aklepatzky Posted December 19, 2017 ID:1192751 Share Posted December 19, 2017 Below you can find the requested files attatched and some other files that go with a brief explanation of the situation: I just bought a MSI notebook two days ago. Today I must admit, I was trying to download and crack MS Office using the Office Toolkit program. As soon as I opened the toolkit and selected activate, my laptop turned off and then I got the BSOD with a "critical error" message. My notebook rebooted automatically but is running noticeabily slower since the incident a couple of hours ago. I bought the Bit Defender antivirus along with the notebook so I performed a scan but found nothing. Nevertheless, as minutes went by I received 2 notifications of intends of infections by trojans. I have uninstalled the Office exe file I downloaded along with the Toolkit, deleted all the files I could in Temp. I have also noticed that when I enter the security section in the control panel I can read that it says: "Bit Defender firewall is not active" and "Bit Defender antivirus is not active". I pressed "activate" in both of those options but didn't get a response. However, hen I open the Bit Defender it says that my notebook is protected, so that's weird. You can also find attached other images with the following additional info related to them: I read in the Bit Defender : "El archivo C:\Users\Andrei\AppData\Local\Temp\518e6ef9-9cb6-45ed-9f86-1431c5f4cc8d.tmp está infectado con Trojan.Generic.19932993. El virus ha sido bloqueado con éxito y su PC ya está a salvo" and "El archivo C:\Users\Andrei\Downloads\Sin confirmar 74621.crdownload está infectado con Gen:Variant.Ursu.40791. El virus ha sido bloqueado con éxito y su PC ya está a salvo. Both mean that those files have been infected with a Trojan but the virus has been successfully blocked and the PC is supposedly "safe"...... Also, I found that the BD blocked 13 apps, all labelled as Malware. The last image is the BSDO I got. MWB scan log.txt Addition.txt FRST.txt Link to post Share on other sites More sharing options...
aklepatzky Posted December 19, 2017 Author ID:1192756 Share Posted December 19, 2017 ****Something important I just found out: in the local services folder I found an arabic-named program (something like "arabic characters" + "Microsoft Office" whose files are located in C:\Program Files\Common Files\microsoft shared. It appears to be run by something called "Click to run".I cant delete those files even when Im the admin.*** Link to post Share on other sites More sharing options...
sandy88 Posted December 19, 2017 ID:1192761 Share Posted December 19, 2017 Try To Scan With Rogue Killer CMD https://www.bleepingcomputer.com/download/roguekillercmd/ Launch "RogueKillerCMD.exe -scan" from Command Prompt Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted December 19, 2017 Root Admin ID:1192772 Share Posted December 19, 2017 Hello @aklepatzky Sorry to hear, but hopefully you've learned a lesson that theft, cracking, etc can be quite dangerous. There are infection out there that can and will encrypt all of your data and it may be impossible to recover the data. Let me give you these options before we go any further and you let me know when you need help or which step you want to try. Recovery options in Windows 10https://support.microsoft.com/en-us/help/12415/windows-10-recovery-options 1st Choice: Restore from a system restore point 2nd Choice: Scan for possible malware and remove 3rd Choice: Reset your PC How to Use All of Windows 10’s Backup and Recovery Toolshttps://www.howtogeek.com/220986/how-to-use-all-of-windows-10’s-backup-and-recovery-tools/ Further reading The complexity of finding, preventing, and cleanup from malware Thanks Ron Link to post Share on other sites More sharing options...
aklepatzky Posted December 19, 2017 Author ID:1192845 Share Posted December 19, 2017 5 hours ago, AdvancedSetup said: Hello @aklepatzky Sorry to hear, but hopefully you've learned a lesson that theft, cracking, etc can be quite dangerous. There are infection out there that can and will encrypt all of your data and it may be impossible to recover the data. Let me give you these options before we go any further and you let me know when you need help or which step you want to try. Recovery options in Windows 10https://support.microsoft.com/en-us/help/12415/windows-10-recovery-options 1st Choice: Restore from a system restore point 2nd Choice: Scan for possible malware and remove 3rd Choice: Reset your PC How to Use All of Windows 10’s Backup and Recovery Toolshttps://www.howtogeek.com/220986/how-to-use-all-of-windows-10’s-backup-and-recovery-tools/ Further reading The complexity of finding, preventing, and cleanup from malware Thanks Ron It seems that I cant choose the option 1 as I hadn't activated the recovery option before . The ideal solution would be number 2. How do I proceed next? Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted December 20, 2017 Root Admin ID:1193043 Share Posted December 20, 2017 Please run the following steps and post back the logs as an attachment when ready.STEP 01 If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. If you don't have Malwarebytes 3 installed yet please download it from here and install it. Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply. If Malwarebytes won't run then please skip to the next step and let me know on your next reply. STEP 02 Please download AdwCleaner by Malwarebytes and save the file to your Desktop. Right-click on the program and select Run as Administrator to start the tool. Accept the Terms of use. Wait until the database is updated. Click Scan. When finished, please click Clean. Your PC should reboot now if any items were found. After reboot, a log file will be opened. Copy its content into your next reply. RESTART THE COMPUTER before running Step 3 STEP 03 Please download the Farbar Recovery Scan Tool and save it to your desktop.Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit Double-click to run it. When the tool opens, click Yes to disclaimer. Press the Scan button. It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply. The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here. Please attach the Additions.txt log to your reply as well. Thanks Ron Link to post Share on other sites More sharing options...
aklepatzky Posted December 21, 2017 Author ID:1193322 Share Posted December 21, 2017 I have already performed the scans in steps 1 and 3 and posted the respective logs Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted December 21, 2017 Root Admin ID:1193366 Share Posted December 21, 2017 And I'd like you to run them again exactly as shown in my post #6 I don't need your old logs anymore Thank you Ron Link to post Share on other sites More sharing options...
Recommended Posts