Jump to content

website blocked due to malware and exploit


Go to solution Solved by JSntgRvr,

Recommended Posts

Hello,

A Malwarebytes pop up window keeps coming up saying that a website is blocked due to malware, and at times due to exploit

IP address: 212.237.217.136

Port: 80

Type: outbound

File: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Malwarebytes system scans including root kits, PUMs and PUPs are clean.

Link to post
Share on other sites

Let's go ahead and run a couple of scans and get some updated logs from your system.


Please make the following changes.

 

 


Next, run these steps and post back the logs as an attachment when ready.


[ 1 ]

Malwarebytes for Windows

  • If you already have Malwarebytes installed then open Malwarebytes and click on the small gear icon, then click on the "Check for updates" button on the General tab.
  • After any updates, click the middle Scan button from the main page. It will automatically run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed, make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let us know in your next reply that the scanner would not run.

[ 2 ]

Malwarebytes AdwCleaner

  • Please download Malwarebytes AdwCleaner and save the file to your Desktop or Downloads folder.
  • Double-click to run the program - Malwarebytes AdwCleaner guide
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine to finish the cleaning process.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach that log to your next reply.
     
  • If No Detections are found, Click Skip Basic Repair

    WARNING: Do Not click the Run Basic Repair button unless instructed to by a Malwarebytes support agent or authorized helper


 

RESTART THE COMPUTER Before running Step 3

[ 3 ]

Gather MBST Logs

Please do the following so that we may take a closer look at your system for any possible infections.

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to the Public desktop, please upload that file on your next reply

    WARNING: Do Not click the Repair System under Advanced unless requested to by a Malwarebytes support agent or authorized helper
Link to post
Share on other sites

First thanks for the help tracking this problem. I ran the various steps suggested: Malwarebyte scan came up clean, adwcleaner found a PUP related to drivers update, rebooted machine, and gathered MBST logs

The pop up window about blocking website is still here

Various files uploaded

 

Malwarebytes Scan Report 2024-06-12 161740.txt mbst-grab-results.zip AdwCleaner[S00].txt AdwCleaner[C00].txt

Link to post
Share on other sites

  • Solution

Welcome smile.png
 
I'll be helping you with your computer.
 
Please read this post completely before beginning. If there's anything that you do not understand, please don't hesitate to ask before proceeding.
 
Please take note of the guidelines for this fix:

  • Please note that I am a volunteer. I do have a family, a career, and other endeavors that may prevent immediate responses that meet your schedule. Do note that the differences in time zones could present a problem as well. Your patience and understanding will be greatly appreciated.
  • First of all, the procedures we are about to perform are specific to your problem and should only be used on this specific computer.
  • Do not make any changes to your computer that include installing/uninstalling programs, deleting files, modifying the registry, nor running scanners or tools of any kind unless specifically requested by me.
  • Please read ALL instructions carefully and perform the steps fully and in the order they are written.
  • If things appear to be better, let me know. Just because the symptoms no longer exist as before, does not mean that you are clean.
  • Continue to read and follow my instructions until I tell you that your machine is clean.
  • If you have any questions at all, please do not hesitate to ask before performing the task that I ask of you, and please wait for my reply before you proceed.
  • Scanning with programs and reading the logs do take a fair amount of time. Again, your patience will be necessary. smile.png

Let's begin... 

This Fix will empty the following folders:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome, and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Discord cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns, please ask before running this fix.

The system will be rebooted after the fix has run.

FRST64 was saved as C:\Users\name\Downloads\FRSTEnglish.exe

  • Download the enclosed file  Fixlist.txt
  • Save it in the same location FRST64 is saved.
  • Start FRST (FRST64) with Administrator privileges
  • This time around Press the Fix button and wait
  • When finished, a log file (Fixlog.txt) will pop up and saved in the same location the tool was ran from.

Please attach this file in your next reply.

Dr.Web CureIt!

Please download the Dr.Web CureIt! anti-virus utility
https://free.drweb.com/

 

You will need to send them an email to obtain a link to download the scanner, please do so

  • The downloaded file will normally have a unique name such as:  q7a9tr4p.exe
  • Close all open applications and locate the downloaded file and double-click to run it
  • The program will take a moment to launch and bring up the License and Update screen
  • Place a check mark to agree to the terms and then click on the Continue button
  • Click the underlined link Select objects for scanning
  • On the top left click the Scanning objects that should automatically check all objects
  • Click the small wrench and make sure there is a check on Automatically apply actions to threats
  • Then click the large button on bottom right Start scanning
  • Once the scan has completed there will be a link named Open report click that and a log named cureit.log should open in Notepad
  • The log is saved in the folder named Doctor Web in the top of your user profile folders
  • Please attach that log on your next reply
Link to post
Share on other sites

My street was out of power all day due to repair so when I booted up the computer the Malwarebytes pop up window this time warned about worm

I couldn't find the FRST64 file in the downloads folder so I ran the FRSTEnglish file instead since it's what I had but without admin privilege since the option wasn't offered. Rebooted machine. Log is below

Half-way through running FRSTEnglish, the Malwarebytes pop up window disappeared and hasn't reappeared yet

I downloaded and ran the Dr.Web Cureit! utility without finding anything new (log below)

Thank you, Yann

Fixlog.txt cureit.log

Link to post
Share on other sites

The computer is running fine and there is no Malwarebytes window warning anymore.

Could FRST have gotten rid of the infection when cleaning up tmp files, etc?

I should mention that this computer was hacked ~one month ago probably by an email that I opened. I had it cleaned by a local tech. He mentioned that he ran a dozen scripts and found several viruses.  I haven't stored important info on it since. Still a little disconcerting.

Link to post
Share on other sites

There were signs of malware:

Quote

Startup: C:\Users\name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xhoqzjwo5v4.lnk [2023-11-02] <==== ATTENTION 
Startup: C:\Users\name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ycaeix0pcog.lnk [2023-11-02] <==== ATTENTION 
Startup: C:\Users\name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xhoqzjwo5v4.lnk [2023-11-02] <==== ATTENTION 
ShortcutTarget: xhoqzjwo5v4.lnk -> C:\Users\name\AppData\Roaming\qgoyziiimlp.1dh23f4aogm () <==== ATTENTION [zero byte File/Folder] <==== ATTENTION 
ShortcutTarget: ycaeix0pcog.lnk -> C:\Users\name\AppData\Roaming\2vuzqz005r4.q14bgr1l5uk () <==== ATTENTION [zero byte File/Folder] <==== ATTENTION 

All temp files were deleted. It is possible that malware be hidden on temp files. As of now all looks clear, Lets proceed with the cleanup:

Please download KpRm by Kernel-panik and save to your Desktop.

  • Click on KpRm.exe to run the tool.

Vista/Windows 7/8/10 users right-click and select Run As Administrator.

  • Put a check mark next to these items:

- Delete tools

- Delete Restore Points

- Create Restore Point

- Delete now

  • Click the "Run" button.

automatic.png

  • When the tool has finished, it will create and open a log report and delete itself.

A few final recommendations:
 
The following information will help you to keep your computer and data safer as well as improve your overall privacy

Malwarebytes Browser Guard

uBlock Origin

Cybersecurity basics & protection
 
Everything you need to know about cybercrime
https://www.malwarebytes.com/cybersecurity
 
Further reading if you'd like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/
 
Please review the following to help you better protect your computer and privacy
 
Tips to help protect from infection
 
Hopefully, we've been able to assist you with correcting your system issues.
 
Thank you for using Malwarebytes. Please tell your friends and family if they too need assistance with malware removal.

Regards.

Link to post
Share on other sites

I can see that 3 out of 5 suspicious items date from November, well before the May hack I mentioned. As you recommended I proceeded with the clean up. It'll take me a little while to review all the reading materials you provided. I installed Bitwarden in order to avoid a repeat of the credit cards/bank account fiasco of a month ago. I really appreciate all your help. Thank you,  Yann

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.