Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible virus


  • Please log in to reply
20 replies to this topic

#1 Zombie Superman

Zombie Superman

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 22 May 2011 - 10:48 AM

A brief timeline of events:

About thirty hours ago, I noticed that our computer (Dell Inspiron 531S, running Vista) started running slowly.

I cleaned and defragged. Still running slowly.

Noticed a few pop-ups and decided to do a system restore. I hadn't checked McAfee (Cox Security Suite) to see if there were any problems.

After the system restore, McAfee's real-time scanning couldn't be restored. Tried to run manual scans, these also failed. Error message received: "An error has occurred. Please return "Home" and try your scan again."

Downloaded McAfee Virtual Technician. This fixed the problem of the real-time scanning. After a restart, real-time didn't work again.

Contacted a McAfee tech support agent through chat. He took control of my computer and ran the Virtual Technician. This failed again.

I still cannot reestablish real-time scanning. The computer is still a little slow, and I was unable to open Firefox after the system restore. I tried downloading Firefox again (upgraded last week) and it opened and works.

I appreciate any help that can be offered.

Z\S/

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 25 May 2011 - 03:42 PM

Hello,lets first see if there is a malware here.

Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.5.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer.


Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
[color=green]Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


Troubleshoot Malwarebytes' Anti-Malware
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 09 June 2011 - 10:07 PM

Sorry I haven't responded sooner.

Here's the log from the Malwarebytes scan:

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6822

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19048

6/9/2011 10:06:29 PM
mbam-log-2011-06-09 (22-06-29).txt

Scan type: Quick scan
Objects scanned: 205097
Time elapsed: 28 minute(s), 31 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 0
Registry Keys Infected: 16
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
c:\Windows\Dpucia.exe (Trojan.Downloader) -> 4768 -> Unloaded process successfully.
c:\Users\Captain\AppData\Local\Temp\Dnr.exe (Trojan.Downloader) -> 7900 -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{00A6FAF1-072E-44CF-8957-5838F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{F02FABCB-92DD-475A-98AF-14217BD50746} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{F02FABCB-92DD-475A-98AF-14217BD50746} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59C7FC09-1C83-4648-B3E6-003D2BBC7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AF847F-6E91-45dd-9B68-D6A12C30E5D7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170B96C-28D4-4626-8358-27E6CAEEF907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D1A71FA0-FF48-48dd-9B6D-7A13A3E42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DDB1968E-EAD6-40fd-8DAE-FF14757F60C7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F138D901-86F0-4383-99B6-9CDD406036DA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\4ECYTQ9SIC (Trojan.FakeAlert.SA) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\KOQMLYTPE7 (Trojan.FakeAlert.SA) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Microwsoft (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4ECYTQ9SIC (Trojan.Downloader) -> Value: 4ECYTQ9SIC -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Windows\Dpucia.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\Captain\AppData\Local\Temp\Dnr.exe (Trojan.Downloader) -> Delete on reboot.
c:\Users\Captain\AppData\Local\Temp\Dnq.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Windows\Temp\3a2ebb8.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Users\Meaux\downloads\retrogamersetup2.3.50.49.rgfox000.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\programdata\sysreserve.ini (Malware.Trace) -> Quarantined and deleted successfully.
c:\Windows\Tasks\{22116563-108c-42c0-a7ce-60161b75e508}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Windows\Tasks\{810401e2-dde0-454e-b0e2-aa89c9e5967c}.job (Trojan.FraudPack) -> Quarantined and deleted successfully.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 10 June 2011 - 10:45 AM

Looks like we found some... Reboot the machine. Now again to Safe mode.

Next run ATF and SAS:

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.



Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 10 June 2011 - 02:23 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/10/2011 at 02:03 PM

Application Version : 4.53.1000

Core Rules Database Version : 7246
Trace Rules Database Version: 5058

Scan type : Complete Scan
Total Scan Time : 00:54:45

Memory items scanned : 375
Memory threats detected : 0
Registry items scanned : 9103
Registry threats detected : 0
File items scanned : 35698
File threats detected : 210

Adware.Tracking Cookie
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@imrworldwide[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@revsci[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@coxhsi.112.2o7[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ad2.popcap[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ford.112.2o7[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ru4[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@edge.ru4[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ads.undertone[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@liveperson[4].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@liveperson[3].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@liveperson[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ad.yieldmanager[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@interclick[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@sales.liveperson[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@microsoftwindows.112.2o7[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@pointroll[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@tribalfusion[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@media6degrees[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@adserver.adtechus[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@popcapgames.122.2o7[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@statse.webtrendslive[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@warnerbros.112.2o7[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@a1.interclick[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@invitemedia[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@insightexpressai[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@tacoda[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ads.pointroll[1].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@at.atwola[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@ads.pointroll[2].txt
C:\Users\Captain\AppData\Roaming\Microsoft\Windows\Cookies\Low\captain@www.googleadservices[1].txt
a.ads2.msads.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
a.media.abcfamily.go.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
adimages.scrippsnetworks.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
ads2.msads.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
b.ads2.msads.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
bc.youporn.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
bloody-disgusting.indieclicktv.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cache.specificmedia.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cdn.eyewonder.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cdn.insights.gravity.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cdn.media.theview.tv [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cdn4.specificclick.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cdn5.specificclick.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
cloudfront.mediamatters.org [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
content.oddcast.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
content.yieldmanager.edgesuite.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
convoad.technoratimedia.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
core.insightexpressai.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
crackle.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
ds.serving-sys.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
ec.atdmt.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
googleads.g.doubleclick.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
hs.interpolls.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
i.adultswim.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
ia.media-imdb.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
ictv-bd-ec.indieclicktv.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
images.indieclick.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
input.insights.gravity.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
interclick.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
m1.2mdn.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
macromedia.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media-att.pictela.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media-ut.pictela.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.comicvine.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.entertonement.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.fleshlight.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.heavy.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.ign.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.jambocast.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.movieweb.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.mtvnservices.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.noob.us [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.onsugar.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.podaddies.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.resulthost.org [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.scanscout.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.socialvibe.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.tattomedia.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.thewb.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media.wfaa.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media1.break.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media10.washingtonpost.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
media2.firstshowing.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
mediaforgews.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
msnbcmedia.msn.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
naiadsystems.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
objects.tremormedia.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
oddcast.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
pornotube.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
revenue.louisiana.gov [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
richmedia247.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
s0.2mdn.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
s1.2mdn.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
s1.media.howtospendit.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
secure-us.imrworldwide.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
serving-sys.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
spe.atdmt.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
static.2mdn.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
static.youporn.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
track.adform.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
tracksimple.s3.amazonaws.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
trinity-adserver-003.co.uk [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
udn.specificclick.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
videos.mediaite.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.5levelmedia.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.adultswim.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.alphaporno.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.crackle.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.fliptrack.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.mofosex.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.naiadsystems.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.pornhub.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.pornrabbit.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.pornstarnetwork.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.sexblonde.info [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.teenist.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.thrixxx.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.userporn.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
www.ziporn.com [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
yieldmanager.edgesuite.net [ C:\Users\Captain\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\62MK5GUM ]
.imrworldwide.com [ C:\Users\Meaux\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Users\Meaux\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
2mdn.net [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
cdn4.specificclick.net [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
core.insightexpressai.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
googleads.g.doubleclick.net [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
ia.media-imdb.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
interclick.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
l.content.oddcast.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
macromedia.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media.mtvnservices.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media.resulthost.org [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media.scanscout.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media.tattomedia.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media.wwltv.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media01.kyte.tv [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
media1.break.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
multistats.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
objects.tremormedia.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
oddcast.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
revenue.louisiana.gov [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
s0.2mdn.net [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
secure-us.imrworldwide.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
spe.atdmt.com [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
static.2mdn.net [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
udn.specificclick.net [ C:\Users\Meaux\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\CSQYN3PL ]
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@www.googleadservices[6].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@questionmarket[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@mediamall.wireless.att[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@fastclick[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ad.yieldmanager[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@realmedia[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@user.lucidmedia[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@r1-ads.ace.advertising[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@tribalfusion[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@serving-sys[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@yieldmanager[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@realmedia[3].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@fastclick[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ad.yieldmanager[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@media6degrees[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@media6degrees[3].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@stat.onestat[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@mediabrandsww[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@adecn[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@a1.interclick[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@sales.liveperson[10].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@traveladvertising[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@stats.paypal[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@liveperson[4].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@atdmt[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@cdn4.specificclick[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@liveperson[5].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@liveperson[3].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@liveperson[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@interclick[3].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@interclick[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@2o7[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@doubleclick[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@pointroll[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@dc.tremormedia[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ads.pointroll[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@sales.liveperson[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@sales.liveperson[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@sales.liveperson[7].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@find.myrecipes[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ads.freearcade[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@imrworldwide[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@adserver1.synapseip[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@adserver.adtechus[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@moneymanagement.122.2o7[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@adbrite[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@adxpose[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@revsci[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@revsci[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@specificmedia[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ru4[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@network.realmedia[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@advertising[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ad2.popcap[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@ads.undertone[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@advertising[3].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@andomedia[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@coxhsi.112.2o7[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@guthyrenker.112.2o7[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@insightexpressai[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@invitemedia[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@pro-market[1].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@trafficmp[2].txt
C:\Users\Meaux\AppData\Roaming\Microsoft\Windows\Cookies\Low\meaux@trafficmp[3].txt

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 10 June 2011 - 02:50 PM

Looking good,will await the MBAM rerun LOG and did you ever run TDSS from post 2
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 10 June 2011 - 07:41 PM

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6822

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19048

6/10/2011 9:22:26 AM
mbam-log-2011-06-10 (09-22-26).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 374228
Time elapsed: 3 hour(s), 27 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Users\Captain\Desktop\Desktop\yontooclientsetup.exe (Adware.Agent) -> Quarantined and deleted successfully.

Re-ran a TDSS scan. No problems found.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 10 June 2011 - 08:18 PM

Ok,so how is it now,any issues left?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 11 June 2011 - 09:55 AM

It appears there's some sort of virus or malware still there. Clicking on Google search results leads to either a blank page or another search page. Here are some of the alternate search pages that appear:

http://radontheweb.mevio.com/?utm_campaign=5b9202_559132_258162_113956_45251_&utm_source=5b9202&utm_medium=5b9202&ClickId=127.0.1.1_1307804023532_b6ec6a2d

http://www.goingonearth.com/search.php?q=cthulhu&n=1307804023

http://www.deckplaninfo.com/search-results.aspx?keywords=cthulhu

I've also been redirected to "findquickresults" but another redirect happens so quickly I wasn't able to copy the link.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 12 June 2011 - 06:20 PM

If still redirecting>>>
Change your DNS Servers:
  • Go to Posted Image > Run... and in the open box, type: cmd
  • Press OK or Hit Enter.
  • At the command prompt, type or copy/paste: ipconfig /flushdns
  • Hit Enter.
  • You will get a confirmation that the flush was successful.
  • Close the command box.
If the above commands did not resolve the problem, the next thing to try is to reset your network settings and Configure TCP/IP to use DNS.
  • Go to Posted Image > Control Panel, and choose Network Connections.
  • Right-click on your default connection, usually Local Area Connection or Dial-up Connection if you are using Dial-up, and and choose Properties.
  • Double-click on Internet Protocol (TCP/IP) or highlight it and select Properties.
  • Under the General tab, write down any settings in case you should need to change them back.
  • Select the button that says "Obtain an IP address automatically" or make sure the DNS server IP address is the same as provided by your ISP.
  • Select the button that says "Obtain DNS servers automatically".
  • If unknown Preferred or Alternate DNS servers are listed, uncheck the box that says "Use the following DNS server address".
  • Click OK twice to get out of the properties screen and restart your computer. If not prompted to reboot go ahead and reboot manually.
-- Vista users can refer to How to Change TCP/IP settings

CAUTION: It's possible that your ISP (Internet Service Provider) requires specific DNS settings here. Make sure you know if you need these settings or not BEFORE you make any changes or you may lose your Internet connection. If you're sure you do not need a specific DNS address,
then you may proceed.


Let me know if that fixes the redirects. Are you connected over the router? If so are other people on the router affected as well?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 12 June 2011 - 08:51 PM

Tried to change the DNS servers, but received this message: "This operation requires elevation."

Checked the IP settings, and they were already set as you described them.

We only have the one computer on the network.

Would it help to uninstall and then reinstall Firefox? If so, how would I preserve my bookmarks?

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 12 June 2011 - 08:58 PM

•Go to Start > Run... and in the open box, type: cmd
when you see the Command Prompt in the list that comes up Right Click on the Command Prompt and select Run As Administrator
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 12 June 2011 - 09:35 PM

•Go to Start > Run... and in the open box, type: cmd
when you see the Command Prompt in the list that comes up Right Click on the Command Prompt and select Run As Administrator


That did the trick!

Thanks so much for the help. It seems things are moving more quickly, and hopefully, any remaining sluggishness is due to not enough space on the hard drive. I'll be fixing that shortly (have a lot of images/files to delete)

Thanks again, Z\S/

#14 Zombie Superman

Zombie Superman
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 13 June 2011 - 12:14 AM

The redirecting is still happening! Is there anything else I can do?

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:06 PM

Posted 13 June 2011 - 09:35 AM

Are you connected via a router? If so are other people on the router affected as well?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users