Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

"Use a proxy server for your LAN" repeatedly enabled


  • This topic is locked This topic is locked
2 replies to this topic

#1 ABAP

ABAP

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:56 PM

Posted 18 July 2018 - 10:25 AM

Hi, I've been dealing with ware all morning that i'm fairly sure i got from some shady installer wizard that had bundled things such as task bars, trojans, and malware that i had foolishly assumed were part of the installer. I've got the majority of the ware i believe, but there's two things troubling me. The first of which being a process called SCApp, (I think this is a backdoor for other ware) which has proved near impossible to delete, and the problem in the title, the auto proxy server enabling. I believe that it's entirely possible these two are intertwined. I know for sure that SCApp is opening internet explorer (a browser i never use) and putting ads in my face. The auto proxy enabling is getting irritating, as it prevents me from using discord for long periods of time. I have also encountered something called "roracoon" in my malwarebytes scans. It keeps popping up. Thanks so much for taking your time to help me solve these issues. I really appreciate it. 

 

 

 

Screenshots: 

 

 

Proxy problem -  e0d5b2ba93a47e104d747212797e492c.png

https://gyazo.com/e0d5b2ba93a47e104d747212797e492c

 

 

 

SCApp - f196e035eaf00e1d9a999a1d72f5ea8a.png

https://gyazo.com/f196e035eaf00e1d9a999a1d72f5ea8a

 

 

Roracoon - 0b0deb893ae00baa03a1045472801077.png

https://gyazo.com/0b0deb893ae00baa03a1045472801077



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 39,569 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:09:56 PM

Posted 18 July 2018 - 12:25 PM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

How to attach a file to your reply:
In the Reply section in the bottom of the topic Click the "more reply Options" button.
attachlogs.png

Attach the file.
Select the "Choose a File" navigate to the location of the File.
Click the file you wish to Attach.
Click Attach this file.
Click the Add reply button.
===

Please post the logs for my review.

Wait for further instructions.

#3 nasdaq

nasdaq

  • Malware Response Team
  • 39,569 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:09:56 PM

Posted 24 July 2018 - 07:47 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users