Suspected follow on Trojan Agent attack

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by yabasha71, May 2, 2011.

  1. yabasha71

    yabasha71 Private E-2

    Hello -

    About a month ago my wife's laptop was hit by malware, after running the normal Major Geek Malware protocol, which SAS picked up a Trojan.Agent/Gen-CDesc[Gen] and MBAM identifed a Registry Data Items Infected. Both were quaratined and eliminated. The Computer ran fine for a few days until we left on holiday. We just returned and after the first start up and use the computer is acting loopy.
    Start up does a 3 minute blue screen pause which I have never seen before, actions such as starting programmes or the internet are abnormally slow and sound functionality does some really odd things.

    I did not remember the problems from before holidays and have unfortunalely run the Major Geek malware protocol again, logs attached below, clearly something is not right but not sure what is causing the dilemna.

    We believe the cause of the infection was from my daughter playing on a website called Monster High. We can't be sure but it is the only unusual website that was on the IE history log from prior to the event.

    Thank you in advance for your time and help




    Infections from early april issues listed below for reference. Do not have the combofix, rootrepeal or MGtools logs from this period unfortunately....
    ___________
    SAS identifed a Trojan.Agent/Gen-CDesc[Gen] within the following locations

    C:\PROGRAM FILES\MATLAB\R2008A\TOOLBOX\RTW\TARGETS\XPC\TARGET\BUILD\XPCBLOCKS\ADBBPCI20098.MEXW32
    C:\PROGRAM FILES\MATLAB\R2008A\TOOLBOX\RTW\TARGETS\XPC\TARGET\BUILD\XPCBLOCKS\ADCBDAS16JREXP.MEXW32

    and MBAM picked up a
    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\StartMenuLogoff (PUM.Hijack.StartMenu) -> Bad: (1) Good: (0) ->
     

    Attached Files:

  2. yabasha71

    yabasha71 Private E-2

    root repeal log attached here
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing any malware in your logs. I suggest you post in the software forum for further assistance.

    Since you are not having any malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0

    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  4. yabasha71

    yabasha71 Private E-2

    Thank you Tim for your help
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds