<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remove  JS:Adware.Lnkr.E in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4448512#M6314</link>
    <description>&lt;P&gt;Hey David,&lt;/P&gt;&lt;P&gt;Unfortunately, we've already tried that and it just kept coming up (different file &amp;amp; SHA of course). We removed everything in Temp, rebooted, and disabled all browser plugins. One user we even re-imaged his machine and it came back. Most likely sounds like what user 'TruthNotTruth' had to say about website drive-by. Can you provide what AMP/Secure EndPoint is flagging on these types of events?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Cheo&lt;/P&gt;</description>
    <pubDate>Thu, 12 Aug 2021 15:02:49 GMT</pubDate>
    <dc:creator>ccodda</dc:creator>
    <dc:date>2021-08-12T15:02:49Z</dc:date>
    <item>
      <title>Remove  JS:Adware.Lnkr.E</title>
      <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4313268#M6058</link>
      <description>&lt;P&gt;After a running running a full scan we still received email from Cisco AMP the computer is infected.... how i can remove it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Event Type:&lt;/STRONG&gt; Threat Detected&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Computer:&lt;/STRONG&gt; CDCMKTGHJPCL63&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Hostname:&lt;/STRONG&gt; CDCMKTGHJPCL63&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;IP:&lt;/STRONG&gt; 192.168.1.186, 10.101.214.190&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Detection:&lt;/STRONG&gt; JS:Adware.Lnkr.E&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;File:&lt;/STRONG&gt; e7c6af52-44c5-4edf-b2e8-06b400978330.tmp&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;File path:&lt;/STRONG&gt; \\?\C:\Users\astewart\AppData\Local\Temp\e7c6af52-44c5-4edf-b2e8-06b400978330.tmp&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Detection SHA-256:&lt;/STRONG&gt;041d08101884d7d0a91ce2b98cffd8a5ffca75941e4556ddbf5da7bb7f984ac2&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;By Application:&lt;/STRONG&gt; chrome.exe&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Application SHA-256:&lt;/STRONG&gt;bb8b199f504db7e81cf32ce3c458d2a8533beac8dcefa5df024fa79fe132648a&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt; Medium&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Timestamp:&lt;/STRONG&gt; 2021-03-24 15:54:27 +0000 UTC&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 18:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4313268#M6058</guid>
      <dc:creator>mradamorales</dc:creator>
      <dc:date>2021-03-24T18:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remove  JS:Adware.Lnkr.E</title>
      <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4314246#M6060</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the detected SHA-256 value, I don't see any detection on AMP.&lt;/P&gt;
&lt;P&gt;Please check for the event details on the AMP console and share the screenshot so that I can suggest accordingly.&lt;/P&gt;
&lt;P&gt;Also, please make sure that the email is a genuine email received from AMP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: You can open a TAC case as well to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Pratham&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 04:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4314246#M6060</guid>
      <dc:creator>ppreenja</dc:creator>
      <dc:date>2021-03-26T04:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Remove  JS:Adware.Lnkr.E</title>
      <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4432385#M6210</link>
      <description>&lt;P&gt;I have this problem too, and it's been going on for some time. No one from Cisco can give me an answer. The SHA changes every few days and is never in VirusTotal. It would be nice if Cisco had a definition of what JS:Adware.Lnkr.E is specifically triggering on.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 15:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4432385#M6210</guid>
      <dc:creator>cheo.codda</dc:creator>
      <dc:date>2021-07-13T15:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Remove  JS:Adware.Lnkr.E</title>
      <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4447766#M6307</link>
      <description>&lt;P&gt;Imagine you were downloading something from the web, but arbitrarily decided to check the file's integrity only halfway through the download using the .tmp file for the download. A useless and&amp;nbsp; pointless exercise some might say, but every single time I see these (which is what lead me to searching the community) this is what looks to be happening. It guarantees the 'detection' hash is always unique and always useless, and of course the file will never exist at that location after the event - this is the nature of a temp file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These don't usually appear to be user-initiated downloads in my experience, but rather a user visits some website that uses GZip compressed .JS files and AMP generates a meaningless false positive detection as a result. Curious what others may have done to remedy this as it seems the only solution would be to either exclude the threat category or use a path-based exclusion for 'C:\Users\*\AppData\Local\Temp\*.tmp'.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 12:40:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4447766#M6307</guid>
      <dc:creator>TruthNotTruth</dc:creator>
      <dc:date>2021-08-11T12:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remove  JS:Adware.Lnkr.E</title>
      <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4448239#M6311</link>
      <description>&lt;P&gt;This is a temp file and it is harmless to delete out from the disk. Do not create any exclusion for the temp file, just keep your Internet browsing safe. I personally think the infection will no longer pops up if the temp directory is cleaned \\?\C:\Users\astewart\AppData\Local\Temp\e7c6af52-44c5-4edf-b2e8-06b400978330.tmp&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 07:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4448239#M6311</guid>
      <dc:creator>David Janulik</dc:creator>
      <dc:date>2021-08-12T07:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Remove  JS:Adware.Lnkr.E</title>
      <link>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4448512#M6314</link>
      <description>&lt;P&gt;Hey David,&lt;/P&gt;&lt;P&gt;Unfortunately, we've already tried that and it just kept coming up (different file &amp;amp; SHA of course). We removed everything in Temp, rebooted, and disabled all browser plugins. One user we even re-imaged his machine and it came back. Most likely sounds like what user 'TruthNotTruth' had to say about website drive-by. Can you provide what AMP/Secure EndPoint is flagging on these types of events?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Cheo&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 15:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/remove-js-adware-lnkr-e/m-p/4448512#M6314</guid>
      <dc:creator>ccodda</dc:creator>
      <dc:date>2021-08-12T15:02:49Z</dc:date>
    </item>
  </channel>
</rss>

