Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Win32:Malware-gen and Win32:Dropper-gen [Drp]

  • This topic is locked This topic is locked
2 replies to this topic

#1 Strained to See

Strained to See

  • Members
  • 10 posts
  • Gender:Male
  • Local time:04:30 AM

Posted 07 September 2014 - 12:56 PM

 Yesterday I used the System Recovery "destructive recovery option" so that  I could put it back to the way it was when it was first bought. After that I spent a while removing the stuff that HP adds that I don't need, only after I removed pretty much everything not needed, I put my scanning programs on an ran scans.


 Malwarebytes Anti-Malware and SUPERAntiSpyware Free Edition found nothing, but Avast Free found "Win32:Adware-gen [Adw] in C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP16\A0005131.exe" an moved it to virus chest. After that avast wanted to do a boot-time scan, so I allowd it an that's when it found the other infections.


Copy of aswBoot (Avast Boot-time scan Log)


09/06/2014 12:45
Scan of all local drives

File C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP16\A0005209.exe|>$_OUTDIR\Windows\FastLane\FastLane.msi|>Data1.cab|>IPHook32.dll is infected by Win32:Dropper-gen [Drp], Moved to chest
File C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP16\A0005209.exe|>$_OUTDIR\Windows\access\SpywareBlocker.msi|>Data1.cab|>SpywareBlocker.exe|>[UPX] is infected by Win32:Malware-gen, Moved to chest
File D:\PRELOAD\BASE_18.INP|>unidrvui.dll Error 42127 {CAB archive is corrupted.}
Number of searched folders: 3124
Number of tested files: 309503
Number of infected files: 2


 It says both we're sent to the virus chest, but some reason when I read the boot-time scan log through avast instead of the "aswBoot.txt" like I did above, it says the 1st one "Win32:Dropper-gen [Drp]" was sent to the virus chest but the 2nd one it says "Error: The system cannot find the file specified (2)". I've ran avast again a few times an the only thing it mentions is the "File D:\PRELOAD\BASE_18.INP|>unidrvui.dll Error 42127 {CAB archive is corrupted.}", doesn't detect any more infections.


I'll list all the scans I've done afterwards in case that helps you guys.

  • MBAM (found nothing)
  • SUPERAntiSpyware Free Editon (just cookies, no infections)
  • Avast Full Scan and Boot-time Scan (nothing for full scan and only that corrupted archive for boot-time scan)
  • Trend Micro Housecall (nothing found)


I'd also like to add that I never once tried to connect it to the internet after doing the system recovery, I only connected to it after avast found those files so I could update my progarms an scan again. I originally just installed my programs from a disk I made.




DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.67.2
Run by HP_Administrator at 12:10:38 on 2014-09-07
Microsoft Windows XP Professional  5.1.2600.2.1252.1.1033.18.958.382 [GMT -5:00]
AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
============== Running Processes ================
C:\Program Files\Sandboxie\SbieSvc.exe
C:\Program Files\AVAST Software\Avast\AvastSvc.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\AVAST Software\Avast\AvastUI.exe
C:\Program Files\Sandboxie\SbieCtrl.exe
C:\Program Files\Sandboxie\SandboxieRpcSs.exe
C:\Program Files\Sandboxie\SandboxieDcomLaunch.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Sandboxie\SbieSvc.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\system32\svchost.exe -k imgsvc
============== Pseudo HJT Report ===============
uStart Page = about:blank
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [SandboxieControl] "c:\program files\sandboxie\SbieCtrl.exe"
mRun: [PCDrProfiler] <no file>
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-Explorer: NoDriveTypeAutoRun = dword:149
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
TCP: NameServer =
TCP: Interfaces\{892900FC-9814-4488-99C0-81491C1EE93D} : DHCPNameServer =
TCP: Interfaces\{913594F0-57DE-49C4-9386-4AA676EBD50E} : DHCPNameServer =
Notify: AtiExtEvent - Ati2evxx.dll
SEH: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - c:\program files\superantispyware\SASSEH.DLL
================= FIREFOX ===================
FF - ProfilePath - c:\documents and settings\hp_administrator\application data\mozilla\firefox\profiles\jh9a8e37.default\
FF - prefs.js: browser.startup.homepage - hxxps://www.google.com/
FF - plugin: c:\program files\java\jre7\bin\dtplugin\npdeployJava1.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_14_0_0_179.dll
============= SERVICES / DRIVERS ===============
R0 aswRvrt;avast! Revert;c:\windows\system32\drivers\aswRvrt.sys [2014-9-6 49944]
R0 aswVmm;avast! VM Monitor;c:\windows\system32\drivers\aswVmm.sys [2014-9-6 192352]
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2014-9-6 779536]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswsp.sys [2014-9-6 414520]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R2 aswHwid;avast! HardwareID;c:\windows\system32\drivers\aswHwid.sys [2014-9-6 24184]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2014-9-6 67824]
R2 avast! Antivirus;avast! Antivirus;c:\program files\avast software\avast\AvastSvc.exe [2014-9-6 50344]
R3 SbieDrv;SbieDrv;c:\program files\sandboxie\SbieDrv.sys [2012-12-16 157776]
S3 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2014-7-22 142648]
S3 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
=============== Created Last 30 ================
2014-09-06 21:42:26    145408    ----a-w-    c:\windows\system32\javacpl.cpl
2014-09-06 21:42:18    96680    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2014-09-06 21:31:13    71344    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2014-09-06 21:31:13    699568    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2014-09-06 21:30:21    --------    d-----w-    c:\documents and settings\hp_administrator\local settings\application data\Adobe
2014-09-06 20:58:25    --------    d-----w-    C:\temp
2014-09-06 20:18:48    24184    ----a-w-    c:\windows\system32\drivers\aswHwid.sys
2014-09-06 20:18:43    43152    ----a-w-    c:\windows\avastSS.scr
2014-09-06 20:11:23    --------    d-----r-    C:\Sandbox
2014-09-06 20:04:06    --------    d-----w-    c:\program files\Sandboxie
2014-09-06 17:18:23    --------    d-----w-    c:\documents and settings\hp_administrator\application data\AVAST Software
2014-09-06 17:18:03    779536    ----a-w-    c:\windows\system32\drivers\aswSnx.sys
2014-09-06 17:18:03    192352    ----a-w-    c:\windows\system32\drivers\aswVmm.sys
2014-09-06 17:18:02    67824    ----a-w-    c:\windows\system32\drivers\aswMonFlt.sys
2014-09-06 17:18:02    49944    ----a-w-    c:\windows\system32\drivers\aswRvrt.sys
2014-09-06 17:17:57    --------    d-----w-    c:\program files\CodeStuff
2014-09-06 17:17:39    --------    d-----w-    c:\program files\AVAST Software
2014-09-06 17:17:12    388096    ----a-r-    c:\documents and settings\hp_administrator\application data\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2014-09-06 17:17:11    --------    d-----w-    c:\program files\Trend Micro
2014-09-06 17:17:03    --------    d-----w-    c:\documents and settings\all users\application data\AVAST Software
2014-09-06 17:14:05    --------    d-----w-    c:\documents and settings\hp_administrator\application data\SUPERAntiSpyware.com
2014-09-06 17:13:54    --------    d-----w-    c:\program files\SUPERAntiSpyware
2014-09-06 17:13:54    --------    d-----w-    c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2014-09-06 17:02:16    110296    ----a-w-    c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-09-06 17:02:06    53208    ----a-w-    c:\windows\system32\drivers\mbamchameleon.sys
2014-09-06 17:02:06    23256    ----a-w-    c:\windows\system32\drivers\mbam.sys
2014-09-06 17:02:05    --------    d-----w-    c:\program files\Malwarebytes Anti-Malware
2014-09-06 17:02:05    --------    d-----w-    c:\documents and settings\all users\application data\Malwarebytes
2014-09-06 16:55:15    --------    d-----w-    c:\documents and settings\hp_administrator\application data\HPQ
2014-09-06 16:22:31    --------    d-----w-    c:\windows\system32\appmgmt
2014-09-06 16:17:33    --------    d-sh--r-    C:\cmdcons
2014-09-06 16:17:30    --------    d-----w-    c:\windows\setup.pss
2014-09-06 16:10:22    --------    d-sh--w-    c:\documents and settings\hp_administrator\PrivacIE
2014-09-06 16:01:04    12160    ----a-w-    c:\windows\system32\drivers\mouhid.sys
2014-09-06 16:00:59    9600    ----a-w-    c:\windows\system32\drivers\hidusb.sys
2014-09-06 15:29:33    --------    d-sh--w-    c:\documents and settings\hp_administrator\IETldCache
2014-09-06 15:27:02    --------    dc-h--w-    c:\windows\ie8
2014-09-06 15:10:49    --------    d-----w-    c:\program files\CONEXANT
2014-09-06 14:54:06    --------    d-----w-    c:\windows\I386
2014-09-06 14:45:52    --------    d-----r-    c:\documents and settings\all users\Documents
2014-09-06 14:44:52    --------    d-----r-    c:\windows\Offline Web Pages
2014-09-06 14:43:48    --------    d-sh--r-    c:\windows\system32\dllcache
==================== Find3M  ====================
============= FINISH: 12:10:49.42 ===============



Attached File  attach.txt   5.63KB   0 downloads


I hope I was able to give enough information, thanks to anyone that helps me figure out if my computer is clean or there's still more infection.




Edit: Fixed a typo.

Edited by Strained to See, 07 September 2014 - 03:27 PM.

BC AdBot (Login to Remove)



#2 nasdaq


  • Malware Response Team
  • 38,223 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:30 AM

Posted 12 September 2014 - 09:18 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

How is the computer running?
Wait for further instructions.

#3 nasdaq


  • Malware Response Team
  • 38,223 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:30 AM

Posted 17 September 2014 - 08:21 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users