Jump to content

Recommended Posts

Hello, yesterday I just wanted to make sure I'm not infected with malware etc.  I ran several programs and no real threats were found, but rogue killer did find Pum.dns. I ran malwarebytes and thankfully no threats or PUPs. Can you please have a look because I'm way too paranoid about malware. And I wonder if a malwarebytes scan is enough when you want to check if you are safe, or should you use other programs too.

Thanks lots

Addition.txt

FRST.txt

Malwarescan.txt

Link to post
Share on other sites

Hello brighteyesss and :welcome:
I'm Android 8888 and I'll be helping you with your malware issues. Please ask questions if anything is unclear.

 

Your FRST logs are clean. We will run a fix script just for some tidy up.

 

First, enable System Restore.
http://www.thewindowsclub.com/system-restore-disabled-turn-on-system-restore-windows

 

Next,

Follow the instructions below to execute a fix on your system using FRST, and provide the log in your next reply.

  • Download the attached fixlist.txt file, and save it on your Desktop (or wherever your FRST64.exe executable is located); DO NOT open or modify that file!
  • Right-click on the FRST executable and select Spcusrh.pngRun as Administrator;
  • Click on the Fix button;
    NYA5Cbr.png
    Credits: Aura
  • On completion, a message will come up saying that the fix has been completed and it'll open a log in Notepad;
  • Please attach the Fixlog.txt in your next reply;

 

In your next reply, please copy and paste the entire contents of Fixlog.txt and also from the RogueKiller log file (RKlog.txt) for my review.

What issues or concerns are you having with the computer?

Thank you.

Android8888

fixlist.txt

Link to post
Share on other sites

Hello.

1 hour ago, brighteyesss said:

So I don't have to worry anymore ?

Not for now.

 

Okay, the FRST script ran well.

The RogueKiller log:

These entries are legit. They belong to Lenovo web site.

[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-1697640862-2283178921-85191061-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://lenovo15.msn.com/?pc=LCTE -> Gevonden
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-1697640862-2283178921-85191061-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://lenovo15.msn.com/?pc=LCTE -> Gevonden
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-1697640862-2283178921-85191061-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://lenovo15.msn.com/?pc=LCTE -> Gevonden
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-1697640862-2283178921-85191061-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://lenovo15.msn.com/?pc=LCTE -> Gevonden


The IP Address 84.116.46.22 on the following entries is owned by Liberty Global Operations B.V. located in Netherlands, which I presume that is your ISP (Internet Service Provider). If you know them, they are legitimate.

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 84.116.46.23 84.116.46.22 ([Netherlands][-])  -> Gevonden
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{43d9ef7c-053a-4e4f-8065-c7ca4ee5f294} | DhcpNameServer : 84.116.46.23 84.116.46.22 ([Netherlands][-])  -> Gevonden

Check here:
https://db-ip.com/84.116.46.22


Now, please scan your computer with ESET Online Scanner to ensure that your computer is clean.

  • Click on this link to open ESET Online Scanner in a new window.
    1. Click on the Scan Now button to download the esetonlinescanner_enu.exe file. Save it to your Desktop.
    2. Close all your programs and browsers and disconnect any USB flash drives from the computer.
    3. Please disable your antivirus program to avoid potential conflicts, improve the performance and speed up the scan.
    4. Double click on esetonlinescanner_enu.exe to start ESET Online Scanner. It will open a window with the Terms of Use.

  • Check mark Download latest version of ESET Online Scanner and click the Accept button.
  • Click Yes to accept any security warnings that may appear.
  • Under Computer scan settings, check mark Enable detection of potentially unwanted applications.
  • Then click Advanced settings and check mark the following options:
    • Enable detection of potentially unsafe applications
    • Clean threats automatically
  • Click the Scan button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats.
  • Click Export, and save the file to your Desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.


Note: If nothing is found, it will not produce a log.

Please re-enable your antivirus program.


Please post the contents of the ESET log (if it produced one).

Android8888

Link to post
Share on other sites

Excellent! Your machine appears to be clean and free of malware. :)

Now, run a program like Personal Software Inspector (PSI) or FileHippo Update Checker to see what programs need to be updated.


To help keep malware off your system below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please consider using these ideas to help secure your computer.

Keep your Windows Operating System up-to-date.

Keep your Antivirus program up-to-date.

Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Keep Malwarebytes updated and perform a regular scan to your system as it will make it harder for malware to reside on your computer.
A tutorial on using MBAM can be found here and a complete guide here

Please Note: Only the paid for version has real time capabilities. Please go here and scroll down to find a comparison list of the two versions.

A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall and scanning anti-spyware program with real time protection at a time .

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure.

A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Another most feared threat at the moment is an infection by a Ransomware. A Ransomware infection is a program that ransoms the data or functionality of your computer until you perform an action. This action is typically to pay a ransom in the form of Bitcoins or another payment method. I advise you to read more info on this terrible threat here and here.

Please keep your programs up to date. This applies to most of the programs and all your Internet Browsers in particular. Vulnerabilities in the programs are often exploited in order to install malware on your PC.

Be careful with flash drives, as they can spread infections. See this post on USB/flash drive safety.

Stay away from P2P software; even with a clean P2P program, their networks are often riddled with malware.

Don't click on attachments or links in e-mail, and read your e-mail in text-only mode for the highest safety.

Don't click on links received in instant message programs.

A HOSTS file will prevent Internet Explorer from communicating with sites known to be associated with adware or spyware. A good regularly updated HOST file is MVPS HOSTS File, available here

For much more useful and complete information, please read the following links to fully understand PC Security and Best Practices:
So how did I get infected in the first place
Answers to common security questions - Best Practices

Hopefully these steps will help to keep you error and malware free. If you run into more difficulty, we will certainly do what we can to help.


Are there any questions or concerns before we close this thread?


Android8888

Link to post
Share on other sites

17 minutes ago, brighteyesss said:

Thanks for the valuable information

You're welcome! :)

Okay, stay safe out there and come back whenever you need.

Kindly Regards,

Android8888

Link to post
Share on other sites

  • 1 month later...
  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread.

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.