Help with Trojan horse Dropper.Generic_c.MMI..FRST File attached. Thanks!

Discussion in 'Malware Help (A Specialist Will Reply)' started by lilair101, Aug 8, 2012.

  1. lilair101

    lilair101 Private E-2

    I unfortunately also have the Trojan Dropper virus :/ any help would ve VERY appreciated! Thanks :)
    BTW the FRST log is attached
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  3. lilair101

    lilair101 Private E-2

    My apologies, i definitely should have done that at first! However AVG still says that i have the trojan in services.exe
    any suggestions? thanks!
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    -------------------------------

    • Now re-run RogueKiller - no fix just a scan and attach the log.
    • Re-run FRST - no fix, just a scan and attach the log.
    • Run HitmanPro and have it fix all that it finds. (See further down for a list of what I am referring to, leave everything else alone)
    • Let me know how things are running at this point.

    Code:
    C:\ProgramData\Microsoft\Windows\DRM\957C.tmp
    C:\ProgramData\Microsoft\Windows\DRM\957D.tmp
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\U\80000000.@
    C:\windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\U\80000064.@
    C:\Program Files (x86)\PricePeep\ (Adware.ClickPotato)
    C:\Program Files (x86)\PricePeep\installer.ico (Adware.ClickPotato)
    C:\Program Files (x86)\PricePeep\pricepeep.crx (Adware.ClickPotato)
    C:\Program Files (x86)\PricePeep\uninstall.exe (Adware.ClickPotato)
    C:\Users\Matt\AppData\Local\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\@ (ZeroAccess)
    C:\Users\Matt\AppData\Local\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\L\ (ZeroAccess)
    C:\Users\Matt\AppData\Local\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\U\ (ZeroAccess)
    C:\Windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\@ (ZeroAccess)
    C:\Windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\L\ (ZeroAccess)
    C:\windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\L\00000004.@ (ZeroAccess)
    C:\windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\L\201d3dde (ZeroAccess)
    C:\Windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\U\ (ZeroAccess)
    C:\windows\Installer\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\U\00000004.@ (ZeroAccess)
    HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PricePeep\ (Adware.ClickPotato)
     

    Attached Files:

  5. lilair101

    lilair101 Private E-2

    Thanks for the reply. I've done everything and everything seems to be running smoothly. Just to be sure i ran another AVG scan and it says that services.exe has the trojan but it was quarantined by FRST. Is this okay??
    I've also attached the logs asked for.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes that's fine about FRST snagging the bad services.exe, which is what we wanted! :)


    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate this 1 detection:
    • [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Matt\AppData\Local\{2d42da1e-730b-c3d7-a821-8c4b29e46821}\n.) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine
    Now re run RogueKiller, just a scan, no fix and attach log.



    Now, you did not run FRST properly, so.....
    Run it again in the correct way and attach the log.
     
  7. lilair101

    lilair101 Private E-2

    oh my bad! here are the logs
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Everything running well?
     
  9. lilair101

    lilair101 Private E-2

    yeah everythings great :) thanks so much!!
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Most welcome. ;)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds