    smokinbls the title thing is overrated

    deleted

    C:\WINDOWS\System32\eppaeja.dll -----i could not find this one




    did this again.
    here is a cmd.log file
    did you get my PM?
     

    Attached Files:

    • cmd.txt
      File size:
      919 bytes
      Views:
      3
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Delete c:\windows\system32\ctlbfdm.bad

    For the command prompt stuff, you are not getting the error message you told me before. You are getting:
    The system cannot find the file specified.

    And you only received this error for the bridge.dll file which was probably due to the fact that it was already renamed to bridge.bad previously.

    Where is this confusion coming from? The commands worked okay. Why did you say they did not?

    Yes, I saw your PM. I take a look at that link when I can.
     
  16. smokinbls

    smokinbls the title thing is overrated

    this is gone


    i should hve looked back to see what i said :rolleyes:
    sorry
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay, so now let's use Registrar Lite to search your registry for netdc (without the .exe). Tell me what matches you get.
     
  18. smokinbls

    smokinbls the title thing is overrated

    i did not find anything with netdc with registar lite

    however i found where regedit said netdc.exe was
    here is the path
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000
    when i clicked on it this is what was on the right side
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\(default)
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.BitsPerPel
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.FixedOutput
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.Flags
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.Orientation
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.VRefresh
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.XPanning
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.XResolution
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.YPanning
    HKEY_CURRENT_CONFIG\System\CurrentControlSet\Control\VIDEO\{81A1BF3D-7E46-43DB-9529-66D227F4F539}\0000\Mon80861000\\DefaultSettings.YResolution

    I AM SURE THAT THIS IS NOT WHAT YOU WANTED
    THAT IS ALL I CAN GIVE YOU.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is nothing in that registry key that shows netdc.exe and that is why Registrar Lite showed no matches. I don't know why regedit would show a match because there isn't any according to what you posted.
     
  20. smokinbls

    smokinbls the title thing is overrated

    well i tried to find netdc on my own.
    so now i need help.
    what would be the path
    ( i.e.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\netdc )
    that i type in to have registrar find it.
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's the same basic place I had you look for AppInit_DLLs.

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

    If you double click on netdc what kind of info do you see for value.
     
  22. smokinbls

    smokinbls the title thing is overrated

    that was a example. netdc is not there. i have no idea where it is.
    i started to look in every folder in registrar lite but after about 200 folders i gave up.
    so that is why i asked if you had any idea where it might be..
    or what i should type into registrar lite to find it.
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sorry! I misunderstood you. You don't need to look in the folders yourself. You need to use the search function built into Registrar Lite and let it look for matches. But before doing that make sure when Registrar Lite first opens that you click in the left window to put the cursor on the top of the registry where the two little computer appear next to the word Registry.

    But I thought you already did this in message # 118
     
  24. smokinbls

    smokinbls the title thing is overrated

    sorry it did not search the first time.....
    IT FOUND SOMETHINGS.
    DO YOU WANT ME TO COPY AND PASTE OR USE A LOG FILE..?
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Post it the fastest and easiest way you can. Unless it is exactly the same as what you gave before with regedit.
     
  26. smokinbls

    smokinbls the title thing is overrated

    sorry i had to type it out

    this is how it looked

    KEY...............VALUE.........DATA

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curent Version\Winlogon..........shell..........explorer.exe :C\WINDOWS\System32\netdc.exe

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curent Version\Winlogon..........shell..........explorer.exe :C\WINDOWS\System32\netdc.exe

    HKEY_USERS\S-1-5-21-484763869-436374069-854245398-1004\Sortware\microsoft\Search assistant\ACMru\5603..........001.............netdc.exe


    HKEY_USERS\S-1-5-21-484763869-436374069-854245398-1004\Sortware\microsoft\Windows\Current Version\Explorer\RunMRU...........e.............C:\windows\systen32\netdc.exe\1


    HKEY_USERS\S-1-5-21-484763869-436374069-854245398-1004\Sortware\microsoft\Windows\Current Version\Explorer\RunMRU............f.........netdc.exe\1
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Don't you mean (my changes in bold):
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Current Version\Winlogon.......shell..........explorer.exe ;C\WINDOWS\System32\netdc.exe

    And it does not make sense to have two listings at the same registry key of:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\Current Version\Winlogon

    Are you sure one of them wasn't really
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\WindowsNT\Current Version\Winlogon

    At anyrate the Value data for HKLM should just be Explorer.exe
    and for HKCU there should not even be a Winlogon entry.

    You should also take a look at
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\Current Version\IniFileMapping\system.ini\boot//shell
    to see what it has for Value. It should be SYS:Microsoft\Windows NT\CurrentVersion\Winlogon

    The same goes for:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\Current Version\IniFileMapping\win.ini//winlogon

    The MRU and ACMRU entries with netdc.exe should just delete the netdc.exe entry.
     
  28. smokinbls

    smokinbls the title thing is overrated

    one like this ( with NT )
    and one without NT


    NO THEY ALL ARE
    HKEY_USER

    YES THE VALUE IS SYS:Microsoft\Windows NT\CurrentVersion\Winlogon

    SO DO I DELETE THIS
     
  29. smokinbls

    smokinbls the title thing is overrated

    ok i recopied registrar this is exactly how it looks

    look at post 128 also
     

    Attached Files:

  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! First let's backup your registry. You can use Erunt to do this. Get it here: http://www.majorgeeks.com/download1267.html

    Then what I want you to do is this:

    Delete this next registry key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Currentversion\Winlogon

    Before doing this next step make sure that in the c:\windows directory there is a file named Explorer.exe and it should be approximately 981k in size and under the Properties, Version information the Company must be Microsoft Corporation.

    Edit this next registry key so the Data just says "Explorer.exe":
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\Currentversion\Winlogon ( VALUE ) Shell (Data) C:\\WINDOWS\\System32\\netdc.exe\par

    Also edit this next registry key so the Data just says "explorer.exe":
    HKEY_USERS\\S-1-5-21-484763869-436374069-854245398-1004\\Software\\Microsoft\\SearchAssistant\\ACMru5603 (VALUE) 001 (DATA) netdc.exe\par
     
  31. smokinbls

    smokinbls the title thing is overrated

    done

    deleted

    found 973 kb

    done ( i did this using Registrar i hope that is correct )

    done ( i did this using Registrar i hope that is correct )
     
  32. smokinbls

    smokinbls the title thing is overrated

    also a new HJT LOG FILE
    just in case you want it....
     

    Attached Files:

  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks like we finally got rid of this piece of crud. Hopefully it has not come back after some reboots. Let me know. One other item I noticed in your log now is that the helper DLL for SpyBot S&D is now missing. You should uninstall and then reinstall SpyBot S&D to fix this. The line I'm referring to is:
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll (file missing).

    Alternately you can go here and get the DLL: http://www.spywareinfo.com/~merijn/winfiles.html
    Scroll down to the bottom. It will tell you were to copy the file to.

    Other than that your log looks good. How is everything running?
     
  34. smokinbls

    smokinbls the title thing is overrated

    *&^%$#@#%^*( it is back ( netdc) that thing is a pain
    i rebooted 2 times than ran HJT to check, and f2 is back


    log file
     

    Attached Files:

  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you have your Windows XP CD? I want to try booting off the Windows CD into recovery console.

    -You should get a "press any key to boot from CD" message, so do that.
    -It will load a bunch of files and eventually give you a menu where you can select the "Recovery Console" by pressing R
    -You'll see your Windows Installation like "C:\Windows", type the number 1 and press enter.
    -Administrator password is next: is probably blank so just press enter, unless you set one in which case enter it.
    -With all that done you'll end up with a C:\Windows>

    I need to know the results of each step below:
    - Type cd c:\windows\system32 and hit enter
    - Type attrib -r -s -h netdc.exe and hit enter
    - Type dir netdc.exe and hit enter
    - Type ren netdc.exe netdc.bad and hit enter
    - Type copy c:\windows\explorer.exe netdc.exe and hit enter
    - Type attrib +r +h +s netdc.exe and hit enter

    Take out the cd and reboot. Normal.
    The run HijackThis and have it fix the F2 line. Scan again and make sure it actually fixed it.
    Reboot and check to see if it comes back.
     
  36. smokinbls

    smokinbls the title thing is overrated

    no i do not,

    i have been trying to figure out how to copy windows xp to a disc
     
  37. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We don't discuss those things here. You should have your own official MS Windows XP CD.

    The only alternative is to repeat those last steps we did where you located the registry entries with Registrar Lite and then delete the appropriate entries and change the others to be explorer.exe rather than netdc.exe. But this time when you get to the point where the HJT log was clear for the moment, locate and delete netdc.exe from your PC. Making sure c:\windows\Pretch does not have a copy and also empty the Recycle bin. You need to look for any files similar to netdc.exe. Like netdc.dll, netdc.dat. And also find things like netda.exe and netdb.exe.

    Look for things similar to these:
    C:\windows\prefetch\NETDC.EXE-00DA8B70.pf
    C:\windows\prefetch\NETDB.EXE-006fa9bb.pf
    C:\windows\prefetch\NETDC.EXE-00da8870.pf
    C:\Documents and Settings\All Users\Application Data\SecTaskMan\_netdcF01200
    C:\Documents and Settings\All Users\Application Data\SecTaskMan\_netdbq_52cf307_q
    C:\Documents and Settings\All Users\Application Data\SecTaskMan\_netdbq_80411e_q
    C:\Documents and Settings\All Users\Application Data\SecTaskMan\-net6559200
    C:\Documents and Settings\All Users\Application Data\SecTaskMan\-net65596
    C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\Netda.exe
    C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\Netdb.exe
    C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\Netdc.exe
    C:\Windows\pss\netda.exestartup
    C:\Windows\pss\netdb.exestartup
    C:\Windows\pss\netdc.exestartup

    Look in your Startup Directory
    Any file in C:\WINDOWS\Start Menu\Programs\StartUp will start when windows is booted.

    Look thru your Registry

    There are many registry entries that can be used to automatically invoke a program when the machine boots. These include:


    Type 1
    Here are the most common autostart keys:
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]
    Type 2
    If keys below don't have the "\"%1\" %*" value as shown, and are changed to something like "\"netdc.exe %1\" %*" then they are automatically invoking netdc.exe (or any other specified file).

    [HKEY_CLASSES_ROOT\exefile\shell\open\command] ="\"%1\" %*"
    [HKEY_CLASSES_ROOT\comfile\shell\open\command] ="\"%1\" %*"
    [HKEY_CLASSES_ROOT\batfile\shell\open\command] ="\"%1\" %*"
    [HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] ="\"%1\" %*"
    [HKEY_CLASSES_ROOT\piffile\shell\open\command] ="\"%1\" %*"
    [HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command] ="\"%1\" %*"
    [HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command] ="\"%1\" %*"
    [HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command] ="\"%1\" %*"
    [HKEY_LOCAL_MACHINE\Software\CLASSES\htafile\Shell\Open\Command] ="\"%1\" %*"
    [HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command] ="\"%1\" %*"


    Type 3
    Additional autostart methods. The first two are used by SubSeven 2.2 HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Currentversion\explorer\User shell folders
     
  38. smokinbls

    smokinbls the title thing is overrated

    sorry

    i did call microsoft and talked to a lady who said that i should run this
    McAfee AVERT Stinger...i think i downloaded it from here ( MG ), but what the heck i will try the link they gave to me.......
    the link
    http://vil.nai.com/vil/stinger/

    i will also do what you said to do in your last post.....
    P.S. i will call the guy i bought my computer from and see if he has the windows cd ( i think he took it from me after i installed it on my computer )
     
  39. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There will be no difference between Stinger downloaded here or from McAfee since we keep current versions. And it will not fix this anyway. This is not one of the types of problems that Stinger is designed to look for.

    I while ago I asked you to do this,

    "Before doing this next step make sure that in the c:\windows directory there is a file named Explorer.exe and it should be approximately 981k in size and under the Properties, Version information the Company must be Microsoft Corporation."

    You only told me the size. You need to get all of the Properties info. I want you to get the info for each of the below items:
    On the General tab:
    Size: in KB and in bytes

    On the Version tab:
    Company:
    File Version:
    Internal Name:
    Language:
    Original File Name:
    Product Name:
    Product Version:
     
  40. smokinbls

    smokinbls the title thing is overrated

    Company-----Microsoft Corporation
    File Version-------6.00.2800.1221 (xpsp2.030511-1403)
    Internal Name------explorer
    Language------English
    Original File Name-----EXPLORER.EXE
    Product Name------Microsoft Windows Operating System
    Product Version------6.00.2800.1221

    size 973 KB (996,352 bytes )
    Size on disc 976KB (999,424 bytes)

    is this all

    also i am doing what you said to do 2 posts ago...........
     
  41. smokinbls

    smokinbls the title thing is overrated

    ok i found somethings
    first....
    HKEY_LOCAL_MACHINE\SOFTWARE\Malcosoft\Params\Netdb.exe ( NOTE THE NAME MELCOSOFT )
    DELETED THIS ONE

    ALSO I WAS ABLE TO FIND
    HKEY_LOCAL_MACHINE\SOFTWARE\WindowsNT\Current Version\Winlogon\\Shell
    found a netdc.exe and when i deleted it and checked HJT log
    looked like this
    F2 - REG:system.ini: Shell=
    it was missing the location
    BUT when i reboot it comes back after deleting it..

    also YOU ASKED ABOUT THIS
    THIS LINE
    [HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] ="\"%1\" %*"

    SAID
    WINDOWS\SYSTEM32\MSHTA.EXE\"%!"%
    I LEFT IT ALONE

    EVERYTHING ELSE YOU HAD ASKED ABOUT I FOUND NOTHING...


    IT MUST BE HIDING SOMEWHERE
     
  42. smokinbls

    smokinbls the title thing is overrated

    i forgot to tell you that spybot found this

    Executable c:\windows\29.exe

    it could not fix it..

    info on it
    29.exe
    company--- Melcosoft corp.
    File version--- 1.0.0.1
    size--- 92.5 kb
    if you say to i will delete it manualy.
     
  43. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! Probably need to do it in safe mode. Also check for those netdc.exe ad netdb.exe etc files and delete any found. Have HJT fix that line again too.
     
  44. smokinbls

    smokinbls the title thing is overrated

    as per your PM here is something to do with my desktop not showing...

    i was able to accessmy documents threw task mgr i typed in explorer in file open task ( run ) ( the icons are still not there )
    i am right now doing all the basic spyware removal stuff again

    the question i have is since system restore is turn off is there anyway to return to an earler point lets say last friday. without system restore.

    later tonight i am going to try trend micro system again scan for viruses
    thank for you help on that problem..
    i am starting to HATE spyware and worms and viruses...
     
  45. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This problem with no icons is on the same PC where you have been having this netdc.exe problem that would not go away? Right?

    If so, I wonder if that is the problem. See if you can locate the netdc.exe program on the PC. It was actually set to be your shell before. Tell me if you can find it and where it is. Also, make a copy of c:\windows\explorer.exe called netdc.exe (you can do this by right clicking on explorer.exe and select copy. Now get into another directory with Windows Explorer (like c:\) and right click and select paste. Now right click on the new copy of explorer.exe and select rename. Change it to netdc.exe. Now double click on this fake netdc.exe. Tell me what happens.


    With System Restore off, you are out of luck for going backwards to before the problem began.
     
  46. smokinbls

    smokinbls the title thing is overrated

    good news i was able to run trend micro scan and it found and deleted all maleware and trojans.........
    my messed up computer now show the desktop :) :)
    i rebooted 1 time so far and everything worked.......
    i ran a HJT log.
    and the f2 line is gone :) :)
    i will reboot a few more times to make sure it is ok.
    then rerun the HJT..
    and then post another log file for you to check.. if it is ok then i will turn on system restore and istall anti virus and a good firewall...
    so here is a HJT log file...
    i think it is all gone..
     

    Attached Files:

  47. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks clean but you need to uninstall and reinstall SpyBot. One of its DLL's got removed by one of your problems. (usually a form of CWS). See this line:
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll (file missing)
     
  48. smokinbls

    smokinbls the title thing is overrated

    ok will do

    i am going to use my computer for a couple days then post another HJT log for you to check to make sure it is clean.
    I WILL POST IT ON FRIDAY, PLEASE CHECK IT WHEN YOU HAVE TIME.


    THANK YOU VERY VERY MUCH FOR YOUR TIME AND PATIENCE.
    brian
    watch your pm box next week for a pm from me
     
  49. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! Talk to you later!
     
  50. smokinbls

    smokinbls the title thing is overrated

    i does not look like anything has changed has changed.
    i am going to re download spybot
    thanks again.
    here is the HJT log
     

    Attached Files:

    • HJT.txt
      File size:
      3.2 KB
      Views:
      2

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds