Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Check OS status after ransonware ACCDFISA v2.0 attack


  • This topic is locked This topic is locked
3 replies to this topic

#1 merced25

merced25

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 19 December 2017 - 02:28 PM

Hello, we have been victims of a ransomware. I suspect that in addition to encrypting a large number of files which we were able to recover thanks to a backup modified parts of the operating system. I need to help me identify what services, executables, scheduled tasks and others were done. What I have noticed is that some hidden folders were created that I already deleted. A scheduled task named CreateExplorerShellUnelevatedTask and some services that are renamed (their termination after deleting them) UnistoreSvc_690c9, PimIndexMaintenanceSvc_690c9, WpnUserService_690c9, OneSyncSvc_690c9, CDPUserSvc_690c9.
The OS is a Windows Server 2016. Thank you very much!

Edited by hamluis, 22 December 2017 - 06:04 AM.
Moved from MRL to Ransomware - Hamluis.


BC AdBot (Login to Remove)

 


#2 merced25

merced25
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 21 December 2017 - 10:23 PM

Hello, sorry for the insistence, can someone help me? Thank you very much


Edited by merced25, 21 December 2017 - 10:23 PM.


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,469 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:10 PM

Posted 22 December 2017 - 08:39 AM

Your topic was moved back to this forum by another Moderator because you failed to follow the instructions provided in the Malware Removal and Log Section Preparation Guide which included running FRST and posting it's log there for review by one of our malware removal experts.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,469 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:10 PM

Posted 22 December 2017 - 10:59 AM


I have moved (split away) your FRST log(s) to the Virus, Trojan, Spyware, and Malware Removal Logs forum as they are not permitted in this forum.

Please go here, click on the Follow this topic button in the upper right corner and select Immediate Notification to subscribe to that topic so you are notified when a helper replies.

Now that your new topic is posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Response Team member...nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the information or any log(s) you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process or make things worst which would extend the time it takes to clean your computer.

From this point on the Malware Response Team should be the only members that you take advice from, until they have verified your system is clean.

Please be patient. It may take several days to get a response because the Malware Response Team members are very busy working logs posted before yours. They are volunteers but your topic will be reviewed and answered as soon as possible. Once you have posted your log and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Response Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Response Team member is already assisting you and not open the thread to respond.

I advise checking your new topic once a day for responses as the e-mail notification system is unreliable.

If HelpBot replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.

To avoid confusion, I am closing this topic.

Good luck.
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users