Jump to content

I think I'm in a botnet


Recommended Posts

Hi, my CPU is overheated and sometimes the laptop switch off (hibernate). I was angry because it closes 3 times in a row, so I opened my Gaming Center and I see the MHz I don't understand why... First I think because I was using Virtual Box, so I closed it and then my computer again switch off, so fastly I have forced it off to see what happens If I restart it. I logged in and when I was in the desktop, I opened again the Gaming Center... and the MHz was again in 3,50 [~]. So I thinked... aha, i'm mining... There are the proves: [PS: It started to do this weekend... Maybe when I downloaded Unity? JAJAJAJA]

xxxxx1.png

xxxxx2.png

xxxxx3.png

xxxxx4.png

xxxxx5.png

Link to post
Share on other sites

Hello The7Power and welcome to Malwarebytes,

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Open Malwarebytes Anti-Malware.
 
  • On the Settings tab > Protection Scroll to and make sure the following are selected:
    Scan for Rootkits
    Scan within Archives
     
  • Scroll further to Potential Threat Protection make sure the following are set as follows:
    Potentially Unwanted Programs (PUP`s) set as :- Always detect PUP`s (recommended)
    Potentially Unwanted Modifications (PUM`s) set as :- Alwaysdetect PUM`s (recommended)
     
  • Click on the Scan make sure Threat Scan is selected,
  • A Threat Scan will begin.
  • When the scan is complete if anything is found make sure that the first checkbox at the top is checked (that will automatically check all detected items), then click on the Quarantine Selected Tab
  • If asked to restart your computer to complete the removal, please do so
  • When complete click on Export Summary after deletion (bottom-left corner) and select Copy to Clipboard.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more to retrieve the log.


To get the log from Malwarebytes do the following:
 
  • Click on the Reports tab > from main interface.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

     
  • Use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
 
  • Right-click on AdwCleaner.exe and select user posted imageRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Clean button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Next,

Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop

Ensure to get the correct version for your system....

https://www.microsoft.com/en-gb/download/malicious-software-removal-tool-details.aspx


Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.


Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\mrt.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

Let me see those logs in your reply, also tell me if there are any remaining issues or concerns....

Thank you,

Kevin...

fixlist.txt

Link to post
Share on other sites

I'm scaning now with Malwarebytes... I don't sayed this, but I work in a server in which we try to our users can't play with hacks/cheats (free & P2C (Pay to Cheat)), so 99% of the free have viruses or trojans, I'm using payed cheats from contacts/friends. So, if there is a cheat that is a real dangerous archive, tell me. And there is the FRST log.

Fixlog.txt

Link to post
Share on other sites

The CPU frequency stills to be 3.1GHz... I think is too dangerous if I have 2.60GHz... right? 

 

[EDIT]

The scan of Malwarebytes finishes, puting to quarantine the selected malware/PUP. PS: I haved two crackers, for Netflix and Spotify. Aren't mine, from a friend. They go to quarantine too.

Edited by The7Power
Link to post
Share on other sites

Run the following:

Download RogueKiller and save it on your desktop, ensure to download correct version..

RogueKiller (X86)

RogueKiller (x64)
 
  • Exit all running applications.
  • Double-click on RogueKiller.exe to launch the tool. On its first execution, RogueKiller will disply the software license (EULA), click on "Accept" to continue.
  • If RogueKiller is unable to load, do not hesitate to try launching it several times or rename it winlogon.
  • Click "Start Scan" to begin the analysis. This may take some time.
  • Once the scan is complete, click the "Open TXT" button to display the scan report.
  • Copy/Paste it's content in your next reply.
Do not use the Remove Selected option until i`ve had a look at the log..

 

Link to post
Share on other sites

2 minutes ago, kevinf80 said:

Your CPU readings are normal.... have a look at mine...

 

The strange thing is that I don't remember I was at 3GHz normally... And for a friend's idea, I just see what happens if I unplug the notebook and only use battery, and the MHz, goes to 1.5GHz, and sometimes upping to 2GHz or more (Before this) Maybe I need to delete apps or something? My HDD is full of games and in-game records.

Link to post
Share on other sites

# AdwCleaner 7.0.8.0 - Logfile created on Mon Feb 12 22:20:02 2018
# Updated on 2018/08/02 by Malwarebytes 
# Running on Windows 10 Home (X64)
# Mode: clean
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services deleted.

***** [ Folders ] *****

Deleted: C:\Program Files\Hola
Deleted: C:\Users\flore\AppData\Roaming\Hola
Deleted: C:\Users\flore\AppData\Roaming\imminent
Deleted: C:\Users\flore\Desktop\spyhunter
Deleted: C:\Users\flore\Desktop\SpyHunter


***** [ Files ] *****

Deleted: C:\Users\flore\Downloads\Hola-Setup.exe


***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks deleted.

***** [ Registry ] *****

Deleted: [Key] - HKCU\Software\Microsoft\Internet Explorer\DOMStorage\dmmzebk6min1t.cloudfront.net
Deleted: [Key] - HKLM\SOFTWARE\Hola
Deleted: [Key] - HKU\.DEFAULT\Software\Hola
Deleted: [Key] - HKU\S-1-5-18\Software\Hola
Deleted: [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\hola.org
Deleted: [Key] - HKU\S-1-5-21-3876092839-3678774668-485418510-1001\Software\win
Deleted: [Key] - HKCU\Software\win
Deleted: [Key] - HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Reason\ReasonByteFence
Deleted: [Key] - HKLM\SOFTWARE\EnigmaSoftwareGroup
Deleted: [Key] - HKLM\SOFTWARE\EnigmaSoftwareGroup
Deleted: [Value] - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders|C:\Program Files (x86)\Microleaves\


***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries deleted.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries deleted.

*************************

::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0

*************************

C:/AdwCleaner/AdwCleaner[S0].txt - [2129 B] - [2018/2/12 22:18:0]mrt.log


########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########

RogueKiller V12.12.4.0 (x64) [Feb 12 2018] (Gratuito) por Adlice Software
correo : http://www.adlice.com/contact/
Realimentación : https://forum.adlice.com
Página Web : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Sistema Operativo : Windows 10 (10.0.16299) 64 bits version
Comenzado en : Modo Normal
Usuario : The7Power [Administrador]
Iniciado desde : C:\Users\flore\Downloads\RogueKiller_portable64.exe
Modo : Análisis -- Fecha : 02/12/2018 23:38:16 (Duración : 00:54:16)

¤¤¤ Procesos : 0 ¤¤¤

¤¤¤ Registro : 7 ¤¤¤
[PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3876092839-3678774668-485418510-1001\Software\IM -> Encontrado
[PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3876092839-3678774668-485418510-1001\Software\IM -> Encontrado
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-3876092839-3678774668-485418510-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://asus15.msn.com/?pc=ASTE  -> Encontrado
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-3876092839-3678774668-485418510-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://asus15.msn.com/?pc=ASTE  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 62.81.16.148 62.81.16.213 ([X][X])  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{17db4c5e-7abf-4dfc-ac3d-b7e23ffb93d0} | DhcpNameServer : 62.81.16.148 62.81.16.213 ([X][X])  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{b2137967-12d1-4114-ba2f-e4194922f7b6} | DhcpNameServer : 62.81.16.148 62.81.16.213 ([X][X])  -> Encontrado

¤¤¤ Tareas : 0 ¤¤¤

¤¤¤ Archivos : 12 ¤¤¤
[PUP.HackTool][Carpeta] C:\ProgramData\KMSAuto -> Encontrado
[PUP.Gen1][Carpeta] C:\ProgramData\simplitec -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.4.9_43295\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.4.9_43388\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.5.0_43916\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.5.0_44090\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.5.0_44294\utorrentie.exe -> Encontrado
[PUP.uTorrentAds][Archivo] C:\Users\flore\AppData\Roaming\uTorrent\updates\3.5.1_44332\utorrentie.exe -> Encontrado
[PUP.HackTool][Carpeta] C:\ProgramData\KMSAuto -> Encontrado
[PUP.Gen1][Carpeta] C:\ProgramData\simplitec -> Encontrado

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Archivo Hosts : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Cargado) ¤¤¤

¤¤¤ Exploradores Web : 3 ¤¤¤
[PUM.HomePage][Firefox:Config] wsk91m19.default-1491489667997 : user_pref("browser.startup.homepage", "http://www.cool-itv.net"); -> Encontrado
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [http://google.com/|chrome://newtab/] -> Encontrado
[PUM.SearchPage][Chrome:Config] Default [SecurePrefs] : default_search_provider_data.template_url_data.keyword [google.es] -> Encontrado

¤¤¤ Comprobacion MBR : ¤¤¤
+++++ PhysicalDrive0: HGST HTS721010A9E630 +++++
--- User ---
[MBR] 358887f8de16cecc37b5ee059a6c71fc
[BSP] 007d471dbb79a44c712697f8439c360e : Empty|VT.Unknown MBR Code
Partition table:
0 - [MAN-MOUNT] EFI system partition | Offset (sectors): 2048 | Size: 260 MB
1 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 534528 | Size: 16 MB
2 - Basic data partition | Offset (sectors): 567296 | Size: 380772 MB
3 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 780388352 | Size: 499 MB
4 - Basic data partition | Offset (sectors): 781410304 | Size: 572321 MB
User = LL1 ... OK
User = LL2 ... OK

Link to post
Share on other sites

Thanks for those logs, continue:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Open Malwarebytes Anti-Malware.
 
  • On the Settings tab > Protection Scroll to and make sure the following are selected:
    Scan for Rootkits
    Scan within Archives
     
  • Scroll further to Potential Threat Protection make sure the following are set as follows:
    Potentially Unwanted Programs (PUP`s) set as :- Always detect PUP`s (recommended)
    Potentially Unwanted Modifications (PUM`s) set as :- Alwaysdetect PUM`s (recommended)
     
  • Click on the Scan make sure Threat Scan is selected,
  • A Threat Scan will begin.
  • When the scan is complete if anything is found make sure that the first checkbox at the top is checked (that will automatically check all detected items), then click on the Quarantine Selected Tab
  • If asked to restart your computer to complete the removal, please do so
  • When complete click on Export Summary after deletion (bottom-left corner) and select Copy to Clipboard.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more to retrieve the log.


To get the log from Malwarebytes do the following:
 
  • Click on the Reports tab > from main interface.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

     
  • Use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download Norton Power Eraser from here: https://security.symantec.com/nbrt/npe.aspx? and save direct to your Desktop.
 
  • Double click on NPE.exe to start the tool. Vista, Windows 7/8/8.1/10 right click, select "Run as Administrator" accept UAC.

    user posted image

     
  • The EULA will open, accept that to move on...

    user posted image

     
  • The tool will check for updates/latest version

    user posted image

     
  • The GUI will open, select "Scan for Risks"

    user posted image

     
  • Rootkit scan alert will open, select "Restart"

    user posted image

     
  • Rootkit scan preparations will time out and Reboot the system.

    user posted image

     
  • Tool will will restart and check for update, do nothing.

    user posted image

     
  • System scan will start, do nothing.

    user posted image

     
  • If infections are found a list will be produced, make sure to checkmark "Create System Restore Point" then select "Fix Now" if nothing is found select "Exit" to close out the tool.

    user posted image

     
  • To remove "found entries" the system will need to restart, select that option.

    user posted image

     
  • If applicable select "Locate Log" attach to reply. Select "Done" when complete....
.

Let me see those logs in your reply...

Thank you,

Kevin....

 

fixlist.txt

Link to post
Share on other sites

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.