MSIE Infected

Discussion in 'Malware Help (A Specialist Will Reply)' started by sleeplessinsale, Feb 18, 2007.

  1. sleeplessinsale

    sleeplessinsale Private E-2

    Hello there

    I have done everything on the READ ME First page, the long one with 6 steps before resorting to HijackThis. I am still having an issue with MSIE whereby after some shortish time period it spawns a new browser in Chinese. I did have worse problems before I did those other 6 steps including this current one, so I know this is a leftover from all of those problems which has escaped those various cleaning tools. I had a problem running BitDefender but did run the Panda one.

    I have all the logs from those steps on my computer but am unclear which specific ones you want in this message, and as there is I believe a limit of only 3 per message then I thought you could advise me which ones you'd like to see first.

    I'm attaching my HiJackThis log as an attachment to get things started. It has been 6 days and I have never been so frustrated with an infection like this.

    Please help. Many thanks in advance for your generous time!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • CounterSpy
      • AVG Antispyware log - ONLY IF NEEDED you were not able to run CounterSpy
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use two messages to attach all of these logs!
     
  3. sleeplessinsale

    sleeplessinsale Private E-2

    I did everything in the order you listed just like it also is on the README AND RUN FIRST page.

    OK first off I couldn't run Counterspy I think because I'd had it as a trial. So my AVG log is attached.

    Then I had a double-whammy. Bitdefender ran for about 4 hours and before it finished my computer froze (it never does this). I had no mouse, nothing. :cry

    I had to do a reboot using the button at the front and accept it and move onto Panda. After my bitdefender experience I set it off and let it run and went away after an hour when it looked like it was running along ok. When I came back, I had a clean desktop, no browsers open, nothing. :cry

    So I have nothing to show for all that confused

    runkeys and newfiles - yes I have those. They are attached. to this also.
     

    Attached Files:

  4. sleeplessinsale

    sleeplessinsale Private E-2

    Finally here is my HijackThis log at the end of it all. Additionally I found something called Kaspersky online scanner as well and I am attaching that log as well to this, though I don't know how helpful that will be for you.

    So many thanks for fast reply today !
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please save this to notepad so that you can complete the instructions off-line.

    Do you know what these are in your uninstall program list:
    "2a3a47f"
    "8551ad0f"

    Use windows explorer to delete these folders/files:
    C:\WINDOWS\system32\drivers\msusbbux.sys
    C:\Program Files\Common Files\{60863F5B-0543-1033-0922-030707000001}\system.dll
    C:\Program Files\Common Files\Yazzle1162OinAdmin.exe
    C:\Program Files\Mediacenter\Mediacenter0.4-by Coolstreaming.exe


    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchURL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchURL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page_bak = prosearching.com
    O20 - Winlogon Notify: cryptimg - C:\WINDOWS\SYSTEM32\cryptimg.dll
    After clicking Fix, exit HJT.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:

    * Delete on Reboot
    * then Click on the All Files button.*(or on the folders option)*
    * Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\4072cfsb.dll
    C:\WINDOWS\system32\42ccntos.dll
    C:\WINDOWS\system32\92CF7CE6.DLL
    C:\WINDOWS\system32\92CF7CE6.EXE
    C:\WINDOWS\system32\92CF7CE6T.EXE
    C:\WINDOWS\system32\u1171575075g.exe
    C:\WINDOWS\system32\cacheur.exe
    C:\WINDOWS\system32\drivers\ffpbek.sys
    C:\WINDOWS\system32\mctet.dll
    C:\WINDOWS\system32\drivers\erbnseh.sys
    C:\WINDOWS\system32\winsys32_070212.dll
    C:\WINDOWS\system32\drvcog.dll
    C:\WINDOWS\system32\drvmez.dll
    C:\161941~1
    C:\bcqkcbsw.exe
    C:\jwjbt.exe
    C:\jxeqlgj.exe
    C:\lodcvybl.exe
    C:\ooqlp.exe
    C:\vggba.exe
    C:\voraiau.exe
    C:\vyqnwwd.exe
    C:\WINDOWS\system32\1010s.exe
    C:\WINDOWS\SYSTEM32\cryptimg.dll
    C:\WINDOWS\system32\40b2ntos.dll
    C:\WINDOWS\system32\"4c70cfsb.dll"
    C:\WINDOWS\system32\fcccccc.dll
    C:\WINDOWS\system32\"ljjiffg.dll"
    C:\WINDOWS\system32\pmkih.dll
    C:\WINDOWS\system32\"winzxe32.dll"
    C:\WINDOWS\system32\wjxgavpu.dll
    C:\WINDOWS\system32\wvutrpn.dll
    C:\WINDOWS\system32\mywebhit.ini.tmp
    C:\WINDOWS\system32\mywebhit.ini
    C:\WINDOWS\system32\92CF7CE6.dat

    * Return to Killbox, go to the File menu, and choose Paste from Clipboard. Check the box to unregister the .dll's.
    * Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.

    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    You will need to update your JAva as well as your operating system!!!

    J2SE Runtime Environment 5.0 Update 2 - the instructions asked you to delete this and install the latest version!

    Now attach new logs for:

    * GetRunKey
    * ShowNew
    * HJT

    Be sure to tell us how things are running.
     
  6. sleeplessinsale

    sleeplessinsale Private E-2

    Hi again

    No I don't know what these are..

    Do you know what these are in your uninstall program list:
    "2a3a47f"
    "8551ad0f"

    Should I ? confused

    Well I did everything else you told me to on Monday and from Monday evening for 48 hrs everything seemed PERFECT!! Then I got home tonight and booted up and got something called adgug.exe (I think it was an exe) trying get through my ZoneAlarm firewall. I hit deny of course and now I am submitting new logs for
    RunKey
    ShowNew
    HJT

    Thanks so far though, That was a dramatic improvement Monday!! :)
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please uninstall these thru add/remove programs:
    webwork
    J2SE Runtime Environment 5.0 Update 11
    J2SE Runtime Environment 5.0 Update 2

    Reboot and install:
    Java Runtime 6

    Run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:

    * Delete on Reboot
    * then Click on the All Files button.*(or on the folders option)*
    * Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Program Files\Common Files\{60863F5B-0543-1033-0922-030707000001}
    C:\Program Files\Common Files\sxco
    C:\Program Files\Common Files\xing shared
    C:\161941~1
    C:\bcqkcbsw.exe
    C:\jwjbt.exe
    C:\jxeqlgj.exe
    C:\lodcvybl.exe
    C:\ooqlp.exe
    C:\vggba.exe
    C:\voraiau.exe
    C:\vyqnwwd.exe
    C:\WINDOWS\system32\40b2ntos.dll
    C:\WINDOWS\system32\winsys16_070212.dll
    C:\WINDOWS\system32\cryptimg.dll
    C:\WINDOWS\system32\oldmywebhit.ini
    C:\WINDOWS\system32\rrsut.ini
    C:\WINDOWS\system32\00004a8e.DAT
    C:\WINDOWS\system32\drivers\00004a8e.SYS
    C:\WINDOWS\system32\drivers\ast.sys
    C:\WINDOWS\system32\drivers\hidproc.sys
    C:\WINDOWS\system32\drivers\onmrukid.sys
    C:\WINDOWS\system32\drivers\restore.ini
    C:\WINDOWS\system32\drivers\ttp~1.exe

    * Return to Killbox, go to the File menu, and choose Paste from Clipboard. Check the box to unregister the .dll's.
    * Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.

    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O21 - SSODL: webwork - {4C611512-2C1D-44b2-A044-872AD2AD5A61} - C:\WINDOWS\webwork\webwork.dll

    After clicking Fix, exit HJT.

    Run CCleaner

    Now attach new logs for:

    * GetRunKey
    * ShowNew
    * HJT

    Be sure to tell us how things are running.
     
  8. sleeplessinsale

    sleeplessinsale Private E-2

    OK I did all that. Sorry I didn't upgrade to the right version of Java before. I ran the update wizard but it didn't say to use v6.

    Anyway all done now.

    First off, when I booted up my PC tonight, I got this message just before the OS loaded up my desktop. It was in a popup message box but when I clicked OK it didn't stop the desktop loading as normal.

    yprs_x.dll could not be found

    THen after that I did everything you said. Attached are the latest logs.

    I will let you know after 24 hours' use how it's running.
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If all was done, why is Webwork still showing in the add/remove program list, as well as a lot of the other items from killbox list?
     
  10. sleeplessinsale

    sleeplessinsale Private E-2

    You're right. I missed uninstalling webwork using add/remove programs. :eek:

    So I did everything again.

    I'm sorry. I assure you I am not intentionally trying to cut corners and waste your time. I am wasting my own if I do that after all :(

    I have attached the new logs.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Run Killbox and have it delete these files:

    C:\WINDOWS\pss\3ª¬ýøO.lnkStartup
    C:\WINDOWS\system32\drivers\00004a8e.SYS
    C:\WINDOWS\system32\00004a8e.DAT
    C:\WINDOWS\system32\oldmywebhit.ini.tmp
    C:\mdwgnjib.bat

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Now run HJT and have it fix this item:

    O20 - Winlogon Notify: cryptimg - cryptimg.dll (file missing)

    After clicking fix, exit HJT.

    Now attach new logs for:

    * GetRunKey
    * ShowNew
    * HJT

    Be sure to tell us how things are running.
     
  12. sleeplessinsale

    sleeplessinsale Private E-2

    One of the things that keeps happening that I don't like is a folder keeps coming back called C:\!Killbox

    I am sure it is something bad trying to imitate the real Killbox I have in a completely different location.

    Anyway I did those things and am attaching the logs.
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    C:/KillBox is the backup list of deleted files .....I can't see if the files that we ask you to delete using PocketKillBox are actually being deleted.

    Also the registry fix is not taking ...are you following the instructions on doing that?
     
  14. sleeplessinsale

    sleeplessinsale Private E-2

    That might have been the issue. I did everything you said, but I also deleted that C:\!Killbox folder

    So I just did those things again and left it alone this time.

    Do you think the registry fix isn't taking because the special characters are not translating properly when I copy and paste from your text on this forum into a notepad file?

    Hmm well I just copied back from the notepad file into here and the characters turned out fine so it should be working. So I answered my own question.

    Attached are the latest logs after I re-did everything in your 10:50 message and didn't delete that backup Killbox folder.
     

    Attached Files:

  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please remove all of your extensions and toolbars in your browsers......reboot and attach a new (please get the latest version) ShowNew and GetRun logs.
     
  16. sleeplessinsale

    sleeplessinsale Private E-2

    I'm sorry but can you tell me exactly how I remove all my extensions from my browsers? I have done the toolbars on my MSIE browser by selecting Toolbars and the making everything under there unchecked - even the address bar :)

    I use MSIE, Firefox and Opera.

    Sorry for being ignorant on this.

    Also, where do I get the latest ShowNew and GetRunKey from? I originally got them from a page on this forum by downloading attachments. It was forum written by admins, the READ ME FIRST AND RUN page. I have tried google but no luck there?
     
  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    The new versions are now posted in the ShowNew and GetRun Links .....I suspect the problem is with the IE toolbars ...(what was installed?).

    Post new logs:
    ShowNew
    GetRun
    HJT
     
  18. sleeplessinsale

    sleeplessinsale Private E-2

    I think just the yahoo toolbar managed to install itself at some point. It's persistent like that! OK I disable every toolbar in MSIE and like I said even the address bar so all there is that can be seen when I open it is the bare browser exterior with the File Edit View.... etc options at the top. Nothing else.

    Attached are the latest logs using the latest versions of GetRunkey and ShowFiles
     

    Attached Files:

  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please print these instructions out, or write them down, as you can't read them during the fix.

    Download and Install RogueRemover Free http://www.majorgeeks.com/RogueRemover_d5360.html

    Run RogueRemover and select Scan and the program will walk you through the remaining steps.

    Remove:

    Registry Fix and any others that it finds.

    Step 1:
    Download SmitfraudFix (c) S!Ri http://siri.urz.free.fr/Fix/SmitfraudFix.zip
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Do NOT run any other option other than 1

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consultin...rocessutil.htm

    Step 2:
    Next, reboot your computer in Safe Mode by doing the following:
    1) Restart your computer
    2) After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
    3) Instead of Windows loading as normal, a menu should appear
    4) Select the first option, to run Windows in Safe Mode
    5) Choose your usual account.

    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.
    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.

    Reboot

    Follow the directions for
    Virtumonde aka Trojan Vundo Removal procedure.

    Post the Following Logs:
    1. rapport.txt from SmitFraudFix
    2. ShowNew
    3. GetRunKey
    4. HijackThis
     
  20. sleeplessinsale

    sleeplessinsale Private E-2

    Many many thanks for your continued help. I cannot adequately express my gratitude of course. Just know that it is appreciated :)

    The last thing I ran was to run VundoFix. It scanned everything and reported back that it found no infected files at all so it didn't do anything. A good sign I suppose?

    Attached are the rapport file called rapport2.txt and the two other logs. I will attach the HJT log to a separate reply.
     

    Attached Files:

  21. sleeplessinsale

    sleeplessinsale Private E-2

    Result of the first SmitFraudFix scan..

    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Admin


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Admin\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Admin\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components



    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» pe386-msguard-lzx32-huy32


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End
     

    Attached Files:

  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please find this in your startup folder and delete it:
    C:\Documents and Settings\Admin\Start Menu\Programs\Startup\3ª¬ýøO.lnk

    Do you know what this is in your add/remove program list:
    Windows hckw UnInstall

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Do a search for msmsgs and delete anything found. Also check msconfig and see if it is in the startup tab ...uncheck it if it is.

    Tell me how things are running.
     
  23. sleeplessinsale

    sleeplessinsale Private E-2

    C:\Documents and Settings\Admin\Start Menu\Programs\Startup\3ª¬ýøO.lnk

    I could not find this. Only my Ding! (southwest airlines cheap fare alert) was in that folder. I used a command window to look as well.

    =======================

    Do you know what this is in your add/remove program list:
    Windows hckw UnInstall

    No idea what that is. I went ahead and uninstalled it. It seemed like sinister Oriental spy junk.

    =======================

    Did the registry merge

    ========================

    Found 4 files with msmsgs in and deleted them.
    Found several registry entries with msmsgs in. Deleted them all.
    Nothing bad in msconfig

    Things seem to have settled down a lot this week but one thing is consistent and has been happening since last week :

    When i boot up and log in as Admin, it continues to load the OS but just before it does, I get two popup messages from the system saying it can't find these

    yprs_x.dll could not be found
    winsys16_070212.dll could not be found

    That's all that's bad so far as I can see now.
     
  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I'm not seeing anything in your previous logs .....please run CCleaner (both the cleaner and the issues - make the backup when prompted).

    Then reboot and attach a new HJT log.
     
  25. sleeplessinsale

    sleeplessinsale Private E-2

    OK I did that. I do see a reference to the long named dll in the HJT log but can't find any reference to the yprs_x.dll in the registry, HJT log, or msconfig. confused

    Attached is the latest HJT log after running the cleaner and issues in CCleaner.
     

    Attached Files:

  26. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    The HJT log is clean ...are you still having any other issues?
    If not:You may uninstall any programs we had you download.

    If you are not having any other malware problems, it is time to do our final steps:

    1. If we used Pocket Killbox during your cleanup, do the below
    * Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
    * go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
    * Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
    * How to Protect yourself from malware!
     
  27. sleeplessinsale

    sleeplessinsale Private E-2

    Hi again

    I have been away for a few days visiting..

    I am still having issues here. MSIE has been re-hijacked somehow and it is doing that thing launching more instances of IEXPLORER.exe in the task manager, I see it in the Processes tab.

    I have attached a HJT log for today.

    :cry
     

    Attached Files:

  28. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.cnnine.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.cnnine.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 194.80.38.242:3127

    After clicking Fix, exit HJT.
    Now attach new logs for:

    * GetRunKey
    * ShowNew
    * HJT
     
  29. sleeplessinsale

    sleeplessinsale Private E-2

    OK done that and attaching the logs.

    Still getting that pop up after logging on, during the OS getting from logon to the desktop : cannot find C:\windows\system32\yprs_x.dll

    I cannot find references to it in msconfig or the registry.
     

    Attached Files:

  30. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please use add/remove programs to uninstall:
    Mysee WebTV
    PPMateIoA‡æ‡EO 1.7.1.28 <---if you don't know what this is!?

    Now go to start / run / and type "msconfig" without quotes and tell me what is in the startup tab. (Cancel to exit).

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    You can have HJT remove this item unless you do use it as your homepage:
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.nothing.com/

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:

    * Delete on Reboot
    * then Click on the All Files button.*(or on the folders option)*
    * Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\mywebhit.ini
    C:\WINDOWS\system32\mywebhit.ini.tmp

    * Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    * Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.

    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Tim,

    There are other issues in the logs that you need to address.
    • multiple antivirus applications are installed
    • MSConfig is in use and at least one baddie is in the list of inhibited startups.
    • runkeys.txt also shows the below:
      • [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run]
        "svchost.exe"=""
      • [HKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\Explorer\ShellExecuteHooks]
        "{613E7B70-5380-4063-A060-C147AB994C02}"=""
        "{4ED6E0B5-F47A-4609-A940-11CF60FDC3C3}"="NetCache" <--- I'm not positive on this one, but it does not look good!
    • you need to download and use the current version of ShowNew.
     
  32. sleeplessinsale

    sleeplessinsale Private E-2

    Here is what is checked in my msconfig
    Startup Item Command
    ========================
    SNDMon C:\PROGRA~1\SYMNET~1\SYMNET~1\SNDMon.exe /Consumer
    zlclient C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    avgcc C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    DING! C:\PROGRA~1\SOUTHW~1\Ding\Ding.exe

    I've attached the logs after doing all your instructions. PPMate is an app. I use sometimes to watch tv streamed showing UK sport which I can't watch over here.
     

    Attached Files:

  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you look in the log from GetRunKey, you will see a lot more than that is disabled using MSconfig. You need to follow the directions given in the READ & RUN ME in at least two places and select Normal Startup in MSconfig.

    Then you need to follow the directions in step 3 of the READ & RUN ME and uninstall all but one antivirus.

    Then you need to download the current version of ShowNew as I stated in my last message.

    After doing the above attach new logs from:
    - GetRunKey
    - ShowNew
    - HijackThis
     
  34. sleeplessinsale

    sleeplessinsale Private E-2

    OK sorry I didn't know you wanted to know about the unchecked stuff too. I will come back when I have done everything you have said in your latest message. :eek:
     
  35. sleeplessinsale

    sleeplessinsale Private E-2

    OK I did all that. I didn't realise my msconfig setting wasn't in normal mode :(

    avgas "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    avcc C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
    jusched "C:\Program Files\Java\jre1.6.0\bin\jusched.exe"
    zlclient "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    DING! "C:\Program Files\Southwest Airlines\Ding\Ding.exe"

    I wasn't using Symantec any more even though it was installed, so I just uninstalled it all anyway.

    Attached are the latest logs with the latest shownew exe.
     

    Attached Files:

  36. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:

    * Delete on Reboot
    * then Click on the All Files button.*(or on the folders option)*
    * Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\rrsut.bak1

    * Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    * Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.

    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
     
    Last edited by a moderator: Mar 14, 2007
  37. sleeplessinsale

    sleeplessinsale Private E-2

    I have done that. Early to say but things seem ok. Still getting that popup complaining there is no yprs_x.dll during logon.

    Attached are the latest logs
     

    Attached Files:

  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now attach a new log from GetRunKey.
     
  39. sleeplessinsale

    sleeplessinsale Private E-2

    OK here is the Runkey logfile.

    I think getting rid of Nortons and using AVG has been good too I must say.
     

    Attached Files:

  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you still getting a popup about a missing DLL? If so post exactly what it says or give as a screen snapshot if possible.
     
  41. sleeplessinsale

    sleeplessinsale Private E-2

    Yes it is still happening. It is a popup dialog box after logging on but before XP gets me to the desktop.

    In the blue bar at the top of the box it says

    RUNDLL

    Then in the main area it says

    Error loading C:\WINDOWS\system32\yprs_x.dll
    The specified module could not be found.


    Then there is an OK button. Only after I press ok does it load up the desktop as normal otherwise it stays on a blue screen with that dialog box.

    On the plus side, my MSIE isn't getting hijacked or launching Chinese sites or rogue instances in the process explorer, Vundo seems to have gone as does Hitapop trojan. Any more info you need just ask :)
     
  42. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,%System%\userinit.exe,

    And is the below something you recognize? If not, fix it. It seems Chinese related too.
    O16 - DPF: {39D420B3-E0EB-424C-89AA-C24F8DE7EF79} (KooPlayer Control) - http://www.vivitv.com/KooPlayer.ocx

    After clicking Fix, exit HJT.

    Now attach a new HJT log here.

    Are you still seeing the same message?

    If so, does it appear in safe mode.
    Does it appear when you log into other user accounts?
     
  43. sleeplessinsale

    sleeplessinsale Private E-2

    And is the below something you recognize? If not, fix it. It seems Chinese related too.
    O16 - DPF: {39D420B3-E0EB-424C-89AA-C24F8DE7EF79} (KooPlayer Control) - http://www.vivitv.com/KooPlayer.ocx
    Yes this is internet streamed TV for European sport. :eek:

    Are you still seeing the same message?
    YES

    If so, does it appear in safe mode.
    NO

    Does it appear when you log into other user accounts?
    NO - Just my profile, Admin, in Normal startup mode
    Also I noticed there is a file called yprs_x.sys in C:\windows\system32\drivers
    Kind of similar name.
     

    Attached Files:

  44. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    bookmark
     
    Last edited: Mar 16, 2007
  45. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then there is a process or service that you are loading in normal boot mode that you do not load in safe mode. Attach a HijackThis log from safe mode.

    Then from Normal Boot mode get a Startup List with Hijack This.

    Generating Startup Lists with HijackThis
    • Run HijackThis, click Open the Misc Tools section
    • Put a check in the List also minor sections (full) check box.
    • Now click the Generate StartupList Log button.
    • This will create a file named startuplist.txt in the same folder that HijackThis is installed into.
    • Also a notepad file will open with this startuplist in it.
    • Attach the startuplist.txt file to your next message.

    Put a copy of yprs_x.sys into a ZIP file and attach it here.
     
  46. sleeplessinsale

    sleeplessinsale Private E-2

    OK this is very intriguing...

    here are the three attachments
     

    Attached Files:

  47. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No this is strange. The problem you are having does not occur when you are in safe mode but the item that is causing it does show in safe mode. And the exact opposite is true for normal boot mode.

    Boot in safe mode and run HijackThis. Select the below line and then click fix:

    O4 - HKLM\..\RunOnce: [yprs_x] %systemroot%\system32\rundll32.exe %systemroot%\system32\yprs_x.dll,Run

    Then exit HJT and reboot in normal mode.

    Does the problem happen again?

    The .SYS file you uploaded is a copy of a Microsoft file named BEEP.SYS which is just a speaker driver. I'm not sure who renamed/copied this or why. It does not seem to be malware but it is not normal.
     
  48. sleeplessinsale

    sleeplessinsale Private E-2

    You're right, this is STRANGE!

    I did reboot to Safe Mode, ran HJT and fixed the entry.

    When I rebooted to normal it appeared as if I had done nothing. I rebooted then to Safe Mode, ran HJT again, and there it was again. So I went to the registry and sure enough it was there. Then I rebooted to Safe again and this time logged in as Administrator user (not Admin). I ran HJT, fixed the entry, verified it was gone from the registry by using regedit, rebooted to Safe mode, logged in as Administrator, and it was back in the registry (and HJT)!

    I checked permissions on the registry key and everything is set to checked for 'Allow' for all users except CREATE OWNER.

    While I was in Safe Mode, I searched the registry for 'yprs' from HKLM down and other than the entry in CurrentVersion\RunOnce.. it returned one other item.

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\yprs_x]
    "reg"=dword:00000000
    "module1"="1.0.0.1004"
    "module2"="1.0.0.1"
    "update"=dword:45dd1ef8


    I don't know what else to do? HJT seems to be ineffective on this registry entry regardless of how I log in.
     
  49. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Try booting into safe mode again and fixing that line in HijackThis again and then also delete the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\yprs_x

    registry key that you found. Make sure you only delete the yprs_x subkey. If you are not sure how to do that, just use the below registry patch and then double check to make sure it really was removed.

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    I tend to doubt that this is malware and it does not appear to be causing you any problems other than the popup about the missing dll. I still wonder what program that you use or used that installed this and what the purpose was in copying the beep.sys driver to a new name. Could it be related to the YSIGet Download Manager that you have installed.
     
  50. sleeplessinsale

    sleeplessinsale Private E-2

    I uninstalled YSIGet. It was a legitimate download manager but I never used it. I must have needed it once for some types of files.

    Then I did all your instructions in safe mode.

    I rebooted into safe mode and when I ran HJT, the yprs entry was back. I went to the registry and it was there too. That is the one in CurrentVersion\RunOnce

    The other key called 'yprs' remained deleted.

    I rebooted to normal to come and tell you all about it but my computer stayed on a screen for about ten minutes saying 'Please Wait...'

    Then it went to a blue screen saying something like it could not read from the hive(registry) because of a possible corrupt or damaged registry. Performing physical memory dump... Please contact your administrator.

    Then it powered itself off right there.

    I powered it up again and it come up into Normal mode without any unusual screens, but it did of course still pop up that missing dll message.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds