restart pc = missing file every reboot!!!

Discussion in 'Malware Help (A Specialist Will Reply)' started by barkerb23, Feb 20, 2011.

  1. barkerb23

    barkerb23 Private E-2

    well every time i restart my pc, i have to reinstall windows xp because theres always a file missing at start up,
    after i reinstalled xp i ran a virus scan and theres 31 infections and many, different viruses in my system32 folder. heres the log

    Malwarebytes' Anti-Malware 1.50.1.1100
    www.malwarebytes.org

    Database version: 5815

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 6.0.2900.5512

    2/19/2011 11:32:21 PM
    mbam-log-2011-02-19 (23-32-18).txt

    Scan type: Quick scan
    Objects scanned: 128342
    Time elapsed: 28 minute(s), 45 second(s)

    Memory Processes Infected: 4
    Memory Modules Infected: 1
    Registry Keys Infected: 6
    Registry Values Infected: 10
    Registry Data Items Infected: 1
    Folders Infected: 0
    Files Infected: 13

    Memory Processes Infected:
    c:\WINDOWS\Temp\34byl.exe (Trojan.Downloader) -> 3568 -> No action taken.
    c:\WINDOWS\Temp\o6jv.exe (Trojan.Dynamer) -> 3608 -> No action taken.
    c:\WINDOWS\Temp\o6jv.exe (Trojan.Dynamer) -> 2652 -> No action taken.
    c:\WINDOWS\svc2.exe (Trojan.Sisproc.Gen) -> 2192 -> No action taken.

    Memory Modules Infected:
    c:\WINDOWS\system32\nwcwks.dll (Trojan.Inject) -> No action taken.

    Registry Keys Infected:
    HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} (Worm.Nyxem) -> No action taken.
    HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} (Worm.Nyxem) -> No action taken.
    HKEY_CLASSES_ROOT\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} (Worm.Nyxem) -> No action taken.
    HKEY_CLASSES_ROOT\MSWinsock.Winsock.1 (Worm.Nyxem) -> No action taken.
    HKEY_CLASSES_ROOT\MSWinsock.Winsock (Worm.Nyxem) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advan ced\Folder\Hidden\NOHIDORSYS (Malware.Trace) -> No action taken.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explo rer\Run\2z4in (Trojan.Downloader) -> Value: 2z4in -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explo rer\Run\s4u9 (Trojan.Dynamer) -> Value: s4u9 -> No action taken.
    HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetLog2 (Trojan.Sisproc.Gen) -> Value: NetLog2 -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explo rer\Run\apps (Trojan.Agent) -> Value: apps -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userini (Rootkit.ADS) -> Value: userini -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explo rer\Run\userini (Rootkit.ADS) -> Value: userini -> No action taken.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userini (Rootkit.ADS) -> Value: userini -> No action taken.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explor er\Run\userini (Rootkit.ADS) -> Value: userini -> No action taken.
    HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Windows\win (Malware.Trace) -> Value: win -> No action taken.
    HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Windows\init (Malware.Trace) -> Value: init -> No action taken.

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advan ced\Folder\Hidden\SHOWALL\CheckedValue (PUM.Hijack.System.Hidden) -> Bad: (0) Good: (1) -> No action taken.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\system32\nwcwks.dll (Trojan.Inject) -> No action taken.
    c:\WINDOWS\Temp\34byl.exe (Trojan.Downloader) -> No action taken.
    c:\WINDOWS\Temp\o6jv.exe (Trojan.Dynamer) -> No action taken.
    c:\WINDOWS\svc2.exe (Trojan.Sisproc.Gen) -> No action taken.
    c:\WINDOWS\Fonts\services.exe (Trojan.Agent) -> No action taken.
    c:\WINDOWS\system32\MSWINSCK.OCX (Worm.Nyxem) -> No action taken.
    c:\WINDOWS\system32\calc.exe (Trojan.Agent.Gen) -> No action taken.
    c:\WINDOWS\Temp\7cx66hjl.exe (Malware.Packer.Gen) -> No action taken.
    c:\WINDOWS\Temp\eq88jce8p.exe (Trojan.Sisproc.Gen) -> No action taken.
    c:\WINDOWS\system32\6c6s4.log (Malware.Trace) -> No action taken.
    c:\documents and settings\brandon\application data\wiaservg.log (Malware.Trace) -> No action taken.
    c:\WINDOWS\Temp\wpv411298036282.exe (Trojan.Agent) -> No action taken.
    c:\WINDOWS\explorer.exe:userini.exe (Rootkit.ADS) -> No action taken.


    im not sure if i should remove them or not
    HELP!!!!!!!!!!!!
    :cry:cry:cry:cry:cry:cry:cry:cry:cry:cry
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Welcome to Major Geeks!

    Yes you need to let Malware Bytes fix them! You also need to follow through with the rest of the malware removal procedures.

    You also need to read this

    HOW TO: Attach Items To Your Post


    [Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds