Jump to content

Infected with fileless(?) malware

Recommended Posts

So i opened a .exe installer and when i realized, it was a virus. By reopening the virus .exe inside a VM and using Sandboxie i was able to figure out a couple of things. One was what files the malware added/modified, which i'll attach here. After a lot of research i deleted all of the contents inside the CatRoot2 folder, the folder with the .exe inside Temp, all of the contents inside the CryptnetUrlCache folder, and lastly "ModuleAnalysisCache" inside the Powershell folder. I don't know if it's safe to delete "StartupProfileData-NonInteractive" so i didn't. Also deleted an added entry in the Task Scheduler to run the .exe inside Temp every hour.

The second thing i figured was that the malware opened PowerShell which well, opens a whole new can of worms i guess. I tried to read the logs that were left in AppData but they were gibberish to me, i'll attach them just in case they help in any way.

I ran Malwarebytes on my entire C drive and only detected a couple of false positives i recognized from years ago. Also ran Kaspersky Virus Removal Tool and apparently it found one infected process in my memory but it didn't give me any details, i cleaned it up just in case.

Tried to run FRST64 but it kept freezing and being unresponsive for 15+ minutes, the only way i could finish it up was in safe mode unfortunately. Attaching all logs below.

Some things i'm noticing, the start menu search generally doesn't work, sometimes it's fixed if i start ctfmon.exe manually but even then sometimes it still doesn't work. Tried to sfc /scannow and it fixed some things but couldn't fix others. Ran DISM /RestoreHealth and apparently everything was ok, but i still can't complete sfc /scannow.

Running shell:startup on Windows + R now gives me an error, and from reading briefly in the sfc log some permissions in that folder were altered, tried to figure it out but couldn't.

Any help is appreciated!




Addition.txt FRST.txt Malwarebytes.txt powershell.exe.log redshift_v3.0.66_setup.exe.log wfyoot.exe.log

Link to post
Share on other sites

  • Root Admin

Hello  and  :welcome:      @Guayabo


My screen name is AdvancedSetup and I will assist you with your system issues.

Let's keep these principles as we proceed. Make sure to read the entire post below first.

  • Please follow all steps in the provided order and post back all requested logs
  • Please attach all log files to your post, unless otherwise requested
  • Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans have been completed.
  • Temporarily disable Microsoft SmartScreen to download the software below if needed. Make sure to turn it back on once the scans are completed.
  • Searching, detecting, and removing malware isn't instantaneous and there is no guarantee to repair every system.
  • Before we start, please make sure that you have an external backup, not connected to this system, of all private data.
  • Do not run online games while the case is ongoing. Do not do any free-wheeling or risky web-surfing.
  • Only run the tools I guide you to use. Please don't run any other scans, download, install or uninstall any programs while I'm working with you.
  • Cracked, Hacked, or Pirated programs are not only illegal but also can make a computer a malware victim. Having such programs installed is the easiest way to get infected. It is the leading cause of ransomware encryption. It is at times also a big source of current Trojan infections. If there are any on the system you should uninstall them before we proceed.
  • Please be patient and stick with me until I give you the "all clear". We don't want to waste your time, please don't waste ours.
  • If your system is running Discord, please be sure to Exit it while this case is ongoing.




Difficult to say what might be going on. Reading articles on the Web and then just randomly deleting stuff is not the best way to handle something like that.

If you want these files you should consider placing them in a dedicated folder. Batch or command files in the root of the ProgramData folder are prime for abuse and deletion by security software.

2021-11-05 11:30 - 2021-11-05 11:30 - 000000329 _____ () C:\ProgramData\temp_Delete.bat
2021-11-05 11:30 - 2021-11-05 11:30 - 000000096 _____ () C:\ProgramData\temp_runbat.vbs

Please uninstall Java from your Control Panel. Once we're done if you want Java you can reinstall the latest version.


Please run the following fix below. Once the fix has been completed, attach the FIXLOG.TXT file for review.


Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.
NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

Please make sure you disable any real-time antivirus or security software before running this script. Once completed, make sure you re-enable it.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1:  This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The use of an external password manager is highly recommended instead of using your browser to store passwords.

NOTE-3: As part of this fix it will also reset the network to default settings including the firewall. If you have custom firewall rules you need to save please export or save them first before running this fix.

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome, and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Discord cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.




Link to post
Share on other sites

  • 1 month later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection



Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.