Jump to content

Insistent malware


Go to solution Solved by andrzej1_1,

Recommended Posts

I downloaded some aggressive malware when looking for Android flashing software. I tried to remove it on my own, but still there is something that replace my Google search results and computer seems to be sluggish. I hope you (experts!) can tell me what should be removed additionally.

I attached FRST logs, let me know if I should attach something more.

FRST.txt Addition.txt Shortcut.txt

Link to post
Share on other sites

Hello @Percival and :welcome:

 

My name is MKDB and I will assist you.

  • Please follow the following steps and post back the logs as an attachment when ready. Thank you very much for your cooperation.
  • Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
  • Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
  • As English is not my native language, slang or idoms may be hard for me to understand.

 

 

I've noticed that you run FRST in safe mode (with networking). Please run the following steps in normal mode.

 

 

Step 1

  • If you already have Malwarebytes installed, then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet, please download it from here and install it.
  • Once the MBAM dashboard opens, click on Settings (gear icon).
  • Click on Security tab and make sure that all four Scan options are enabled.
  • Close Settings and click on the Scan button on the dashboard.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT button and save the file as a Text file to your desktop.
  • If there were detections then once the quarantine has completed click on the View report button, then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run, then please skip to the next step and let me know in your next reply that the scanner would not run.

 

 

 

Step 2

Please download AdwCleaner and save it to your desktop.

  • Double-click to run it.
  • Accept the End User License Agreement.
  • Click Scan Now.
  • When finished, if items are found please click Next / Quarantine.
  • Maybe your PC will be rebooted, AdwCleaner will be opened automatically.
  • Click View Log File.
  • AdwCleaner will open one log (AdwCleaner[Cxx].txt).
  • Please attach or copy its content to your next reply.

 

 

 

Step 3

  • Run FRST again.
  • Check the box in front of Shortcut.txt.
  • Press the Scan button.
  • FRST will create two logs now (FRST.txt + Addition.txt) in the same directory the tool is run.
  • Please attach these logfiles to your next reply.

 

 

 

 

 

 

Link to post
Share on other sites
  • Solution

@AdvancedSetup Sync was already disabled, so nothing to do.

I found that CryptoTokenExtension is part of Chromium source code:

I looked for cbor.js source code and it is herehttps://github.com/chromium/chromium/blob/d7da0240cae77824d1eda25745c4022757499131/chrome/browser/resources/cryptotoken/cbor.js

So in my case chrome-extension://kmendfapggjehodndflmmgagdbamhnfd/cbor.js was infected! The solution was to simply uninstall Google Chrome and install it again.

I wonder why no AV software was able to detect it...

Link to post
Share on other sites

I suggest you remove this Android flash software or do you need those files/folders any longer @andrzej1_1?

Spoiler

2021-06-10 10:34 - 2021-06-10 10:36 - 000000000 ____D C:\Users\Andrzej\Desktop\realme_flash_proj
2021-06-10 10:33 - 2021-06-10 10:33 - 000000000 ____D C:\Users\Andrzej\AppData\Roaming\NuGet
2021-06-10 10:33 - 2021-06-10 10:33 - 000000000 ____D C:\Users\Andrzej\AppData\Local\SymbolSourceSymbols
2021-06-10 10:33 - 2021-06-10 10:33 - 000000000 ____D C:\Users\Andrzej\AppData\Local\RefSrcSymbols
2021-06-10 10:33 - 2021-06-10 10:33 - 000000000 ____D C:\Users\Andrzej\AppData\Local\NuGet
2021-06-10 10:29 - 2021-06-10 10:29 - 000000000 ____D C:\Users\Andrzej\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\JetBrains
2021-06-10 10:28 - 2021-06-10 10:33 - 000000000 ____D C:\Users\Andrzej\AppData\Roaming\JetBrains
2021-06-10 10:28 - 2021-06-10 10:33 - 000000000 ____D C:\Users\Andrzej\AppData\Local\JetBrains
2021-06-10 10:28 - 2021-06-10 10:28 - 000000000 ____D C:\Users\Andrzej\AppData\Roaming\Progress
2021-06-10 10:28 - 2021-06-10 10:28 - 000000000 ____D C:\Users\Andrzej\AppData\Local\Progress_Software_Corpora
2021-06-10 10:07 - 2021-06-10 10:07 - 000000000 ____D C:\Users\Andrzej\Desktop\oppo_decrypt-master
2021-06-10 09:54 - 2021-06-10 09:54 - 000000000 ____D C:\Users\Andrzej\Desktop\realme flash
2021-06-09 22:44 - 2021-06-10 12:46 - 000001505 _____ C:\ToolLog.txt
2021-06-09 22:01 - 2021-06-09 22:01 - 000000000 ____H C:\Windows\system32\Drivers\Msft_User_WpdFs_01_11_00.Wdf
2021-05-26 16:38 - 2021-06-09 23:49 - 000000000 ____D C:\_r7p_FlashTool
2021-05-26 16:38 - 2021-05-21 04:56 - 000002519 _____ C:\Users\Andrzej\Desktop\_r7p_FlashTool_ru.lnk
2021-05-26 16:38 - 2021-05-12 16:17 - 000002096 _____ C:\Users\Andrzej\Desktop\_r7p_FlashTool_eng.lnk
2021-05-26 16:37 - 2021-05-26 16:36 - 453102911 _____ C:\r7p_FlashTool.exe

 

 

 

 

We are going to remove some orphans and check Windows system files, so the FRST-fix (Step 1) will take some time (probably > 10 min). Please be patient.

 

 

Step 1

  • Please download the attached fixlist.txt file and save it to the desktop or location where you ran FRST from.

Note: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

  • Close all open programs and save your work.
  • Run FRST again.
  • Press the Fix button only once and wait. Please be patient.
  • If the tool needs a restart, please make sure you let the system restart normally and let the tool complete its run after restart.
  • FRST will create one log now (Fixlog.txt) in the same directory the tool is run.
  • Please attach this logfile to your next reply.

 

 

 

Step 2

  • Run FRST again.
  • Do not change any settings.
  • Press the Scan button.
  • FRST will create two logs now (FRST.txt + Addition.txt) in the same directory the tool is run.
  • Please attach these logfiles to your next reply.

 

 

fixlist.txt

Edited by MKDB
Link to post
Share on other sites

Step 1

  • Right-Click on FRST64 and choose Rename.
  • Rename FRST64 into Uninstall.
  • Run Uninstall.
  • FRST and it’s files/folders will be deleted.
  • If the tool needs a restart, please make sure you let the system restart normally.

 

 

 

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection.

Thank you @andrzej1_1.

Edited by MKDB
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.