Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

trojan.dropper.bcminer


  • Please log in to reply
2 replies to this topic

#1 klutch24

klutch24

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:09:14 AM

Posted 09 July 2012 - 05:20 PM

I am currently having trouble with a particular Trojan called trojan.dropper.bcminer. i am using maleware bytes anti maleware software to try and combat this pesky bug with little success. Each time I restart my computer it refreshes itself and i am looking for a way to get rid of it.

thank you
terry

Edited by hamluis, 09 July 2012 - 05:26 PM.
Moved from Win 7 to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 klutch24

klutch24
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:09:14 AM

Posted 09 July 2012 - 08:25 PM

here is a copy of the malware log. I hope it may shed a little more light on the matter.

thank you,
TERRY

Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Database version: v2012.07.09.10

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
My Computer :: MYCOMPUTER-PC [administrator]

7/9/2012 5:43:14 PM
mbam-log-2012-07-09 (17-43-14).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 210228
Time elapsed: 3 minute(s), 33 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Windows\Installer\{a2d8084d-c4fd-0a56-dcb8-2a0e980e3c62}\U\00000008.@ (Trojan.Dropper.BCMiner) -> Quarantined and deleted successfully.

(end)

It shows that it was quarantined and deleted. although, after the prompted restart the trojan is detected once again.

#3 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 35,076 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:07:14 AM

Posted 09 July 2012 - 08:38 PM

Welcome aboard Posted Image

This type of infection will require elevated help.

Please follow the instructions in ==>This Guide<== starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif







0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users