Unable to Connect to the Proxy Server

Discussion in 'Malware Help (A Specialist Will Reply)' started by fofufu, Feb 14, 2015.

  1. fofufu

    fofufu Private E-2

    Hello,
    Everytime I open Chrome I get the same error: "Unable to Connect to the Proxy Server." I tried to disable using a proxy server for my LAN under internet options, it re-enables itself after a few moments.

    So far, I've used your websites guide (http://forums.majorgeeks.com/showthread.php?t=35407) and the logs are contained on this post.

    The computer I'm using is running Windows 7 64 bit.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good evening.

    Uninstall the below garbage.

    • Snap.Do
    • AnyProtect


    It doesn't look like you had Malware Bytes fix anything! (Unless you did so after attaching log.) Please re run it and allow it to remove all it finds, attach log showing me if it does.


    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:8877;https=127.0.0.1:8877
    • O2 - BHO: ApptoUe - {36c440c7-d892-4618-8b7a-4bb7ae4a9a0b} - C:\Program Files (x86)\ApptoUe\ThKj2vM6yYs4NW.dll
    • O2 - BHO: SaaVerrPro - {f6494725-52c9-47ed-894d-8e12d7ea33f3} - C:\Program Files (x86)\SaaVerrPro\npkTgO68AyuJ37.dll
    • O4 - HKLM\..\Run: [autoauto] 56013460.bat
    • O4 - HKLM\..\Run: [cutoauto] C:\a\wincheckfe.exe
    • O4 - HKCU\..\Run: [rutoauto] 56013460.bat
    • O4 - HKCU\..\Run: [dutoauto] C:\a\wincheckfe.exe
    • O4 - Startup: intr.lnk = C:\a\46869678.bat
    After clicking Fix exit HJT.




    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{31AD400D-1B06-4E33-A59A-90C2C140CBA0} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{56561B2A-FB5D-363A-9631-4C03D6054209} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{A717364F-69F3-3A24-ADD5-3901A57F880E} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{CCB08265-B35D-30B2-A6AF-6986CA957358} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{CD92622E-49B9-33B7-98D1-EC51049457D7} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{E041E037-FA4B-364A-B440-7A1051EA0301} -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31ad400d-1b06-4e33-a59a-90c2c140cba0} -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\nethfdrv (\??\C:\Windows\system32\drivers\nethfdrv.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetHttpService (C:\Windows\SysWOW64\nethtsrv.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ServiceUpdater (C:\Windows\SysWOW64\netupdsrv.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\nethfdrv (\??\C:\Windows\system32\drivers\nethfdrv.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NetHttpService (C:\Windows\SysWOW64\nethtsrv.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\ServiceUpdater (C:\Windows\SysWOW64\netupdsrv.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\nethfdrv (\??\C:\Windows\system32\drivers\nethfdrv.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\NetHttpService (C:\Windows\SysWOW64\nethtsrv.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\ServiceUpdater (C:\Windows\SysWOW64\netupdsrv.exe) -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-21-2078090934-3936231352-1786977492-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-21-2078090934-3936231352-1786977492-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-21-2078090934-3936231352-1786977492-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:8877;https=127.0.0.1:8877 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-21-2078090934-3936231352-1786977492-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:8877;https=127.0.0.1:8877 -> Found
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for these entries on the Task tab please...

    • [Suspicious.Path] WSE_Vosteran.job -- C:\Users\Jamie\AppData\Roaming\WSE_VO~1\UPDATE~1\UPDATE~1.EXE (/Check) -> Found
    • [Suspicious.Path] \\Runner IC -- %LOCALAPPDATA%\206F4692-CDF2-7377-552D-000000B100\Runner.exe -> Found
    • [Suspicious.Path] \\WSE_Vosteran -- C:\Users\Jamie\AppData\Roaming\WSE_VO~1\UPDATE~1\UPDATE~1.EXE (/Check) -> Found
    • [Suspicious.Path] \Microsoft\Windows\Maintenance\Update IC -- %LOCALAPPDATA%\206F4692-CDF2-7377-552D-000000B100\Runner.exe (--Update) -> Found

    ...and these on Host file tab too...

    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 0.0.0.0 # fix for traceroute and netstat display anomaly
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 tracking.opencandy.com.s3.amazonaws.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 media.opencandy.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.opencandy.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 tracking.opencandy.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 api.opencandy.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 installer.betterinstaller.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 installer.filebulldog.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 d3oxtn1x3b8d7i.cloudfront.net
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 inno.bisrv.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 nsis.bisrv.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.file2desktop.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.goateastcach.us
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.guttastatdk.us
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.inskinmedia.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.insta.oibundles2.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.insta.playbryte.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.llogetfastcach.us
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.montiera.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.msdwnld.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.mypcbackup.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.ppdownload.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.riceateastcach.us
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.shyapotato.us
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.solimba.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.tuto4pc.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.appround.biz
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.bigspeedpro.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.bispd.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.bisrv.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.cdndp.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.download.sweetpacks.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.dpdownload.com
    • [C:\Windows\System32\drivers\etc\hosts] 0.0.0.0 cdn.visualbee.net

    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    :Files
    C:\Users\Jamie\AppData\Local\nsj757C.tmp
    C:\Users\Jamie\Desktop\AnyProtect.lnk
    C:\ProgramData\15211988805266855952
    C:\ProgramData\ucxrypwh.kkh
    C:\Program Files (x86)\ApptoUe
    C:\Program Files (x86)\CCoupScanNuer
    C:\Program Files (x86)\Deall4rEal
    C:\Program Files (x86)\deualsteR
    C:\Program Files (x86)\SaaVerrPro
    C:\awh41DF.tmp
    C:\awh453A.tmp
    C:\awh4A96.tmp
    C:\awh508F.tmp
    C:\awh5F7D.tmp
    C:\awh6144.tmp
    C:\awh7C4D.tmp
    C:\awh7D1B.tmp
    C:\awh842C.tmp
    C:\awh846B.tmp
    C:\awh8AFF.tmp
    C:\awh9942.tmp
    C:\awh99CE.tmp
    C:\awh9AD7.tmp
    C:\awh9B83.tmp
    C:\awh9C0F.tmp
    C:\awhA0B1.tmp
    C:\awhA302.tmp
    C:\awhB0B4.tmp
    C:\awhB856.tmp
    C:\awhFB8D.tmp
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "rutoauto"=-
    "dutoauto"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "autoauto"=-
    "cutoauto"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "autoauto"=-
    "cutoauto"=-
    [HKEY_USERS\S-1-5-21-2078090934-3936231352-1786977492-1000\Software\Microsoft\Windows\CurrentVersion\run]
    "rutoauto"=-
    "dutoauto"=-
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Download Cleano 0.61

    Download it to your desktop, Right click the cleano.exe file and run as admin > and place check marks in the boxes as follows (click on link below to see image)

    View attachment 148092
    Click clean now and exit the program.



    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    • Now rerun both Hitman and RogueKiller (just scans) and attach logs from each.
    • Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds