Internet Explorer suddenly extremely slow

Discussion in 'Malware Help (A Specialist Will Reply)' started by dip0, May 9, 2012.

  1. dip0

    dip0 Private E-2

    Hi,

    Since last night, my Internet Explorer has become extremely slow.
    The rest of my system so far sees unaffected, ping and download times are normal. Browsing is the only thing that has become a crawl.

    I can open Internet Explorer (ver8) just fine and it opens as quickly as usual. The moment I press Enter on an URL or pick a webpage from my history, it takes about a full minute for anything to happen in the status bar during which time the browser is unresponsive. Once it has "connected" to the webpage, it then takes extremely long to load and even when it has mostly finished loading it then stalls again and takes is time. Clicking any link on the webpage or going to another page or using a separate window or tab results in the exact same sloth again.
    Typing in textboxes like this one is also quite slow and swallows characters.

    The other notable thing is that if I rightclick any link to bring up the context menu, it takes about 4-6 seconds for it to appear during which time Internet Explorer stalls too.

    I've run several scans with MBAM, AVG, Panda, Bitdefender and have installed TM's Browser Guard, all to no avail.

    HiJackThis log also seems to not pick up anything strange.

    Now as for when this happened last night:
    I was browsing onto rlslog.net and about a few seconds into page load, the browser stalled and download/installed something (felt like it). Then I got a security popup saying "do you want to allow XXX.info access to your computer"? or somesuch, where XXX was some strange address called nvigporta or something like that. I clicked No, but my browser was aleady slowed since then. I checked Task Manager and java.exe was running whic normally doesn't happen, suggesting it was some bad java which may have infected me?
    Since the, trying to access the offending webpage has resulted in it not loading but asking whether I was to download a file called rlslog_net instead, which suggests maybe the site got hacked?

    As for what I have done so far besides scanning:
    Reset IE settings via advanced tab
    Cleared all IE history
    Cleared Temp folder
    Upgraded from Java 6-27 to 7-04 making sure 6-27 and legacy is all removed using Revo Uninstaller.

    Forgot to mention, after the permissions incident, going to another webpage (google) caused my laptop to lock up completely with everything unresponsive. Had to switch it off.

    Today I ran a thorough chkdsk which has improved speeds very slightly, but things are still slower than usual. Accessing emails is particularly slow and logging in to websites also is very slow.

    Please, please help me fix this, it is driving me nuts.
     

    Attached Files:

  2. dip0

    dip0 Private E-2

    Re: Internet Explorer suddenly extremely slow after visitng webpage

    Additional logs

    Just as a sidenote, no AV or scanner has picked up anything as far s I am aware except that RootRepeal. I have no idea how to fix those though.
     

    Attached Files:

    Last edited: May 9, 2012
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
     
  4. dip0

    dip0 Private E-2

    Thanks for your reply, I much appreciate it.

    I ran TDSSKiller and it found and removed Sinowal.
    However, checking with GMER and MBRCheck after, reveals that while the Sinowal itself was deleted, there is still something else in the MBR.

    Also, the ComboFix GMER didn't detect the Sinowal / Bootkits while the GMER I downloaded directly off their site found it.

    MBRCheck just said press enter to exit.

    There are several items in the quarantine from TDSSkiller which is not mentioned in the log. Let me know if you would like me to upload them
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you did not deliberately set this proxy yourself then please include it in the HJT fix further below:
    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    • R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 69.39.2.29:8080
    • O16 - DPF: {D8AA889B-2C65-47C3-8C16-3DCD4EF76A47} -


    After clicking Fix exit HJT.


    Please re-run TDSSKiller and attach the new log.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  6. dip0

    dip0 Private E-2

    Hi Kestrel13!,

    The proxy is something I added a long time ago and forgot about - it is not actually active, just entered. I removed it anyway as instructed.

    TDSSKiller didn't find anything different from since the Sinowal removal, but GMER that I ran just now still detects some sort of malicious code, but doesn't flag it in red like it did with Sinowal.

    Logs attached.

    Since the removal of Sinowal last night, things have been running fairly smooth again. I can also access support.microsoft.com again which I couldn't prior to removal (forgot to mention!)

    Still, the malicious code that's being detected by GMER and the like worries me. Is it some harmless leftover or some new thing which isn't quite "detected" yet?

    I've attached a screenshot of the quarantine of TDSSkiller from last night. Is it safe to delete?
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It is a residual entry made by the infection but it has been neutralized. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  8. dip0

    dip0 Private E-2

    Thanks for your time and effort in helping me sort this out, much appreciated!

    On a sidenote, somewhere along the lines, an issue I had with services.msc having a huge blue bar at the top got fixed as well :D
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Glad to hear everything is running well again. ;) Safe surfing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds