Jump to content

Bought Premium and now hit with Ransomware - Help

Recommended Posts

I was infected with the Medusa ransomware in June.  I purchased Malwarebytes premium and cleaned my machine.  I had good backups so I reinstalled my corrupted files and thought I was now protected.  On September 2nd I was shocked to see I was again infected with a ransomware. This time it was JeppersCrypt ransomware.  All my files were encrypted with the file extension "grgr".  When I logged into my machine I found the add-remove programs window open and my Malware-bytes program had been removed.

Again, I was running Malwarebytes premium and doing a scan each night.  Nothing suspicious was ever found.

How can this happen?  Very disappointed with this product.


Link to post
Share on other sites

First thing to do is use the following site to officially identify the ransomware. https://id-ransomware.malwarehunterteam.com/

17 minutes ago, scamp2032 said:

I was infected with the Medusa ransomware in June.

18 minutes ago, scamp2032 said:

I had good backups so I reinstalled my corrupted files

Do you have current backups this time?




Link to post
Share on other sites

2 minutes ago, scamp2032 said:

Yes, I have current backups.

I am glad to hear that. The best protection is current backups that are not attached.

I personally Image my computer on a monthly basis like my life depended on it.

As for how you were infected, Most ransomware comes from email attachments. Do you remember opening one before this happened?


Link to post
Share on other sites

No, I removed the ransomware using Malwarebytes.  My backup consists of individual files.

My only concern now is that there is still a .bat file running somewhere that will occasionally log me off and open my desktop folder.  I'm assuming it's looking for the folder that the Medusalocker installed onto my desktop called JeppersCrypt.  That folder is no longer on my desktop so the .bat file just stops at that point.

Link to post
Share on other sites

1 minute ago, scamp2032 said:

My only concern now is that there is still a .bat file running somewhere that will occasionally log me off and open my desktop folder.  I'm assuming it's looking for the folder that the Medusalocker installed onto my desktop called JeppersCrypt.  That folder is no longer on my desktop so the .bat file just stops at that point.

Do not connect or restore the files yet. Do the following and a malware removal expert will assist.

Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system.

You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens click Yes to the disclaimer.
  • Press the Scan button.


  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've run it before it may not and you may need to select it manually
  • Please attach both logs to your reply if possible. Otherwise, you may copy/paste the logs directly if you have to, but an attachment is better.
  • To save attachments please click the link as shown below. Then browse to where your file is located and select it and click the Open button.



Link to post
Share on other sites

Hello scamp2032,

Continue with the following:

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.

NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed.

The following directories are emptied:
  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.


Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes quarantine any found entries...

To get the log from Malwarebytes do the following:
  • Click on the Report tab > from main interface.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
  • Right-click on AdwCleaner.exe and select Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Download "Microsoft's Safety Scanner" and save direct to the desktop

Ensure to get the correct version for your system....


Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.

Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\msert.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

Let me see those logs in your reply....

Thank you,





Link to post
Share on other sites

8 hours ago, kevinf80 said:

Let me see those logs in your reply....

Thank you,


Thank you.  Here is the information you requested.


-Log Details-
Scan Date: 9/5/20
Scan Time: 9:01 AM
Log File: 01111dc2-ef91-11ea-98fc-d4bed99a17bb.json

-Software Information-
Components Version: 1.0.1036
Update Package Version: 1.0.29483
License: Premium

-System Information-
OS: Windows 10 (Build 19041.450)
CPU: x64
File System: NTFS
User: Admin-PC\Admin

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 416559
Threats Detected: 0
Threats Quarantined: 0
Time Elapsed: 33 min, 4 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 0
(No malicious items detected)

File: 0
(No malicious items detected)

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


# -------------------------------
# Malwarebytes AdwCleaner
# -------------------------------
# Build:    07-22-2020
# Database: 2020-07-20.1 (Cloud)
# Support:  https://www.malwarebytes.com/support
# -------------------------------
# Mode: Clean
# -------------------------------
# Start:    09-05-2020
# Duration: 00:00:11
# OS:       Windows 10 Pro
# Cleaned:  105
# Failed:   3

***** [ Services ] *****

No malicious services cleaned.

***** [ Folders ] *****

Deleted       C:\Users\Admin\AppData\Local\jZip
Deleted       C:\Users\Admin\AppData\Roaming\Yahoo!\Companion

***** [ Files ] *****

No malicious files cleaned.

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks cleaned.

***** [ Registry ] *****

Deleted       HKCU\Software\AppDataLow\Software\Yahoo\Companion
Deleted       HKCU\Software\Yahoo\Companion
Deleted       HKCU\Software\Yahoo\YFriendsBar
Deleted       HKCU\Software\jZip
Deleted       HKLM\SOFTWARE\Classes\AppID\TbCommonUtils.DLL
Deleted       HKLM\SOFTWARE\Classes\AppID\TbHelper.EXE
Deleted       HKLM\SOFTWARE\Classes\AppID\YMERemote.DLL
Deleted       HKLM\SOFTWARE\RegisteredApplications|jZip
Deleted       HKLM\Software\Classes\AppID\{7D831388-D405-4272-9511-A07440AD2927}
Deleted       HKLM\Software\Classes\CLSID\{A2970C7C-8392-4E6F-8B51-B763CF38E13C}
Deleted       HKLM\Software\Classes\Interface\{01221FCC-4BFB-461C-B08C-F6D2DF309921}
Deleted       HKLM\Software\Classes\Interface\{0FA32667-9A8A-4E9C-902F-CA3323180003}
Deleted       HKLM\Software\Classes\Interface\{1231839B-064E-4788-B865-465A1B5266FD}
Deleted       HKLM\Software\Classes\Interface\{2A42D13C-D427-4787-821B-CF6973855778}
Deleted       HKLM\Software\Classes\Interface\{2DAC2231-CC35-482B-97C5-CED1D4185080}
Deleted       HKLM\Software\Classes\Interface\{3D8478AA-7B88-48A9-8BCB-B85D594411EC}
Deleted       HKLM\Software\Classes\Interface\{3F1CD84C-04A3-4EA0-9EA1-7D134FD66C82}
Deleted       HKLM\Software\Classes\Interface\{3F83A9CA-B5F0-44EC-9357-35BB3E84B07F}
Deleted       HKLM\Software\Classes\Interface\{452AE416-9A97-44CA-93DA-D0F15C36254F}
Deleted       HKLM\Software\Classes\Interface\{45CDA4F7-594C-49A0-AAD1-8224517FE979}
Deleted       HKLM\Software\Classes\Interface\{47E520EA-CAD2-4F51-8F30-613B3A1C33EB}
Deleted       HKLM\Software\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
Deleted       HKLM\Software\Classes\Interface\{4D8ED2B3-DC62-43EC-ABA3-5B74F046B1BE}
Deleted       HKLM\Software\Classes\Interface\{57C91446-8D81-4156-A70E-624551442DE9}
Deleted       HKLM\Software\Classes\Interface\{6B458F62-592F-4B25-8967-E6A350A59328}
Deleted       HKLM\Software\Classes\Interface\{70AFB7B2-9FB5-4A70-905B-0E9576142E1D}
Deleted       HKLM\Software\Classes\Interface\{7AD65FD1-79E0-406D-B03C-DD7C14726D69}
Deleted       HKLM\Software\Classes\Interface\{81E852CC-1FD5-4004-8761-79A48B975E29}
Deleted       HKLM\Software\Classes\Interface\{8233093C-178B-484B-979E-3C6B5B147DBC}
Deleted       HKLM\Software\Classes\Interface\{95B6A271-FEB4-4160-B0FF-44394C21C8DC}
Deleted       HKLM\Software\Classes\Interface\{97DD820D-2E20-40AD-B01E-6730B2FCE630}
Deleted       HKLM\Software\Classes\Interface\{B177446D-54A4-4869-BABC-8566110B4BE0}
Deleted       HKLM\Software\Classes\Interface\{B2CA345D-ADB8-4F5D-AC64-4AB34322F659}
Deleted       HKLM\Software\Classes\Interface\{B9F43021-60D4-42A6-A065-9BA37F38AC47}
Deleted       HKLM\Software\Classes\Interface\{BF921DD3-732A-4A11-933B-A5EA49F2FD2C}
Deleted       HKLM\Software\Classes\Interface\{D83B296A-2FA6-425B-8AE8-A1F33D99FBD6}
Deleted       HKLM\Software\Classes\Interface\{D9D1DFC5-502D-43E4-B1BB-4D0B7841489A}
Deleted       HKLM\Software\Classes\Interface\{E0B07188-A528-4F9E-B2F7-C7FDE8680AE4}
Deleted       HKLM\Software\Classes\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}
Deleted       HKLM\Software\Classes\Interface\{F05B12E1-ADE8-4485-B45B-898748B53C37}
Deleted       HKLM\Software\Classes\Interface\{FCC9CDD3-EFFF-11D1-A9F0-00A0244AC403}
Deleted       HKLM\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
Deleted       HKLM\Software\Classes\TypeLib\{B722ED8B-0B38-408E-BB89-260C73BCF3D4}
Deleted       HKLM\Software\Classes\TypeLib\{B87F8B63-7274-43FD-87FA-09D3B7496148}
Deleted       HKLM\Software\Classes\TypeLib\{C4BAE205-5E02-4E32-876E-F34B4E2D000C}
Deleted       HKLM\Software\Classes\TypeLib\{EC4085F2-8DB3-45A6-AD0B-CA289F3C5D7E}
Deleted       HKLM\Software\Classes\jZip.file
Deleted       HKLM\Software\Wow6432Node\Yahoo\Companion
Deleted       HKLM\Software\Wow6432Node\\Classes\AppID\TbCommonUtils.DLL
Deleted       HKLM\Software\Wow6432Node\\Classes\AppID\TbHelper.EXE
Deleted       HKLM\Software\Wow6432Node\\Classes\AppID\YMERemote.DLL
Deleted       HKLM\Software\Wow6432Node\\Classes\AppID\{7D831388-D405-4272-9511-A07440AD2927}
Deleted       HKLM\Software\Wow6432Node\\Classes\CLSID\{A2970C7C-8392-4E6F-8B51-B763CF38E13C}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{01221FCC-4BFB-461C-B08C-F6D2DF309921}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{0FA32667-9A8A-4E9C-902F-CA3323180003}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{2A42D13C-D427-4787-821B-CF6973855778}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{3D8478AA-7B88-48A9-8BCB-B85D594411EC}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{452AE416-9A97-44CA-93DA-D0F15C36254F}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{45CDA4F7-594C-49A0-AAD1-8224517FE979}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{4D8ED2B3-DC62-43EC-ABA3-5B74F046B1BE}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{6B458F62-592F-4B25-8967-E6A350A59328}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{81E852CC-1FD5-4004-8761-79A48B975E29}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{8233093C-178B-484B-979E-3C6B5B147DBC}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{95B6A271-FEB4-4160-B0FF-44394C21C8DC}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{B2CA345D-ADB8-4F5D-AC64-4AB34322F659}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{B9F43021-60D4-42A6-A065-9BA37F38AC47}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{BF921DD3-732A-4A11-933B-A5EA49F2FD2C}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{D83B296A-2FA6-425B-8AE8-A1F33D99FBD6}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{E67D5BC7-7129-493E-9281-F47BDAFACE4F}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{FCC9CDD3-EFFF-11D1-A9F0-00A0244AC403}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{B722ED8B-0B38-408E-BB89-260C73BCF3D4}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{B87F8B63-7274-43FD-87FA-09D3B7496148}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{C4BAE205-5E02-4E32-876E-F34B4E2D000C}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{EC4085F2-8DB3-45A6-AD0B-CA289F3C5D7E}
Deleted       HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Deleted       HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Ext\Preapproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Deleted       HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Ext\Preapproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Deleted       HKLM\Software\Wow6432Node\\RegisteredApplications|jZip
Deleted       HKLM\Software\Wow6432Node\jZip

***** [ Chromium (and derivatives) ] *****

Deleted       MSN Homepage & Bing Search Engine - fcfenmboojpjinhpgggodefccipikbpd

***** [ Chromium URLs ] *****

No malicious Chromium URLs cleaned.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries cleaned.

***** [ Firefox URLs ] *****

No malicious Firefox URLs cleaned.

***** [ Hosts File Entries ] *****

No malicious hosts file entries cleaned.

***** [ Preinstalled Software ] *****

Deleted       Preinstalled.DellCustomerConnect   Folder   C:\Program Files (x86)\DELL CUSTOMER CONNECT
Deleted       Preinstalled.DellCustomerConnect   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{04A41EBC-AB30-4574-A14D-E0CDFE31AB70}
Deleted       Preinstalled.DellPhotoStage   Folder   C:\DELL\PHOTOSTAGE
Deleted       Preinstalled.DellSupportAssistAgent   Folder   C:\Program Files (x86)\DELL\SUPPORTASSISTAGENT
Deleted       Preinstalled.DellSupportAssistAgent   Folder   C:\Program Files\DELL\SAREMEDIATION\AUDIT
Deleted       Preinstalled.DellSupportAssistAgent   Folder   C:\Program Files\DELL\SUPPORTASSIST
Deleted       Preinstalled.DellSupportAssistAgent   Folder   C:\Program Files\DELL\SUPPORTASSISTAGENT
Deleted       Preinstalled.DellSupportAssistAgent   Folder   C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DELL\SUPPORTASSIST
Deleted       Preinstalled.DellSupportAssistAgent   Registry   HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{6DE68941-66DE-48DE-9C80-FE60C9DE0AD4}
Deleted       Preinstalled.DellSupportAssistAgent   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{287348C8-8B47-4C36-AF28-441A3B7D8722}
Deleted       Preinstalled.DellSupportAssistAgent   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{A62A2F03-3006-40CA-A3FA-C1086B2FEF5D}
Deleted       Preinstalled.DellSupportAssistAgent   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{B57A8AFE-6735-4497-BD52-BD2F838F5CF0}
Deleted       Preinstalled.DellSupportCenter   Registry   HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{0090A87C-3E0E-43D4-AA71-A71B06563A4A}
Deleted       Preinstalled.DellUpdateforWindows10   Folder   C:\Program Files (x86)\DELL\UPDATE
Deleted       Preinstalled.DellUpdateforWindows10   Folder   C:\ProgramData\DELL\UPDATE
Deleted       Preinstalled.DellUpdateforWindows10   Folder   C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DELL\UPDATE
Deleted       Preinstalled.DellUpdateforWindows10   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{5EBBC1DA-975F-44A0-B438-F325BCD45577}
Deleted       Preinstalled.HPHealthCheck   Folder   C:\Program Files (x86)\HEWLETT-PACKARD\HP HEALTH CHECK
Deleted       Preinstalled.HPHealthCheck   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{6F340107-F9AA-47C6-B54C-C3A19F11553F}
Deleted       Preinstalled.HPSupportAssistant   Registry   HKLM\Software\Wow6432Node\\Classes\CLSID\{335F9A62-FE4B-40CD-B4ED-BB4DE21DC95D}
Deleted       Preinstalled.HPSupportAssistant   Registry   HKLM\Software\Wow6432Node\\Classes\CLSID\{C0ABBA07-B636-47B8-B9E1-BB96D7CD4831}
Not Deleted   Preinstalled.DellSupportAssistAgent   Folder   C:\Program Files\DELL\SAREMEDIATION\PLUGIN
Not Deleted   Preinstalled.DellUpdateforWindows10   Folder   C:\Program Files (x86)\DELL\UPDATESERVICE
Not Deleted   Preinstalled.DellUpdateforWindows10   Folder   C:\ProgramData\DELL\UPDATESERVICE


[+] Delete Tracing Keys
[+] Reset Winsock


AdwCleaner[S00].txt - [12705 octets] - [05/09/2020 09:48:21]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ##########


Fixlog.txt msert.log

Link to post
Share on other sites

I'm still having issues.  Today I stepped away from my computer and noticed I was logged off when I came back.  I couldn't log in back in because the user "Localhost" denied my login attempt.  I immediately turned my PC off and then back on.  I was then able to log in.  I checked my user account settings and found a user called "Localhost" had been added at some point with Administrator privileges.  I deleted this user immediately.  I have no idea how or when the user account was created.

Any ideas??  I did another Malwarebytes scan upon seeing this and nothing was found.

Link to post
Share on other sites

Hello scamp2032,

Continue with the following:

Run FRST one more time, ensure all boxes are checkmarked under "Whitelist" but only Addition.txt under "Optional scan" Select scan, when done post the new logs. "FRST.txt" and "Addition.txt"


user posted imageScan with Autoruns

Please download Sysinternals Autoruns from the following link: https://live.sysinternals.com/autoruns.exe save it to your desktop.

Note: If using Windows Vista, Windows 7, Windows 8/8.1 or Windows 10 then you also need to do the following:
  • Right-click on Autoruns.exe and select Properties
  • Click on the Compatibility tab
  • Under Privilege Level check the box next to Run this program as an administrator
  • Click on Apply then click OK
  • Double-click Autoruns.exe to run it.
  • Once it starts, please press the Esc key on your keyboard.
  • Now that scanning is stopped, click on the Options button at the top of the program and verify that the following are checked, if they are unchecked, check them:

    Hide empty locations
    Hide Windows entries

  • Click on the Options button at the top of the program and select Scan Options... then in the Autoruns Scan Options dialog enable/check the following two options:

    Verify code signatures
    Check VirusTotal.com

  • Once that's done click the Rescan button at the bottom of the Autoruns Scan Options dialog and this will start the scan again, this time let it finish.
  • When it's finished and says Ready. on the lower left of the program window, please click on the File button at the top of the program and select Save and save the file to your desktop and close Autoruns.
  • Right click on the file on your desktop that you just saved and hover your mouse over Send To and select Compressed (zipped) Folder
  • Attach the ZIP folder you just created to your next reply

Let me see those logs in your reply...

Thank you,

Link to post
Share on other sites

Hello scamp2032,

Those logs are clean, nothing of note... Continue:

Download Kaspersky Virus Removal Tool (KVRT) from here: https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool and save to your Desktop.

Select the Windows Key and R Key together, the "Run" box should open.

user posted image

Drag and Drop KVRT.exe into the Run Box.

user posted image

C:\Users\{your user name}\DESKTOP\KVRT.exe will now show in the run box.

user posted image

add -dontcryptsupportinfo Note the space between KVRT.exe and -dontcryptsupportinfo

C:\Users\{your user name}\DESKTOP\KVRT.exe -dontcryptsupportinfo should now show in the Run box.

user posted image

That addendum to the run command is very important, when the scan does eventually complete the resultant report is normally encrypted, with the extra command it is saved as a readable file.

Reports are saved here C:\KVRT_data\Reports and look similar to this report_20200727_103821.klr Right click direct onto that report, select > open with > Notepad. Save that file and attach to your reply.

To start the scan select OK in the "Run" box.

user posted image

The Windows Protected your PC window will open, select "More Info"

user posted image

A new Window will open, select "Run anyway"

user posted image

A EULA window will open, tick both confirmation boxes then select "Accept"

user posted image

In the new window select "Change Parameters"

user posted image

In the new window ensure all selection boxes are ticked, then select "OK" The scan should now start...

user posted image

When complete if entries are found there will be options, if "Cure" is offered leave as is. For any other options change to "Delete" then select "Continue"

user posted image

When complete, or if nothing was found select "Close"
Thank you,
Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.