I have been trying to find a good program that wont cost me an arm and a leg.... I know I have a zlob on my laptop, but I cant get rid of the darn thing. also hello to everyone I havent talked to for awhile.
__________________
To talk without thinking is to shoot without aiming.
Logfile of HijackThis v1.99.1 Scan saved at 11:36:38 PM, on 11/10/2007 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Photo, try this: Back-up your regestry!!--save it in "my documents" or to a "pen-drive".
Step 1 : Use Windows File Search Tool to Find Zlob Path
Go to Start > Search > All Files or Folders.
In the "All or part of the the file name" section, type in "Zlob" file name(s).
To get better results, select "Look in: Local Hard Drives" or "Look in: My Computer" and then click "Search" button.
When Windows finishes your search, hover over the "In Folder" of "Zlob", highlight the file and copy/paste the path into the address bar. Save the file's path on your clipboard because you'll need the file path to delete Zlob in the following manual removal steps.
Step 2 : Use Windows Task Manager to Remove Zlob Processes
To open the Windows Task Manager, use the combination of CTRL+ALT+DEL or CTRL+SHIFT+ESC.
Click on the "Image Name" button to search for "Zlob" process by name.
Select the "Zlob" process and click on the "End Process" button to kill it.
Remove the "Zlob" processes files:
msmsgs.exe nvctrl.exe msmsgs.exe nvctrl.exe
Step 3 : Use Registry Editor to Remove Zlob Registry Values
To open the Registry Editor, go to Start > Run > type regedit and then press the "OK" button.
Locate and delete the entry or entries whose data value (in the rightmost column) is the spyware file(s) detected earlier.
To delete "Zlob" value, right-click on it and select the "Delete" option.
Locate and delete "Zlob" registry entries:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWinlogonShell=explorer.exe HKEY_LOCAL_MACHINE SoftwareMicrosoftWindows NT CurrentVersionWinlogonShell=explorer.exe, msmsgs.exeHKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunRegSvr32=%System%msmsgs.exe HKEY_LOCAL_MACHINE SoftwareMicrosoftWindows CurrentVersionRunRegSvr32=%System%msmsgs.exe
Step 4 : Use Windows Command Prompt to Unregister Zlob DLL Files
To open the Windows Command Prompt, go to Start > Run > type cmd and then click the "OK" button.
Type "cd" in order to change the current directory, press the "space" button, enter the full path to where you believe the Zlob DLL file is located and press the "Enter" button on your keyboard. If you don't know where Zlob DLL file is located, use the "dir" command to display the directory's contents.
To unregister "Zlob" DLL file, type in the exact directory path + "regsvr32 /u" + [DLL_NAME] (for example, :C\Spyware-folder\> regsvr32 /u Zlob.dll) and press the "Enter" button. A message will pop up that says you successfully unregistered the file.
Search and unregister "Zlob" DLL files:
uimcu.dll antzozc.dll dtjby.dll
Step 5 : Detect and Delete Other Zlob Files
To open the Windows Command Prompt, go to Start > Run > type cmd and then press the "OK" button.
Type in "dir /A name_of_the_folder" (for example, C:\Spyware-folder), which will display the folder's content even the hidden files.
To change directory, type in "cd name_of_the_folder".
Once you have the file you're looking for type in "del name_of_the_file".
To delete a file in folder, type in "del name_of_the_file".
To delete the entire folder, type in "rmdir /S name_of_the_folder".
Select the "Zlob" process and click on the "End Process" button to kill it.
Maybe this thread might afford you a solution ..... lots of good programs listed in it .... if you use Kaspersky WebScanner .... make sure nothing interrupts it or you might loose everything ....
Turn off system restore first. ( http://support.mechling.com/computer/systemrestore.html )
then download AVG Free & Adaware SE by Lavasoft. Install them both (don't run any scans yet). Update them both.
Disconnect your network cable.....run AVG first.....it will find and remove the trojans and virus. If it asks you to reboot afterward, do so.....
When it reboots, run the Adaware Se program.....delete all the shit it finds....
Reboot....as your PC is rebooting....start tappin the F8 key and boot into safe mode.....run the adaware scan and virus scan again while in safe mode....
After all is done, you should be virus free.....Invest in a good AV or you will get it back w/in a week!
Oh, and you should turn system restore back on too and create a clean point.....you might need it later. :sad:
http://support.mechling.com/
Good luck...I've been makin big $$$$$ on this little bugger for almost a year!
__________________
And your point is???? Don't have one? Well then shut up and I'll give you one!
Kat is right, I didn't even think about adaware! It's alot easier to let the software dig thru the registry!! Sorry if I got you confused with way too much info!
Okay I did some scans, but here is some logfile info I got from the adware.... Here are some details of zlobs...
Name:Virtumonde Category:Malware Object Type:File Size:34304 Bytes Location:C:\qoobox\Quarantine\C\WINDOWS\system32\xxyxxya.dll.vir Last Activity:11-17-2007 1:11:12 AM Relevance:Low TAC index:10 Comment: Description:Virtumonde may cause system instability, auto updates and opens unsolicited websites. No uninstaller. Bundled install that is undisclosed.There is a Virtumonde removal tool available at http://www.lavasoft.com/download for the variants which cannot easily be removed.
Name:Win32.Trojandownloader.Zlob Category:Malware Object Type:File Size:20480 Bytes Location:c:\system volume information\tracking.log Last Activity:11-17-2007 12:47:24 AM Relevance:Low TAC index:10 Comment: Description:Win32.Trojandownloader.Zlob installs in stealth, opening backdoors on the computer and downloads other applications such as SpyDawn and other rogue anti-spyware software.
__________________
To talk without thinking is to shoot without aiming.
Ad-Aware SE Build 1.06r1 Logfile Created on:Friday, November 16, 2007 7:43:28 PM Created with Ad-Aware SE Personal, free for private use. Using definitions file:SE1R202 12.11.2007 »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» »»»»»»»»»»»
References detected during the scan: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» MRU List(TAC index:0):8 total references Win32.Trojandownloader.Zlob(TAC index:10):6 total references »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
Ad-Aware SE Settings =========================== Set : Search for negligible risk entries Set : Safe mode (always request confirmation) Set : Scan active processes Set : Scan registry Set : Deep-scan registry Set : Scan my IE Favorites for banned URLs Set : Scan my Hosts file
Extended Ad-Aware SE Settings =========================== Set : Unload recognized processes & modules during scan Set : Scan registry for all users instead of current user only Set : Always try to unload modules before deletion Set : During removal, unload Explorer and IE if necessary Set : Let Windows remove files in use at next reboot Set : Delete quarantined objects after restoring Set : Include basic Ad-Aware settings in log file Set : Include additional Ad-Aware settings in log file Set : Include reference summary in log file Set : Include alternate data stream details in log file Set : Play sound at scan completion if scan locates critical objects
Hosts file scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» 1 entries scanned. New critical objects:0 Objects found so far: 4
MRU List Object Recognized! Location: : C:\Documents and Settings\Administrator ecent Description : list of recently opened documents
MRU List Object Recognized! Location: : S-1-5-21-2830030001-2813528681-1042858952-500\software\microsoft\directinput\mostrecentapplication Description : most recent application to use microsoft directinput
MRU List Object Recognized! Location: : S-1-5-21-2830030001-2813528681-1042858952-500\software\microsoft\directinput\mostrecentapplication Description : most recent application to use microsoft directinput
MRU List Object Recognized! Location: : S-1-5-21-2830030001-2813528681-1042858952-500\software\microsoft\microsoft management console ecent file list Description : list of recent snap-ins used in the microsoft management console
MRU List Object Recognized! Location: : S-1-5-21-2830030001-2813528681-1042858952-500\software\microsoft\windows\currentversion\applets egedit Description : last key accessed using the microsoft registry editor
MRU List Object Recognized! Location: : S-1-5-21-2830030001-2813528681-1042858952-500\software\microsoft\windows\currentversion\explorer\comdlg32\lastvisitedmru Description : list of recent programs opened
MRU List Object Recognized! Location: : .DEFAULT\software\microsoft\windows media\wmsdk\general Description : windows media sdk
MRU List Object Recognized! Location: : S-1-5-18\software\microsoft\windows media\wmsdk\general Description : windows media sdk
Conditional scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 2 Objects found so far: 14
7:47:24 PM Scan Complete
Summary Of This Scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Total scanning time:00:03:56.344 Objects scanned:94418 Objects identified:6 Objects ignored:0 New critical objects:6
__________________
To talk without thinking is to shoot without aiming.
After the scan finishes, it will show the files in red. Click next, the next screen is "tabbed" on "scan summary", put a check in all boxes, and click on next, it'll ask if you want to remove them, OK, the next screen will have the quarrantined list on it, check the box and delete the quarrantined files, make sure they are not put into the recycle bin. Run the scan in safe mode also.
Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 22:11, on 2007-11-17 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Boot mode: Normal