Jump to content
dasmith60

MW Bytes Free 4.04 removed Hack Tool (Log Details Attached)

Recommended Posts

Here is my scan results. I would love to know where this came from as I am a Grad student and recently used support at Tech for BlackBoard and had trouble getting office 365 downloaded and complete. Student wrote a file and told me to use it for uninstalling and Installing ?

That is when the problems started?

Thanks

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 2/2/20
Scan Time: 8:38 PM
Log File: dfbaa8f6-4625-11ea-9e52-0071c20925bc.json

-Software Information-
Version: 4.0.4.49
Components Version: 1.0.810
Update Package Version: 1.0.18614
License: Free

-System Information-
OS: Windows 10 (Build 18362.628)
CPU: x64
File System: NTFS
User: DASOFFICE0918\dasmi

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 356191
Threats Detected: 17
Threats Quarantined: 17
Time Elapsed: 16 min, 16 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 1
PUP.Optional.Safely.Generic, HKU\S-1-5-21-2852233594-2661402965-3583355561-1004\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|ledpmklechmkjngjilbfpogiehjbemkj, Quarantined, 210, 723653, , , , 

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 2
PUP.Optional.Safely.Generic, C:\USERS\DASMI\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\USERS\DASMI\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\LEDPMKLECHMKJNGJILBFPOGIEHJBEMKJ, Quarantined, 210, 723653, 1.0.18614, , ame, 

File: 14
PUP.Optional.Safely.Generic, C:\USERS\DASMI\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\USERS\DASMI\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000005.ldb, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000030.log, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000032.ldb, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOCK, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\Users\dasmi\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000001, Quarantined, 210, 723653, , , , 
PUP.Optional.Safely.Generic, C:\USERS\DASMI\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\LEDPMKLECHMKJNGJILBFPOGIEHJBEMKJ\1.0.6_0\MANIFEST.JSON, Quarantined, 210, 723653, 1.0.18614, , ame, 
HackTool.Agent.KMS, C:\USERS\DASMI\APPDATA\LOCAL\TEMP\TEMP1_ONEDRIVE_2020-01-29.ZIP\OFFICE 2013-2019 C2R INSTALL V6.8.0\OINSTALL.EXE, Quarantined, 7631, 715409, 1.0.18614, 000000000000000000000008, dds, 00573154
HackTool.Agent.KMS, C:\USERS\DASMI\APPDATA\ROAMING\Microsoft\Windows\Recent\OneDrive_2020-01-29.zip.lnk, Quarantined, 7631, 715409, , , , 
HackTool.Agent.KMS, C:\USERS\DASMI\DOWNLOADS\ONEDRIVE_2020-01-29.ZIP, Quarantined, 7631, 715409, 1.0.18614, 000000000000000000000008, dds, 00573154

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)

Share this post


Link to post
Share on other sites

Hello, Welcome to Malwarebytes.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

There is no way to find out how you got infected.

We can only now check if other remnant items remains.

Download the Farbar Recovery Scan Tool (FRST).
Choose the 32 or 64 bit version for your system.
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

How to attach a file:
In the Reply section in the bottom of the topic Select Click the Choose a File.
Navigate to the location of the File.
Click the file. It will appear in section.
Click the Saving button.

Please attach the logs for my review.

Let me know what problems persists.

Wait for further instructions
====
 

Share this post


Link to post
Share on other sites

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Thanks

 

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.