Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Error loading streamci


  • Please log in to reply
10 replies to this topic

#1 alby

alby

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 19 September 2010 - 02:54 PM

I've been trying to fix this computer since August.
I took out the hard drive and ran it against my own AVG installation.
I did a re-install of Windows using the DELL system and the partition on the original computer, listed below.
I have followed instructions to download Dell Desktop Software, the Intel chipset software, and the rest of the drivers for this computer. I installed Avast and Malwarebytes, as well as the SP3 and all security updates.
However, I consistently get a message when trying to install the Soundmax software "Error loading streamci."
I have tried re-downloading all drivers and re-installing.
The message stays the same.
As a member of BC, I read through some similar problems and followed instructions on how to post the problems and diagnostics.

I include information that indicates the computer (System Information), the original infections found (AVG scans), Malwarebytes report, OTL report and extras, and RTLUnhooker report.
OS Name Microsoft Windows XP Home Edition
Version 5.1.2600 Service Pack 3 Build 2600
OS Manufacturer Microsoft Corporation
System Name PHILLIP-A6F17A3
System Manufacturer Dell Computer Corporation
System Model Dimension 3000
System Type X86-based PC
Processor x86 Family 15 Model 3 Stepping 4 GenuineIntel ~2394 Mhz
BIOS Version/Date Dell Computer Corporation A01, 8/24/2004
SMBIOS Version 2.3
Windows Directory C:\WINDOWS
System Directory C:\WINDOWS\system32
Boot Device \Device\HarddiskVolume2
Locale United States
Hardware Abstraction Layer Version = "5.1.2600.5512 (xpsp.080413-2111)"
User Name PHILLIP-A6F17A3\Owner
Time Zone Mountain Daylight Time
Total Physical Memory 512.00 MB
Available Physical Memory 165.00 MB
Total Virtual Memory 2.00 GB
Available Virtual Memory 1.95 GB
Page File Space 1.22 GB
Page File C:\pagefile.sys

Scan "Shell extension scan" completed.
Infections;"89";"89";"0"
Spyware;"7";"7";"0"
Folders selected for scanning:;"F:\;"
Scan started:;"Thursday, August 05, 2010, 5:53:50 AM"
Scan finished:;"Thursday, August 05, 2010, 8:26:48 AM (2 hour(s) 32 minute(s) 58 second(s))"
Total object scanned:;"266350"
User who launched the scan:;"Rus"

AVG Scan 8/05/10
Infections
File;"Infection";"Result"
F:\WINDOWS\SYSTEM32\yuhndbge.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\xxjompbe.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\wsgdyosy.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\wpvcwfop.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\wpv101229907443.cpx:\$IB\GetModule\GetModule32.exe;"Trojan horse Adload_r.EQ";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\wpv101229907443.cpx;"Trojan horse Adload_r.EQ";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\wftlbcgv.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\warning.gif;"Trojan horse Generic_c.ABVY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\vltrbewn.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\vjxkrpbcowlwgnem.dll;"Trojan horse Generic_r.BB";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\userinit.exe;"Trojan horse Agent.AWRD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\urqNFxYr.dll;"Trojan horse Generic_r.AI";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\udukwbom.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\tnnccj.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\snibnj.dll;"Trojan horse Generic12.AOVI";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\sjzxju.dll;"Trojan horse Generic12.APRX";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\senekanoetwqoo.dll;"Trojan horse Generic12.ANRD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\senekamrmlleuw.dll;"Trojan horse Agent.ASHN";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\senekabidqpuir.dll;"Trojan horse Generic12.ALPP";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\scearulo.dll;"Trojan horse Generic12.AOVI";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\rqRLbcBt.dll;"Trojan horse Generic12.AJHI";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\rargjz.dll;"Trojan horse Generic12.AJJH";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\qwbvjj.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\qtteyyvq.dll;"Trojan horse Generic12.AJJH";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\prunnet.exe;"Trojan horse Clicker.VSE";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\pcload.exe;"Trojan horse SHeur2.JDY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\owsdpuhu.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\ntdll64.exe;"Trojan horse Agent.AWRD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\msiconf.exe;"Trojan horse Downloader.Zlob";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\mpfpqb.dll;"Trojan horse BHO.GWH";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\mfhoopna.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\lwghjgam.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\leuixqgf.dll;"Trojan horse Generic12.APSA";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\lbwrxh.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\larbglno.dll;"Trojan horse Vundo.DA";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\khfGyyya.dll;"Trojan horse Generic12.ATVH";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\juvggd.dll;"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\jkrbmcpn.dll;"Trojan horse BHO.GWH";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\frmwrk32.exe;"Trojan horse SHeur2.JDY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\ficadijo.dll;"Trojan horse Generic12.AOUR";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\efcYSiGY.dll;"Trojan horse Generic12.AJHI";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\DRIVERS\senekawbovxfai.sys;"Trojan horse Generic12.ANRY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\DLLCACHE\userinit.exe;"Trojan horse Agent.AWRD";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\digeste.dll;"Trojan horse Downloader.Generic8.MUN";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\dcugwggh.dll;"Trojan horse Generic12.APRX";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\CONFIG\systemprofile\Application Data\8da4b9e87dba9aa7;"Trojan horse Generic_c.TST";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\CONFIG\systemprofile\Application Data\18e23421ea0fd821;"Trojan horse Generic_c.TSW";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\cbXRkHBu.dll;"Trojan horse Vundo.DB";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\cbjxubph.dll;"Trojan horse Generic12.ASYC";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\awkgsmuj.dll;"Trojan horse Generic12.APRY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\amkjydiu.dll;"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\WINDOWS\SYSTEM32\ahtn.htm;"Trojan horse Generic_c.ABVX";"Moved to Virus Vault"
F:\Program Files\GrandPack\GrandPack2.dll;"Trojan horse Generic12.AGNC";"Moved to Virus Vault"
F:\Program Files\GetModule\GetModule32.exe;"Trojan horse Adload_r.EQ";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\V6JC4Q3K\kbp41256[1];"Trojan horse Generic10.AMUY";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\TG0D35I2\warning[1].gif;"Trojan horse Generic_c.ABVY";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\MWZFHQVT\lsp[1].exe;"Trojan horse Agent.AWRD";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\MWZFHQVT\InstallAVg_770522168440[1].exe;"Trojan horse FakeAlert.EM";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\KRNEMX6W\InstallAVg_770522168440[2].exe;"Trojan horse FakeAlert.EM";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\KRNEMX6W\InstallAVg_770522168440[1].exe;"Trojan horse FakeAlert.EM";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\DBRI8VOU\winsinstall[1].exe;"Trojan horse Agent_r.IF";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\7PST333Z\winlogon[1].htm;"Trojan horse Generic_c.ABVX";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temporary Internet Files\Content.IE5\16U5898Z\lsp[1].exe;"Trojan horse Agent.AWRD";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temp\senekae357.tmp;"Trojan horse Agent.ADIY";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temp\ntdll64.dll;"Virus found Downloader.Tibs";"Moved to Virus Vault"
F:\Documents and Settings\PHIL O PACHECO JR\Local Settings\Temp\mousehook.dll;"Virus found Downloader.Tibs";"Moved to Virus Vault"
F:\Documents and Settings\LILLY M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\W30WZJJ7\KB908459[1].exe;"Trojan horse Downloader.Generic8.GLX";"Moved to Virus Vault"
F:\Documents and Settings\LILLY M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\OAAU1V46\apstpldr.dll[1].htm;"Trojan horse Generic_r.AI";"Moved to Virus Vault"
F:\Documents and Settings\LILLY M PACHECO\Local Settings\Temp\wJQs.exe;"Trojan horse Downloader.Generic8.GLX";"Moved to Virus Vault"
F:\Documents and Settings\CHRISTINA S PACHECO\Local Settings\Temporary Internet Files\Content.IE5\XUSINJ39\index[1];"Trojan horse Generic12.AJJH";"Moved to Virus Vault"
F:\Documents and Settings\CHRISTINA S PACHECO\Local Settings\Temporary Internet Files\Content.IE5\WN1GTA2W\upd105320[1];"Trojan horse Vundo.DA";"Moved to Virus Vault"
F:\Documents and Settings\CHRISTINA S PACHECO\Local Settings\Temp\wJQs.exe;"Trojan horse Downloader.Generic8.GMP";"Moved to Virus Vault"
F:\Documents and Settings\CHRISTINA S PACHECO\Local Settings\Temp\ntdll64.dll;"Virus found Downloader.Tibs";"Moved to Virus Vault"
F:\Documents and Settings\CHRISTINA S PACHECO\Local Settings\Temp\mousehook.dll;"Virus found Downloader.Tibs";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\ZQQBBUH0\apstpldr.dll[1].htm;"Trojan horse Generic_r.AI";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\R6N771J4\divx[1];"Trojan horse Vundo.DB";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\EH4G3AA9\get_file[1].php:\$JJ\$KI.dll;"Trojan horse Generic_r.BB";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\EH4G3AA9\get_file[1].php;"Trojan horse Generic_r.BB";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\7JY5TPLA\upd105320[1];"Trojan horse Vundo.DA";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\60KG8T7T\KB908902[1].exe;"Trojan horse Downloader.Generic8.MUN";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temporary Internet Files\Content.IE5\60KG8T7T\index[1];"Trojan horse Vundo.DD";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\KB00.exe;"Trojan horse Downloader.Generic8.MUN";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\ismbar2.exe:\$IB\GrandPack\GrandPack2.dll;"Trojan horse Generic12.AGNC";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\ismbar2.exe;"Trojan horse Generic12.AGNC";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\38.exe:\$JJ\$KI.dll;"Trojan horse Adload_r.FU";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\38.exe;"Trojan horse Adload_r.FU";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Application Data\gadcom\gadcom.exe;"Trojan horse Downloader.Generic8.HPC";"Moved to Virus Vault"
F:\Documents and Settings\Administrator\Local Settings\Temp\ntdll64.dll;"Virus found Downloader.Tibs";"Moved to Virus Vault"
F:\Documents and Settings\Administrator\Local Settings\Temp\mousehook.dll;"Virus found Downloader.Tibs";"Moved to Virus Vault"

Spyware
File;"Infection";"Result"
F:\Program Files\VirusRanger\vrext.dll;"Potentially harmful program Fake_AntiSpyware.LR";"Moved to Virus Vault"
F:\Program Files\VirusProtectPro 3.5\VirusProtectPro 3.5.exe;"Potentially harmful program Fake_AntiSpyware.DF";"Moved to Virus Vault"
F:\Program Files\GrandPack\qdrloader.exe;"Adware Generic4.HEF";"Moved to Virus Vault"
F:\Program Files\GetPack\GetPack26.exe;"Adware Generic3.AEZM";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\ismbar2.exe:\$IB\GrandPack\qdrloader.exe;"Adware Generic4.HEF";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\gettpa226.exe:\$IB\GetPack\GetPack26.exe;"Adware Generic3.AEZM";"Moved to Virus Vault"
F:\Documents and Settings\BREANNA M PACHECO\Local Settings\Temp\gettpa226.exe;"Adware Generic3.AEZM";"Moved to Virus Vault"

So, I will be grateful for your help in identifying the problems and solutions.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:53 PM

Posted 19 September 2010 - 07:55 PM

Hello, Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 alby

alby
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 24 September 2010 - 06:50 AM

Thank you for the procedure directions.
Downloaded, updated, restarted, cleaned, scanned.
Only a cookie reported.
But the installation still reads --error loading streamci, module cannot be located--
downloaded update for MB and scanned.

Log for MB 9/18/10:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4650

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/18/2010 9:15:07 PM
mbam-log-2010-09-18 (21-15-07).txt

Scan type: Full scan (C:\|)
Objects scanned: 168739
Time elapsed: 35 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Log for SAS:
SUPERAntiSpyware Scan Log


Generated 09/23/2010 at 06:13 AM

Application Version : 4.43.1000

Core Rules Database Version : 5563
Trace Rules Database Version: 3375

Scan type : Complete Scan
Total Scan Time : 00:53:53

Memory items scanned : 239
Memory threats detected : 0
Registry items scanned : 4894
Registry threats detected : 0
File items scanned : 21034
File threats detected : 0

Log for MB:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4678

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

9/23/2010 10:23:32 PM
mbam-log-2010-09-23 (22-23-32).txt

Scan type: Full scan (C:\|)
Objects scanned: 168227
Time elapsed: 55 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

So still in silent limbo.

Edited by alby, 24 September 2010 - 06:52 AM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:53 PM

Posted 24 September 2010 - 10:43 AM

Ok, now we can get rid of that error. I waited in case we got more.

Its not unusual to receive such an error after using specialized fix tools.

A "Cannot find...", "Could not run...", "Error loading... or "specific module could not be found" message is usually related to malware that was set to run at startup but has been deleted. Windows is trying to load this file but cannot locate it since the file was mostly likely removed during an anti-virus or anti-malware scan. However, an associated orphaned registry entry remains and is telling Windows to load the file when you boot up. Since the file no longer exists, Windows will display an error message. You need to remove this registry entry so Windows stops searching for the file when it loads.

To resolve this, download Autoruns, search for the related entry and then delete it.

Create a new folder on your hard drive called AutoRuns (C:\AutoRuns) and extract (unzip) the file there. (click here if you're not sure how to do this.)
Open the folder and double-click on autoruns.exe to launch it.
Please be patient as it scans and populates the entries.
When done scanning, it will say Ready at the bottom.
Scroll through the list and look for a startup entry related to the file(s) in the error message.
Right-click on the entry and choose delete.
Reboot your computer and see if the startup error returns.
Credit to quietman7
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 alby

alby
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 25 September 2010 - 08:47 PM

Gracias! Estudiamos!

#6 alby

alby
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 25 September 2010 - 09:35 PM

This line:
Scroll through the list and look for a startup entry related to the file(s) in the error message.
is not clear to me.
The Autoruns "everything" window/list has a find function that doesn't come up with anything with "error" "loading" "streamci" -- I did "look through" the other tabs' lists with the same non-result.
But not able to find the string so I haven't deleted it.

I can do a screen capture of the Autoruns findings, but not a full copy of the list.
This is a rundll error. Very late in saying so...

Edited by alby, 26 September 2010 - 09:50 AM.


#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:53 PM

Posted 26 September 2010 - 12:44 PM

Do you see this in the list>>> streamci.dll,

Scroll through the list and look for a startup entry related to the file(s) in the error message.
Right-click on the entry and choose delete. ---> streamci.dll,
Reboot your computer and see if the startup error returns.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 alby

alby
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 26 September 2010 - 11:09 PM

Thanks for the quick tip back.
I don't think streamci.dll was on the list, but at this time, I can't be sure it wasn't...
Peace be with you...

9/27 nope, no streamci in "everything" and there is nothing in the "Knowndll" tab?
and
Starting up into Windows not as usual...

Edited by alby, 27 September 2010 - 06:11 AM.


#9 alby

alby
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 28 September 2010 - 08:21 PM

OK, first, the "strangeness of Windows opening" due to a power surge.
Second, of course I can send a log of Autostarts
Third, using regedit find (and no other commands therein)
in: HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\SEARCH ASSISTANT\ACMrU\5603\are three ?symbols:
ab (Default) REG_SZ (value not set)
ab 001 REG_SZ (atf)
ab 002 REG_SZ (streamci)[/size][/size]

As with my ignorance of the "Error loading" implication, maybe a pointer to comprehend this?
Thank you, Boopme, for your patience...

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:53 PM

Posted 28 September 2010 - 08:31 PM

OK ,you may need to reinstall the streamci.dll file as it may be missing. Get it here

download streamci.dll to the folder c:\windows\system32
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 alby

alby
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Tijeras, NM
  • Local time:07:53 PM

Posted 29 September 2010 - 08:29 AM

Thanks for this!

OK, downloaded streamci as directed. Tried the Dell software for SoundMax again.
Tried this several times with no good result.
No results indicate the original rundll "error loading streamci."

Should/do you want to continue with this problem, or do I ask someone in another forum?

Edited by alby, 29 September 2010 - 05:46 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users