Scan Logs - Something is persistently changing proxy settings

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by ethereal1, Dec 23, 2014.

  1. ethereal1

    ethereal1 Private E-2

    Hi all,

    Something on this computer is persistently changing Windows 8's proxy settings to use a proxy at 127.0.0.1:56571. Attached are my logs from the Run & Read First guide. The computer belongs to my girlfriend's grandmother, so I don't know what exactly she did before having these problems. I do know that the problem is less than 1 week old. Let me know if I need to provide any more info. Thanks!
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please uninstall Avast right now as it will get in the way of getting this fixed up properly. When we are finished, you can reinstall it.

    Now uninstall this >> Web Protect for Windows

    Now you need to go back and rerun Malwarebytes and allow it to fix all that it finds. Your first log shows that you did not fix anything. Make sure you fix first and then save the log. Please attach the new log.

    Now rerun RogueKiller and look for any of the below to still exist under the registry tab. Select each that still exists ( any only these ) and then Delete them.

    [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{F63AAEDC-3602-49EF-AA45-262380A98980} -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{93DBF2BB-A2B3-4683-A92E-57E60751F346} -> Found
    [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{93DBF2BB-A2B3-4683-A92E-57E60751F346} -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\pastaleadsServiceCore (C:\Program Files (x86)\pastaleads\PastaLeadsService.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ProtectMonitor (C:\monitorsvc.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\pastaleadsServiceCore (C:\Program Files (x86)\pastaleads\PastaLeadsService.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\ProtectMonitor (C:\monitorsvc.exe) -> Found
    [PUM.Proxy] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    [PUM.Proxy] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    [PUM.Proxy] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:56571;https=127.0.0.1:56571 -> Found
    [PUM.Proxy] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:56571;https=127.0.0.1:56571 -> Found
    [PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://search.gboxapp.com/?aff=p -> Found
    [PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://search.gboxapp.com/?aff=p -> Found
    [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-392756881-2949503325-421059871-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://search.gboxapp.com/?aff=p -> Found
    [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-392756881-2949503325-421059871-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://search.gboxapp.com/?aff=p -> Found

    Now immediately reboot, after reboot continue with the below.



    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run new scans with Hitman Pro and Rogue Killer and save new logs.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the new Malwarebytes log
    • the new Hitman and RogueKiller logs
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. ethereal1

    ethereal1 Private E-2

    Thank you very much for your help. By deleting those registry entries, I have been able to regain internet access. Everything seems ok. Attached are all the new logs.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We still have more to doNow download LSP - Fix

    Run LSP-Fix.

    Check the Box labeled "I know what I'm doing" and then click on the pcprotect.dll file (in the “Keep” section) to select it.

    Then, Select the >> button to move pcprotect.dll into the Remove section.

    Now, click the Finish Button. When the Repair Summary box appears, click OK.
    If it is already in the Remove section, just click Finish.




    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Windows\SysWOW64\PCProtect.dll
    C:\Program Files\Conduit
    C:\Users\Dolores\AppData\Local\1449540703extsetup14495444211.exe
    C:\Users\Dolores\AppData\Local\1449540703extsq.dll
    C:\Users\Dolores\AppData\Local\dsisetup3894388592.exe
    C:\Users\Dolores\AppData\Local\dsisetup7308070932.exe
    C:\ProgramData\13423926525590616092
    C:\ProgramData\ba4b5e0d50c5b81c
    C:\Program Files (x86)\guReAAtssaviNg
    C:\Program Files (x86)\OpenSoftwareUpdater
    C:\Program Files (x86)\orangeexcelerate
    C:\Program Files (x86)\RoYalShopperAApp
    C:\Program Files (x86)\saFiErweb
    C:\Program Files (x86)\Web Protect
    C:\Users\Dolores\AppData\Local\Temp\*.*
     
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\ (PriceChop)
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\rlvknlg_RASAPI32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\rlvknlg_RASMANCS]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\WajamInternetEnhancer_RASAPI32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\WajamInternetEnhancer_RASMANCS]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{6791A2F3-FC80-475C-A002-C014AF797E9C}]
    [-HKEY_USERS\S-1-5-21-392756881-2949503325-421059871-1001\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKEY_USERS\S-1-5-21-392756881-2949503325-421059871-1001\Software\Conduit]
    [-HKEY_USERS\S-1-5-21-392756881-2949503325-421059871-1001_Classes\Wow6432Node\CLSID\{bebbc426-4f16-4567-8fe1-be198c982027}]
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{B89E9BB0-AAFA-45CF-92A0-06AC1937EC5}"
    "URL"="[URL]http://www.bing.com/search?q={searchTerms}&form=IE11TR&src=IE11TR&pc=TNJB[/URL]"
    "SuggestionsURL"="[URL]http://api.bing.com/qsml.aspx?query={searchTerms}&src={referrer:source?}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}&sectionHeight={ie:sectionHeight}&FORM=IE8SSC&market={Language[/URL]}"
    "DisplayName"="Bing"\
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.
    .txt to your next message.
    [/LIST]Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds