Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 91804 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

[Resolved] Going to certain sites redirects me to other ad sites.


  • This topic is locked This topic is locked
32 replies to this topic

#1 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 11 October 2009 - 10:48 AM

I keep getting redirect to other ad sites like asklots.com and then ebay and then it keeps going, when visiting allkpop.com, I've been visiting this site for over a year, and never has there been a problem where it redirects me until about 3-4?(not sure) days ago?

Here are my logs:


DDS (Ver_09-06-26.01) - NTFSx86
Run by Administrator at 3:39:21.71 on Mon 10/12/2009
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3326.2659 [GMT 10:00]


============== Running Processes ===============

F:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
F:\WINDOWS\System32\svchost.exe -k netsvcs
F:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\Rundll32.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\DAEMON Tools Lite\daemon.exe
F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
F:\Program Files\Bonjour\mDNSResponder.exe
F:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
F:\WINDOWS\system32\svchost.exe -k imgsvc
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
F:\WINDOWS\System32\svchost.exe -k HTTPFilter
F:\Program Files\Windows Live\Messenger\msnmsgr.exe
F:\WINDOWS\system32\WISPTIS.EXE
F:\Program Files\Microsoft Office\OFFICE11\POWERPNT.EXE
F:\Program Files\Windows Media Player\wmplayer.exe
F:\Program Files\Mozilla Firefox\firefox.exe
F:\Documents and Settings\Administrator\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = *.local
mSearchAssistant = hxxp://www.google.com
BHO: IeMonitorBho Class: {bf00e119-21a3-4fd1-b178-3b8537e75c92} - f:\program files\megaupload\mega manager\MegaIEMn.dll
TB: {A057A204-BACC-4D26-C39E-35F1D2A32EC8} - No File
uRun: [ctfmon.exe] f:\windows\system32\ctfmon.exe
uRun: [DAEMON Tools Lite] "f:\program files\daemon tools lite\daemon.exe" -autorun
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [P17Helper] Rundll32 P17.dll,P17Helper
mRun: [StartCCC] "f:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [IMJPMIG8.1] f:\windows\ime\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
mRun: [MSPY2002] f:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [PHIME2002ASync] f:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] f:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
uPolicies-explorer: FOLDEROPTIONS = 0 (0x0)
uPolicies-system: EnableProfileQuota = 1 (0x1)
IE: E&xport to Microsoft Excel - f:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - f:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - f:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - f:\program files\spybot - search & destroy\SDHelper.dll
DPF: Microsoft XML Parser for Java - file://f:\windows\java\classes\xmldso.cab
DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} - hxxp://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} - hxxp://messenger.zone.msn.com/binary/SolitaireShowdown.cab56986.cab
DPF: {5D6F45B3-9043-443D-A792-115447494D24} - hxxp://messenger.zone.msn.com/EN-AU/a-UNO1/GAME_UNO1.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1230097177390
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1230097142984
DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} - hxxp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: {892E1C59-51CF-4F96-ADE3-57278A6EDA53} = 192.168.1.1
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - f:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - f:\docume~1\admini~1\applic~1\mozilla\firefox\profiles\swhk27ue.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com.au/|http://www.allkpop.com/|http://seoulbeats.com/
FF - plugin: f:\documents and settings\administrator\local settings\application data\google\update\1.2.145.5\npGoogleOneClick8.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin2.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin3.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin4.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin5.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin6.dll
FF - plugin: f:\program files\quicktime alternative\plugins\npqtplugin7.dll

---- FIREFOX POLICIES ----
f:\program files\mozilla firefox\greprefs\all.js - pref("media.enforce_same_site_origin", false);
f:\program files\mozilla firefox\greprefs\all.js - pref("media.cache_size", 51200);
f:\program files\mozilla firefox\greprefs\all.js - pref("media.ogg.enabled", true);
f:\program files\mozilla firefox\greprefs\all.js - pref("media.wave.enabled", true);
f:\program files\mozilla firefox\greprefs\all.js - pref("media.autoplay.enabled", true);
f:\program files\mozilla firefox\greprefs\all.js - pref("browser.urlbar.autocomplete.enabled", true);
f:\program files\mozilla firefox\greprefs\all.js - pref("capability.policy.mailnews.*.wholeText", "noAccess");
f:\program files\mozilla firefox\greprefs\all.js - pref("dom.storage.default_quota", 5120);
f:\program files\mozilla firefox\greprefs\all.js - pref("content.sink.event_probe_rate", 3);
f:\program files\mozilla firefox\greprefs\all.js - pref("network.http.prompt-temp-redirect", true);
f:\program files\mozilla firefox\greprefs\all.js - pref("layout.css.dpi", -1);
f:\program files\mozilla firefox\greprefs\all.js - pref("layout.css.devPixelsPerPx", -1);
f:\program files\mozilla firefox\greprefs\all.js - pref("gestures.enable_single_finger_input", true);
f:\program files\mozilla firefox\greprefs\all.js - pref("dom.max_chrome_script_run_time", 0);
f:\program files\mozilla firefox\greprefs\all.js - pref("network.tcp.sendbuffer", 131072);
f:\program files\mozilla firefox\greprefs\all.js - pref("geo.enabled", true);
f:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.remember_cert_checkbox_default_setting", true);
f:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr", "moz35");
f:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-cjkt", "moz35");
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.blocklist.level", 2);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.urlbar.restrict.typed", "~");
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.urlbar.default.behavior", 0);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.history", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.formdata", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.passwords", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.downloads", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cookies", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cache", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.sessions", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.offlineApps", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.siteSettings", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.history", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.formdata", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.passwords", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.downloads", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.cookies", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.cache", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.sessions", true);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.offlineApps", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.siteSettings", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.sanitize.migrateFx3Prefs", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.ssl_override_behavior", 2);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("security.alternate_certificate_error_page", "certerror");
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.autostart", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.dont_prompt_on_enter", false);
f:\program files\mozilla firefox\defaults\pref\firefox.js - pref("geo.wifi.uri", "https://www.google.com/loc/json");

============= SERVICES / DRIVERS ===============

R0 pavboot;pavboot;f:\windows\system32\drivers\pavboot.sys [2009-10-11 28544]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;f:\windows\system32\drivers\AtiHdmi.sys [2008-12-24 93696]
S0 Lbd;Lbd;f:\windows\system32\drivers\lbd.sys --> f:\windows\system32\drivers\Lbd.sys [?]
S3 NPF;NetGroup Packet Filter Driver;f:\windows\system32\drivers\npf.sys [2007-11-7 34064]
S4 GEST Service;GEST Service for program management.;f:\program files\gigabyte\energysaver\GSvr.exe [2008-12-24 80392]

=============== Created Last 30 ================

2009-10-11 02:54 28,544 a------- f:\windows\system32\drivers\pavboot.sys
2009-10-11 02:52 <DIR> --d----- f:\program files\Panda Security
2009-10-05 04:02 <DIR> --d----- f:\program files\Megaupload
2009-10-01 03:40 <DIR> --d----- f:\program files\ElcomSoft
2009-09-28 20:57 <DIR> --dsh--- f:\documents and settings\administrator\UserData
2009-09-28 20:57 <DIR> --dsh--- f:\documents and settings\administrator\IECompatCache
2009-09-28 20:57 <DIR> --dsh--- f:\documents and settings\administrator\PrivacIE
2009-09-28 20:56 8,192 a------- f:\windows\REGLOCS.OLD
2009-09-28 20:55 <DIR> --dsh--- f:\documents and settings\administrator\IETldCache
2009-09-28 20:52 <DIR> -cd-h--- f:\windows\ie8
2009-09-28 20:50 <DIR> --d-h--- f:\windows\$hf_mig$
2009-09-28 20:49 297,984 -c------ f:\windows\system32\dllcache\msctf.dll
2009-09-27 21:03 <DIR> a-dshr-- F:\autorun.inf
2009-09-27 19:35 2 a--shrot f:\windows\winstart.bat
2009-09-27 19:35 <DIR> --d----- f:\program files\UnHackMe
2009-09-21 15:38 2,184 a------- f:\windows\system32\wpa.dbl
2009-09-16 16:24 <DIR> --d----- f:\docume~1\alluse~1\applic~1\Viewpoint

==================== Find3M ====================

2009-09-10 14:54 38,224 a------- f:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 19,160 a------- f:\windows\system32\drivers\mbam.sys
2009-08-16 03:52 45,286 a------- f:\windows\system32\ClubboxUninstall.exe

============= FINISH: 3:39:31.78 ===============


ROOTREPEAL LOG:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/10/12 03:43
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: F:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xACB76000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: F:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA5D8000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PCI_PNP9940
Image Path: \Driver\PCI_PNP9940
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: F:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA9A51000 Size: 49152 File Visible: No Signed: -
Status: -

Name: spgw.sys
Image Path: spgw.sys
Address: 0xB9EA7000 Size: 1048576 File Visible: No Signed: -
Status: -

Name: sptd
Image Path: \Driver\sptd
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "spgw.sys" at address 0xb9ea80e0

#: 071 Function Name: NtEnumerateKey
Status: Hooked by "spgw.sys" at address 0xb9ec6ca2

#: 073 Function Name: NtEnumerateValueKey
Status: Hooked by "spgw.sys" at address 0xb9ec7030

#: 119 Function Name: NtOpenKey
Status: Hooked by "spgw.sys" at address 0xb9ea80c0

#: 160 Function Name: NtQueryKey
Status: Hooked by "spgw.sys" at address 0xb9ec7108

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "spgw.sys" at address 0xb9ec6f88

#: 247 Function Name: NtSetValueKey
Status: Hooked by "spgw.sys" at address 0xb9ec719a

==EOF==

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:53:05 AM, on 10/12/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\Rundll32.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\DAEMON Tools Lite\daemon.exe
F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
F:\Program Files\Bonjour\mDNSResponder.exe
F:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
F:\WINDOWS\System32\svchost.exe
F:\Program Files\Windows Live\Messenger\msnmsgr.exe
F:\WINDOWS\system32\WISPTIS.EXE
F:\Program Files\Microsoft Office\OFFICE11\POWERPNT.EXE
F:\Program Files\Windows Media Player\wmplayer.exe
F:\Program Files\Mozilla Firefox\firefox.exe
F:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: MegaIEMn - {bf00e119-21a3-4fd1-b178-3b8537e75c92} - F:\Program Files\Megaupload\Mega Manager\MegaIEMn.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
O4 - HKLM\..\Run: [StartCCC] "F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [IMJPMIG8.1] F:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] F:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] F:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] F:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKCU\..\Run: [ctfmon.exe] F:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [DAEMON Tools Lite] "F:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - F:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - F:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zon...kr.cab56986.cab
O16 - DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} (Solitaire Showdown Class) - http://messenger.zon...wn.cab56986.cab
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zon...1/GAME_UNO1.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.mi...b?1230097177390
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1230097142984
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zon...nt.cab56907.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{892E1C59-51CF-4F96-ADE3-57278A6EDA53}: NameServer = 192.168.1.1
O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - F:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: iPod Service - Apple Inc. - F:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - F:\Program Files\WinPcap\rpcapd.exe
O23 - Service: ServiceLayer - Nokia. - F:\Program Files\PC Connectivity Solution\ServiceLayer.exe
O23 - Service: WMP54Gv4SVC - GEMTEKS - F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe

--
End of file - 5714 bytes

Attached Files


Edited by Icoris, 11 October 2009 - 10:54 AM.

    Advertisements

Register to Remove


#2 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 12 October 2009 - 03:37 PM

Posted Image


DO NOT use any TOOLS such as Combofix, SmitfraudFix, MBAM, Vundofix, or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.


Vista users:
1. These tools MUST be run from the executable. (.exe)
2. With Admin Rights (Right click, choose "Run as Administrator")


Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

Double-click My Computer.
Click the Tools menu, and then click Folder Options.
Click the View tab.
Uncheck "Hide file extensions for known file types."
Under the "Hidden files" folder, select "Show hidden files and folders."
Uncheck "Hide protected operating system files."
Click Apply, and then click OK.


Please do not delete anything unless instructed to.


Please download ATF Cleaner by Atribune.
Download - ATF Cleaner»
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Posted Image
Click the Empty Selected button.

(If you use FireFox or the Opera browser
To keep saved passwords, click No at the prompt.)

It's normal after running ATF cleaner that the PC will be slower to boot the first time or two.

Next:

Please download Malwarebytes' Anti-Malware to your desktop.

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
    Posted Image
  • When the scan is complete, click OK, then Show Results to view the results.
  • Posted Image
  • Then click Remove Selected .
  • When completed, a log will open in Notepad. Please save it to a convenient location and post the results.
  • Note: If you receive a notice that some of the items couldn't be removed, that they have been added to the delete on reboot list, please reboot.
Also "copy/paste" a new HijackThis log file into this thread.

Also please describe how your computer behaves at the moment.


Please don't attach the scans / logs, use "copy/paste". .

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#3 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 13 October 2009 - 09:48 AM

Just to add on, i dont know when and how this happened, but i noticed 43725627.exe and _ex-08 running, and is now in my msconfig, ill get back to you after following your instructions.

EDIT: after using that cleaner, the redirection is still the same, i actually watched it redirect, it goes through quite a bit of websites, i think because i left it so long it installed those .exes without me noticing as i was doing something else, attempting to scan with mbam now.

EDIT2: MBAM LOG: strange,. i actually scanned before when the redirections were happening there was nothing but now thers this

Malwarebytes' Anti-Malware 1.41
Database version: 2954
Windows 5.1.2600 Service Pack 2

10/14/2009 2:58:00 AM
mbam-log-2009-10-14 (02-58-00).txt

Scan type: Quick Scan
Objects scanned: 95589
Time elapsed: 2 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 2
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RList (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: f:\windows\system32\sdra64.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\sdra64.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (F:\WINDOWS\system32\userinit.exe,F:\WINDOWS\system32\sdra64.exe,) Good: (Userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
F:\Documents and Settings\All Users\Application Data\43725627 (Rogue.Multiple) -> Quarantined and deleted successfully.
F:\WINDOWS\system32\lowsec (Stolen.data) -> Delete on reboot.

Files Infected:
F:\Documents and Settings\Administrator\Local Settings\temp\d.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
F:\Documents and Settings\All Users\Application Data\43725627\43725627.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
F:\WINDOWS\system32\lowsec\local.ds (Stolen.data) -> Delete on reboot.
F:\WINDOWS\system32\lowsec\user.ds (Stolen.data) -> Delete on reboot.
F:\WINDOWS\system32\sdra64.exe (Trojan.FakeAlert) -> Delete on reboot.


HJT: Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:03:17 AM, on 10/14/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\Explorer.EXE
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\Rundll32.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\DAEMON Tools Lite\daemon.exe
F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
F:\Program Files\Bonjour\mDNSResponder.exe
F:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
F:\WINDOWS\System32\svchost.exe
F:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: MegaIEMn - {bf00e119-21a3-4fd1-b178-3b8537e75c92} - F:\Program Files\Megaupload\Mega Manager\MegaIEMn.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
O4 - HKLM\..\Run: [StartCCC] "F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [IMJPMIG8.1] F:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] F:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] F:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] F:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [MSConfig] F:\WINDOWS\pchealth\helpctr\Binaries\MSCONFIG.EXE /auto
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "F:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [ctfmon.exe] F:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [DAEMON Tools Lite] "F:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - F:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - F:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zon...kr.cab56986.cab
O16 - DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} (Solitaire Showdown Class) - http://messenger.zon...wn.cab56986.cab
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zon...1/GAME_UNO1.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.mi...b?1230097177390
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1230097142984
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zon...nt.cab56907.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{892E1C59-51CF-4F96-ADE3-57278A6EDA53}: NameServer = 192.168.1.1
O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - F:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - F:\Program Files\WinPcap\rpcapd.exe
O23 - Service: ServiceLayer - Nokia. - F:\Program Files\PC Connectivity Solution\ServiceLayer.exe
O23 - Service: WMP54Gv4SVC - GEMTEKS - F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe

--
End of file - 5602 bytes

Computer seems fine for now, ill post again if anything comes up

EDIT: The mass redirection thing is happening on that site again, so not in the clear yet.

Edited by Icoris, 13 October 2009 - 10:13 AM.


#4 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 13 October 2009 - 10:22 AM

1. These tools MUST be run from the executable. (.exe)
2. With Admin Rights (Right click, choose "Run as Administrator") every time you run them




Download ComboFix from one of these locations:

Link 1
Link 2


* IMPORTANT !!! Save ComboFix.exe to your Desktop


  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs

  • Double click on ComboFix.exe & follow the prompts.

    Note: Combofix will run without the Recovery Console installed.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
"copy/paste" a new HijackThis log file into this thread as well.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.
3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.
4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.


Also please describe how your computer behaves at the moment.

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#5 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 13 October 2009 - 10:23 PM

Combo LOG:

ComboFix 09-10-13.01 - Administrator 10/14/2009 15:13.2.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3326.2881 [GMT 10:00]
Running from: f:\documents and settings\Administrator\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

f:\documents and settings\Administrator\Desktop\Big Bang & Hyori Lee - Act
f:\documents and settings\Administrator\Desktop\Big Bang & Hyori Lee - Act
f:\windows\system32\Data

f:\windows\system32\mstsc.exe . . . is infected!!

f:\windows\system32\proquota.exe . . . is missing!!

.
((((((((((((((((((((((((( Files Created from 2009-09-14 to 2009-10-14 )))))))))))))))))))))))))))))))
.

2009-10-11 17:53 . 2009-10-11 17:53 -------- d-----w- f:\program files\Trend Micro
2009-10-10 16:54 . 2008-06-19 07:24 28544 ----a-w- f:\windows\system32\drivers\pavboot.sys
2009-10-10 16:52 . 2009-10-10 16:52 -------- d-----w- f:\program files\Panda Security
2009-10-04 18:02 . 2009-10-04 18:02 -------- d-----w- f:\program files\Megaupload
2009-09-30 17:40 . 2009-09-30 17:40 -------- d-----w- f:\program files\ElcomSoft
2009-09-28 10:57 . 2009-09-28 10:57 -------- d-sh--w- f:\documents and settings\Administrator\UserData
2009-09-28 10:57 . 2009-09-28 10:57 -------- d-sh--w- f:\documents and settings\Administrator\IECompatCache
2009-09-28 10:57 . 2009-09-28 10:57 -------- d-sh--w- f:\documents and settings\Administrator\PrivacIE
2009-09-28 10:55 . 2009-09-28 10:55 -------- d-sh--w- f:\documents and settings\LocalService\IETldCache
2009-09-28 10:55 . 2009-09-28 10:55 -------- d-sh--w- f:\documents and settings\Administrator\IETldCache
2009-09-28 10:52 . 2009-09-28 10:53 -------- dc-h--w- f:\windows\ie8
2009-09-28 10:50 . 2009-09-28 10:50 -------- d--h--w- f:\windows\$hf_mig$
2009-09-28 10:49 . 2008-02-26 11:48 297984 -c----w- f:\windows\system32\dllcache\msctf.dll
2009-09-27 09:35 . 2009-09-27 09:35 2 --shatr- f:\windows\winstart.bat
2009-09-27 09:35 . 2009-09-27 09:54 -------- d-----w- f:\program files\UnHackMe
2009-09-21 07:46 . 2009-09-21 07:46 -------- d-----w- f:\documents and settings\Administrator\Application Data\GRETECH
2009-09-16 06:24 . 2009-09-16 06:24 -------- d-----w- f:\documents and settings\All Users\Application Data\AOL OCP
2009-09-16 06:24 . 2009-09-17 14:55 -------- d-----w- f:\documents and settings\All Users\Application Data\AOL
2009-09-16 06:24 . 2009-09-16 06:24 -------- d-----w- f:\documents and settings\All Users\Application Data\Viewpoint

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-13 16:59 . 2008-12-24 07:11 -------- d-----w- f:\documents and settings\Administrator\Application Data\uTorrent
2009-10-11 11:55 . 2009-08-03 14:37 -------- d-----w- f:\program files\Heroes of Newerth
2009-10-04 18:02 . 2008-12-24 01:01 -------- d--h--w- f:\program files\InstallShield Installation Information
2009-09-27 08:50 . 2008-12-24 00:57 -------- d-----w- f:\program files\Spybot - Search & Destroy
2009-09-21 05:18 . 2009-06-23 16:42 -------- d-----w- f:\program files\Malwarebytes' Anti-Malware
2009-09-10 14:21 . 2009-09-10 14:21 -------- d-----w- f:\documents and settings\Administrator\Application Data\Ahead
2009-09-10 04:54 . 2009-06-23 16:42 38224 ----a-w- f:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 04:53 . 2009-06-23 16:42 19160 ----a-w- f:\windows\system32\drivers\mbam.sys
2009-09-01 11:06 . 2009-04-04 18:15 -------- d-----w- f:\program files\Common Files\AVSMedia
2009-08-29 02:51 . 2008-12-24 08:12 -------- d-----w- f:\documents and settings\Administrator\Application Data\Apple Computer
2009-08-29 02:48 . 2008-12-24 08:10 -------- d-----w- f:\documents and settings\All Users\Application Data\Apple
2009-08-16 09:11 . 2008-12-24 04:19 74440 ----a-w- f:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-16 07:58 . 2009-01-08 11:38 -------- d-----w- f:\documents and settings\All Users\Application Data\avg8
2009-08-15 17:52 . 2009-08-15 17:52 45286 ----a-w- f:\windows\system32\ClubboxUninstall.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DAEMON Tools Lite"="f:\program files\DAEMON Tools Lite\daemon.exe" [2008-12-29 687560]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="f:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-01-21 61440]
"IMJPMIG8.1"="f:\windows\IME\imjp8_1\IMJPMIG.EXE" [2001-08-23 208949]
"MSPY2002"="f:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2001-08-23 77824]
"PHIME2002ASync"="f:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2001-08-23 737360]
"PHIME2002A"="f:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2001-08-23 737360]
"Malwarebytes Anti-Malware (reboot)"="f:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"RTHDCPL"="RTHDCPL.EXE" - f:\windows\RTHDCPL.exe [2008-05-07 16862208]
"P17Helper"="P17.dll" - f:\windows\system32\P17.dll [2005-05-03 64512]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"FOLDEROPTIONS"= 0 (0x0)

[HKLM\~\startupfolder\F:^Documents and Settings^Administrator^Start Menu^Programs^Startup^Adobe Gamma.lnk]
path=f:\documents and settings\Administrator\Start Menu\Programs\Startup\Adobe Gamma.lnk
backup=f:\windows\pss\Adobe Gamma.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Lavasoft Ad-Aware Service"=2 (0x2)
"iPod Service"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"WLSetupSvc"=3 (0x3)
"usnjsvc"=3 (0x3)
"wscsvc"=2 (0x2)
"Ati HotKey Poller"=2 (0x2)
"ATI Smart"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"f:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"f:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"f:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"f:\\Program Files\\uTorrent\\uTorrent.exe"=
"f:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"f:\\Program Files\\VentSrv\\ventrilo_srv.exe"=
"f:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"f:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizz
"6112:TCP"= 6112:TCP:B

R0 pavboot;pavboot;f:\windows\system32\drivers\pavboot.sys [10/11/2009 2:54 AM 28544]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;f:\windows\system32\drivers\AtiHdmi.sys [12/24/2008 11:12 AM 93696]
S0 Lbd;Lbd;f:\windows\system32\DRIVERS\Lbd.sys --> f:\windows\system32\DRIVERS\Lbd.sys [?]
S3 NPF;NetGroup Packet Filter Driver;f:\windows\system32\drivers\npf.sys [11/7/2007 6:22 AM 34064]
S4 GEST Service;GEST Service for program management.;f:\program files\GIGABYTE\EnergySaver\GSvr.exe [12/24/2008 11:01 AM 80392]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - GTNDIS5

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"f:\windows\system32\rundll32.exe" "f:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - f:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: {892E1C59-51CF-4F96-ADE3-57278A6EDA53} = 192.168.1.1
DPF: Microsoft XML Parser for Java - file://f:\windows\Java\classes\xmldso.cab
FF - ProfilePath - f:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\swhk27ue.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com.au/|http://www.allkpop.com/|http://seoulbeats.com/
FF - plugin: f:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\1.2.145.5\npGoogleOneClick8.dll
FF - plugin: f:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin2.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin3.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin4.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin5.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin6.dll
FF - plugin: f:\program files\QuickTime Alternative\Plugins\npqtplugin7.dll
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{A057A204-BACC-4D26-C39E-35F1D2A32EC8} - (no file)
AddRemove-WinZip 10 Pro - c:\docume~1\ADMINI~1\APPLIC~1\MICROS~1\Crypto\UNWISE.EXE



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-14 15:16
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-861567501-261478967-1417001333-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f1,c1,ac,e3,24,c3,17,47,85,3d,97,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f1,c1,ac,e3,24,c3,17,47,85,3d,97,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(712)
f:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3484)
f:\windows\system32\ieframe.dll
f:\windows\system32\webcheck.dll
f:\windows\system32\WPDShServiceObj.dll
f:\windows\system32\PortableDeviceTypes.dll
f:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
f:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
f:\program files\Bonjour\mDNSResponder.exe
f:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
f:\program files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
f:\program files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
f:\windows\system32\rundll32.exe
f:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
f:\windows\system32\wscntfy.exe
f:\program files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
.
**************************************************************************
.
Completion time: 2009-10-14 15:18 - machine was rebooted
ComboFix-quarantined-files.txt 2009-10-14 05:18
ComboFix2.txt 2009-07-12 12:51

Pre-Run: 62,144,372,736 bytes free
Post-Run: 62,118,129,664 bytes free

181


HJT LOG:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:21:50 PM, on 10/14/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
F:\WINDOWS\System32\smss.exe
F:\WINDOWS\system32\winlogon.exe
F:\WINDOWS\system32\services.exe
F:\WINDOWS\system32\lsass.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\system32\svchost.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
F:\Program Files\Bonjour\mDNSResponder.exe
F:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
F:\WINDOWS\system32\svchost.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
F:\WINDOWS\RTHDCPL.EXE
F:\WINDOWS\system32\Rundll32.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
F:\Program Files\DAEMON Tools Lite\daemon.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
F:\WINDOWS\System32\svchost.exe
F:\WINDOWS\explorer.exe
F:\WINDOWS\system32\notepad.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Windows Live\Messenger\msnmsgr.exe
F:\Program Files\Mozilla Firefox\firefox.exe
F:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: MegaIEMn - {bf00e119-21a3-4fd1-b178-3b8537e75c92} - F:\Program Files\Megaupload\Mega Manager\MegaIEMn.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
O4 - HKLM\..\Run: [StartCCC] "F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [IMJPMIG8.1] F:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] F:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] F:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] F:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "F:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [DAEMON Tools Lite] "F:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKCU\..\Run: [ctfmon.exe] F:\WINDOWS\system32\ctfmon.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://F:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - F:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - F:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - F:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - F:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zon...kr.cab56986.cab
O16 - DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} (Solitaire Showdown Class) - http://messenger.zon...wn.cab56986.cab
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zon...1/GAME_UNO1.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.mi...b?1230097177390
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1230097142984
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zon...nt.cab56907.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{892E1C59-51CF-4F96-ADE3-57278A6EDA53}: NameServer = 192.168.1.1
O23 - Service: Adobe LM Service - Adobe Systems - F:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - F:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - F:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - F:\Program Files\WinPcap\rpcapd.exe
O23 - Service: ServiceLayer - Nokia. - F:\Program Files\PC Connectivity Solution\ServiceLayer.exe
O23 - Service: WMP54Gv4SVC - GEMTEKS - F:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe

--
End of file - 5681 bytes


Computer is behaving normally, no redirection form the site yet.

#6 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 14 October 2009 - 05:45 AM

Please go to http://virusscan.jotti.org, click on Browse, and upload the following file for analysis:

f:\windows\winstart.bat


Then click Submit. Allow the file to be scanned, and then please copy and paste the results here for me to see.


If virscan.org is too busy you can try these.

http://virscan.org/

http://www.kaspersky...anforvirus.html


http://www.virustota.../en/indexf.html

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#7 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 14 October 2009 - 05:52 AM

[ArcaVir] 2009-10-02 Found nothing [G DATA] 2009-10-02 Found nothing [A-Squared] 2009-10-02 Found nothing [Ikarus] 2009-10-02 Found nothing [Avast! antivirus] 2009-10-02 Found nothing [Kaspersky Anti-Virus] 2009-10-02 Found nothing [Grisoft AVG Anti-Virus] 2009-10-02 Found nothing [ESET NOD32] 2009-10-02 Found nothing [Avira AntiVir] 2009-10-02 Found nothing [Norman Virus Control] 2009-10-02 Found nothing [Softwin BitDefender] 2009-10-02 Found nothing [Panda Antivirus] 2009-10-02 Found nothing [ClamAV] 2009-10-02 Found nothing [Quick Heal] 2009-10-01 Found nothing [CPsecure] 2009-10-02 Found nothing [Sophos] 2009-10-02 Found nothing [Dr.Web] 2009-10-02 Found nothing [VirusBlokAda VBA32] 2009-09-30 Found nothing [Frisk F-Prot Antivirus] 2009-10-02 Found nothing [VirusBuster] 2009-10-02 Found nothing [F-Secure Anti-Virus] 2009-10-02 Found nothing

#8 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 14 October 2009 - 06:33 PM

Do a file search for mstsc.exe.
See if you have one in Windows\ServicePackFiles\i386
If you have one located there, copy it to f:\windows\system32 to replace the one listed here.
f:\windows\system32\mstsc.exe

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#9 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 14 October 2009 - 10:40 PM

i seem to only have one located in f:\windows\system32

#10 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 15 October 2009 - 05:58 AM

Lets get a second opinion.


Please go to http://virusscan.jotti.org, click on Browse, and upload the following file for analysis:

f:\windows\system32\mstsc.exe


Then click Submit. Allow the file to be scanned, and then please copy and paste the results here for me to see.


If virscan.org is too busy you can try these.

http://virscan.org/

http://www.kaspersky...anforvirus.html


http://www.virustota.../en/indexf.html

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 

    Advertisements

Register to Remove


#11 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 15 October 2009 - 12:00 PM

[ArcaVir] 2009-09-17 Found nothing [G DATA] 2009-09-18 Found nothing [A-Squared] 2009-09-18 Found nothing [Ikarus] 2009-09-18 Found nothing [Avast! antivirus] 2009-09-17 Found nothing [Kaspersky Anti-Virus] 2009-09-18 Found nothing [Grisoft AVG Anti-Virus] 2009-09-17 Found nothing [ESET NOD32] 2009-09-17 Found nothing [Avira AntiVir] 2009-09-18 Found nothing [Norman Virus Control] 2009-09-17 Found nothing [Softwin BitDefender] 2009-09-18 Found nothing [Panda Antivirus] 2009-09-17 Found nothing [ClamAV] 2009-09-17 Found nothing [Quick Heal] 2009-09-18 Found nothing [CPsecure] 2009-09-18 Found nothing [Sophos] 2009-09-18 Found nothing [Dr.Web] 2009-09-17 Found nothing [VirusBlokAda VBA32] 2009-09-17 Found nothing [Frisk F-Prot Antivirus] 2009-09-17 Found nothing [VirusBuster] 2009-09-17 Found nothing [F-Secure Anti-Virus] 2009-09-18 Found nothing

#12 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 15 October 2009 - 01:10 PM

False positive then I would guess.

Good job :thumbup:

The following will implement some cleanup procedures as well as reset System Restore points:

  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.

    • Posted Image


    To be on the safe side, I would also change all my passwords.


    Here's my usual all clean post

    Log looks good :D


    • Make your Internet Explorer more secure - This can be done by following these simple instructions:
      • From within Internet Explorer click on the Tools menu and then click on Options.
      • Click once on the Security tab
      • Click once on the Internet icon so it becomes highlighted.
      • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week
    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.
    Without a firewall your computer is succeptible to being hacked and taken over.
    I am very serious about this and see it happen almost every day with my clients.
    Simply using a Firewall in its default configuration can lower your risk greatly.

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.
    This will ensure your computer has always the latest security updates available installed on your computer.
    If there are new updates to install, install them immediately, reboot your computer, and revisit the site
    until there are no more critical updates.

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly.
    Without regular updates you WILL NOT be protected when new malicious programs are released.

Only run one Anti-Virus and Firewall program.


I would suggest you read How to Prevent Malware:

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#13 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 15 October 2009 - 10:32 PM

Thanks, all the redirections are gone, I'll follow the last few steps!

#14 LDTate

LDTate

    Forum God

  • Root Admin
  • 57,171 posts

Posted 16 October 2009 - 10:08 AM

One of our Teachers, TomK, brought this to my attention as I missed it.

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

Even though those were removed, be sure to change ALL your passwords.

The forum is run by volunteers who donate their time and expertise.

Want to help others? Join the ClassRoom and learn how.

Logs will be closed if you haven't replied within 3 days

 

If you would like to paypal.gif for the help you received.
 

Proud graduate of TC/WTT Classroom

 


#15 Icoris

Icoris

    Authentic Member

  • Authentic Member
  • PipPip
  • 29 posts

Posted 17 October 2009 - 09:09 AM

I know im spose to be in the all clear, but the redirection just happened again.
I'm currently using firefox/

EDIT: i decided to test whether it was just firefox, but it appears to be affecting my IE as well.
Got redirected to that:
http://www.asklots.c.....=prague hotel

also got redirected to http://www.pctools.c...f...ver&cur=aud

http://us.chinaontv....=...tudy[ABCAffID]=ezanga4-90898649
http://saco.iamalex........tudy[ABCAffID]=ezanga4-90898649
http://www.asklots.c.....s=bible study
http://www.asklots.c...5yd3d3LvoDc0RHa
http://www.okeeko3.c...mk9MCZmZmM9MA==

Edited by Icoris, 17 October 2009 - 10:47 AM.

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users