Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Removed IS2010 and XP AV 2009, Now missing taskbar

  • This topic is locked This topic is locked
3 replies to this topic

#1 SteveMHDS


  • Members
  • 6 posts
  • Gender:Male
  • Location:Wheaton, IL
  • Local time:07:22 AM

Posted 07 February 2010 - 09:23 AM

Ok, here's a challenge for you!

System Info: Dell Latitude D600, 512 MB RAM, 40 GB HDD, XP Pro SP 2/3

The system was originally infected with both IS 2010 and XP AV 2009. Using MalwareBytes and CCLeaner, it appeared to have cleaned a lot of the problems up. However, after rebooting, I was faced with no taskbar (Windows key didn't work), but I still saw an occassional bubble telling me things from the system tray, but couldn't access it. I then tried to run MBAM again, but started receiving an error about the vba being out of date...tried to uninstall/install, but it wouldn't.

I then did a repair (dirty) install of windows. It seemed to go well until I got the "Windows cannot open the file rundll32.exe because we don't know the program it was created with...go to our online tool or browse"... I tried both but neither worked. I cancelled through a bunch of times, and got the same message for regsvr32 and some others. Cancelled through all of those and it 'seemed' to work. Upon finishing the install, life was as it should be. Taskbar present, internet access, MBAM worked. I created a restore point at that time, ran some rootkit detectors (Panda, SOPHOS, etc) which found nothing. After restarting the system, everything was back to its screwed up format...no taskbar, MBAM didn't work, etc. I booted into safe mode to try the restore point, but was told that the restore wasn't available. I booted with UBCD4W, found that the restore point actually did exist, copied the security, sam, software, default, and system hives to the config folder, rebooted, but to the same setup!

Another frustrating side effect has been a 2-3 minute pause at the 'Windows is Starting Up' screen...

With nothing but time, I did the repair install again. Same results...everything fine until a reboot, then back to square one. I am getting a bit frustrated... Obviously something is still running during the bootup that messes everything up. HELP!

Any ideas?

As a sidenote, is it ok to clear out the temp internet files in the system profile local settings folder? I usually clean them out from each user account, but after having to watch so many scans, I see all these files in this location and wondered if I can erase them...

Below is the DDS text and I've attached the necessary scan logs...


DDS (Ver_09-12-01.01) - NTFSx86
Run by Student at 22:42:49.88 on Sat 02/06/2010
Internet Explorer: 6.0.2900.2180

============== Running Processes ===============

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydial/*http://www.yahoo.com/search/ie.html
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/su/sbcydial/*http://www.yahoo.com
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: Yahoo! IE Services Button: {5bab4b5b-68bc-4b02-94d6-2fc0de4a7897} - c:\program files\yahoo!\common\yiesrvc.dll
BHO: Easy Photo Print: {9421dd08-935f-4701-a9ca-22df90ac4ea6} - c:\program files\epson software\easy photo print\EPTBL.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SingleInstance Class: {fdad4da1-61a2-4fd8-9c17-86f7ac245081} - c:\program files\yahoo!\companion\installs\cpn0\YTSingleInstance.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
TB: Easy Photo Print: {9421dd08-935f-4701-a9ca-22df90ac4ea6} - c:\program files\epson software\easy photo print\EPTBL.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
EB: &Yahoo! Messenger: {4528bbe0-4e08-11d5-ad55-00010333d0ad} - c:\progra~1\yahoo!\common\yhexbmesus.dll
EB: &Discuss: {bdeade7f-c265-11d0-bced-00a0c90ab50f} - shdocvw.dll
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Yahoo! Pager] "c:\progra~1\yahoo!\messen~1\YAHOOM~1.EXE" -quiet
mRun: [ATIModeChange] Ati2mdxx.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [Dell QuickSet] c:\program files\dell\quickset\quickset.exe
mRun: [AdaptecDirectCD] "c:\program files\roxio\easy cd creator 5\directcd\DirectCD.exe"
mRun: [DVDSentry] c:\windows\system32\DSentry.exe
mRun: [vptray] c:\progra~1\symant~1\symant~1\vptray.exe
mRun: [HPDJ Taskbar Utility] c:\windows\system32\spool\drivers\w32x86\3\hpztsb04.exe
mRun: [LTCM Client] c:\program files\ltcm client\ltcmClient.exe /startup
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
dRunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\univer~1.lnk - c:\program files\ut vpn client\vpngui.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\winzip~1.lnk - c:\program files\winzip\WZQKPICK.EXE
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
IE: &Yahoo! Search - file:///c:\program files\yahoo!\Common/ycsrch.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Yahoo! &Dictionary - file:///c:\program files\yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\yahoo!\Common/ycsms.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\program files\yahoo!\common\yiesrvc.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {01113300-3E00-11D2-8470-0060089874ED} - hxxp://activation.rr.com/install/download/tgctlcm.cab
DPF: {231B1C6E-F934-42A2-92B6-C2FEFEC24276} - c:\program files\yahoo!\common\yucconfig.dll
DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} - c:\program files\yahoo!\common\yinsthelper.dll
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc.cab
DPF: {493ACF15-5CD9-4474-82A6-91670C3DD66E} - hxxp://www.linkedin.com/cab/LinkedInContactFinderControl.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} - hxxp://v4.windowsupdate.microsoft.com/CAB/x86/unicode/iuctl.CAB?38125.3967824074
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_02-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_04-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Notify: AtiExtEvent - Ati2evxx.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
mASetup: {A509B1FF-37FF-4bFF-8CFF-4F3A747040FF} - c:\windows\system32\rundll32.exe c:\windows\system32\advpack.dll,launchinfsectionex c:\program files\internet explorer\clrtour.inf,DefaultInstall.ResetTour,,12

============= SERVICES / DRIVERS ===============

=============== Created Last 30 ================

2010-02-07 00:40:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-07 00:40:12 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-07 00:40:12 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-07 00:38:11 358 ----a-w- C:\cc_20100206_183810.reg
2010-02-07 00:37:57 6658 ----a-w- C:\cc_20100206_183755.reg
2010-02-06 22:35:19 0 d-----w- C:\fe80a4174b0ee2d829c712a586063f
2010-02-06 22:15:41 18816 ------w- c:\windows\system32\SAVRKBootTasks.sys
2010-02-06 21:33:49 0 d-----w- c:\program files\Sophos
2010-02-06 21:31:18 142096 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-02-06 21:12:14 0 d-----w- c:\program files\Runtime Software
2010-02-06 13:19:59 30208 -c--a-w- c:\windows\system32\dllcache\sm81w.dll
2010-02-06 13:18:50 92416 -c--a-w- c:\windows\system32\dllcache\mga.sys
2010-02-06 13:17:59 7680 -c--a-w- c:\windows\system32\dllcache\ftpctrs2.dll
2010-02-06 13:16:49 7168 -c--a-w- c:\windows\system32\dllcache\wamregps.dll
2010-02-06 12:48:11 488 ---ha-r- c:\windows\system32\logonui.exe.manifest
2010-02-06 12:48:02 749 ---ha-r- c:\windows\WindowsShell.Manifest
2010-02-06 12:48:02 749 ---ha-r- c:\windows\system32\wuaucpl.cpl.manifest
2010-02-06 12:48:02 749 ---ha-r- c:\windows\system32\sapi.cpl.manifest
2010-02-06 12:48:02 749 ---ha-r- c:\windows\system32\nwc.cpl.manifest
2010-02-06 12:48:02 749 ---ha-r- c:\windows\system32\ncpa.cpl.manifest
2010-02-06 04:25:23 0 d-----w- c:\windows\pss
2010-02-06 00:19:27 0 d-----w- c:\windows\system32\CatRoot_bak
2010-02-06 00:17:46 0 d-----w- C:\7c1e21d0425a80b9086469f5ac
2010-02-05 21:03:58 0 d-----w- C:\ComboFix
2010-02-05 20:57:20 2444 ----a-w- c:\windows\system32\wpa.bak
2010-02-05 16:39:37 16384 -c--a-w- c:\windows\system32\dllcache\isignup.exe
2010-02-05 16:39:01 32768 -c--a-w- c:\windows\system32\dllcache\icwdl.dll
2010-02-05 16:22:22 7334 -c--a-w- c:\windows\system32\dllcache\wmerrenu.cat
2010-02-05 16:22:14 13753 ----a-r- c:\windows\SETBA.tmp
2010-02-05 16:22:11 1086058 ----a-r- c:\windows\SETAE.tmp
2010-02-05 16:22:08 1042903 ----a-r- c:\windows\SETAB.tmp
2010-02-05 15:59:15 448245 ----a-w- c:\windows\setupapi.old
2010-02-05 14:08:38 3248 ----a-w- C:\cc_20100205_080836.reg
2010-02-05 14:04:18 98816 ----a-w- c:\windows\sed.exe
2010-02-05 14:04:18 77312 ----a-w- c:\windows\MBR.exe
2010-02-05 14:04:18 261632 ----a-w- c:\windows\PEV.exe
2010-02-05 14:04:18 161792 ----a-w- c:\windows\SWREG.exe
2010-02-05 05:06:41 0 d-----w- c:\docume~1\student\applic~1\Malwarebytes
2010-02-05 05:06:32 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-02-05 02:22:10 360 ----a-w- C:\cc_20100204_202208.reg
2010-02-05 02:21:49 442 ----a-w- C:\cc_20100204_202148.reg
2010-02-05 02:21:36 1856 ----a-w- C:\cc_20100204_202134.reg
2010-02-05 02:21:17 251524 ----a-w- C:\cc_20100204_202107.reg
2010-02-05 02:04:05 0 d-----w- c:\program files\CCleaner
2010-02-05 02:03:24 81920 ----a-w- c:\windows\system32\Startup.cpl
2010-02-04 21:21:35 576 ----a-w- C:\precleaning.reg
2010-01-24 20:28:09 0 ----a-w- c:\windows\Jrelamuzage.bin
2010-01-24 20:28:08 120 ----a-w- c:\windows\Xyeje.dat
2010-01-24 19:47:23 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-01-12 02:12:31 54156 ---ha-w- c:\windows\QTFont.qfn
2010-01-12 02:12:31 1409 ----a-w- c:\windows\QTFont.for

==================== Find3M ====================

2010-02-06 12:46:22 23412 ----a-w- c:\windows\system32\emptyregdb.dat
2009-12-17 23:14:00 411368 ----a-w- c:\windows\system32\deploytk.dll

============= FINISH: 22:43:37.54 ===============

Attached Files

Edited by SteveMHDS, 07 February 2010 - 09:41 AM.

BC AdBot (Login to Remove)


#2 SteveMHDS

  • Topic Starter

  • Members
  • 6 posts
  • Gender:Male
  • Location:Wheaton, IL
  • Local time:07:22 AM

Posted 09 February 2010 - 07:58 PM

Well, after 2 days of no response, I decided to try a few things myself. Since the problem that occurred during the repair install dealt with files (regsvr32, rundll32, etc) that don't appear to be replaced in a repair install, I booted with my UBCD4W (Ultimate Boot CD for Windows) and copied all the files (not the folders) from the I386\system32 folder on the CD to the windows\system32 folder on the c drive. I then did another repair install, and DID NOT get the error messages. This was the first sign of life returning to normal. I had some problems accessing the Internet, even though I had a connection. I reset the winsock and then Internet access was back up. I then updated Windows, verified that various programs still worked, rebooted several times, each time coming back to the way it is supposed to look! thumbup.gif

If anyone has an explanation for this, I'd love to hear it...I went with a rather drastic approach, and while it worked, I would love to know what part of the fix actually did the fixing...

Hope my pain is someone's gain!



While we understand your frustration at having to wait, please note that Bleeping Computer deals with several hundred requests for assistance such as yours on a daily basis. As a result, our backlog is quite large as are other comparable sites that help others with malware issues. Although our HJT Team members work on hundreds of requests each day, they are all volunteers who work logs when they can and are able to do so. No one is paid by Bleeping Computer for their assistance to our members.

Further, our malware removal staff is comprised of team members with various levels of skill and expertise to deal with thousands of malware variants, some more complex than others. Although we try to take DDS/HJT logs in order (starting with the oldest), it is often the skill level of the particular helper and sometimes the operating system that dictates which logs get selected first. Some infections are more complicated than others and require a higher skill level to remove. Without that skill level attempted removal could result in disastrous results. In other instances, the helper may not be familiar with the operating system that you are using, since they use another. In either case, neither of us want someone to assist you who is not familiar with your issue and attempt to fix it.

We ask that once you have posted your log and are waiting, please DO NOT "bump" your thread or make further replies until it has been responded to by a member of the HJT Team. The reason we ask this or do not respond to your requests is because that would remove you from the active queue that Techs and Staff have access to. The malware staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response, there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

That is why I have made an edit to your last post, instead of a reply. Please do not multiple post here, as that only pushes you further down the queue and causes confusion to the staff.

Please be patient. It may take several days, up to more than a week, perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

Thank you for understanding.

Elise - forum moderator

Edited by elise025, 12 February 2010 - 02:15 PM.

#3 schrauber



  • Malware Response Team
  • 24,794 posts
  • Gender:Male
  • Location:Munich,Germany
  • Local time:01:22 PM

Posted 14 February 2010 - 08:50 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#4 schrauber



  • Malware Response Team
  • 24,794 posts
  • Gender:Male
  • Location:Munich,Germany
  • Local time:01:22 PM

Posted 19 February 2010 - 03:28 PM

Due to the lack of feedback, this topic is now closed.
If you need this topic reopened, please PM a staff member and we will reopen it for you (include the address of this thread in your request). This applies to the original topic starter only. Everyone else with similar problems, please start a new topic.

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users