Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win32:Cryptor was found by AVG


  • Please log in to reply
6 replies to this topic

#1 isrgish

isrgish

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:07:35 PM

Posted 05 March 2018 - 02:14 PM

I realized that all my files and folders in the root of my SD cards where disapering and links were found in there stead. After running AVG it found Win32:Cryptor virus on all of them. I want to make sure that I got rid of this virus totally. I'm concerned that it came from my PC computer. What do I need to do to make sure it is gone.

 

The names of the files found by AVG end in *.scr and all the links that were created had something about this file in them. It also made the files and folders as system and hidden.

 

I don't have the links anymore as that was the first thing I deleted.

 

Thank You,


Edited by hamluis, 05 March 2018 - 02:29 PM.
Moved from Win 7 to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,255 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:06:35 PM

Posted 06 March 2018 - 06:24 AM

Welcome to BC....

 

Use the programs below to clean, remove adware and remove malware.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of Google Chrome and Avast.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Malwarebytes - Clean Mode

  • Download and install the free version of Malwarebytes
    Note: If you have Malwarebytes already installed, you don't need to install it again. Simply start from the next bullet point
  • Once Malwarebytes is installed, launch it and let it update its database. You might have to click on the little arrow by Scan Status in the middle right pane for it to do so
  • Once the database update is complete, click on the Scan tab, then select the Threat Scan button and click on Start Scan
  • Let the scan run, the time required to complete the scan depends of your system and computer specs
  • Once the scan is complete, make sure that the first checkbox at the top is checked (which will automatically check every detected item), then click on the Quarantine Selected button
    • If it asks you to restart your computer to complete the removal, do so
  • Click on Export Summary after the deletion (in the bottom-left corner) and select Copy to Clipboard. Paste the content in your next reply

Download 51a5f31352b88-icon_MBAR.pngMalwarebytes Anti-Rootkit (MBAR) to your desktop.

  • Warning! Malwarebytes Anti-Rootkit needs to be run from an account with administrator rights.
  • Double click on downloaded file. OK self extracting prompt.
  • MBAR will start. Click "Next" to continue.
  • Click in the following screen "Update" to obtain the latest malware definitions.
  • Once the update is complete select "Next" and click "Scan".
  • When the scan is finished and no malware has been found select "Exit".
  • If malware was detected, make sure to check all the items and click "Cleanup". Reboot your computer.
  • Open the MBAR folder located on your Desktop and paste the content of the following files in your next reply:
  • "mbar-log-{date} (xx-xx-xx).txt"

 

Download AdwCleaner by Xplode onto your desktop. (compatible with Windows 7, 8 and 10)

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

 

Download and run the FREE online scanner from Free Virus Scan | Online Virus Scan from ESET | ESET

  • Place a checkmark in YES, I accept the Terms of Use, then click Start. Wait for ESET Online Scanner to load its components.
  • Select Enable detection of potentially unwanted applications.
  • Click Advanced Settings, then place a checkmark in the following:
    • Remove found threats
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click Start to begin scanning.
  • ESET Online Scanner will start downloading signatures and scan. Please be patient, as this scan can take quite some time.
  • When the scan is done, click List threats (only available if ESET Online Scanner found something).
  • Click Export, then save the file to your desktop.
  • Click Back, then Finish to exit ESET Online Scanner.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 isrgish

isrgish
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:07:35 PM

Posted 06 March 2018 - 02:28 PM

 Free Virus Scan | Online Virus Scan from ESET | ESET was showing that AVG is installed on my computer and may cause instability I pressed ignore I hope that was OK.

 

Here are the logs of the other programs you suggested I run.

 

Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 3/6/18
Scan Time: 6:50 AM
Log File: 885fd9c2-2134-11e8-8d6d-b083fea6c97a.json
Administrator: Yes
 
-Software Information-
Version: 3.3.1.2183
Components Version: 1.0.262
Update Package Version: 1.0.4222
License: Trial
 
-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: srulyG\beigels
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 253443
Threats Detected: 62
Threats Quarantined: 62
Time Elapsed: 2 min, 27 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 11
PUP.Optional.Hicosmea, HKU\S-1-5-21-2779557678-3830489536-1879980627-1000_Classes\WOW6432NODE\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}, Quarantined, [989], [234782],1.0.4222
PUP.Optional.InstallCore, HKU\S-1-5-21-2779557678-3830489536-1879980627-1000\SOFTWARE\csastats, Quarantined, [2], [260986],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\ShoppingOptimizerBHO.DLL, Quarantined, [9710], [246152],1.0.4222
PUP.Optional.Hicosmea, HKU\S-1-5-21-2779557678-3830489536-1879980627-1000_Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}, Quarantined, [989], [234782],1.0.4222
PUP.Optional.InstallCore, HKU\S-1-5-21-2779557678-3830489536-1879980627-1000\SOFTWARE\PRODUCTSETUP, Quarantined, [2], [481004],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\ShoppingOptimizerBHO.DLL, Quarantined, [9710], [246152],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\CLASSES\APPID\ShoppingOptimizerBHO.DLL, Quarantined, [9710], [246152],1.0.4222
PUP.Optional.Hicosmea, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7806f5a2-b248-4896-cf82-75e4cb6480df}, Quarantined, [989], [257193],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\CLASSES\APPID\{EF6177BB-4B35-4A5B-9EE8-DE8AA6328442}, Quarantined, [9710], [169128],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{EF6177BB-4B35-4A5B-9EE8-DE8AA6328442}, Quarantined, [9710], [169128],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{EF6177BB-4B35-4A5B-9EE8-DE8AA6328442}, Quarantined, [9710], [169128],1.0.4222
 
Registry Value: 2
PUP.Optional.InstallCore, HKU\S-1-5-21-2779557678-3830489536-1879980627-1000\SOFTWARE\PRODUCTSETUP|TB, Quarantined, [2], [481004],1.0.4222
PUP.Optional.iDealsShoppingOptimizer, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|JID1-XNAJ4KGYF5WYHG@JETPACK, Quarantined, [9710], [239260],1.0.4222
 
Registry Data: 0
(No malicious items detected)
 
Data Stream: 0
(No malicious items detected)
 
Folder: 8
PUP.Optional.FasterWeb, C:\PROGRAM FILES\FASTER WEB, Quarantined, [11335], [182127],1.0.4222
PUP.Optional.FasterWeb, C:\PROGRAM FILES (X86)\FASTER WEB, Quarantined, [11335], [182127],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\_metadata, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\config, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\icons, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\USERS\BEIGELS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\KGDIPIFDDAIEDEHDPHNFLAPCINBNDGMB, Quarantined, [1401], [456843],1.0.4222
 
File: 41
PUP.Optional.FasterWeb, C:\Program Files (x86)\Faster Web\faster-web.xpi, Quarantined, [11335], [182127],1.0.4222
PUP.Optional.MindSpark.Generic, C:\USERS\BEIGELS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\USERS\BEIGELS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\USERS\BEIGELS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\SyncData.sqlite3, Replaced, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\USERS\BEIGELS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\KGDIPIFDDAIEDEHDPHNFLAPCINBNDGMB\13.421.12.42327_0\MANIFEST.JSON, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\config\config.json, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\config\extension-config.json, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\config\extension-dev-config.json, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\icons\icon128.png, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\icons\icon16.png, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\icons\icon19disabled.png, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\icons\icon19on.png, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\icons\icon48.png, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\ajax.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\background.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\chrome.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\content_script.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\dlp.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\dlpHelper.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\extension_detect.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\genericLoadRemoteSettings.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\index.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\initOfferCEF.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\logger.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\offerService.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\pageUtils.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\PartnerId.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\product.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\storage.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\TabManager.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\TemplateParser.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\ul.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\urlFragmentActions.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\urlUtils.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\util.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\js\webtooltabAPI.js, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\_metadata\verified_contents.json, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\dynamicNewTab.html, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\productnewtab.html, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.MindSpark.Generic, C:\Users\beigels\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgdipifddaiedehdphnflapcinbndgmb\13.421.12.42327_0\stubby.html, Quarantined, [1401], [456843],1.0.4222
PUP.Optional.InstallCore, C:\DOWNLOADS\WINZIP19TP.EXE, Quarantined, [2], [81004],1.0.4222
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)
 
 
Malwarebytes Anti-Rootkit BETA 1.10.3.1001
www.malwarebytes.org
 
Database version:
  main:    v2018.03.06.03
  rootkit: v2018.02.28.05
 
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 11.0.9600.18920
beigels :: SRULYG [administrator]
 
3/6/2018 7:22:00 AM
mbar-log-2018-03-06 (07-22-00).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 205067
Time elapsed: 14 minute(s), 37 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)
 
 
# AdwCleaner 7.0.8.0 - Logfile created on Tue Mar 06 16:38:54 2018
# Updated on 2018/08/02 by Malwarebytes 
# Database: 2018-03-05.3
# Running on Windows 7 Professional (X64)
# Mode: scan
 
***** [ Services ] *****
 
No malicious services found.
 
***** [ Folders ] *****
 
PUP.Optional.Legacy, C:\Users\beigels\AppData\Roaming\Desktopicon
 
 
***** [ Files ] *****
 
No malicious files found.
 
***** [ DLL ] *****
 
No malicious DLLs found.
 
***** [ WMI ] *****
 
No malicious WMI found.
 
***** [ Shortcuts ] *****
 
No malicious shortcuts found.
 
***** [ Tasks ] *****
 
No malicious tasks found.
 
***** [ Registry ] *****
 
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}
PUP.Optional.ByteFence, [Key] - HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Reason\ReasonByteFence
 
 
***** [ Firefox (and derivatives) ] *****
 
No malicious Firefox entries.
 
***** [ Chromium (and derivatives) ] *****
 
No malicious Chromium entries.
 
*************************
 
 
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt ##########
 
 
 
# AdwCleaner 7.0.8.0 - Logfile created on Tue Mar 06 16:39:28 2018
# Updated on 2018/08/02 by Malwarebytes 
# Running on Windows 7 Professional (X64)
# Mode: clean
 
***** [ Services ] *****
 
No malicious services deleted.
 
***** [ Folders ] *****
 
Deleted: C:\Users\beigels\AppData\Roaming\Desktopicon
 
 
***** [ Files ] *****
 
No malicious files deleted.
 
***** [ DLL ] *****
 
No malicious DLLs cleaned.
 
***** [ WMI ] *****
 
No malicious WMI cleaned.
 
***** [ Shortcuts ] *****
 
No malicious shortcuts cleaned.
 
***** [ Tasks ] *****
 
No malicious tasks deleted.
 
***** [ Registry ] *****
 
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}
Deleted: [Key] - HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Reason\ReasonByteFence
 
 
***** [ Firefox (and derivatives) ] *****
 
No malicious Firefox entries deleted.
 
***** [ Chromium (and derivatives) ] *****
 
No malicious Chromium entries deleted.
 
*************************
 
::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0
 
 
 
*************************
 
C:/AdwCleaner/AdwCleaner[S0].txt - [1359 B] - [2018/3/6 16:38:55]
 
 
########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########
 
 
 
ESET Log 03062018.txt
 
Log
Scan Log
Version of detection engine: 17012 (20180306)
Date: 3/6/2018  Time: 12:26:58 PM
Scanned disks, folders and files: Operating memory;C:\Boot sector;C:\
C:\Documents and Settings\All Users\Microsoft\Crypto\RSA\MachineKeys\374aa05d6da2df53268cfe7629c03a34_4031c8cf-7c04-411c-b44c-df06585090bf - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Crypto\RSA\MachineKeys\94261a6da5eaa252b7f90a1b6be6d9dc_4031c8cf-7c04-411c-b44c-df06585090bf - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Diagnosis\DownloadedSettings\telemetry.ASM-WindowsDefault.json - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.app.json - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Diagnosis\events00.rbs - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Diagnosis\events01.rbs - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Diagnosis\events10.rbs - unable to open [4]
C:\Documents and Settings\All Users\Microsoft\Diagnosis\events11.rbs - unable to open [4]
C:\Documents and Settings\beigels\AppData\Roaming\kingsoft\office6\update\down\wpsupdate.exe - a variant of Win32/KingSoft.D potentially unwanted application - action selection postponed until scan completion
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.5_41372.exe » ZIP » mediaelement/controls.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.5_41372.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.5_41865.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.8_42576.exe » ZIP » mediaelement/bigplay.fw.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.8_42576.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.9_43295.exe » ZIP » mediaelement/bigplay.fw.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.9_43295.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.9_43388.exe » ZIP » mediaelement/bigplay.fw.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.4.9_43388.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_43580.exe » ZIP » mediaelement/bigplay.fw.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_43580.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_43804.exe » ZIP » open-sans-light.eot - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_43804.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_43916.exe » ZIP » mediaelement/bigplay.fw.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_43916.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_44090.exe » ZIP » open-sans-light.eot - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_44090.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_44294.exe » ZIP » open-sans-light.eot - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.0_44294.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.1_44332.exe » ZIP » open-sans-light.eot - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.1_44332.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.3_44358.exe » ZIP » mediaelement/bigplay.fw.png - archive damaged - the file could not be extracted.
C:\Documents and Settings\beigels\AppData\Roaming\uTorrent\updates\3.5.3_44358.exe » ZIP »  - archive damaged
C:\Documents and Settings\beigels\Application Data\kingsoft\office6\update\down\wpsupdate.exe - a variant of Win32/KingSoft.D potentially unwanted application - action selection postponed until scan completion
C:\Downloads\ccsetup510.exe » NSIS » PF-Toolbar-W78.exe - Win32/Bundled.Toolbar.Google.D potentially unsafe application - action selection postponed until scan completion
C:\hiberfil.sys - unable to open [4]
C:\Me\Downloads\avc-free.exe » INNO » {tmp}\OCSetupHlp.dll - a variant of Win32/OpenCandy.A potentially unsafe application - action selection postponed until scan completion
C:\Me\Downloads\ccsetup532.exe » NSIS » PF-Toolbar-2016.exe - Win32/Bundled.Toolbar.Google.D potentially unsafe application - action selection postponed until scan completion
C:\Me\Downloads\ccsetup540pro.exe » NSIS » PF-Toolbar-2016.exe - Win32/Bundled.Toolbar.Google.D potentially unsafe application - action selection postponed until scan completion
C:\Me\Downloads\KingoRoot.exe - Win32/InstallCore.Gen.A potentially unwanted application - action selection postponed until scan completion
C:\Me\Downloads\rcsetup152.exe » NSIS » PF-Toolbar-W78.exe - Win32/Bundled.Toolbar.Google.D potentially unsafe application - action selection postponed until scan completion
C:\Me\Lexar\Id.txt.lnk - LNK/Agent.AO trojan - cleaned by deleting [1]
C:\Me\Old Computer\Me\new\Downloads\ccsetup312.exe » NSIS » PRFB-IEToolbar.exe - Win32/Bundled.Toolbar.Google.E potentially unsafe application - action selection postponed until scan completion
C:\Me\Old Computer\Me\new\Downloads\ccsetup324.exe » NSIS » PRFB-IEToolbar.exe - Win32/Bundled.Toolbar.Google.E potentially unsafe application - action selection postponed until scan completion
C:\Me\Old Computer\Me\new\Downloads\ccsetup401.exe » NSIS » PF-Toolbar-W78.exe - Win32/Bundled.Toolbar.Google.D potentially unsafe application - action selection postponed until scan completion
C:\Me\Old Computer\Me\new\Downloads\chromeinstall-6u27.exe » CAB » jusched - archive damaged - the file could not be extracted.
C:\Me\Old Computer\Me\new\Downloads\chromeinstall-6u27.exe » CAB » task.xml - archive damaged - the file could not be extracted.
C:\Me\Old Computer\Me\new\Downloads\chromeinstall-6u27.exe » CAB » task64.xml - archive damaged - the file could not be extracted.
C:\Me\Old Computer\Me\new\Downloads\chromeinstall-7u25.exe » CAB » jusched - archive damaged - the file could not be extracted.
C:\Me\Old Computer\Me\new\Downloads\chromeinstall-7u25.exe » CAB » task.xml - archive damaged - the file could not be extracted.
C:\Me\Old Computer\Me\new\Downloads\chromeinstall-7u25.exe » CAB » task64.xml - archive damaged - the file could not be extracted.
C:\Me\Old Computer\Me\new\Downloads\PhotoScape_V3.6.2.exe » NSIS » Mooii_Toolbar_Omaha.exe - Win32/Bundled.Toolbar.Google.D potentially unsafe application - action selection postponed until scan completion
C:\Me\Old Computer\Me\pdbtools.exe » INNO » setup.data - unsupported option
C:\Microsoft Toolkit 2.5.3 Official Torrent\Microsoft Toolkit.exe » SMARTASSEMBLY » deobfuscated.exe - a variant of MSIL/HackKMS.G potentially unsafe application - action selection postponed until scan completion
C:\pagefile.sys - unable to open [4]
C:\Program Files (x86)\Dell Backup and Recovery\Components\DBRUpdate\Updates\DBR_17560_1928_x64_Update.exe » INDIGOROSE - archive damaged
C:\Program Files (x86)\Dell Backup and Recovery\Components\DBRUpdate\Updates\DBRFactorySetupUpdate.exe » INDIGOROSE - archive damaged
C:\Program Files (x86)\Dell Backup and Recovery\Components\DBRUpdate\Updates\STUpdateNotifier_DBAR18.exe » INDIGOROSE - archive damaged
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\374aa05d6da2df53268cfe7629c03a34_4031c8cf-7c04-411c-b44c-df06585090bf - unable to open [4]
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\94261a6da5eaa252b7f90a1b6be6d9dc_4031c8cf-7c04-411c-b44c-df06585090bf - unable to open [4]
C:\ProgramData\Microsoft\Diagnosis\DownloadedSettings\telemetry.ASM-WindowsDefault.json - unable to open [4]
C:\ProgramData\Microsoft\Diagnosis\DownloadedSettings\utc.app.json - unable to open [4]
C:\ProgramData\Microsoft\Diagnosis\events00.rbs - unable to open [4]
C:\ProgramData\Microsoft\Diagnosis\events01.rbs - unable to open [4]
C:\ProgramData\Microsoft\Diagnosis\events10.rbs - unable to open [4]
C:\ProgramData\Microsoft\Diagnosis\events11.rbs - unable to open [4]
C:\System Volume Information\MountPointManagerRemoteDatabase - unable to open [4]
C:\System Volume Information\Syscache.hve - unable to open [4]
C:\System Volume Information\Syscache.hve.LOG1 - unable to open [4]
C:\System Volume Information\Syscache.hve.LOG2 - unable to open [4]
C:\System Volume Information\{3808876b-c176-4e48-b7ae-04046e6cc752} - unable to open [4]
C:\System Volume Information\{71e3fd34-1c23-11e8-9471-b083fea6c97a}{3808876b-c176-4e48-b7ae-04046e6cc752} - unable to open [4]
C:\System Volume Information\{71e3fd38-1c23-11e8-9471-b083fea6c97a}{3808876b-c176-4e48-b7ae-04046e6cc752} - unable to open [4]
C:\System Volume Information\{7bafb500-16af-11e8-8b76-b083fea6c97a}{3808876b-c176-4e48-b7ae-04046e6cc752} - unable to open [4]
C:\System Volume Information\{c5583c19-1b8e-11e8-840f-b083fea6c97a}{3808876b-c176-4e48-b7ae-04046e6cc752} - unable to open [4]
C:\System Volume Information\{c958f212-2097-11e8-9c67-b083fea6c97a}{3808876b-c176-4e48-b7ae-04046e6cc752} - unable to open [4]
C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\374aa05d6da2df53268cfe7629c03a34_4031c8cf-7c04-411c-b44c-df06585090bf - unable to open [4]
C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\94261a6da5eaa252b7f90a1b6be6d9dc_4031c8cf-7c04-411c-b44c-df06585090bf - unable to open [4]
C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\telemetry.ASM-WindowsDefault.json - unable to open [4]
C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.app.json - unable to open [4]
C:\Users\All Users\Microsoft\Diagnosis\events00.rbs - unable to open [4]
C:\Users\All Users\Microsoft\Diagnosis\events01.rbs - unable to open [4]
C:\Users\All Users\Microsoft\Diagnosis\events10.rbs - unable to open [4]
C:\Users\All Users\Microsoft\Diagnosis\events11.rbs - unable to open [4]
C:\Users\beigels\AppData\Roaming\kingsoft\office6\update\down\wpsupdate.exe - a variant of Win32/KingSoft.D potentially unwanted application - action selection postponed until scan completion
C:\Users\beigels\Application Data\kingsoft\office6\update\down\wpsupdate.exe - a variant of Win32/KingSoft.D potentially unwanted application - action selection postponed until scan completion
C:\Windows\AutoKMS\AutoKMS.exe » SMARTASSEMBLY » deobfuscated.exe - a variant of MSIL/HackKMS.H potentially unsafe application - action selection postponed until scan completion
C:\Windows\CSC\v2.0.6\pq - unable to open [4]
C:\Windows\CSC\v2.0.6\temp\ea-{48219d68-ef42-11e4-8465-901e1819ed3f} - unable to open [4]
C:\Windows\Installer\33df7ea6.msi » MSI » Binary.dumper.js - Win32/Adware.Hicosmea.I application - action selection postponed until scan completion
C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagLog.etl - unable to open [4]
C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagtrack-Listener.etl - unable to open [4]
C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-Application.etl - unable to open [4]
C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl - unable to open [4]
C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-System.etl - unable to open [4]
C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTUBPM.etl - unable to open [4]
Number of scanned objects: 842495
Number of threats found: 18
Number of cleaned objects: 15
Time of completion: 2:22:50 PM  Total scanning time: 6952 sec (01:55:52)
 
Notes:
[1] Object has been deleted as it only contained the virus body.
[4] Object cannot be opened. It may be in use by another application or operating system.
 
*************END***************


#4 buddy215

buddy215

  • Moderator
  • 13,255 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:06:35 PM

Posted 06 March 2018 - 03:09 PM

Due to scan results I think it best you start a new topic in the malware removal forum. Along with FRST logs include the Eset scan results in your opening

post.

 

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.

  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 6 there are instructions for downloading and running FRST which will create two logs.

When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.

Start a new topic, give it a relevant title and post your log(s) along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. If you cannot produce any of the required logs...start the new topic anyway. Explain that you followed the Prep. Guide, were unable to create the logs, and describe what happened when you tried to create them. A member of the Malware Removal Team will walk you through, step by step, on how to clean your computer.

After doing this, please reply back in this thread with a link to the new topic so we can close this one.

 

DO NOT bump your new topic. Wait for a response from one of the Team Members.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#5 isrgish

isrgish
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:07:35 PM

Posted 06 March 2018 - 05:04 PM

What do I call this infection that I have? Should I call it  Win32:Cryptor?



#6 isrgish

isrgish
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:07:35 PM

Posted 06 March 2018 - 05:54 PM

This is the new post I posted 

 

https://www.bleepingcomputer.com/forums/t/672480/win32cryptor-was-found-by-avg-made-all-filesfolders-hidden-and-system/



#7 isrgish

isrgish
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:07:35 PM

Posted 19 March 2018 - 03:54 PM

Now it moved to this post.

 

https://www.bleepingcomputer.com/forums/t/672903/win32cryptor-was-found-by-avg-made-all-filesfolders-hidden-and-system/






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users