Clémence Navarro

305 replies · 589997 views

m
marcelvidal
Posts: 110
#221
15 hours ago, throwawaydox said:

Also, here is the archive I have of the uncropped/uncensored photos originally hosted by Maison Close's parent company Lovely Planet, up to about 2023. UHQ. Archive password is LovelyPlanet

There are a couple of unrelated photos I think but most of them are Maison Close marketing material

 

https://gofile.io/d/I7AGDw

Amazing ... do you have any more uncensored, say from other shoots/models? 🤩

s
solarpilot
Posts: 5
#222
On 12/8/2024 at 5:48 AM, throwawaydox said:

Also, here is the archive I have of the uncropped/uncensored photos originally hosted by Maison Close's parent company Lovely Planet, up to about 2023. UHQ. Archive password is LovelyPlanet

There are a couple of unrelated photos I think but most of them are Maison Close marketing material

 

https://gofile.io/d/I7AGDw

Archive seems to contain a crypto-miner (XRM) that is rather difficult to get rid of.

 

It automatically installs once you decompress the archive.

 

The in-built Windows anti-virus does not remove the virus/trojan/miner. The virus also blocks installation of tools such as Malwarebytes.

 

It seems to enable the XMR miner at different times (when the computer is in standby). Considering the relative sophistication of the virus I wouldn't be surprised if gets enabled only for powerful CPUs.

 

Proceed at your own risk!

m
marcelvidal
Posts: 110
#223
3 hours ago, solarpilot said:

Archive seems to contain a crypto-miner (XRM) that is rather difficult to get rid of.

 

It automatically installs once you decompress the archive.

 

The in-built Windows anti-virus does not remove the virus/trojan/miner. The virus also blocks installation of tools such as Malwarebytes.

 

It seems to enable the XMR miner at different times (when the computer is in standby). Considering the relative sophistication of the virus I wouldn't be surprised if gets enabled only for powerful CPUs.

 

Proceed at your own risk!

What are we looking for .. something unusual in the process listing? And how did you remove it ? thanks

t
terminatorslayer22
Posts: 11
#224
4 hours ago, solarpilot said:

Archive seems to contain a crypto-miner (XRM) that is rather difficult to get rid of.

 

It automatically installs once you decompress the archive.

 

The in-built Windows anti-virus does not remove the virus/trojan/miner. The virus also blocks installation of tools such as Malwarebytes.

 

It seems to enable the XMR miner at different times (when the computer is in standby). Considering the relative sophistication of the virus I wouldn't be surprised if gets enabled only for powerful CPUs.

 

Proceed at your own risk!

I was able to install Malwarebytes and do a scan, it found something but I'm guessing it's something else. How do I make sure I'm not infected?

throwawaydox's avatar
throwawaydox
Posts: 93
#225

SMH it's just an image archive, ESET clears it, but I'll take it down
I think there was a PDF in there maybe that's what was triggering it

1
1111scan
Posts: 95
#226
On 12/8/2024 at 3:01 PM, talos72 said:

Awesome!

Help, can I do something with that archive without being Premium on Gofile ?

 

Thanks

s
solarpilot
Posts: 5
#227

You would have noticed if it was activated (installed?). CPU was running at 100% (but sneakily the crypto-miner would stop working when you opened task manager), using a lot of electricity and generating a lot of heat. It blocks installation of malwarebytes (or running it if it is already installed) and several other 3rd party malware tools (e.g. ESET online scanner) and various windows services (system restore etc.). It would even try and shut down the browser when I was on the page for the tool that I used to remove it.

 

I suspect the crypto-miner only activates for IPs in Eastern Europe as I was only able to find info about it from resources in that region (luckily I speak some of the local languages). This may be a method to avoid quick detection. That being said, the virus payload also includes a remote-access trojan, so even if the crypto-miner is not running, it could be used to steal your data.

 

I did find that it adds Windows Defender exclusions for the following path: 

 

C:\ProgramData\WindowsTasks\apphost.exe

 

There are several other exclusion exes for that path. "WindowsTasks" is not a real Windows folder. And that wasn't the real apphost.exe. I was not able to actually navigate to it via File Explorer while the computer was infected.

 

It also disabled the Windows security centre.

 

I found a solution via this thread in a seemingly legit looking russian-language forum. 2 caveats however:

 

1. The crypto-miner remover actually triggers windows defender (this is mentioned in the thread). It seems that this a generic ML-based identification. Without going into details, if you write your own program (not a virus) and if does certain things, Windows Defender will label it as the exact same "virus" (unless you submit to MS for whitelisting). USE AT YOUR OWN RISK.

 

2. The tool has horrible UI and isn't very clear about it's findings. You do get a log file that shows corrections if the virus was identified, but it may be that this is a generic log file (that you get even when no cleaning was done).

 

URL to the tool: https://www.safezone.cc/resources/av-block-remover-avbr.224/

 

Click the "For english-speaking users" spoiler button for a guide.

 

I went with [5] straight away, rebooted into "Safe Mode with Networking", ran the tool and it did remove the virus (in my case it did create a quarantine folder, maybe if you're not infected it won't).

 

3 hours ago, throwawaydox said:

SMH it's just an image archive, ESET clears it, but I'll take it down
I think there was a PDF in there maybe that's what was triggering it

 

I got the infection as soon as I decompressed the archive with a licensed, fully updated copy of WinRar. Windows Defender did pop-up, but it said it had failed to clean the virus.

 

 

 

S
Slenderxta
Posts: 21
#228

Hey, thanks for all the info. Quick question, I DLed the archive, opened it once, just opened one random picture and closed it. Then I deleted it since I saw here it was infected.

 

Am I being infected in your opinion?

nyepee's avatar
nyepee
Posts: 227
#229

I downloaded the file and did a scan with AVG before opening it.  The scan turned up nothing.  After I opened it I rescanned my computer (AVG again) but turned up nothing.  Is the crypto-miner hiding?

pinguoin's avatar
pinguoin
Posts: 5486
#230

Maison Close Advent Calendar - Day 10

 

ClemenceNavarro_MaisonClose(3).thumb.jpg.85b9e1154a1db69fa3dc69c3cc98dbd1.jpgClemenceNavarro_MaisonClose(1).thumb.jpg.606c83fb2d5b5d75858bbe52f4bf8d0c.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.a8604a6008064a4f390d897512d90ee7.jpg

t
testerer
Posts: 1
#231
21 hours ago, throwawaydox said:

SMH it's just an image archive, ESET clears it, but I'll take it down
I think there was a PDF in there maybe that's what was triggering it

The link to the host no longer works, anyway.

Is it possible to upload again?

 

Thx. 

 

p
pimpl
Posts: 725
#232
19 hours ago, solarpilot said:

You would have noticed if it was activated (installed?). CPU was running at 100% (but sneakily the crypto-miner would stop working when you opened task manager), using a lot of electricity and generating a lot of heat. It blocks installation of malwarebytes (or running it if it is already installed) and several other 3rd party malware tools (e.g. ESET online scanner) and various windows services (system restore etc.). It would even try and shut down the browser when I was on the page for the tool that I used to remove it.

 

I suspect the crypto-miner only activates for IPs in Eastern Europe as I was only able to find info about it from resources in that region (luckily I speak some of the local languages). This may be a method to avoid quick detection. That being said, the virus payload also includes a remote-access trojan, so even if the crypto-miner is not running, it could be used to steal your data.

 

I did find that it adds Windows Defender exclusions for the following path: 

 

C:\ProgramData\WindowsTasks\apphost.exe

 

There are several other exclusion exes for that path. "WindowsTasks" is not a real Windows folder. And that wasn't the real apphost.exe. I was not able to actually navigate to it via File Explorer while the computer was infected.

 

It also disabled the Windows security centre.

 

I found a solution via this thread in a seemingly legit looking russian-language forum. 2 caveats however:

 

1. The crypto-miner remover actually triggers windows defender (this is mentioned in the thread). It seems that this a generic ML-based identification. Without going into details, if you write your own program (not a virus) and if does certain things, Windows Defender will label it as the exact same "virus" (unless you submit to MS for whitelisting). USE AT YOUR OWN RISK.

 

2. The tool has horrible UI and isn't very clear about it's findings. You do get a log file that shows corrections if the virus was identified, but it may be that this is a generic log file (that you get even when no cleaning was done).

 

URL to the tool: https://www.safezone.cc/resources/av-block-remover-avbr.224/

 

Click the "For english-speaking users" spoiler button for a guide.

 

I went with [5] straight away, rebooted into "Safe Mode with Networking", ran the tool and it did remove the virus (in my case it did create a quarantine folder, maybe if you're not infected it won't).

 

 

I got the infection as soon as I decompressed the archive with a licensed, fully updated copy of WinRar. Windows Defender did pop-up, but it said it had failed to clean the virus.

 

 

 

Hey solarpilot, is this a joke?
I downloaded the zip-file and scanned it prior to and after the extraction. There was nothing detected. Also, there was no .pdf document in the archive.

Today I scanned the system top to bottom with two antimalware programs. I also scanned the system in "offline mode". Nothing has been detected.

 

So, what makes you think throwawaydox put malware in his zip-file? Why and how would he do that?

Also, I am really curious HOW you got all that info you've written above. It is impressive, but how did you find all that out? Are you a cybersecurity expert?
Please tell, how did you get suspicious in the first place and how can you verify that there has been malware in the .zip-file?
Did I get you right that your "Windows Defender did pop-up" when extracting the file and that started the whole investigation?

 

Is there a method to cleary verify that there is no malware on the system?

 

You're writing about the path "C:\ProgramData\WindowsTasks\apphost.exe" but there is no "C:\ProgramData\WindowsTasks" folder in Windows 11.

Where and how did you see the "Windows Defender exclusions"? I have no idea where those are listed.

 

Thank you in advance.

pinguoin's avatar
pinguoin
Posts: 5486
#233

Maison Close Advent Calendar - Day 11

 

ClemenceNavarro_MaisonClose(1).thumb.jpg.b864c08d5d2155ef3f973fdcb6cb5f22.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.70e838a400d37ad8b375ce82d4f75619.jpgClemenceNavarro_MaisonClose(3).thumb.jpg.5ac2a2ee98f1c0fa0e335dddd8a056a9.jpgClemenceNavarro_MaisonClose(4).thumb.jpg.bd1af2b6890257f0926ac9f682f3a8e5.jpgClemenceNavarro_MaisonClose(5).thumb.jpg.afe24dab2809fa8bf0ff198c114f522d.jpg

 

 

Spoiler
Spoiler

C.N 11.mp4

 

 

 

 

 

 

pinguoin's avatar
pinguoin
Posts: 5486
#234

Maison Close Advent Calendar - Day 12

 

ClemenceNavarro_MaisonClose(1).thumb.jpg.06d56b278081d83c7514d0e12f9f45ec.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.ec63180f0342e211bfacd68458957ad9.jpgClemenceNavarro_MaisonClose(3).thumb.jpg.5cf6224217d4a63e9792f0982d537ba4.jpgClemenceNavarro_MaisonClose(4).thumb.jpg.79c7047be8f439fcd812b7ed97f7b75f.jpg

pinguoin's avatar
pinguoin
Posts: 5486
#235

Maison Close Advent Calendar - Day 13

 

ClemenceNavarro_MaisonClose(1).thumb.jpg.286979d5bf6b3d1cc59df3acb8d09169.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.e45007cd0e31ed178d249dc0499decc8.jpgClemenceNavarro_MaisonClose(3).thumb.jpg.2162f16ea8e731fa4eb6d718d354eb3c.jpgClemenceNavarro_MaisonClose(5).thumb.jpg.a3eefc8d8df2506c616c53dc30f6de7e.jpgClemenceNavarro_MaisonClose(4).thumb.jpg.ee25f72b59ce675de90f9c0f33a81d0a.jpg

 

 

Spoiler
Spoiler

 

C.N 13.mp4  

 

 

pinguoin's avatar
pinguoin
Posts: 5486
#236

 

Maison Close Advent Calendar - Day 14

 

ClemenceNavarro_MaisonClose(1).thumb.jpg.0a71cca8d66c033a7904777d569681ea.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.32844b24f36fe5156be197e0f9fd6be7.jpgClemenceNavarro_MaisonClose(3).thumb.jpg.d73abdf8c6fb24db9083d165a7566925.jpgClemenceNavarro_MaisonClose(4).thumb.jpg.d1aac42d26a2d0547907fe18a9d3723b.jpg

 

 

Spoiler
Spoiler

C.N 14.mp4  

 

 

 

pinguoin's avatar
pinguoin
Posts: 5486
#237

Maison Close

 

ClemenceNavarro_MaisonClose(1).thumb.jpg.5de3732c8709f42569b35be189b7cb4e.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.a5d2bf1cc5332a05d7e0dbd79dae1029.jpgClemenceNavarro_MaisonClose(3).thumb.jpg.ef4978a84852e4ce6606703494044351.jpgClemenceNavarro_MaisonClose(4).thumb.jpg.72d65620d64925543f8bc3a26e131c45.jpgClemenceNavarro_MaisonClose(5).thumb.jpg.207a3ea57241883f54b8082c872ffb89.jpgClemenceNavarro_MaisonClose(6).thumb.jpg.b7ec5b9946cb4f5175ea8a521083f0a7.jpgClemenceNavarro_MaisonClose(7).thumb.jpg.8a93482000148e05d06c7c7d2f3e387d.jpgClemenceNavarro_MaisonClose(9).thumb.jpg.f8c2bffbc1b0a0f52eae2b114a44dfab.jpgClemenceNavarro_MaisonClose(10).thumb.jpg.3b7738d01bf985cbab27da2a144dd3c8.jpgClemenceNavarro_MaisonClose(8).thumb.jpg.3c242e1cac14a385776cb3f5459f1cf1.jpgClemenceNavarro_MaisonClose(13).thumb.jpg.6ad119e4392dbcfd82467a5f796168eb.jpgClemenceNavarro_MaisonClose(14).thumb.jpg.7018f56ceb9ff2e4ff228f5d45807ea5.jpgClemenceNavarro_MaisonClose(15).thumb.jpg.272d259d790ecba900aa62109632bd44.jpgClemenceNavarro_MaisonClose(16).thumb.jpg.313a27bf5c9b548c3c901ebf753756de.jpgClemenceNavarro_MaisonClose(17).thumb.jpg.efda3b3466d94c6a860df8a8d80203f7.jpgClemenceNavarro_MaisonClose(18).thumb.jpg.8d4e0ff6b60087c3a42abbb4c5a847de.jpgClemenceNavarro_MaisonClose(19).thumb.jpg.9b5104d45195bb3e1152a3163a8134a1.jpgClemenceNavarro_MaisonClose(20).thumb.jpg.8d868d284788f5f1f9962d26b51ae9a3.jpgClemenceNavarro_MaisonClose(21).thumb.jpg.6a990d1fcb77522650f05eaca1c28e26.jpgClemenceNavarro_MaisonClose(22).thumb.jpg.34e9494f3f13440dce5138257593ea12.jpgClemenceNavarro_MaisonClose(23).thumb.jpg.9b6dee33c0b9852cdb851aac3d600b61.jpgClemenceNavarro_MaisonClose(23).thumb.jpg.158eb308a491381e467bc590dad727e0.jpgClemenceNavarro_MaisonClose(24).thumb.jpg.2a1599c6fa774ff3d45800157f360e68.jpgClemenceNavarro_MaisonClose(25).thumb.jpg.97d579b4aa0bfd5fd287cedad7cb18a8.jpgClemenceNavarro_MaisonClose(26).thumb.jpg.4a6d9e5ea22c14c5e0245a5af6e56596.jpgClemenceNavarro_MaisonClose(27).thumb.jpg.1b9b3c499778c77ea48df03f97e630eb.jpgClemenceNavarro_MaisonClose(28).thumb.jpg.e99129bdeeb3477eb8658c04d7accdb2.jpgClemenceNavarro_MaisonClose(29).thumb.jpg.6371604d4c60d8f8ab08617c834490aa.jpgClemenceNavarro_MaisonClose(30).thumb.jpg.536e0e6809cc1d2682e3fd153f5713af.jpg

 

Clemence Navarro_Maison Close  (11).jpg
pinguoin's avatar
pinguoin
Posts: 5486
#238

Maison Close Advent Calendar - Day 15

 

ClemenceNavarro_MaisonClose(1).thumb.jpg.19885fe49518307c01d6d186608252e3.jpgClemenceNavarro_MaisonClose(2).thumb.jpg.dc65ef2ba608788b4f384fee866358de.jpgClemenceNavarro_MaisonClose(4).thumb.jpg.d6f54acc1b3f4cacab9815a74d762eef.jpgClemenceNavarro_MaisonClose(3).thumb.jpg.a3903ea433b3388addd3b6715c589a05.jpgClemenceNavarro_MaisonClose(5).thumb.jpg.63fc7f0166d976a041c278a5a07d8c4e.jpg

 

Spoiler
Spoiler

 

C.N 15.mp4  

 

 

 

 

 

s
solarpilot
Posts: 5
#239
On 12/10/2024 at 6:20 PM, pimpl said:

Hey solarpilot, is this a joke?
I downloaded the zip-file and scanned it prior to and after the extraction. There was nothing detected. Also, there was no .pdf document in the archive.

Today I scanned the system top to bottom with two antimalware programs. I also scanned the system in "offline mode". Nothing has been detected.

 

So, what makes you think throwawaydox put malware in his zip-file? Why and how would he do that?

Also, I am really curious HOW you got all that info you've written above. It is impressive, but how did you find all that out? Are you a cybersecurity expert?
Please tell, how did you get suspicious in the first place and how can you verify that there has been malware in the .zip-file?
Did I get you right that your "Windows Defender did pop-up" when extracting the file and that started the whole investigation?

 

Is there a method to cleary verify that there is no malware on the system?

 

You're writing about the path "C:\ProgramData\WindowsTasks\apphost.exe" but there is no "C:\ProgramData\WindowsTasks" folder in Windows 11.

Where and how did you see the "Windows Defender exclusions"? I have no idea where those are listed.

 

Thank you in advance.

 

No, this is not a joke. My computer was clearly taken over and used for crypto XRM mining after I opened up the uncompressed the archive file.

 

Windows defender gave a warning when I uncompressed the archive, but it was not able to fix the issue and my computer was clearly compromised (couldn't install Malwarebytes, CPU was going at 100% and power consumption was ~400-500 watts). 

 

I don't necessarily think throwawaydox put anything in the zip file.

 

I am not a cybersecurity expert. Just wanted to actually clean my computer and not delete everything and start from scratch, so I decided to research how I can remove this virus.

Layla_O's avatar
Layla_O
Posts: 26
#240

Can you guys keep this shit out of the thread? It seems like something you could be dealing with via DM. Mods, kindly clean this up, please.

12310111213141516
Page of 16