Personal Information Exploited?

Last week I had all sorts of problems with W10; start,task bar,programs, etc.etc. The worse or most alarming problem was that MS Office 2010 up and completely disappeared from my computer and all of my documents converted to Open Office. I downloaded and reinstalled the office program and my files were all there.

However, yesterday I got a call from my credit card co. asking me if I charged $ 1,602, to some company in the Ukraine. No, so , that card is cancelled and I’ve changed all of my passwords and security questions on the most important accounts except with Social Security. With SS, I changed the password, but I forgot to change the security questions-so I tried to do that today and got frozen out; I assume because someone else had been trying to access my account today as well.

Is there some sort of exploit that deletes office and copies the files? Or, is the credit card fraud probably just a coincidence?

Finally, I just installed WD backup software for it’s drive and I inadvertently put my files in to the “cloud service” that it offers. Is it still conventional wisdom that any information put in the cloud is at great risk?

Any suggestions and information will be greatly appreciated. I already have Malwarebytes Pro and Frst. If someone will tell me what to look for in the Frst logs, I can learn to read them myself first, and then submit them when I get lost.

Where are the log files that are requested ?

Here are the logs as requested. Thank you for the assistance.

Please post the Addition.txt and aswMBR scan result file. Did you create the following files?

2015-12-15 18:12 - 2015-12-15 18:12 - 00000042 _____ C:\Users\Owner\p[2].gif 2015-12-15 16:33 - 2015-12-15 16:33 - 00024850 _____ C:\Users\Owner\BBnBrGh[2].jpg 2015-12-15 16:31 - 2015-12-15 16:31 - 00042746 _____ C:\Users\Owner\BBnyeTq[1].jpg 2015-12-15 16:28 - 2015-12-15 16:28 - 00000807 _____ C:\Users\Owner\event[7].gif 2015-12-15 16:25 - 2015-12-15 16:25 - 00000611 _____ C:\Users\Owner\BB5Z4Yd[1].png 2015-12-15 16:25 - 2015-12-15 16:25 - 00000483 _____ C:\Users\Owner\BBgX3ni[1].png 2015-12-15 16:22 - 2015-12-15 16:22 - 00017646 _____ C:\Users\Owner\AAgdMoQ[1]_1.png 2015-12-15 16:22 - 2015-12-15 16:22 - 00017646 _____ C:\Users\Owner\AAgdMoQ[1].png 2015-12-15 16:22 - 2015-12-15 16:22 - 00012306 _____ C:\Users\Owner\AAgiFGj[1]_1.jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00012306 _____ C:\Users\Owner\AAgiFGj[1].jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00012010 _____ C:\Users\Owner\BBnseLT[1]_1.jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00012010 _____ C:\Users\Owner\BBnseLT[1].jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00011360 _____ C:\Users\Owner\BBnxz3h[1]_1.jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00011360 _____ C:\Users\Owner\BBnxz3h[1].jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00011160 _____ C:\Users\Owner\BBnAkHv[1]_1.jpg 2015-12-15 16:22 - 2015-12-15 16:22 - 00011160 _____ C:\Users\Owner\BBnAkHv[1].jpg

For some reason both files don’t show as attachments with this message. This is the first of two posts (Scan Log) uploaded here and the next will have the Addition file. I hope that this is what you’ve asked for, because I only see a protection log and a scan log in MB.

As to whether or not I created the referenced files, yes I did-I think. I found the file referenced in a secure vault program-however I couldn’t open it. I assume this might be because I changed the name.

2nd Post.

[*]Step #1 ESET Online Scanner
Disable your security programs which includes but not limited to anti-virus, anti-malware, anti-spyware et cetera. Peruse this for additional information.
[*]Download esetsmartinstaller_enu.exe by clicking here.
[*]Right-click on the program and choose Run as administrator.
[*]Accept their terms and condition and proceed.
[*]Install Add-On/Active X if prompted.
[*]From the Computer Scan Setting
[list][*]Enable detection of potentially unwanted application
[*]Click on Advanced Setting
[]Uncheck the following box –
[list][*]Remove Found Threats[/list]
[
]Check the following boxes –
[list][*]Scan archives;
[*]Scan for potentially unsafe applications
[*]Enable Anti-Stealth Technology[/list]
[*]Click on Start and wait for the virus signature database to update.
[*]The online scan will begin automatically and can take several hours.
[*]Note: Do not touch either the Mouse or keyboard during the scan. Otherwise it may stall.
[*]After the Scan finishes –
[*]If no threats were found:
[list][*]Put a checkmark in Uninstall application on close.
[*]Close the program and report that nothing was found
[*]If threats were found:
[*]Open the file located in C:\Program Files\ESET\ESET Online Scanner\log.txt (32-bit) or C:\Program Files (x86)\ESET\ESET Online Scanner\log.txt (64-bit).
[*]Attach the log file in your next reply.[/list][/list]
Note: Enable your security programs afterwards.


I ran the scan as directed-well almost. I couldn’t run it as the admin-right click didn’t work.

In any event, here is the log with the 4 files that it saw as potential threats. I assume that they are inconsequential since
they are the same “ask” toolbar bundle. But, I’ve sent the log just in case. In 62 years, I’ve been wrong once or twice.

I appreciate you, your time and assistance.

Thank you!

[*]Step #2 Fix with FRST
Make sure that you still have FRST.exe on your Desktop. If you do not have it, download the suitable version from here to your Desktop.
[*]Open Notepad.exe. Do not use any other text editor software;
[*]Copy and Paste the contents inside the code-box to your Notepad

Start
CreateRestorePoint:
CloseProcesses:
EmptyTemp:
Task: {0860E5EC-445C-4873-86E2-ECC4F2C4C356} - \Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent -> No File <==== ATTENTION
Task: {1E8A7E2A-D4C9-48B0-A731-F42C4050FA0C} - \Microsoft\Windows\Setup\gwx\refreshgwxcontent -> No File <==== ATTENTION
Task: {2F7AA93E-DF6D-49DF-B3DC-41F530F11315} - \Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d -> No File <==== ATTENTION
Task: {3143AA90-AD86-4ADA-8DFB-FD0895D6160A} - \Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d -> No File <==== ATTENTION
Task: {5809E62D-57A0-4743-8687-4F8C0CCD5EFF} - \Microsoft\Windows\Setup\GWXTriggers\Logon-5d -> No File <==== ATTENTION
Task: {665811DF-9475-4EDE-957D-A7FD58F2F7E3} - \Microsoft\Windows\Setup\gwx\refreshgwxconfig -> No File <==== ATTENTION
Task: {731B8322-27CD-437C-9B8D-4342CDD83CF2} - \Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd -> No File <==== ATTENTION
Task: {8368E168-5DDC-4F6F-A66B-01ADAF5E3DA8} - \Microsoft\Windows\Setup\GWXTriggers\Time-5d -> No File <==== ATTENTION
Task: {9E16146C-8B31-4804-A2EE-1D4BC7446ADA} - \Microsoft\Windows\Setup\gwx\launchtrayprocess -> No File <==== ATTENTION
Task: {B68BEE42-A799-4C64-965B-16639872007D} - \Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d -> No File <==== ATTENTION
Task: {C1AE2E97-60E7-47E5-9B0A-1FC494FC7640} - \Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B -> No File <==== ATTENTION
HKLM-x32\...\Run: [] => [X]
2015-01-29 14:17 - 2015-01-29 14:17 - 0000057 _____ () C:\ProgramData\Ament.ini
2013-10-28 13:08 - 2012-12-07 16:41 - 0007680 _____ () C:\Users\Owner\AppData\Local\Z@!-85b55905-43c3-4c32-8c8a-dac134a0e349.tmp
2013-10-28 13:08 - 2012-12-07 16:41 - 0007168 _____ () C:\Users\Owner\AppData\Local\Z@S!-f213f5f3-0de7-4577-8c56-b07cce8f1047.tmp
C:\ProgramData\hash.dat
C:\Config.Msi\24bd3fed.rbf
C:\Windows\Installer\MSIC452.tmp
End

[*]Click on File > Save as…
[list][*]Inside the File Name box type fixlist.txt
[*]From the Save as type drop down list, choose All Files
[*]Save the file to your Desktop;
[*]Re-run FRST.exe and click Fix;
[*]Note: If FRST advises there is a new updated version to be downloaded, do so/allow this.[]After the completion, a log will be produced;
[
]Attach the log in your next reply.[/list]


[*]Required Log(s):
[*]FRST Fix Log

Regards,
Valinorum

Attached is the fix log.

If you would, please, give me the simple language version of what we fixed and a short explanation of the importance.

I’m always curious and I like trying to expand my knowledge/comfort level. I don’t have illusions that I’m ever going to be more than a newbie. But, perhaps I can learn to ask better questions.

Thanks again!

There were no information stealer in your PC when I started working on it. It may be due to the fact that many malware of this nature self-destruct itself after contacting its host or your information was stolen elsewhere. I would counsel you to change your login credentials and enable 2FA where possible. I mostly cleared out the remnants of the malware files which were detected by Malwarebytes’ Anti-Malware and ESET.

Perusing your logs, I see no infection currently present in your system. Unless you are having any issue(s), the machine appears to be Malware-free as we speak.


:clubs: Removal of Tools and Quarantined Files :clubs:


Despite the tools we have used are clean, they are powerful removal tools and made in a way so that they carry out any commands given to them without (most cases) asking for a confirmation. In the hands of an inept person, they can make the machine un-bootable – a scenario we do not wish to see. Also, we need to remove the quarantined files/folders from your system as a dormant malware can be as bad as an active one if given the proper environment. I shall now give you the guidelines to remove the tools and the quarantined files from your system.

[*]Cleanup with Delfix
Please download DelFix by Xplode to your Desktop.
Download Link
[*]Double-click to run the program;
[list][*]Note: Windows Vista/7/8 users right-click and choose Run as administrator[*]Make sure that all the boxes are checked;
[*]Click Run;
[*]A log will be opened after the operation is finished;
[*]Copy and Paste it in your next reply[/list]


:clubs: Prevention and Future Guidelines :clubs:


Prevention is better than cure – goes the old saying. As much as we love to see you visit our site, we do not want to see you having your PC infected by malwares again.

[*]Keep Windows up-to-date.
It is extremely important that you keep your operating system (Windows) updated when updates are made available. It is set to alert you, so be sure not to ignore these notices and to allow the updates to install. Many of these are critical security packages which could very possibly be the difference between your picking up a future infiltration and simply passing right by it unharmed.
[*]Run antivirus software and keep it up-to-date, too.
Antivirus software is your safety net if all other protections fail. The first line of defense is smart computing, of course, but everyone needs a backup. Once they’re installed, check periodically to ensure they have been successfully updating as well. An out-of-date antivirus is not a happy antivirus!
[*]Keep your web browser plugins and other programs updated also.
This tip is rarely shared by technicians and its importance is not widely recognized, but it’s absolutely critical. Programs such as Java, Adobe Flash Player and Adobe Reader, Internet Explorer, and myriad other such web-exposed items are deeply vulnerable to attack, which can quickly lead to a hopelessly infected system no matter what protection you currently have installed. The reason is that these programs are ubiquitous, but are also not perfect and are extremely complex… and as such, security vulnerabilities are discovered and exploited by hackers hoping to gain control over your machine. By performing every update for these programs as soon as it’s made available, you will greatly reduce your exposure to dangerous internet threats.

A great way to do this is to install the Filehippo Update Checker and run it regularly. Also, try not to ignore any notifications you receive regarding updates to programs already installed on your PC.

No scripts is an excellent security device too. I like it but it is not for everyone because it requires you to take action if you want to see some things (pop ups, banners etc.) on sites you visit.

Download NoSript by Giorgio Maone.

Note: Sometimes you will get a site telling you that you need to install Java when actually all you need to do is enable the site through the no script icon down on the right hand side of your computer.

[*]Watch out for new threat named CryptoLocker
CryptoLocker is a new type ransomware family malware that encrypts your important files and asks for a ransom to decrypt them. At the moment of posting this reply there are no tools that can undo the havoc this malware causes. We can help you to remove the malware from your system but the files that was encrypted cannot be recovered without the decryption key. So, I ask for your forbearance and practice constant vigilance. Please read the following article to acknowledge yourself about the safety measures.
How to prevent your computer from becoming infected by CryptoLocker.

[*]And last of all, surf smart.
It doesn’t matter how well the autopilot system works if the pilot keeps flying the plane into mountain ranges. Don’t forget that no matter how much you have protecting yourself, your security ultimately begins and ends with you. Don’t visit dangerous or questionable web sites, avoid suspicious links on Facebook and emails/email attachments you’re unsure about, and just generally keep your wits about you, and you’ll be much safer. Also, avoid illegal downloads, cracks, “warez”, and all other too-good-to-be-true internet offerings: they’re typically laden with malware. Be smart and you can avoid most threats lurking about the darker corners of the internet! And for even more tips, see our article, How Did I Get Infected in the First Place?

My help is free but if you feel like making my day you may donate any amount you wish by clicking the ‘donate’ button. I really appreciate your kindness.

https://www.paypalobjects.com/en_US/i/btn/btn_donate_SM.gif

Regards,
Valinorum

Hi Valinorum,

The log is attached as requested.

Thanks for the additional suggestions. Noscript seems like a really good idea.

This is an observation and not a complaint. As you know, I run Avast Pro and Malwarebytes Pro. Avast is supposed to have a software updater, but I guess one more program and another layer of protection from Filehippo can’t hurt. As well, Avast and MB are supposed to auto update but don’t always, so I guess that a daily update check on my part will have to be part of my routine on startup.

Finally, a heads up. I will be making a donation next week when I get my new credit card. 15 minutes ago I had to cancel my second, backup card for fraudulent activity after cancelling my primary card this past Sat.

Again, I appreciate all of the time you spent in assisting me.

Avast is supposed to have a software updater,
That should suffice.
15 minutes ago I had to cancel my second, backup card for fraudulent activity after cancelling my primary card this past Sat.
How is the situation now? The PC is clean. It could be the information that was stolen earlier. Have you changed all your login credentials?

Yes, I’ve changed my login creds. I’m afraid you’re right that my information was stolen previously to all of the scans. Like I said in my first post, MS Office completely disappeared from my computer and all of my documents were converted to Open Office. I did not initiate any of those actions. But…who knows where the information was actually compromised, I heard the other day that Dropbox Cloud Service was hit and I have tons of information (military service record-etal.) yikes! stored as a backup there.

It’s too bad that I’m late in putting all of my documents on a thumb drive and only accessing them from that device. But, at least I can work around ransom ware now. I hope anyways.

After I post this, I’m going to your paypal site to make a donation with my brand new credit card.

Thank you very much. Safe surfing. :slight_smile: