This are the files I had including some invisible script files and one other, I didn’t have all the files that it says here, just 3 of them.
http://www.drwebhk.com/en/virus_techinfo/Trojan.KillProc.23266.html
http://processchecker.com/file/winsvchost.exe.html
“%APPDATA%\Adobex86\invis.vbs” “%APPDATA%\Adobex86\bat.exe”’
30 C:\Users\username\AppData\Roaming\Adobex86\winsvchost.exe 5068 E0EBEA73CB8BAE113923DDD672456406
31 C:\Users\username\AppData\Roaming\Adobex86\winsvchost.exe 5068 E0EBEA73CB8BAE113923DDD672456406
32 C:\Users\username\AppData\Roaming\Adobex86\winsvchost.exe 5068 E0EBEA73CB8BAE113923DDD672456406
I deleted everything I found.
This process as I remember had Bitcoin farmer process on some site as it took 2.5GB of ram and it ran, not CPU % process what so ever.
My comodo antivirus didn’t detect of the process nore any of the after effects.
I used tdskiller , it didn’t find anything, not files, not hidden partitions.
this is the log :
23:44:18.0724 0x1280 KLMD registered as C:\Windows\system32\drivers\58412091.sys
23:44:18.0880 0x1280 System UUID: {66BFCA02-16F6-36E2-E934-43771ECB8AD1}
23:44:19.0345 0x1280 Drive \Device\Harddisk0\DR0 - Size: 0x3B9E656000 (238.47 Gb), SectorSize: 0x200, Cylinders: 0x799A, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type ‘K0’, Flags 0x00000040
23:44:19.0359 0x1280 Drive \Device\Harddisk1\DR1 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type ‘K0’, Flags 0x00000040
23:44:19.0359 0x1280 Drive \Device\Harddisk2\DR2 - Size: 0x2BAA2200000 (2794.53 Gb), SectorSize: 0x200, Cylinders: 0x59103, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type ‘K0’, Flags 0x00000040
23:44:19.0361 0x1280 ============================================================
23:44:19.0362 0x1280 \Device\Harddisk0\DR0:
23:44:19.0362 0x1280 MBR partitions:
23:44:19.0362 0x1280 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x32000
23:44:19.0362 0x1280 \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x32800, BlocksNum 0x1DCEF800
23:44:19.0362 0x1280 \Device\Harddisk1\DR1:
23:44:19.0362 0x1280 MBR partitions:
23:44:19.0362 0x1280 \Device\Harddisk1\DR1\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x3A385000
23:44:19.0362 0x1280 \Device\Harddisk2\DR2:
23:44:19.0362 0x1280 GPT partitions:
23:44:19.0362 0x1280 \Device\Harddisk2\DR2\Partition1: GPT, TypeGUID: {E3C9E316-0B5C-4DB8-817D-F92DF00215AE}, UniqueGUID: {9D610991-05F7-43AD-BA2A-1B52E11F0083}, Name: Microsoft reserved partition, StartLBA 0x22, BlocksNum 0x40000
23:44:19.0362 0x1280 \Device\Harddisk2\DR2\Partition2: GPT, TypeGUID: {EBD0A0A2-B9E5-4433-87C0-68B6B72699C7}, UniqueGUID: {99B2DC5B-2A3F-405B-8FF2-BA8FA5359DA9}, Name: Basic data partition, StartLBA 0x40800, BlocksNum 0x5D4D0000
23:44:19.0362 0x1280 MBR partitions:
23:44:19.0362 0x1280 ============================================================
23:44:19.0363 0x1280 C: ↔ \Device\Harddisk0\DR0\Partition2
23:44:19.0379 0x1280 D: ↔ \Device\Harddisk1\DR1\Partition1
23:44:19.0410 0x1280 F: ↔ \Device\Harddisk2\DR2\Partition2
23:44:46.0803 0x143c ================ Scan MBR ==================================
23:44:46.0804 0x143c [ B1F7D7F6E4FBE98E578562A22A94D02C ] \Device\Harddisk0\DR0
23:44:46.0971 0x143c \Device\Harddisk0\DR0 - ok
23:44:46.0980 0x143c [ A36C5E4F47E84449FF07ED3517B43A31 ] \Device\Harddisk1\DR1
23:44:47.0294 0x143c \Device\Harddisk1\DR1 - ok
23:44:47.0295 0x143c [ 5FB38429D5D77768867C76DCBDB35194 ] \Device\Harddisk2\DR2
23:44:47.0340 0x143c \Device\Harddisk2\DR2 - ok
23:44:47.0340 0x143c ================ Scan VBR ==================================
23:44:47.0341 0x143c [ 9DB0F07AA21FC8E4FE4CC0392CD778C6 ] \Device\Harddisk0\DR0\Partition1
23:44:47.0342 0x143c \Device\Harddisk0\DR0\Partition1 - ok
23:44:47.0343 0x143c [ 2A456D05E78A6EFE9AD13F017E20BC96 ] \Device\Harddisk0\DR0\Partition2
23:44:47.0344 0x143c \Device\Harddisk0\DR0\Partition2 - ok
23:44:47.0345 0x143c [ F08701980A58CDFCA1A1C9AB9E6C090D ] \Device\Harddisk1\DR1\Partition1
23:44:47.0346 0x143c \Device\Harddisk1\DR1\Partition1 - ok
23:44:47.0347 0x143c [ B1E27AA018409DE6BFD73F8AFB883A65 ] \Device\Harddisk2\DR2\Partition1
23:44:47.0347 0x143c \Device\Harddisk2\DR2\Partition1 - ok
23:44:47.0348 0x143c [ 43D1E1DC340B844169F324DF3D10B1AD ] \Device\Harddisk2\DR2\Partition2
23:44:47.0349 0x143c \Device\Harddisk2\DR2\Partition2 - ok
23:44:47.0349 0x143c Waiting for KSN requests completion. In queue: 221
23:44:48.0349 0x143c Waiting for KSN requests completion. In queue: 190
23:44:49.0349 0x143c Waiting for KSN requests completion. In queue: 190
23:44:50.0518 0x143c AV detected via SS2: COMODO Antivirus, C:\Program Files\COMODO\COMODO Internet Security\cfpconfg.exe ( 6.3.38526.2970 ), 0x61000 ( enabled : updated )
23:44:50.0521 0x143c Win FW state via NFP2: enabled
23:44:53.0232 0x143c ============================================================
23:44:53.0232 0x143c Scan finished
23:44:53.0232 0x143c ============================================================
23:44:53.0235 0x1324 Detected object count: 0
23:44:53.0235 0x1324 Actual detected object count: 0
23:44:59.0082 0x05d0 Deinitialize success
So nothing in the services, I checked the things I know and the things I don’t know, nothing dangerous or unwanted.
Now the after effect that it did was killing my adminstrator premission, I only had OWNER : User/ZXCV-pc and the Adminstrators/ZXCV was gone, and the default should be TrustedInstaller. So I worked on that and added the premission, took me some time but I got my admin access fully again.
Now the thing I’m afraid is could this trojan effect any of the HDD, even if it didn’t touch the MBR, cause the problem is I did a DEFRAG to my RAID 0 array, the longest possibly one, and I didn’t do defrag alot of time, so after it finished the defrag I’ve download this file which has the virus and I didn’t know.
****.to/need-for-speed-rivals-crack-only-skidrow-t8197384.html#main
And ran it, once I run it, it just did the cursor mouse loading but nothing happened, so I tried again, nothing happened, I knew something is wrong, checked the process and I saw the unwanted files + process and I started to clear,clean and kill everything I knew shouldn’t be.
No antispyware or antivirus detect anything expect those files in adobex86.
So after I did that I restarted so see if something comes up or anything has error, everything came up normal, nothing unwated pop up, everything was fine.
Then I noticed the Adminstartor with cmd didn’t automatically go admin when I clicked, and I noticed I couldn’t go in some folder without windows to request premission, so I checked and noticed that I had only 1 OWNER in security Users/X7007-pc and missing the Adminstrators/X7007-pc and the security OWNER isn’t the default TrustedInstaller. So I added changed and fixed it same as my laptop which now is fine.
The file that I’ve downloaded had DETAILS that said : NAP Client Configuration which is something from microsoft and it had the NFS14.exe Icon.
When I saw this I knew something ofc is dangerous.
But it didn’t do anything else as what I saw.
What should I recheck or check to make sure my system is clean ?
And should I be worry about the 1 HDD in the Raid 0 Array that had error (0) in the Intel Rapid Storage ? no bad sectors, MBR seems fine