Multiple Malware Warnings TR/Dropper

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by flashstar, Dec 7, 2014.

  1. flashstar

    flashstar Private E-2

    Hi!, I´m receiving constantly Avira Warnings for TR/Dropper malware, I quarentine files but I keep receiving the messages, since I installed malwarebytes I get warnings of malware websites blocked even surfing in safe websites like google, Wikipedia etc. After scanning with all programs in the read me section the problem is not resolved. I uploaded all the logs here, I hope someone helps, Thanks!!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing much in the way of malware. Let's do this:

    Rerun RogueKiller and fix these items>
    Code:
    ¤¤¤ Registry : 23 ¤¤¤
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\1SecureIconsProvider | (default) : {FC9D8189-520A-4417-AED7-9EAC810C6FBA}  -> Found
    [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-119660604-1954836818-808663222-1001\Software\Microsoft\Windows\CurrentVersion\Run | AXworks : regsvr32.exe C:\Users\JoG\AppData\Local\AXworks\EP0NRE6G.DLL  -> Found
    [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-119660604-1954836818-808663222-1001\Software\Microsoft\Windows\CurrentVersion\Run | Abworks : C:\Windows\SysWOW64\regsvr32.exe C:\Users\JoG\AppData\Local\Ulmedia\dcru.DLL  -> Found
    [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-119660604-1954836818-808663222-1001\Software\Microsoft\Windows\CurrentVersion\Run | AXworks : regsvr32.exe C:\Users\JoG\AppData\Local\AXworks\EP0NRE6G.DLL  -> Found
    [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-119660604-1954836818-808663222-1001\Software\Microsoft\Windows\CurrentVersion\Run | Abworks : C:\Windows\SysWOW64\regsvr32.exe C:\Users\JoG\AppData\Local\Ulmedia\dcru.DLL  -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\etdrv (\??\C:\Windows\etdrv.sys) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\gdrv (\??\C:\Windows\gdrv.sys) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\GVTDrv64 (\??\C:\Windows\GVTDrv64.sys) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\etdrv (\??\C:\Windows\etdrv.sys) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\gdrv (\??\C:\Windows\gdrv.sys) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\GVTDrv64 (\??\C:\Windows\GVTDrv64.sys) -> Found
    [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-119660604-1954836818-808663222-1001\Software\Microsoft\Internet Explorer\Main | Start Page : [URL]http://google.com/[/URL]  -> Found
    Then rerun Hitman and have it fix all it finds.

    Reboot.

    Please download AdwCleaner by Xplode and save to your Desktop.
    • Double click on AdwCleaner.exe to run the tool.
      Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.


    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.

    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Reboot again and rerun RogueKiller and Hitman and attach those logs.

    Tell me what issues remain.
     
  3. flashstar

    flashstar Private E-2

    Sincé the latest scans I´ve received only one Avira alert about TR/Dropper in the last 15 min., it was less tan before but i don´t know if it´s solved, here are the scans. Hitmanpro didn´t detect anything
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Attach a log from Avira so I can see what it is complaining about.
     
  5. flashstar

    flashstar Private E-2

    Here they are, I didn´t get any new alert in the last hours though, I hope it´s resolved.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let me know if it happens again.
     
  7. flashstar

    flashstar Private E-2

    OK, thanks a lot!!
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds