Jump to content

Netwbw02.sys


Recommended Posts

Hi 

I am have the following problem, I can't find these netwbw02.sys, mpengine.dll files detected by hitman pro nor in registry or drive, files are attached in the image. 

other anomalies:

slow LTE, which at times becomes fast -I keep resetting router that helps, I have some hidden ports (might be nothing), hitman pro complaints alot about my mpengine and its definitions, he even called it trojan and some point and patched it (maybe incompatibility with windows malware removal tool), I am unable to block autorun completely, drive autorun is forced on according to avz tool by Oleg. ,,System'' trying to connect on port 0, I found alternate data streams in windows defender, spy shelter complained that files are being modified after being downloaded (WTF), I have received sms from google saying to imput sms number to login (not my doing, maybe someone's error).

I have 0% illegal software or cracked, all is genuine, windows 10 as well, I suspect infection of weak system before updates, since when u first connect u have unpatched windows with almost no security, perhaps something split trough (or maybe not and I am 100% clean)

what I want?

perhaps if u have time check my logs quickly with some tools or/and tell me how to get access to super hidden files with some forensic tool. As said above I am unable to find them (HKLM\SYSTEM\controlset001\Services\NETwNb64\ startup item). I am on a VM, which is an exact copy of real windows, I am afraid that when I boot into real windows the netwbw02.sys won't be detected anymore by hitman pro . I needed to do several scans before it finally it was found by Hitman. Just check my logs I won't take too much of your time I promise. 

security:

syshardener (full lockdown),

os armor (full lockdown),

exe radar pro ver. 24 (full lockdown, no process is trusted),

SecureAplus (lockdown mode, no process is trusted),

keyscrambler,

shadow defender

zemana, 

simple wall (everything is locked down apart browser)

second opinion: , Eset, housecall, vipre, avz, Emsisoft, hitman, NPE, gmer, sophos, malwarebytes antirootkit beta, adware cleaner, rogue killer,

(can't install malwarebytes)

I didn't go to bleeping computers since they are crazy buizy with helping vs ransomware so I thought I'll give malwarebytes a try, besides I like to come here to read

best 

 

 

 

 

 

 

networkrootkitnicelyhidden.png

Edited by nymyname
spelling mistake
Link to post
Share on other sites

  • Root Admin

Hello @nymyname and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Link to post
Share on other sites

  • 2 weeks later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.