Jump to content

Really Desperate!


Recommended Posts

So, I have been having, since I installed a driver for a TP-link product, this weird pop-up: Malware bytes is constantly blocking the IP 94.102.63.85 (outbound) and the process is: C:\Windows\System32\svchost.exe. I have tried a lot of different AV softwares, such as Kaspersky, Malwarebytes, Junkware removal tool, adware cleaner, but nothing seems to work. I am so worried about this problem, that I restored my notebook to its factory defautls, but the problem persists!

 

I really hope you can help me

Link to post
Share on other sites

Hello and welcome to Malwarebytes.org

 

P2P/Piracy Warning:

 

If you're using Peer 2 Peer software such as uTorrent, BitTorrent or similar you must either fully uninstall them or completely disable them from running while being assisted here. Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.If you have illegal/cracked software, cracks, keygens etc. on the system, please remove or uninstall them now and read the policy on Piracy.

 

Next,

 

Change the download folder setting in the default Browser so all tools we may use are saved to the Desktop:

 

Chrome.JPGGoogle Chrome - Click the "Customize and control Google Chrome" button in the upper right-corner of the browser. Settings.JPG

Choose Settings. at the bottom of the screen click the

"Show advanced settings..." link. Scroll down to find the Downloads section and click the Change... button. Select your desktop and click OK.

 

Firefox.JPGMozilla Firefox - Click the "Open Menu" button in the upper right-corner of the browser. Settings.JPG Choose Options. In the downloads section, click the Browse button, click on the Desktop folder and the click the "Select Folder" button. Click OK to get out of the Options menu.

 

IE.jpgInternet Explorer - Click the Tools menu in the upper right-corner of the browser. Tools.JPG Select View downloads. Select the Options link in the lower left of the window. Click Browse and select the Desktop and then choose the Select Folder button. Click OK to get out of the download options screen and then click Close to get out of the View Downloads screen.

NOTE: IE8 Does not support changing download locations in this manner. You will need to download the tool(s) to the default folder, usually Downloads, then copy them to the desktop.

 

Next,

 

Follow the instructions in the following link to show hidden files:

 

http://www.bleepingcomputer.com/tutorials/how-to-see-hidden-files-in-windows/

 

Next,

 

Please open Malwarebytes Anti-Malware.

 


On the Settings tab > Detection and Protection sub tab, Detection Options, tick the box "Scan for rootkits".
Under Non-Malware Protection sub tab Change PUP and PUM entries to Treat detections as Malware
Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
A Threat Scan will begin.
With some infections, you may see this message box.
 
        'Could not load DDA driver'
 
Click 'Yes' to this message, to allow the driver to load after a restart.
Allow the computer to restart. Continue with the rest of these instructions.
When the scan is complete, click Apply Actions.
Wait for the prompt to restart the computer to appear, then click on Yes.
After the restart once you are back at your desktop, open MBAM once more.

 

To get the log from Malwarebytes do the following:

 


Click on the History tab > Application Logs.
Double click on the scan log which shows the Date and time of the scan just performed.
Click Export > From export you have three options:
 
  Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
  Text file (*.txt)        - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
  XML file (*.xml)      - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
 
Recommend you use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…

 

 

If Malwarebytes is not installed follow these instructions first:

 

Download Malwarebytes Anti-Malware to your desktop.


Double-click mbam-setup and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to the following:
Launch Malwarebytes Anti-Malware
A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
Click Finish. Follow the instructions above....

 

Next,

 

Download Farbar Recovery Scan Tool and save it to your desktop.

 

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

 


Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

 

Let me see those logs in your reply....

 

Thank you,

 

Kevin...

Link to post
Share on other sites

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into.

NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

 

Run FRST and press the Fix button just once and wait.

The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

 

Next,

 

Please check to see if malware has modified your DNS settings using the DNSCHECK tool from F-Secure:

 

https://www.ismydnshijacked.com/

 

Press: Start test

 

What is the Verdict?

 

Any DNS hijacking detected?

 

Next,

 

Please download RogueKiller and save it to your desktop from the following link: http://www.bleepingcomputer.com/download/roguekiller/

 


Quit all running programs.
For Windows XP, double-click to start.
For Vista,Windows 7/8, Right-click on the program and select Run as Administrator to start and when prompted allow it to run.
Read and accept the EULA (End User Licene Agreement)
Click Scan to scan the system.
When the scan completes select "Report", log will open. Close the program > Don't Fix anything!
Post back the report which should also be located here:

 

Let me see those logs please...

 

Thanks,

 

Kevin..

 

 

Fixlist.txt

Link to post
Share on other sites

Hello Kevin, so I used DNSCHECK tool from F-Secure, the following message was displayed:

 

 

You appear to be using a safe DNS server, but Router Checker was not able to reach a final verdict.

Your DNS server is one that appears to be widely used or administered by your Internet service provider, but Router Checker could not complete its check. This doesn’t mean there’s a problem, but here are some things you can do if you want to play it safe:

  • Ask people with access to your router (such as friends or family members) if they’ve installed software or adjusted settings that make changes to your Internet set-up.
  • Reset your router so it returns to its factory settings. Please remember to change your router’s default password and disable any external administrator access privileges after the reset.
  • Check the website of the router’s manufacturer for software updates.
  • Run a virus checker such as F-Secure SAFE or F-Secure Online Scanner.
  • Run Router Checker again.

It might be a misdiagnosis if you complete these steps and Router Checker continues to give you the same result.

 

The 2 logs you requested are attached.

Link to post
Share on other sites

Double-click RogueKiller.exe to run again. (Vista/7/8 right-click and select Run as Administrator)

When "initializing/pre-scan" completes  press the Scan button, this may take a few minutes to complete.

When the scan completes open the Registry tab and locate the following detections:

[Orphan] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad | WebCheck : {E6FB5E20-DE35-11CF-9C87-00AA005127ED}  -> Encontrado
[Orphan] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad | WebCheck : {E6FB5E20-DE35-11CF-9C87-00AA005127ED}  -> Encontrado
[Orphan] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ SkyDrive1 | (default) : {F241C880-6982-4CE5-8CF7-7085BA96DA5A}  -> Encontrado
[Orphan] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ SkyDrive2 | (default) : {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}  -> Encontrado
[Orphan] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ SkyDrive3 | (default) : {BBACC218-34EA-4666-9D7A-C78F2274A524}  -> Encontrado
[Orphan] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ SkyDrive1 | (default) : {F241C880-6982-4CE5-8CF7-7085BA96DA5A}  -> Encontrado
[Orphan] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ SkyDrive2 | (default) : {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}  -> Encontrado
[Orphan] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\ SkyDrive3 | (default) : {BBACC218-34EA-4666-9D7A-C78F2274A524}  -> Encontrado
[Orphan] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} -> Encontrado
[Orphan] (X64) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{5547CE1F-74E9-41E5-9CBF-5211ECC37341} | CLSID : {9DE5BD99-A5C0-4A88-9A26-D19C2826E4FA}  -> Encontrado
[Orphan] (X86) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{5547CE1F-74E9-41E5-9CBF-5211ECC37341} | CLSID : {9DE5BD99-A5C0-4A88-9A26-D19C2826E4FA}  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 94.102.63.85 8.8.8.8 [NL][-]  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 94.102.63.85 8.8.8.8 [NL][-]  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A9C9A2EA-831D-4174-90D1-7A1EAEE1342A} | DhcpNameServer : 94.102.63.85 8.8.8.8 [NL][-]  -> Encontrado
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A9C9A2EA-831D-4174-90D1-7A1EAEE1342A} | DhcpNameServer : 94.102.63.85 8.8.8.8 [NL][-]  -> Encontrado


Make sure those entries are Checkmarked (ticked) also ensure that all other entries are not Checkmarked.

Hit the Delete button, when complete select "Report" post that log...

Link to post
Share on other sites

So, I ran it a second time:


You appear to be using a safe DNS server, but Router Checker was not able to reach a final verdict.


Your DNS server is one that appears to be widely used or administered by your Internet service provider, but Router Checker could not complete its check. This doesn’t mean there’s a problem, but here are some things you can do if you want to play it safe:


  • Ask people with access to your router (such as friends or family members) if they’ve installed software or adjusted settings that make changes to your Internet set-up.
  • Reset your router so it returns to its factory settings. Please remember to change your router’s default password and disable any external administrator access privileges after the reset.
  • Check the website of the router’s manufacturer for software updates.
  • Run a virus checker such as F-Secure SAFE or F-Secure Online Scanner.
  • Run Router Checker again.

It might be a misdiagnosis if you complete these steps and Router Checker continues to give you the same result.


Link to post
Share on other sites

I'm still having the same issue :(  

I've uploaded a JPEG file to show it:

 

HLKWMXD.jpg

 

May I add that I realized I had this malware due to the increased number of adds in all sites I visit (and strange ones indeed, most of the them are written in Russian and appear in sites they previously did not) and due to Malwarebytes' constant pop-up (shown in the figure).

Link to post
Share on other sites

No, it was the same password the technician used the first time he installed my modem and set the Wi-Fi, that is, ever since he created that SSID, I have not changed it, nor its passwords (in fact, the only setting I ever changed was the Lease Time, which I increased a lot, because my notebook would not connect to the Wi-fi automatically day after day, only my smartphone).

So, pressing the reset button has changed nothing at all :(

 

I'm sorry to question you so much, but I am really nervous with this situation, do you think someone has hacked into my notebook, or put some Dlls into my windows (since restoring windows to factory defautls has not solve this issue) ? Or is it some file that is trying to communicate with something (since Mallwarebytes keeps popping-up)?

Link to post
Share on other sites

Yes please, I`ve listed some instruction to use DNS jumper just incase needed. d/l the tool and run it. It will read and show what your DNS settings are.

 

Looking at the DNS setting I would assume you originally used Google Public DNS settings,  8.8.4.4  8.8.8.8 These have been altered to the following:  94.102.63.85 - 8.8.8.8

 

Maybe the easiest way is to use DNSjumper tool from here: http://www.sordum.org/7952/dns-jumper-v1-0-6/ Is straight forward...

 

Download and unzip tool from here http://www.sordum.org/dns_jumper/downloads.php to your desktop, the tool is portable so no installation required. Go to first link I posted for instructions...

 

To change the settings use the dropdown under "Choose a DNS server" yours will probably be US - Google Public DNS, when selected choose "Apply DNS"

Link to post
Share on other sites

Hey, luckily I managed to find a .data archive I created 2 months ago, and I used it to restore my modem configuration to that time. Do you want me to test it now?

 

So, after I did this, I ran F-Secure Router Checker and got this:

SPAmcDU.jpg

 

Besides, Malwarebytes doesn't seem to be popping up anymore (I guess we need more time to really know this ). However this particular site:

http://www.speedtest.net/pt/

is still crowded with ads :(

 

What shall be our next step?

Link to post
Share on other sites

Edit: I extracted the Jumper from the folder and ran it again, the result is a bit different:

bVE8K8l.jpg

 

I tried using my signal repeater and just got a single pop-up when I switched to it, but no more blocks during websurfing. Also, F-secure also displays it now as beeing safe.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.