Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Internet Options keeps turning on Proxy for all Internet connections


  • This topic is locked This topic is locked
60 replies to this topic

#1 bunnyfool

bunnyfool

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 13 November 2016 - 08:47 PM

Every now and then while browsing, my work is interrupted in my browser with the message that I can't connect to a proxy. Checking my internet options in the LAN settings shows that it keeps turning on the proxy option with a proxy IP of 127.0.0.1. After some research I learned this was a virus meant to steal my information by rerouting my browsing through a proxy. I have tried several services to remove it, be it ESET, MalwareBytes, JunkRemover, AdwCleaner, and even deleting certain registry entries which just come back. None helped as they don't detect any viruses or malware. Turning the proxy option off fixes the problem for about an hour before it comes back and turns the option on again. I use a 64x Windows 10 system, so ComboFix doesn't work. The log is as follows:

 

Attached File  FRST.txt   207.08KB   15 downloads

 

Please help when you can.

Attached Files



BC AdBot (Login to Remove)

 


#2 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 15 November 2016 - 02:22 AM

I've noticed this in the whitelisted section: ProxyServer: [S-1-5-21-1993721000-4116074352-2927827119-1001] => http=127.0.0.1:8895;https=127.0.0.1:8895.

 

Considering that it is the ip address for the proxy hijack virus, I'm assuming that it's important.



#3 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,730 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:46 PM

Posted 18 November 2016 - 08:50 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/632183 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new FRST log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download FRST by Farbar from the following link if you no longer have it available and save it to your destop.

    FRST Download Link

  • When you go to the above page, there will be 32-bit and 64-bit downloads available. Please click on the appropriate one for your version of Windows. If you are unsure as to whether your Windows is 32-bit or 64-bit, please see this tutorial.
  • Double click on the FRST icon and allow it to run.
  • Agree to the usage agreement and FRST will open. Do not make any changes and click on the Scan button.
  • Notepad will open with the results.
  • Post the new logs as explained in the prep guide.
  • Close the program window, and delete the program from your desktop.


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#4 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 18 November 2016 - 11:50 PM

Alright. I have uploaded the new log and the addition with this reply.
 
To make the problem perfectly clear: My laptop has been infected with a virus that hijacks my internet settings and turns the proxy option on with the ip 127.0.0.1 port 8895. This virus is meant to steal my logins and other personal info while I browse.

 

Attached File  proxy.png   22.89KB   0 downloads

 

Attached File  proxy2.png   29.46KB   0 downloads

 

It creates new registry keys that come back no matter what I do to them. I have already tried things like MalwareBytes, AdwCleaner, JunkRemover, and various other virus detectors and not a one has found anything wrong with my computer.
 
Please help when you can.

 

 

Attached Files



#5 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 21 November 2016 - 10:41 PM

It's been 9 days. I'm seriously considering just nixing this entire website and reinstalling the OS. Can anyone please help? I'm seeing people getting replies to their posts within 2 days of posting.



#6 garioch7

garioch7

    RCMP Veteran


  • Malware Response Instructor
  • 3,795 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Port Hood, Nova Scotia, Canada
  • Local time:01:46 PM

Posted 22 November 2016 - 06:39 AM

bunnyfool:

:welcome: to the Bleeping Computer Virus, Trojans, Spyware, and Malware Removal Logs Forum. My name is Phil and I am a trainee in the Bleeping Computer Malware Removal Study Hall. I would like to address you by your first name, if that is alright with you since we will be working together.

I apologize for the delay that you encountered in receiving assistance. This Forum is very busy and the resources are limited. You provided additional information, in a separate post, which meant that your topic was showing a reply. That would lead the malware removal specialists to think that one of their colleagues had already responded to you and taken your topic, so they would move on to the next topic without any replies.

I will be assisting you with your computer issues. All of my proposed fixes and suggestions must be approved by a fully-qualified Malware Removal Instructor. This will delay response times somewhat, but I will endeavor to respond within a reasonable time, normally 48 hours after your last post.

I will need some time to review your FRST logs and consult with the Malware Response Instructor (MRI) who will be assigned to supervise this topic. That could take a few days. Once I have reviewed my proposed response with the assigned MRI, I will reply to you with initial instructions.

PLEASE DO NOT RUN ANY ADDITIONAL SCANS OR ANTI-MALWARE REMOVAL TOOLS UNTIL YOU HAVE RECEIVED A RESPONSE FROM ME.
Doing so would complicate the situation and it would cause further delays in resolving your issues. It could also potentially result in harm to your computer because my "fix" will be based on the FRST scan logs you have already submitted.

Thank you and have a great day.

Regards,
-Phil

Graduate of the Bleeping Computer Malware Removal Study Hall


#7 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 22 November 2016 - 09:19 AM

Alright. I thank you for taking the time to help me.



#8 garioch7

garioch7

    RCMP Veteran


  • Malware Response Instructor
  • 3,795 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Port Hood, Nova Scotia, Canada
  • Local time:01:46 PM

Posted 22 November 2016 - 03:09 PM

bunnyfool:

Thank you for your patience while I analyzed your FRST logs. I have just graduated late today to the Bleeping Computer Malware Response Team, so there won't be any delays in response times because of the former requirement that applied to me, as a Senior in Study Hall, to have to consult a qualified Malware Response Instructor before responding to logs in this Forum.

Before we start dealing with the problems you are experiencing, I would ask that you to take note of the following points:

  • I am a Bleeping Computer volunteer, so I ask you to be patient. I know it is frustrating when your computer is not working properly, but malware removal takes time.
  • Please also remember that I only dedicate a limited number of hours a day to helping people. We may live in different time zones, which may cause delays in responding.
  • If I have not responded to you within 48 hours, please send me a personal message. Likewise, I expect you to respond within 48 hours, and sooner is better because we can fix your computer faster.
  • If I have not heard from you in three days, I will "bump" your post. After five days of no response, I will consider that you no longer need my assistance and this thread will be closed.
  • Logs can take a while to research, so please be patient.
  • Some issues just cannot be solved so you must be prepared for this.
  • Please read and follow the instructions in the exact sequence that they are posted to avoid making a bad situation worse.
  • Please print or copy and save the instructions.
  • Back up all your data and important files on another (external) drive before starting to run malware removal tools.
  • You should try to limit your browsing with this computer until you are given the "All Clear." Some malware applications steal passwords.
  • Please do not install or uninstall any applications, unless directed. Don't run any scripts or tools on your own because unsupervised usage may cause more harm than good.
  • Please use only the tools you have been instructed to use.
  • If you are using CD/DVD emulation software, this should be uninstalled or disabled as it can interfere with the removal of some malware. It can be turned off with Defogger and then turned back on when you get the "All Clear."
  • Please copy and paste the requested log files inside your post, unless otherwise instructed.
  • There are no silly questions. Ask for clarification, if you have any questions or concerns.
  • Bleeping Computer does not support any piracy. Evidence of illegal OS, software, cracks/keygens, etc., will be revealed by scan logs, and if found, further assistance may be suspended. Uninstall such software before proceeding!
  • Any P2P software such as uTorrent, BitTorrent, Kazaa, etc. must be uninstalled or completely disabled. P2P software is a major security risk to your computer and may have been the route the malware used to infect your computer.
  • Failure to follow these guidelines may result in assistance being withdrawn and your thread being closed.
  • I am volunteering my time to help you, and I will need you to help me. Together, we can, hopefully, disinfect your computer and get if functioning properly again. That is my only aim.

.

OK, let's get started ...

.

:step1: Unfortunately, the FRST logs reveal evidence of "crack" software designed to circumvent Microsoft software licensing agreement(s). Bleeping Computer does not condone or encourage the use of keygens or cracks. They are a major contributor to spreading malware.
If you want me to continue to assist you, then I have to request that you remove all "cracks" and "cracked" software from your computer.
After that is done, please reboot your computer and run CKScanner for me.
ckscanner.jpg Scan with CKScanner

Download CKScanner by askey127 and save it to your desktop.

  • Right-click on ckscanner.jpg icon and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • click Search For Files.
  • When finished, click Save List To File.
  • Remember to run this tool once only, if not asked to run it again.

Please copy and paste the content of CKFiles.txt into your next reply.

.

:step2: In going over your logs I noticed that you had uTorrent installed on your computer.

  • Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.
  • They are a security risk which can make your computer susceptible to a wide variety of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.
  • Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.
  • The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications.

It is pretty much certain that if you continue to use P2P programs, you will get infected again.
I would recommend that you do not use uTorrent, or any other P2P program; however, that choice is up to you. Please do not install or use and P2P programs for as long as I am assisting you. Thank you.

.

When I have reviewed the CKScanner results, assuming that there are no issues identified, then I will provide you, in a subsequent post, with a FRST fixlist.txt to repair the issues that I discovered while analyzing your FRST logs.

Thank you and have a great day.

Regards,
-Phil


Graduate of the Bleeping Computer Malware Removal Study Hall


#9 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 22 November 2016 - 04:14 PM

Alright, I understand your requirements and instructions.

 

I would like to note that if there is any evidence of any Licence Circumvention it is not because of me, since I bought this laptop about a month ago and it had Windows 10/Office pre-installed already. I myself have not attempted to circumvent any Microsoft products. This may be evidence of the virus attempting to do something.

 

I have attached the log files you wanted and have taken a peek at them myself. I'm assuming this list is of "cracked programs"? Because if so, it makes no sense that Gimp 2 or Blender would be "cracked" seeing as they're free software.

 

Please reply if you need anything else, and once again, thank you for your help!

Attached Files



#10 garioch7

garioch7

    RCMP Veteran


  • Malware Response Instructor
  • 3,795 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Port Hood, Nova Scotia, Canada
  • Local time:01:46 PM

Posted 23 November 2016 - 10:25 AM

bunnyfool:

 

Thank you for your CKScanner results.  In the future, going forward, it would help me if you would copy and paste logs into your replies, rather than attach them.

 

I have detected software, in the FRST logs, that suggests that the copy of Microsoft Office 16 installed on your computer is probably a cracked version.

 

Because Bleeping Computer that does not condone software piracy, my FRST fix script to address your computer issues will include commands to remove the offending "crack" files.  This could render your Microsoft Office 16 unusable, unless you purchase a licence.

 

I accept your word that you are not responsible for the presence of pirated software on the computer, so I am willing to provide you with my FRST fixlist script, if you want to proceed to disinfect your computer.

 

It is entirely your decision.  It is your computer.

 

Let me know what you decide.  Thank you and have a great day.

 

Regards,

-Phil


Graduate of the Bleeping Computer Malware Removal Study Hall


#11 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 23 November 2016 - 01:24 PM

I do want to disinfect my computer. If it renders my Office 16 unusable, I am alright with that, I can always buy another. Please, proceed to do whatever you must.



#12 garioch7

garioch7

    RCMP Veteran


  • Malware Response Instructor
  • 3,795 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Port Hood, Nova Scotia, Canada
  • Local time:01:46 PM

Posted 24 November 2016 - 07:52 AM

bunnyfool:

Thank you for your reply. I think that the problems you are experiencing are due to the "cracked" software in your computer that is attempting to circumvent Microsoft licensing. So, let's take that out and also try to reset things and see if we can't get your computer working properly again.

.

:step1: Please copy and paste the text in the code box below into Notepad and save the file as fixlist.txt to the E:\Downloads folder where FRST64.exe is located.

NOTE: It's important that both files, FRST64.exe and fixlist.txt are in the same folder or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this individual computer. Running this on another computer may cause damage to your operating system.
 

CreateRestorePoint:
CloseProcesses:

ProxyServer: [S-1-5-21-1993721000-4116074352-2927827119-1001] => http=127.0.0.1:8895;https=127.0.0.1:8895
Tcpip\..\Interfaces\{96e88f98-e772-42a9-a41c-b44985d36fc2}: [DhcpNameServer] 40.30.1.55
CMD: netsh int ip reset c:\resetlog.txt
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
HKU\.DEFAULT\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
HKU\S-1-5-21-1993721000-4116074352-2927827119-1001\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
Handler: tmtbim - {0B37915C-8B98-4B9E-80D4-464D2C830D10} - C:\Program Files\Trend Micro\Titanium\UIFramework\ProToolbarIMRatingActiveX.dll No File
2016-11-14 13:49 - 2016-11-14 13:49 - 00000002 _____ C:\END
2016-11-08 06:47 - 2016-11-08 06:47 - 00002546 _____ C:\WINDOWS\System32\Tasks\AutoPico Daily Restart
2016-11-02 17:04 - 2016-11-02 17:06 - 00000000 ____D C:\ProgramData\KMSAuto
2016-11-02 16:38 - 2010-12-05 18:16 - 00090112 _____ (Vestris Inc.) C:\WINDOWS\system32\Vestris.ResourceLib.dll
2016-11-08 06:39 - 2016-11-08 06:39 - 0000000 ____H () C:\ProgramData\DP45977C.lfl
Task: {024264E0-63F1-4D9C-B2DA-3B582900C900} - System32\Tasks\AutoPico Daily Restart => C:\Program Files\KMSpico\AutoPico.exe
C:\Program Files\KMSpico

EmptyTemp:

Right click FRST/FRST64, and select "Run as Administrator".
Then press the Fix button just once and wait.
If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.
When finished FRST will generate a log on the Desktop (Fixlog.txt). Please copy and paste it into your reply.

.

:step2: Please reboot your computer, if it did not reboot during the FRST fix, and provide me with an update as to how it is working now. If you are still encountering errors, please provide me with as much detail as possible to enable to assist you better.


Thank you and have a great day.

Regards,
-Phil


Graduate of the Bleeping Computer Malware Removal Study Hall


#13 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 24 November 2016 - 02:33 PM

Fix result of Farbar Recovery Scan Tool (x64) Version: 23-11-2016
Ran by Ilya (24-11-2016 11:28:39) Run:1
Running from E:\Downloads
Loaded Profiles: Ilya (Available Profiles: Ilya)
Boot Mode: Normal
==============================================
 
fixlist content:
*****************
CreateRestorePoint:
CloseProcesses:
 
ProxyServer: [S-1-5-21-1993721000-4116074352-2927827119-1001] => http=127.0.0.1:8895;https=127.0.0.1:8895
Tcpip\..\Interfaces\{96e88f98-e772-42a9-a41c-b44985d36fc2}: [DhcpNameServer] 40.30.1.55
CMD: netsh int ip reset c:\resetlog.txt
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
HKU\.DEFAULT\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
HKU\S-1-5-21-1993721000-4116074352-2927827119-1001\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
Handler: tmtbim - {0B37915C-8B98-4B9E-80D4-464D2C830D10} - C:\Program Files\Trend Micro\Titanium\UIFramework\ProToolbarIMRatingActiveX.dll No File
2016-11-14 13:49 - 2016-11-14 13:49 - 00000002 _____ C:\END
2016-11-08 06:47 - 2016-11-08 06:47 - 00002546 _____ C:\WINDOWS\System32\Tasks\AutoPico Daily Restart
2016-11-02 17:04 - 2016-11-02 17:06 - 00000000 ____D C:\ProgramData\KMSAuto
2016-11-02 16:38 - 2010-12-05 18:16 - 00090112 _____ (Vestris Inc.) C:\WINDOWS\system32\Vestris.ResourceLib.dll
2016-11-08 06:39 - 2016-11-08 06:39 - 0000000 ____H () C:\ProgramData\DP45977C.lfl
Task: {024264E0-63F1-4D9C-B2DA-3B582900C900} - System32\Tasks\AutoPico Daily Restart => C:\Program Files\KMSpico\AutoPico.exe
C:\Program Files\KMSpico
 
EmptyTemp:
*****************
 
Restore point was successfully created.
Processes closed successfully.
HKU\S-1-5-21-1993721000-4116074352-2927827119-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyServer => value removed successfully
HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{96e88f98-e772-42a9-a41c-b44985d36fc2}\\DhcpNameServer => value removed successfully
 
========= netsh int ip reset c:\resetlog.txt =========
 
Resetting Global, OK!
Resetting Interface, OK!
Resetting Unicast Address, OK!
Resetting Neighbor, OK!
Resetting Path, OK!
Resetting , failed.
Access is denied.
 
Resetting , OK!
Restart the computer to complete this action.
 
 
========= End of CMD: =========
 
"HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully
"HKU\.DEFAULT\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully
"HKU\S-1-5-21-1993721000-4116074352-2927827119-1001\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully
"HKCR\PROTOCOLS\Handler\tmtbim" => key removed successfully
"HKCR\CLSID\{0B37915C-8B98-4B9E-80D4-464D2C830D10}" => key removed successfully
C:\END => moved successfully
C:\WINDOWS\System32\Tasks\AutoPico Daily Restart => moved successfully
C:\ProgramData\KMSAuto => moved successfully
C:\WINDOWS\system32\Vestris.ResourceLib.dll => moved successfully
C:\ProgramData\DP45977C.lfl => moved successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{024264E0-63F1-4D9C-B2DA-3B582900C900}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{024264E0-63F1-4D9C-B2DA-3B582900C900}" => key removed successfully
C:\WINDOWS\System32\Tasks\AutoPico Daily Restart => not found.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\AutoPico Daily Restart" => key removed successfully
"C:\Program Files\KMSpico" => not found.
 
=========== EmptyTemp: ==========
 
BITS transfer queue => 0 B
DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 19723952 B
Java, Flash, Steam htmlcache => 22149843 B
Windows/system/drivers => 73438505 B
Edge => 551490 B
Chrome => 823394131 B
Firefox => 0 B
Opera => 0 B
 
Temp, IE cache, history, cookies, recent:
Default => 0 B
ProgramData => 0 B
Public => 0 B
systemprofile => 0 B
systemprofile32 => 0 B
LocalService => 6454 B
NetworkService => 143944 B
Ilya => 173873442 B
 
RecycleBin => 0 B
EmptyTemp: => 1 GB temporary data Removed.
 
================================
 
 
The system needed a reboot.
 
==== End of Fixlog 11:29:33 ====


#14 bunnyfool

bunnyfool
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:08:46 AM

Posted 24 November 2016 - 04:45 PM

Unfortunately, your fix did not work. The virus is still there as it changed my proxy settings back to 127.0.0.1:8895.



#15 garioch7

garioch7

    RCMP Veteran


  • Malware Response Instructor
  • 3,795 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Port Hood, Nova Scotia, Canada
  • Local time:01:46 PM

Posted 25 November 2016 - 11:29 AM

bunnyfool:
 
You did say that you had already run an ESET Online scan and Malwarebytes scans, which should have picked up this virus.
 
You should repeat those scans.  If those don't root it out, then there is another option.
 
In researching your issue, I came across some information about this proxy hijacker.  It involves editing your registry and also disabling any unknown or suspicious programs via msconfig in Safe Mode.
 
Before doing so, you should backup your registry using Tweaking Computer's Registry Backup program, available at this link for download.  Your issue might be related to one of the games that you have installed.
 
You seem to be computer literate; however, if you have any concerns whatsoever about editing your registry, please let me know and I will prepare a registry script for you to run in Safe Mode.
 
Please see the two links listed below for instructions:
 
Link 1

 

Link 2

 

The music might be a bit annoying in Link 2, but it does show you exactly what to do.

 

Good luck and have a great day.

 

Regards,

-Phil


Graduate of the Bleeping Computer Malware Removal Study Hall





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users