Jump to content

adamryer

Members
  • Content Count

    7
  • Joined

  • Last visited

Community Reputation

0 Neutral

About adamryer

  • Rank
    New Member
  1. A note to anyone who has been afected by the trojan.zlob.G virus: I have no idea how my computer got this virus, the only things i can think of are torrent file or from limewire, but usually AVG warns me immediately if it finds a virus in any file i download, in this case it didnt. AVG also did not find this virus during a complete system scan. It was causing both IE and Firefox to crash, and the only way i was able to get onto the internet, and luckily found this site, was to switch to a different user in windows xp. After scanning with spybot, malwarebytes, panda activescan, and hijackthis
  2. here are the log files from the 3 scans performed: Malwarebytes' Anti-Malware 1.31 Database version: 1471 Windows 5.1.2600 Service Pack 3 12/7/2008 12:20:12 PM mbam-log-2008-12-07 (12-20-12).txt Scan type: Quick Scan Objects scanned: 67443 Time elapsed: 6 minute(s), 2 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 8 Registry Values Infected: 0 Registry Data Items Infected: 1 Folders Infected: 2 Files Infected: 1 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: HKEY_
  3. update here. I just did a restart after deleting the two files out of the application data directory, and I ran msconfig to view my startup programs, and a new one appeared with the name kjzna1562565 and the command directory was C:\Documents and Settings\Adam Ryer\Application Data/Google/kjzna1562565.exe. I disabled this command from running on startup, and then deleted that entry with ccleaner. I will post again if anything else appears.
  4. oh, and i also found and deleted the two files that everyone has been mentioning: 1) "spcffwl.dll" 2) "kjzna1562565.exe" After scanning with spybot, malwarebytes, and hijackthis, I was able to just simply right click and delete these two files and now all is well! Thanks to malwarebytes for providing excellent malware removal instructions! I will always come back to this forum for any help i need!
  5. here are my results from the hijackthis scan: Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 2:12:09 PM, on 12/7/2008 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16735) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Common Files\Apple\Mobile Dev
  6. here are my results from the panda active scan: ;******************************************************************************* ******************************************************************************** * ******************* ANALYSIS: 2008-12-07 14:09:37 PROTECTIONS: 1 MALWARE: 13 SUSPECTS: 1 ;******************************************************************************* ******************************************************************************** * ******************* PROTECTIONS Description Version Active Updated ;=========
  7. Ok so I started getting the fake popup saying I had been infected with the Trojan.zlob.G virus. Did 2 complete system scans with the latest version of AVG 8.0. Both scans turned up nothing! I followed the instructions on Malwarebytes and here are my logs: Malwarebytes' Anti-Malware 1.31 Database version: 1471 Windows 5.1.2600 Service Pack 3 12/7/2008 12:20:12 PM mbam-log-2008-12-07 (12-20-12).txt Scan type: Quick Scan Objects scanned: 67443 Time elapsed: 6 minute(s), 2 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 8 Registry Values Infected: 0 Regist
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.