Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser Redirecting (thefeedonline*com)


  • This topic is locked This topic is locked
2 replies to this topic

#1 GreaseMonkeySRT

GreaseMonkeySRT

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:23 PM

Posted 20 September 2009 - 04:05 PM

I made the mistake of clicking on a facebook ad. Dumb move. Why people have to make stuff to make other people's lives difficult is beyond me.

It replaced my desktop wallpaper, wouldn't let me open task manager, and had a tray icon and pop up messages wanting me to download software.

After running Spybot, Adware, and MalwareBytes, those issues are gone. Now links within any webpage will redirect to some advertising page.

The normal link like foxnews or something turns into thefeedonline or livefeedinc followed by a bunch of gibberish.

I have the HijackThis, Malwarebytes, and SuperAntiSpyware log files attached. SuperAntiSpyware removed some things that the others did not.


I've narrowed it down to it being a chkdisk.dll issue.

If I use HijackThis to get rid of several entries of chkdisk.dll and two others that seem to be related, the issues go away. That is, until I restart my computer, and these files are back up again.

O4 - HKCU\..\Run: [autochk] rundll32.exe C:\DOCUME~1\KATEWI~1\protect.dll,_IWMPEvents@0
O4 - HKLM\..\Run: [autochk] rundll32.exe C:\WINDOWS\system32\autochk.dll,_IWMPEvents@0

O4 - S-1-5-18 Startup: ChkDisk.dll (User 'SYSTEM')
O4 - S-1-5-18 Startup: ChkDisk.lnk = ? (User 'SYSTEM')
O4 - .DEFAULT Startup: ChkDisk.dll (User 'Default user')
O4 - .DEFAULT Startup: ChkDisk.lnk = ? (User 'Default user')
O4 - Startup: ChkDisk.dll
O4 - Startup: ChkDisk.lnk = ?

Those are the entries I get rid of and solves the issue, but they're back as soon as I shut down and reboot.

I've been searching online for similar issues, and all other threads time out or get closed and I never find the answer.

I tried using msconfig to block those .dlls, but they keep coming back.

I would really like some help with this please!

Attached Files


Edited by GreaseMonkeySRT, 20 September 2009 - 04:05 PM.


BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:23 PM

Posted 21 September 2009 - 05:17 PM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.


We need to create an OTL Report
  • Please download OTL from here
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the "Run Scan" button.
  • The scan should take just a few minutes.
  • Copy the log that opens up and paste it back here in your next reply.



=============


The next log will show us any hidden files that are present.
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:23 PM

Posted 14 October 2009 - 08:05 AM

As there has been no response, this thread will now be closed.

If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users