Patched.b.gen Trojan with eset nod32

Posted on 2012-08-14
Last Modified: 2012-09-11
Eset kept saying services.exe had patched.b.gen Trojan
I ran the steps in

Once completed with full scan the desktop.ini was stated to have infiltration
So I removed it.  
Then eset would not load correctly saying services wouldn't load.  So I tried to repair eset but it said it couldn't.  I then uninstalled eset an reinstalled.  At that point it said it had an mbr type root kit however the full scan prior to reinstall should nothing.   What is a good program to use to clean this up?  
I will check back at work tomorrow an see but it has me stomped.  Thanks for any solution.
Question by:TechyT
    LVL 38

    Accepted Solution

    Here are some basic steps you can take: Rogue-Killer-What-a-great-name Stop-the-Bleeding-First-Aid-for-Malware

    Please review and post back any questions you have. If you do run any of the tools/scanners recommended, please post the logs generated here for us to review.

    I just started testing a new tool that looks promising. Please read about it and give it a try:
    "Emsisoft Emergency Kit 2.0"

    Author Closing Comment

    thanks I got it resolved!!!
    LVL 1

    Expert Comment

    If none of the files above do it for you, I just removed this using Combofix.  You can download it here.  Run with caution.  A couple times I had Combofix remove infected system files that really messed up the system.  Both times I was able recover by re-installing the latest OS service pack.
    LVL 38

    Expert Comment

    @cdeme123 -
    If you will read the EE Articles I linked in my comment above, you will see the reference to using ComboFix - along with the proper links for downloading it (with instructions).

    Please be aware that it never enough to tell someone to "run this" or "run that". Many variants of malware will block the tools/scanners from running and that is why I recommend one of the 'rogue process stoppers' before doing scans.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
    Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
    This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
    In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now