Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Found Trojans, Removed with MBAM, What do you guys think?


  • This topic is locked This topic is locked
2 replies to this topic

#1 jerrymck

jerrymck

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:07 AM

Posted 09 June 2015 - 06:23 PM

Hi, so I found about 34 Trojans on my clients pc. I removed them with mbam, currently running mbam again.

I ran RKILL, ADWCleaner, about to run SPYBOT S&D, and JRT last.

here is the log from MBAM

 

 

"Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 6/9/2015
Scan Time: 3:47:25 PM
Logfile: trojans.txt
Administrator: Yes

Version: 2.01.4.1018
Malware Database: v2015.06.09.06
Rootkit Database: v2015.06.02.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Administrator

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 482941
Time Elapsed: 15 min, 35 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 1
Trojan.FakeJava.ED, C:\Users\kaycee\AppData\Local\svcxdcl32.exe, 12264, , [efbbbff9a6e4f3437fd3f97357ab39c7]

Modules: 13
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Udkmedia\lmdcisrm.dll, , [1c8e2e8a2b5f8bab158879d6bf4301ff],

Registry Keys: 1
Trojan.FakeMS.ED, HKU\S-1-5-21-515967899-1563985344-725345543-1113_Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}, , [713975434b3f50e6e96a16560ef401ff],

Registry Values: 5
Trojan.FakeJava.ED, HKU\S-1-5-21-515967899-1563985344-725345543-1113\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Svc2dll, C:\Users\kaycee\AppData\Local\svcxdcl32.exe, , [efbbbff9a6e4f3437fd3f97357ab39c7]
Trojan.Ransom.CryptoWall, HKU\S-1-5-21-515967899-1563985344-725345543-1113\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|CryptoUpdate, C:\Windows\system32\regsvr32.exe /s "C:\Users\kaycee\AppData\Roaming\Microsoft\Crypto\RSA\cert_v128_0.tpl", , [6446fdbb91f9de5805790f7385809f61]
Trojan.Ransom.CryptoWall, HKU\S-1-5-21-515967899-1563985344-725345543-1113\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|CryptoUpdate, C:\Windows\system32\regsvr32.exe /s "C:\Users\kaycee\AppData\Roaming\Microsoft\Crypto\RSA\cert_v128_0.tpl", , [6446fdbb91f9de5805790f7385809f61]
Rootkit.Fileless.MTGen, HKU\S-1-5-21-515967899-1563985344-725345543-1113\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|^86d9866a, , [9d0dac0c6b1f0f27ce1931519273b34d],
Rootkit.Fileless.MTGen, HKU\S-1-5-21-515967899-1563985344-725345543-1113\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|^5ba7ed19, , [8921d9dffb8f2412aa3d87fb9a6b25db],

Registry Data: 0
(No malicious items detected)

Folders: 1
Trojan.Clicker.FMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}, , [f8b216a27b0fdc5a864f5e8017eca25e],

Files: 11
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Ozlqics\njpqoqtt.dll, , [1a90ceea93f71a1cdebf054afa0842be],
Trojan.FakeJava.ED, C:\Users\kaycee\AppData\Local\svcxdcl32.exe, , [efbbbff9a6e4f3437fd3f97357ab39c7],
Trojan.Miuref, C:\Users\kaycee\AppData\Local\Udkmedia\lmdcisrm.dll, , [1c8e2e8a2b5f8bab158879d6bf4301ff],
Trojan.FakeMS.ED, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\atidemgy.dll, , [713975434b3f50e6e96a16560ef401ff],
Trojan.FakeJava.ED, C:\$Recycle.Bin\S-1-5-21-515967899-1563985344-725345543-1113\$RJL0JB2.exe, , [ffab86327a101521be94bbb11ee4a957],
Trojan.FakeJava.ED, C:\$Recycle.Bin\S-1-5-21-515967899-1563985344-725345543-1113\$REF0N87.exe, , [3c6e6058d5b593a32d250f5d15edaf51],
Trojan.Ransom.ED, C:\$Recycle.Bin\S-1-5-21-515967899-1563985344-725345543-1113\$RFHIFG5\tmpA2E6.exe, , [7d2d0fa9553553e3471a984a8e733cc4],
Trojan.Inject, C:\$Recycle.Bin\S-1-5-21-515967899-1563985344-725345543-1113\$RFHIFG5\obupdat.exe, , [6a400eaaa8e2cb6beb4d94684cb5639d],
Trojan.Agent, C:\Users\kaycee\AppData\Local\svcxdcl32.dat, , [8c1e199f206a5ed8d2609a85ae566d93],
Trojan.Ransom.CryptoWall, C:\Users\kaycee\AppData\Roaming\Microsoft\Crypto\RSA\cert_v128_0.tpl, , [6446fdbb91f9de5805790f7385809f61],
Trojan.Clicker.FMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\8afc49b02429a, , [f8b216a27b0fdc5a864f5e8017eca25e],

Physical Sectors: 0
(No malicious items detected)

(end)"


Craigslist PC Technicians be like "Oh you have a virus? Let me defrag your hard drive and delete unused desktop icons for you. And if you're lucky, I'll even empty your recycling bin! :smash:


BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 38,940 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:07 AM

Posted 13 June 2015 - 09:52 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

ADWCleaner, about to run SPYBOT S&D, and JRT last


If these programs have been run and cleaned please run this tool and post the logs for my review.

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===

How is the computer running now?

#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,940 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:07 AM

Posted 19 June 2015 - 08:52 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users