kgibson Posted October 19, 2020 ID:1415185 Share Posted October 19, 2020 Hello, About an hour ago, Malwarebytes began to report a Trojan for the domain: cilkonlay.com Port 443; outbound. As best I can tell, this happens when browsing to foxnews.com Please advise next steps to correct. Link to post Share on other sites More sharing options...
kevinf80 Posted October 19, 2020 ID:1415191 Share Posted October 19, 2020 Hello kgibson and welcome to Malwarebytes, Continue: Let me see the last three RTP Detection logs from Malwarebytes, do the following: Open Malwarebytes.... Click on the Detection History window from main interface. Then click on "History" that will open to a historical list Double click on the RTP Detection log which shows the Date and time of the scan just performed. Click Export > From export you have two options:Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your replyText file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply Please use "Text file (*.txt), then name the file and save to a place of choice, recommend "Desktop" then attach to reply Next, Open Malwarebytes, select > "settings" > "protection tab" Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on.... Go back to "DashBoard" select the Blue "Scan Now" tab...... When the scan completes quarantine any found entries... To get the log from Malwarebytes do the following: Click on the Detection History tab > from main interface. Then click on "History" that will open to a historical list Double click on the Scan log which shows the Date and time of the scan just performed. Click Export > From export you have two options:Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your replyText file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply… Next, Download AdwCleaner by Malwarebytes onto your Desktop. Or from this Mirror Right-click on AdwCleaner.exe and select Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users) Accept the EULA (I accept), then click on Scan Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply Next, Download Farbar Recovery Scan Tool and save it to your desktop. Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.htmlNote: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version. If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way... Be aware FRST must be run from an account with Administrator status... Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.) Make sure Addition.txt is checkmarked under "Optional scans" Press Scan button to run the tool.... It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply. The tool will also make a log named (Addition.txt) Please attach that log to your reply. Let me see those logs in your reply... Thank you, Kevin.... Link to post Share on other sites More sharing options...
kgibson Posted October 19, 2020 Author ID:1415207 Share Posted October 19, 2020 Hello Kevin, and thank you for your reply. Attached is the result of the first scan. I downloaded AdwCleaner and ran as requested. The only tab that had entries was "Preinstalled Software". I quarantined those; however upon closing it did not ask to reboot as you indicated. Do I just reboot manually to proceed? Log 10-19-2020 First Scan.txt Link to post Share on other sites More sharing options...
kevinf80 Posted October 19, 2020 ID:1415208 Share Posted October 19, 2020 If no reboot is done then it is not needed. Just continue... Link to post Share on other sites More sharing options...
kgibson Posted October 19, 2020 Author ID:1415249 Share Posted October 19, 2020 Clipboard after running AdwCleaner is below; frst.txt and addition.txt attached Thanks again, -k- Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 10/19/20 Scan Time: 5:57 PM Log File: 742a8592-125e-11eb-97b2-1866da0cdfcb.json -Software Information- Version: 4.2.1.89 Components Version: 1.0.1070 Update Package Version: 1.0.31642 License: Premium -System Information- OS: Windows 10 (Build 18362.1139) CPU: x64 File System: NTFS User: KEVIN-DELL\Kevin -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 435386 Threats Detected: 0 Threats Quarantined: 0 Time Elapsed: 1 min, 54 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 0 (No malicious items detected) Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end) Addition.txt FRST.txt Link to post Share on other sites More sharing options...
Solution kevinf80 Posted October 19, 2020 Solution ID:1415261 Share Posted October 19, 2020 Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone. Run FRST or FRST64 and press the Fix button just once and wait. If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.Note: If the tool warned you about an outdated version please download and run the updated version.NOTE-1: This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The following directories are emptied: Windows Temp Users Temp folders Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History Recently opened files cache Flash Player cache Java cache Steam HTML cache Explorer thumbnail and icon cache BITS transfer queue (qmgr*.dat files) Recycle Bin Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix. The system will be rebooted after the fix has run. Post the produced log, also let me know if the issue is cleared.. fixlist.txt Link to post Share on other sites More sharing options...
kgibson Posted October 20, 2020 Author ID:1415273 Share Posted October 20, 2020 Hi, and thank you again. Before running, I'm curious about the contents of the file. It appears to be opening ports and enabling TeamViewer. Why would I need to do that? Can I just remove TeamViewer? I don't use it. Link to post Share on other sites More sharing options...
kevinf80 Posted October 20, 2020 ID:1415298 Share Posted October 20, 2020 The fix is not opening ports or enabling TeamViewer, ports with no appended application/program are being removed, same goes for TeamViewer.... Link to post Share on other sites More sharing options...
kgibson Posted October 20, 2020 Author ID:1415325 Share Posted October 20, 2020 Ok, got it. I ran the fix; log attached. The issue appears to be resolved. (As a side note, I noticed it went away last night, prior to running the fix. It seemed to stop after running AdwCleaner and clicking Quarantine.) Thanks for all your help, and please let me know if there are additional steps? Link to post Share on other sites More sharing options...
kevinf80 Posted October 20, 2020 ID:1415326 Share Posted October 20, 2020 I do not see the fixlog attached..? Link to post Share on other sites More sharing options...
kgibson Posted October 20, 2020 Author ID:1415327 Share Posted October 20, 2020 Oops .... Attached. Fixlog.txt Link to post Share on other sites More sharing options...
kevinf80 Posted October 20, 2020 ID:1415328 Share Posted October 20, 2020 Thanks for the log, I guess we can clean up..... Right click on FRST here: I:\Libraries\Downloads\FRST64.exe and rename uninstall.exe when complete right click on uninstall.exe and select "Run as Administrator" If you do not see the .exe appended that is because file extensions are hidden, in that case just rename FRST64 to uninstall That action will remove FRST and all created files and folders... Next, Read the following links to fully understand PC Security and Best Practices, you may find them useful....Answers to Common Security Questions and best PracticesDo I need a Registry Cleaner? Take care and surf safe Kevin... Link to post Share on other sites More sharing options...
kgibson Posted October 20, 2020 Author ID:1415350 Share Posted October 20, 2020 Great! Thank you again. I've cleaned up. By the way, I also tried to donate through PayPal (using a US credit card). It keeps throwing an error and says "Try again later". I'll keep trying. Cheers, -k- Link to post Share on other sites More sharing options...
kevinf80 Posted October 20, 2020 ID:1415352 Share Posted October 20, 2020 Hello kgibson, Good to hear you`ve cleaned up and all is well for you. Not sure what is wrong with paypal, maybe my account is full.... Regards, Kevin... Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted October 20, 2020 Root Admin ID:1415435 Share Posted October 20, 2020 Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Please review the following for Tips to help protect from infection Thank you Link to post Share on other sites More sharing options...
Recommended Posts