Windows XP shortcuts don't work, missing IE

Discussion in 'Malware Help (A Specialist Will Reply)' started by tipjar, Sep 5, 2013.

  1. tipjar

    tipjar Private E-2

    My wife is running Windows XP Pro SP3 on a Lenovo. All of a sudden 1 day ago the desktop shortcuts and shortcuts in the Start menu stopped working. None seem to work except Firefox!

    She also got a message from Quickbooks Pro 2012 saying she needs to have IE 6 or above. When I looked, I couldn't find any version of IE. As I tried to download and install IE, I got a message many times, something about ieframe.dll

    When I tried to scan with MalwareBytes I got this

    "Run-time error '372':

    Failed to load control 'WebBrowser' from ieframe.dll. Your version of ieframe.dll may be outdated. Make sure you are using the version of the control that was provided with your application.

    I uninstalled MalWare Bytes.

    I followed instructions from this thread "Malware Removal Guide" and was successful in downloading and running all, except MalWareBytes. When I tried to install it, I got this: “Co-CreateInstance failed; code 0x80040154. Class not registered” and “runtime error 372

    I've attached the logs.

    Thank you,

    Dan
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run Hitman Pro and have it delete Potential Unwanted Programs.



    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :files
    C:\Program Files\Internet Explorer\en-US\SET3D.tmp
    C:\Program Files\Internet Explorer\en-US\SET3E.tmp
    C:\Program Files\Internet Explorer\en-US\SET5.tmp
    C:\Program Files\Internet Explorer\en-US\SET6.tmp
    C:\Program Files\Internet Explorer\SIGNUP\SET3F.tmp
    C:\Program Files\Internet Explorer\SIGNUP\SET7.tmp
    C:\WINDOWS\system32\SET14.tmp
    C:\WINDOWS\system32\SET16.tmp
    C:\WINDOWS\system32\SET17.tmp
    C:\WINDOWS\system32\SET18.tmp
    C:\WINDOWS\system32\SET1A.tmp
    C:\WINDOWS\system32\SET1B.tmp
    C:\WINDOWS\system32\SET1C.tmp
    C:\WINDOWS\system32\SET1D.tmp
    C:\WINDOWS\system32\SET1E.tmp
    C:\WINDOWS\system32\SET20.tmp
    C:\WINDOWS\system32\SET21.tmp
    C:\WINDOWS\system32\SET23.tmp
    C:\WINDOWS\system32\SET25.tmp
    C:\WINDOWS\system32\SET26.tmp
    C:\WINDOWS\system32\SET27.tmp
    C:\WINDOWS\system32\SET2C.tmp
    C:\WINDOWS\system32\SET2F.tmp
    C:\WINDOWS\system32\SET31.tmp
    C:\WINDOWS\system32\SET32.tmp
    C:\WINDOWS\system32\SET35.tmp
    C:\WINDOWS\system32\SET37.tmp
    C:\WINDOWS\system32\SET3A.tmp
    C:\WINDOWS\system32\SET3B.tmp
    C:\WINDOWS\system32\SET3C.tmp
    C:\WINDOWS\system32\SET3D.tmp
    C:\WINDOWS\system32\SET3F.tmp
    C:\WINDOWS\system32\SET40.tmp
    C:\WINDOWS\system32\SET42.tmp
    C:\WINDOWS\system32\SET44.tmp
    C:\WINDOWS\system32\SET4C.tmp
    C:\WINDOWS\system32\SET4E.tmp
    C:\WINDOWS\system32\SET4F.tmp
    C:\WINDOWS\system32\SET50.tmp
    C:\WINDOWS\system32\SET52.tmp
    C:\WINDOWS\system32\SET53.tmp
    C:\WINDOWS\system32\SET54.tmp
    C:\WINDOWS\system32\SET55.tmp
    C:\WINDOWS\system32\SET56.tmp
    C:\WINDOWS\system32\SET58.tmp
    C:\WINDOWS\system32\SET59.tmp
    C:\WINDOWS\system32\SET5A.tmp
    C:\WINDOWS\system32\SET5C.tmp
    C:\WINDOWS\system32\SET5D.tmp
    C:\WINDOWS\system32\SET5E.tmp
    C:\WINDOWS\system32\SET63.tmp
    C:\WINDOWS\system32\SET66.tmp
    C:\WINDOWS\system32\SET68.tmp
    C:\WINDOWS\system32\SET69.tmp
    C:\WINDOWS\system32\SET6C.tmp
    C:\WINDOWS\system32\SET6E.tmp
    C:\WINDOWS\system32\SET71.tmp
    C:\WINDOWS\system32\SET72.tmp
    C:\WINDOWS\system32\SET73.tmp
    C:\WINDOWS\system32\SET74.tmp
    C:\WINDOWS\system32\SET76.tmp
    C:\WINDOWS\system32\SET77.tmp
    C:\WINDOWS\system32\SET79.tmp
    C:\WINDOWS\system32\SET7B.tmp
    C:\WINDOWS\system32\dllcache\SET46.tmp
    C:\WINDOWS\system32\dllcache\SET47.tmp
    C:\WINDOWS\system32\dllcache\SET48.tmp
    C:\WINDOWS\system32\dllcache\SET49.tmp
    C:\WINDOWS\system32\dllcache\SET4B.tmp
    C:\WINDOWS\system32\dllcache\SET4C.tmp
    C:\WINDOWS\system32\dllcache\SET4D.tmp
    C:\WINDOWS\system32\dllcache\SET4E.tmp
    C:\WINDOWS\system32\dllcache\SET4F.tmp
    C:\WINDOWS\system32\dllcache\SET51.tmp
    C:\WINDOWS\system32\dllcache\SET52.tmp
    C:\WINDOWS\system32\dllcache\SET54.tmp
    C:\WINDOWS\system32\dllcache\SET56.tmp
    C:\WINDOWS\system32\dllcache\SET57.tmp
    C:\WINDOWS\system32\dllcache\SET58.tmp
    C:\WINDOWS\system32\dllcache\SET5A.tmp
    C:\WINDOWS\system32\dllcache\SET5C.tmp
    C:\WINDOWS\system32\dllcache\SET5F.tmp
    C:\WINDOWS\system32\dllcache\SET61.tmp
    C:\WINDOWS\system32\dllcache\SET62.tmp
    C:\WINDOWS\system32\dllcache\SET64.tmp
    C:\WINDOWS\system32\dllcache\SET66.tmp
    C:\WINDOWS\system32\dllcache\SET69.tmp
    C:\WINDOWS\system32\dllcache\SET6A.tmp
    C:\WINDOWS\system32\dllcache\SET6B.tmp
    C:\WINDOWS\system32\dllcache\SET6C.tmp
    C:\WINDOWS\system32\dllcache\SET6E.tmp
    C:\WINDOWS\system32\dllcache\SET6F.tmp
    C:\WINDOWS\system32\dllcache\SET71.tmp
    C:\WINDOWS\system32\dllcache\SET72.tmp
    C:\WINDOWS\system32\dllcache\SET73.tmp
    C:\WINDOWS\system32\dllcache\SET7D.tmp
    C:\WINDOWS\system32\dllcache\SET7E.tmp
    C:\WINDOWS\system32\dllcache\SET7F.tmp
    C:\WINDOWS\system32\dllcache\SET80.tmp
    C:\WINDOWS\system32\dllcache\SET82.tmp
    C:\WINDOWS\system32\dllcache\SET83.tmp
    C:\WINDOWS\system32\dllcache\SET84.tmp
    C:\WINDOWS\system32\dllcache\SET85.tmp
    C:\WINDOWS\system32\dllcache\SET86.tmp
    C:\WINDOWS\system32\dllcache\SET88.tmp
    C:\WINDOWS\system32\dllcache\SET89.tmp
    C:\WINDOWS\system32\dllcache\SET8B.tmp
    C:\WINDOWS\system32\dllcache\SET8D.tmp
    C:\WINDOWS\system32\dllcache\SET8E.tmp
    C:\WINDOWS\system32\dllcache\SET8F.tmp
    C:\WINDOWS\system32\dllcache\SET91.tmp
    C:\WINDOWS\system32\dllcache\SET93.tmp
    C:\WINDOWS\system32\dllcache\SET96.tmp
    C:\WINDOWS\system32\dllcache\SET98.tmp
    C:\WINDOWS\system32\dllcache\SET99.tmp
    C:\WINDOWS\system32\dllcache\SET9B.tmp
    C:\WINDOWS\system32\dllcache\SET9D.tmp
    C:\WINDOWS\system32\dllcache\SETA0.tmp
    C:\WINDOWS\system32\dllcache\SETA1.tmp
    C:\WINDOWS\system32\dllcache\SETA2.tmp
    C:\WINDOWS\system32\dllcache\SETA3.tmp
    C:\WINDOWS\system32\dllcache\SETA5.tmp
    C:\WINDOWS\system32\dllcache\SETA6.tmp
    C:\WINDOWS\system32\dllcache\SETA8.tmp
    C:\WINDOWS\system32\dllcache\SETA9.tmp
    C:\WINDOWS\system32\dllcache\SETAA.tmp
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Please give Ccleaner a run (not the reg scanner) just the cleaner itself to be rid of a chunk of temp files.



    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.

    After reboot, check to see if your firewall is working.



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. tipjar

    tipjar Private E-2

    I followed the instructions in your reply. Thanks for all that.

    The shortcuts are now working. The only issue I can report is the computer is running really slow. Excruciatingly slow compared to how it was before the malware issue began.

    I'm attaching the log files as instructed.

    Thanks,

    Dan
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I am not seeing anything else to take care of here in the malware removal forum. With regards to how you say the computer is running slow, you should post in the software forum about it and explain:


    • Is boot up slow?
    • Is shutdown slow?
    • Is browsing/surfing slow?
    • Is downloading slow?
    • Is running any application?
    • Is it also slow in safe boot mode?
    • Also are any process showing in Task Manager to be using a lot of CPU time?
    • Anything else slow?


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.

    7. After doing the above, you should work thru the below link:
     
    Last edited: Sep 13, 2013

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds