Trouble connecting to internet

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Mul, Oct 29, 2014.

  1. Mul

    Mul Private E-2

    Hey,

    Had a problem where my browser was being redirected.The page it went to was ad.propellerads.com.I ran Malwarebytes and Tdss Killer . Malwarebytes found a PUP file which I quarantined , but Tdss came back with nothing.
    The redirect is gone but internet connection is very slow.Its not the router as all other devices in the house are fine.
    I've done all that was advised and am posting my logs.
    Any help appreciated.

    Mul.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not finding any malware in your logs. But we can clean up a few things and then I will send you to the software forum.

    Why do you not have any anti-virus protection installed?

    Rerun RogueKiller and have it fix these items:
    Code:
    ¤¤¤ Registry : 8 ¤¤¤
    [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 89.101.160.4 89.101.160.5  -> Found
    [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 89.101.160.4 89.101.160.5  -> Found
    [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 89.101.160.4 89.101.160.5  -> Found
    [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{2ADB2239-820B-4AB5-99F4-F63B8616572A} | DhcpNameServer : 89.101.160.4 89.101.160.5  -> Found
    [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{2ADB2239-820B-4AB5-99F4-F63B8616572A} | DhcpNameServer : 89.101.160.4 89.101.160.5  -> Found
    [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{2ADB2239-820B-4AB5-99F4-F63B8616572A} | DhcpNameServer : 89.101.160.4 89.101.160.5  -> Found
    Download OTM by Old Timer and save it to your Desktop.


    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    
    :files
    C:\ProgramData\AVG2015
    C:\ProgramData\Avira
    C:\ProgramData\AVG2014
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib10E9.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib10EA.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib10EB.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib10FC.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib12F0.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib27DE.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib2A69.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib2A6A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib2A6B.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib2B18.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib2E.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib3630.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib4A3C.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib6D7.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib6E.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib6F.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib70.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib7E66.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib87D9.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib87DA.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib87DB.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib87DC.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ib914F.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibB22E.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibB9AE.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibB9BF.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibB9CF.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibB9FF.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBA68.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBA69.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBB04.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBB05.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBB06.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBB17.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBB25.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibBB74.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibC239.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibCCDF.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibCDCA.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibCDEA.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibCE87.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibD02D.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibDD05.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibDD16.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibDD17.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibDD37.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE12A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE13A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE13B.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE217.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE3E8.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE456.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE486.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE4A6.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE57D.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE57E.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE58D.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE59F.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE5A0.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE5AD.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE5AE.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE5DE.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE62D.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE677.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE6F5.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE705.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE706.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE7D2.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibE90A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibEA13.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibF366.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibFC0A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibFC39.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibFC3A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\ibFC6A.tmp
    C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\MpCmdRun-B5-421CFC91-A93E-42AB-A35C-F06F127FCC44.lock
    C:\Users\Liam 1\AppData\Local\Temp\*.*
    
    :Commands
    [purity]
    [ResetHosts]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    Rerun both RogueKiller and Hitman and attach the new logs.

    Tell me how things are running now.
     
  3. Mul

    Mul Private E-2

    TimW,

    Thanks for the help. Regarding anti-virus I am running AVG free as anti-virus , but it was disabled.
    One issue is that I couldn't Copy everything in the Results window under the green bar in OTM. The reboot window came up when it finished and I couldn't copy .I tried closing the reboot window but it went straight to reboot. I 'm sure I'm missing something simple.
    But I have attached the other logs.
    There is no change in the computer, still very slow connecting to the internet.

    Mul.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am going to send you to the software forum since you are not having malware issues.

    Since you are not having any malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. After doing the above, you should work thru the below link:

     
  5. Mul

    Mul Private E-2

    TimW,

    Thanks for that,good to hear no virus .Its still acting up so I'll try my luck in the software section.
    Tnx.

    Mul.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Good luck. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds