Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

PC infected again with the same malware.


  • This topic is locked This topic is locked
3 replies to this topic

#1 Nikopol555

Nikopol555

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 February 2015 - 08:08 AM

Some time ago i opened a thread regarding an infection found using Malwarebytes called "Trojan.DNSChanger". I thought the computer was clean after following the steps provided but now Malwarebytes found again the same infection.

This is the log:

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 08/02/2015
Scan Time: 13:53:24
Logfile: 
Administrator: Yes
 
Version: 2.00.4.1028
Malware Database: v2015.02.08.04
Rootkit Database: v2015.02.03.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Nicola
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 316541
Time Elapsed: 5 min, 47 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 2
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, 91.212.124.159 8.8.8.8, Good: (), Bad: (91.212.124.159),Replaced,[2cd8f527068486b00c04c5f431d402fe]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{9489338E-5522-46EB-9E94-B03E83F9E249}|DhcpNameServer, 91.212.124.159 8.8.8.8, Good: (), Bad: (91.212.124.159),Replaced,[20e46fadc9c1a195f7196a4f6c99fd03]
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
 
 
Removing the infection using Malwarebytes does absolutely nothing, on the next restart the virus is still there.
Please help.


BC AdBot (Login to Remove)

 


m

#2 Nikopol555

Nikopol555
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 February 2015 - 01:40 PM

The problem might be the router. That could explain why i got malware on a newly formatted hard drive before i even download anything at all. Same thing on the other notebook i own: recently formatted hard drive with only software downloaded from trusted sites (like the antivirus etc.), infected with malware out of nowhere.

 

I don't know what to do, how do i know for certain if my router has been compromised?


Edited by Nikopol555, 08 February 2015 - 07:40 PM.


#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:16 PM

Posted 12 February 2015 - 10:34 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

--RogueKiller--
  • Download & SAVE to your Desktop For 32bit system or For 64bit system
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
=======

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

Wait for further instructions.

#4 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:16 PM

Posted 17 February 2015 - 09:41 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users