A variation on the Manual Proxy Hack has arrived and infected Win10 Edge’s Manual Proxy Settings. This is an unwanted nuisance for anyone working away from their office and using their smart device to surf the internet.
The malicious Win10 Manual Proxy Settings (https://ibb.co/F8xFK42) are:-
Laptop Operating System is Windows 10 Home (x64) Version 1909 (build 18363.592), Browser is Microsoft Edge 44.18362.449.0, Virus Protection is Windows Defender and Malware Real-Time Protection is Malwarebytes Anti-Malware and Zemana AntiMalware. Have also used standalone antimalware applications and these did not find any problems to correct.
This is a hack (not a regular virus or malware) and thereby evades detection by Virus and Malware Protection applications.
The 127.0.0.1 Hack and/or Virus is not new, but the 8888 variation is new. Have used the 127.0.0.1 information from the internet to edit and remove Registry entries from HKEY_USERS and HKEY_LOCAL_MACHINE. However, the Manual Proxy Hack is persistently reapplied to just the limited user account being used to surf the internet.
Have searched for the root source of this hack’s reapplied settings, installed by proxy strings in SocketsHttpHandler, etc. but this is not in my comfort zone, so do not know what Registry entries to look for.
Has anyone discovered how to remove the root source of this hack?
Thank you in anticipation. Kind regards.
The malicious Win10 Manual Proxy Settings (https://ibb.co/F8xFK42) are:-
- Use a proxy server (__ON),
- Address [http=127.0.0.1:8888;https=127.0.0.1:8888],
- Port [____] i.e. empty, and
- Except for addresses [<-loopback>].
Laptop Operating System is Windows 10 Home (x64) Version 1909 (build 18363.592), Browser is Microsoft Edge 44.18362.449.0, Virus Protection is Windows Defender and Malware Real-Time Protection is Malwarebytes Anti-Malware and Zemana AntiMalware. Have also used standalone antimalware applications and these did not find any problems to correct.
This is a hack (not a regular virus or malware) and thereby evades detection by Virus and Malware Protection applications.
The 127.0.0.1 Hack and/or Virus is not new, but the 8888 variation is new. Have used the 127.0.0.1 information from the internet to edit and remove Registry entries from HKEY_USERS and HKEY_LOCAL_MACHINE. However, the Manual Proxy Hack is persistently reapplied to just the limited user account being used to surf the internet.
Have searched for the root source of this hack’s reapplied settings, installed by proxy strings in SocketsHttpHandler, etc. but this is not in my comfort zone, so do not know what Registry entries to look for.
Has anyone discovered how to remove the root source of this hack?
Thank you in anticipation. Kind regards.
Last edited: