Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

possible malware and ip problems.


  • This topic is locked This topic is locked
11 replies to this topic

#1 ninjalotus

ninjalotus

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 12 June 2017 - 07:16 PM

I just cant seem to get everything figured out I have scanned and removed most things i thought was bad. Here is a few things that might help more . its either a bad infection or maybe something else. Thanks in advance.

Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 40,741 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:07 AM

Posted 13 June 2017 - 08:57 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

ATTENTION: System Restore is disabled
Turn System Restore On for Drives in Windows 10
http://www.tenforums.com/tutorials/4533-system-protection-turn-off-drives-windows-10-a.html
===


Press the windows key Windows_Logo_key.gif+ r on your keyboard at the same time. This will open the RUN BOX.
Type Notepad and and click the OK key.

Please copy the entire contents of the code box below to a new file.
 
Start

CreateRestorePoint:
EmptyTemp:
CloseProcesses:

(AVG Secure Search) C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\40.3.7\ToolbarUpdater.exe
HKLM-x32\...\Run: [] => [X]
ShellIconOverlayIdentifiers: [00avg] -> {472083B0-C522-11CF-8763-00608CC02F24} =>  -> No File
SearchScopes: HKU\S-1-5-21-2363083189-316889934-1782649425-1001 -> {95B7759C-8C7F-4BF1-B163-73684A933233} URL = hxxps://mysearch.avg.com/search?cid={63B25D04-1294-4B1E-BD3F-4DAD14D8294F}&mid=db00daaa6cde47cfb3f66d16b2fa35bf-ad1491be2ce6c122f6b66faa90e70c2decf7d34c&lang=en&ds=AVG&coid=avgtbavg&cmpid=ZenTest_B_0&pr=fr&d=2017-05-17 05:46:30&v=4.3.7.452&pid=wtu&sg=&sap=dsp&q={searchTerms}
FF Plugin-x32: @avg.com/AVG SiteSafety plugin,version=11.0.0.1,application/x-avg-sitesafety-plugin -> C:\Program Files (x86)\Common Files\AVG Secure Search\SiteSafetyInstaller\40.3.7\\npsitesafety.dll [No File]
CHR Extension: (Chrome Web Store Payments) - C:\Users\Airik\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2017-05-14]
CHR Extension: (Chrome Media Router) - C:\Users\Airik\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2017-05-14]
R2 vToolbarUpdater40.3.7; C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\40.3.7\ToolbarUpdater.exe [1354312 2017-05-17] (AVG Secure Search)

End
Save the file as fixlist.txt in the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the Farbar log you have submitted.

Run FRST and click Fix only once and wait.

The tool will create a log (Fixlog.txt) please post it to your reply.
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the LogFile button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleanerCx.txt (x is a number).
===

Please let me know what problem persists with this computer.

#3 ninjalotus

ninjalotus
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 14 June 2017 - 04:30 PM

Here you go thanks!

#4 ninjalotus

ninjalotus
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 14 June 2017 - 05:40 PM

Still having issues. What can I do next?

#5 ninjalotus

ninjalotus
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 15 June 2017 - 02:55 AM

Here is the log.

Attached Files



#6 nasdaq

nasdaq

  • Malware Response Team
  • 40,741 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:07 AM

Posted 15 June 2017 - 07:11 AM

What exactly are the issues?

Is the problem with only this computer or others that may be connected via Wifi?

#7 ninjalotus

ninjalotus
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 15 June 2017 - 10:11 PM

2 pcs on network the router says it is a UDP flood attack from

UDP flood from IP 64.94.179.87 port 38915 to IP 173.46.250.233 port 33448 droped
UDP flood from IP 10.37.0.1 port 67 to IP 255.255.255.255 port 68 droped

#8 nasdaq

nasdaq

  • Malware Response Team
  • 40,741 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:07 AM

Posted 16 June 2017 - 08:15 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Press the windows key Windows_Logo_key.gif+ r on your keyboard at the same time. This will open the RUN BOX.
Type Notepad and and click the OK key.
Please copy the entire contents of the code box below to the a new file.
 
start

CreateRestorePoint:
CloseProcesses:

cmd: ipconfig /flushdns
cmd: IPCONFIG /release
cmd: IPCONFIG /renew
CMD: netsh advfirewall reset
CMD: netsh advfirewall set allprofiles state ON
CMD: netsh winsock reset catalog
CMD: netsh int ip reset c:\resetlog.txt
CMD: netsh int ipv4 reset
CMD: netsh int ipv6 reset
CMD: bitsadmin /reset /allusers

Reboot:

End
Save the file as fixlist.txt in the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the Farbar log you have submitted.

Run FRST and click Fix only once and wait.

The tool will create a log (Fixlog.txt) please post it to your reply.
===

If the problem persists run this scan.

--RogueKiller--
  • Download & SAVE to your Desktop Download RogueKiller
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or above, right-click the program file and select "Run as Administrator"
  • Accept the user agreements.
  • Execute the scan and wait until it has finished.
  • If a Windows opens to explain what [PUM's] are, read about it.
  • Click the RoguKiller icon on your taksbar to return to the report.
  • Click open the Report
  • Click Export TXT button
  • Save the file as ReportRogue.txt
  • Click the Remove button to delete the items in RED
  • Click Finish and close the program.
  • Locate the ReportRogue.txt file on your Desktop and copy/paste the contents in your next.
=======

#9 ninjalotus

ninjalotus
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 16 June 2017 - 04:44 PM

Ok here is that you needed.

#10 ninjalotus

ninjalotus
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:07 AM

Posted 16 June 2017 - 04:46 PM

Now its attached.

Attached Files



#11 nasdaq

nasdaq

  • Malware Response Team
  • 40,741 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:07 AM

Posted 17 June 2017 - 08:43 AM


Run the RogueKiller and delete this entry.
[PUP.Gen0] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233} -> Found

Decide if you wish to keep this Updater. I did not find any references to it in your logs. It may be something you removed.
[Suspicious.Path] (X64) HKEY_USERS\RK_Airik_ON_E_3B25\Software\Microsoft\Windows\CurrentVersion\Run | MegakeyUpdater : C:\Users\Airik\AppData\Local\Megamedia\Megakey\MegakeyUpdater.exe [x] -> Found
[Suspicious.Path] (X86) HKEY_USERS\RK_Airik_ON_E_3B25\Software\Microsoft\Windows\CurrentVersion\Run | MegakeyUpdater : C:\Users\Airik\AppData\Local\Megamedia\Megakey\MegakeyUpdater.exe [x] -> Found
==

Reset your router. It may be infected.

How to Reset a Router Back to the Factory Default Settings
http://www.ehow.com/how_2110924_reset-back-factory-default-settings.html

Then, please reconfigure it back to your preferred setting.. Below is the list of default username and password, should you don't know it ;)

http://www.routerpasswords.com/
http://www.phenoelit-us.org/dpl/dpl.html
===

Reset for Linksys, Netgear, D-Link and Belkin Routers
http://www.techsupportforum.com/2763-reset-for-linksys-netgear-d-link-and-belkin-routers/

====
How to tell if my Wireless is secure.
http://www.ehow.com/how_6775466_tell-wireless-secure_.html

===

Keep me posted.

#12 nasdaq

nasdaq

  • Malware Response Team
  • 40,741 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:07 AM

Posted 23 June 2017 - 08:18 AM

Are you still with me?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users