Since the virus scan/removal I've seen zero file integrity violations. Violations typically happen on an hourly / daily basis. Time may prove otherwise, but by then a rollup may fix the issue anyway.
Avira rescue cd renamed, among others... the following files associated with cryptography. Other than that I had manually deleted "GnuPG", "Gpg4win"... one or both consistently connected to the internet on its own. Initially left me wondering if this was highly fortified software.
Scan Report
Start: 07:03:02 End: 09:20:21
Detections: 12
Files treated: 12
Files scanned: 430737
Engine version: 8.3.40.172
VDF version: 7.12.118.218
Scan status: Finished
Details
Detection: /target/C:/program files (x86)/nvidia corporation/nvtelemetry/plugin/_nvtelemetrystatusreporter.dll (should be legit, but who knows)
Virus name: TR/Crypt.XPACK.Gen2 file renamed
Virus Type: trojan
Detection: /target/C:/program files (x86)/spybot anti-beacon/spybot3antibeacon.exe (32 bit exe renamed, 64 bit remains behind. recently installed v2.2, it runs on every boot to ensure hosts file is blocks microsoft telemetry/spyware upon boot)
Virus name: TR/ATRAPS.Gen2 file renamed
Virus Type: trojan
Detection: /target/C:/program files (x86)/winscp/putty/pageant.exe (Pageant is a secure shell (ssh) tunneling app for connecting to Unix or Linux machines via PuTTY.) Should be legit.
Virus name: TR/Crypt.XPACK.Gen file renamed
Virus Type: trojan
Detection: /target/C:/program files (x86)/winscp/putty/puttygen.exe (for generating cryptographic keys) Should be legit.
Virus name: TR/Crypt.XPACK.Gen file renamed
Virus Type: trojan
Detection: /target/C:/program files/daedalus/resources/app/nsis-setup.exe (something to do with the crypto daedalus wallet, should be legit)
Virus name: TR/Crypt.XPACK.Gen file renamed
Virus Type: trojan
UPDATE:
I also had uninstalled the following, as detected by farbar:
bl (HKLM-x32\...\{2A075BB4-E976-4278-BF3F-E5C6945D84C0}) (Version: 1.0.0 - Your Company Name) Hidden
associated with Adobe Premiere pro, installed to a bogus directory on drive j:, which doesn't make sense.
name : bl
Command line : MsiExec.exe /I{2A075BB4-E976-4278-BF3F-E5C6945D84C0}
\adobe\Adobe Master Collection CS6\Adobe CS6\payloads\SonicWrappers_bl6.0-mul\ (or something like that on my pc)
Software ID {2A075BB4-E976-4278-BF3F-E5C6945D84C0}