Jump to content

Mydako

Honorary Members
  • Posts

    28
  • Joined

  • Last visited

Reputation

0 Neutral
  1. I waited a day this time to be sure, but it looks like this has worked, between the uBlock and flushing the router it looks like my computer is back to normal. Thanks for your help!
  2. How was that different from the clean install done earlier? Either way, I tried that, and when I opened Firefox, which was set to open to Options/Setting page, I still got the notice that malwarebytes had to block that same rtmark website, even though I wasn't even viewing a proper webppage with ads that could be hijacked but an internal page of firefox. Just opened Chrome, and had popups and and a blocked attempt from the two websites I mentioned earlier. Someone I mentioned this problem to told me that when all the scans come up negative on the computer it could possibly be something has infected the router and redirecting through it. Could that be the case?
  3. Attached is my ark file. The redirects only happen when the browsers are open. Again actually I got a blocked popup or something through Malwarebytes loading this page. The reason there were two browsers in the block log is because I often use Firefox and Chrome at the same time. ark.txt
  4. Zemana didn't turn up anything :-/ zemana.txt
  5. Oddly enough as I was attaching this I got another block notice for the rtmark, even though I was just on this page. Block1.txt Block2.txt Block3.txt
  6. Unfortunately that didn't solve everything. I left to grab my lunch, came back to work, and first page I opened tried to redirect me to my.rtmark.net . Malwarebytes blocked the redirect, but it was still attempted.
  7. Thanks Kevin. I did as you said. Before I installed the ublock I tested my browsers and they were both still redirecting, though now to new sites deleton and rtmark.net . I'm not sure what else it could have been though, none of the malware/rootkit/antivirus scanners are showing anything. Now that I have ublock though it seems to have stopped that, so I'm hoping that solves everything from now on, thanks.
  8. Both Chrome and Firefox are affected by this.
  9. There has been no change, still redirecting.
  10. Hi Kevin, thanks for the help Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 1/2/18 Scan Time: 7:20 PM Log File: f1149006-f01b-11e7-af03-54ab3a6b4f9e.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.262 Update Package Version: 1.0.3609 License: Trial -System Information- OS: Windows 10 (Build 16299.125) CPU: x64 File System: NTFS User: LAPTOP-Q4D05MC6\Mykel -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 323342 Threats Detected: 2 Threats Quarantined: 2 Time Elapsed: 16 min, 11 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 2 PUP.Optional.AuslogicsBoostSpeed, C:\USERS\MYKEL\DESKTOP\FILES\AUSLOGICS BOOSTSPEED 6.4.1.0 + CRACK - KRISH\BOOST-SPEED-SETUP.EXE, Quarantined, [1620], [357741],1.0.3609 PUP.Optional.AuslogicsBoostSpeed, C:\USERS\MYKEL\DESKTOP\FILES\AUSLOGICS BOOSTSPEED 8.2 + KEYGEN [4REALTORRENTZ]\BOOST-SPEED-SETUP.EXE, Quarantined, [1620], [357741],1.0.3609 Physical Sector: 0 (No malicious items detected) (end) ---------------------------------------------------------------------------------- # AdwCleaner 7.0.6.0 - Logfile created on Wed Jan 03 00:51:52 2018 # Updated on 2017/21/12 by Malwarebytes # Running on Windows 10 Home (X64) # Mode: clean # Support: https://www.malwarebytes.com/support ***** [ Services ] ***** No malicious services deleted. ***** [ Folders ] ***** No malicious folders deleted. ***** [ Files ] ***** No malicious files deleted. ***** [ DLL ] ***** No malicious DLLs cleaned. ***** [ WMI ] ***** No malicious WMI cleaned. ***** [ Shortcuts ] ***** No malicious shortcuts cleaned. ***** [ Tasks ] ***** No malicious tasks deleted. ***** [ Registry ] ***** No malicious registry entries deleted. ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries deleted. ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries deleted. ************************* ::Tracing keys deleted ::Winsock settings cleared ::Additional Actions: 0 ************************* C:/AdwCleaner/AdwCleaner[C0].txt - [4241 B] - [2017/10/13 20:8:31] C:/AdwCleaner/AdwCleaner[C1].txt - [1578 B] - [2017/11/8 17:37:5] C:/AdwCleaner/AdwCleaner[S0].txt - [4794 B] - [2017/10/13 20:7:11] C:/AdwCleaner/AdwCleaner[S1].txt - [1467 B] - [2017/11/8 17:36:44] C:/AdwCleaner/AdwCleaner[S2].txt - [1216 B] - [2018/1/3 0:51:35] ########## EOF - C:\AdwCleaner\AdwCleaner[C2].txt ########## ------------------------------------------ Microsoft Windows Malicious Software Removal Tool v5.55, December 2017 (build 5.55.14421.1) Started On Tue Jan 02 20:06:49 2018 Engine: 1.1.14405.2 Signatures: 1.257.1160.0 Run Mode: Interactive Graphical Mode Results Summary: ---------------- No infection found. Successfully Submitted MAPS Report Successfully Submitted Heartbeat Report Microsoft Windows Malicious Software Removal Tool Finished On Tue Jan 02 20:11:02 2018 Return code: 0 (0x0) Fixlog.txt
  11. My browsers currently redirects all the time. It seems to be connected to ads but I'm not sure. I see the url www.hitcpm.com frequently as part of the redirect. The only thing I think might have infected me was a Chrome addon, I think it was called UnSeeMe, I uninstalled it as the redirects started right after installing it. Any help would be appreciated. Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 1/2/18 Scan Time: 5:05 PM Log File: 1887622a-f009-11e7-9eea-54ab3a6b4f9e.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.262 Update Package Version: 1.0.3609 License: Trial -System Information- OS: Windows 10 (Build 16299.125) CPU: x64 File System: NTFS User: LAPTOP-Q4D05MC6\Mykel -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 323730 Threats Detected: 0 (No malicious items detected) Threats Quarantined: 0 (No malicious items detected) Time Elapsed: 4 min, 20 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 0 (No malicious items detected) Physical Sector: 0 (No malicious items detected) (end) FRST.txt Addition.txt
  12. Hey, Thanks muchly. I installed several of the programs and will give them a try, hopefully keep something like this from happening again. Computer has been running beautifully. Thanks again.
  13. Heyo, Weird, well, in resetting the router both the router and network password have changed, hopefully that will keep something from getting in. I left Dropbox on the list, cause I know I'd forget to turn it on and then my work wouldn't sync between comps, and ran ESET and it came up clean. Thanks so much for helping me sort this out and get my comps working again.
  14. Hello Gringo MBAM came up clean Malwarebytes Anti-Malware (Trial) 1.75.0.1300 www.malwarebytes.org Database version: v2013.09.17.01 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 10.0.9200.16686 Mykel :: BUSTOFPALLAS [administrator] Protection: Enabled 2013-09-16 21:17:06 mbam-log-2013-09-16 (21-17-06).txt Scan type: Quick scan Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 219226 Time elapsed: 5 minute(s), 7 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 0 (No malicious items detected) (end) And hijackthis returns this Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 21:24:49, on 2013-09-16 Platform: Windows 7 SP1 (WinNT 6.00.3505) MSIE: Internet Explorer v10.0 (10.00.9200.16686) Boot mode: Normal Running processes: C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe C:\Users\Mykel\AppData\Roaming\Dropbox\bin\Dropbox.exe C:\Program Files (x86)\AVG\AVG2014\avgui.exe C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AcroRd32.exe C:\PROGRA~2\MAGICD~1\MAGICD~1.EXE C:\Program Files (x86)\VideoLAN\VLC\vlc.exe C:\Program Files (x86)\Mozilla Firefox\firefox.exe C:\Users\Mykel\Desktop\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O2 - BHO: AMD SteadyVideo BHO - {6C680BAE-655C-4E3D-8FC4-E6A520C3D928} - C:\Program Files (x86)\amd\SteadyVideo\SteadyVideo.dll O4 - HKLM\..\Run: [startCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun O4 - HKLM\..\Run: [AVG_UI] "C:\Program Files (x86)\AVG\AVG2014\avgui.exe" /TRAYONLY O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - Startup: Dropbox.lnk = Mykel\AppData\Roaming\Dropbox\bin\Dropbox.exe O4 - Startup: MagicDisc.lnk = C:\Program Files (x86)\MagicDisc\MagicDisc.exe O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics O17 - HKLM\System\CCS\Services\Tcpip\..\{CDBB5ADF-9FE7-45B4-AA71-194D277D5193}: NameServer = 208.67.222.222,208.67.220.220 O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL O18 - Filter: video/mp4 - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files (x86)\amd\SteadyVideo\VideoMIMEFilter.dll O18 - Filter: video/x-flv - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files (x86)\amd\SteadyVideo\VideoMIMEFilter.dll O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing) O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing) O23 - Service: AVGIDSAgent - AVG Technologies CZ, s.r.o. - C:\Program Files (x86)\AVG\AVG2014\avgidsagent.exe O23 - Service: AVG WatchDog (avgwd) - AVG Technologies CZ, s.r.o. - C:\Program Files (x86)\AVG\AVG2014\avgwdsvc.exe O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing) O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing) O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: MBAMScheduler - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing) O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing) O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files (x86)\Skype\Updater\Updater.exe O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing) O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing) O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing) O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing) O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing) O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing) O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing) O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing) O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing) O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing) -- End of file - 6816 bytes I checked the sites that were blocked, and ones that redirected the most often, and it seems like they're fine, no blocking or redirecting. I'm really unsure how some managed to get in and bungle all this through the router, but that looks like it was the issue, as odd as that seems to me.
  15. Hey Gringo Here is the data Windows IP Configuration Host Name . . . . . . . . . . . . : BustOfPallas Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Wireless LAN adapter Wireless Network Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Virtual WiFi Miniport Adapter Physical Address. . . . . . . . . : 72-B7-C3-E5-CE-0D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wireless Network Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Atheros AR9485WB-EG Wireless Network Adapter Physical Address. . . . . . . . . : 50-B7-C3-E5-CE-0D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::a44f:22e1:2480:9e49%15(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.2(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : September-15-13 14:38:24 Lease Expires . . . . . . . . . . : September-18-13 23:36:46 Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 374388675 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-19-C2-42-B1-20-89-84-18-56-60 DNS Servers . . . . . . . . . . . : 208.67.222.222 208.67.220.220 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 20-89-84-18-56-60 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 50-B7-C3-E5-CE-0E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{B56BD0D1-223B-4FC2-B653-E0A94FEA1970}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{BCE50104-078A-44F1-865C-AD1216DA437A}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter Teredo Tunneling Pseudo-Interface: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fd:38d6:22b3:3f57:fefd(Preferred) Link-local IPv6 Address . . . . . : fe80::38d6:22b3:3f57:fefd%14(Preferred) Default Gateway . . . . . . . . . : :: NetBIOS over Tcpip. . . . . . . . : Disabled Tunnel adapter isatap.{CDBB5ADF-9FE7-45B4-AA71-194D277D5193}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{A1395332-F76C-49BE-8360-470B494AE40E}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #4 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Server: resolver1.opendns.com Address: 208.67.222.222 Name: google.com Addresses: 2607:f8b0:400b:80a::1001 173.194.68.102 173.194.68.139 173.194.68.101 173.194.68.138 173.194.68.113 173.194.68.100 Server: resolver1.opendns.com Address: 208.67.222.222 Name: yahoo.com Addresses: 98.138.253.109 98.139.183.24 206.190.36.45 Pinging google.com [173.194.68.102] with 32 bytes of data: Reply from 173.194.68.102: bytes=32 time=54ms TTL=49 Reply from 173.194.68.102: bytes=32 time=54ms TTL=49 Ping statistics for 173.194.68.102: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 54ms, Maximum = 54ms, Average = 54ms Pinging yahoo.com [98.139.183.24] with 32 bytes of data: Reply from 98.139.183.24: bytes=32 time=51ms TTL=51 Reply from 98.139.183.24: bytes=32 time=57ms TTL=51 Ping statistics for 98.139.183.24: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 51ms, Maximum = 57ms, Average = 54ms =========================================================================== Interface List 29...72 b7 c3 e5 ce 0d ......Microsoft Virtual WiFi Miniport Adapter 15...50 b7 c3 e5 ce 0d ......Atheros AR9485WB-EG Wireless Network Adapter 13...20 89 84 18 56 60 ......Realtek PCIe GBE Family Controller 12...50 b7 c3 e5 ce 0e ......Bluetooth Device (Personal Area Network) 1...........................Software Loopback Interface 1 17...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter 18...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2 14...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface 28...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3 33...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4 =========================================================================== IPv4 Route Table =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 25 127.0.0.0 255.0.0.0 On-link 127.0.0.1 306 127.0.0.1 255.255.255.255 On-link 127.0.0.1 306 127.255.255.255 255.255.255.255 On-link 127.0.0.1 306 192.168.1.0 255.255.255.0 On-link 192.168.1.2 281 192.168.1.2 255.255.255.255 On-link 192.168.1.2 281 192.168.1.255 255.255.255.255 On-link 192.168.1.2 281 224.0.0.0 240.0.0.0 On-link 127.0.0.1 306 224.0.0.0 240.0.0.0 On-link 192.168.1.2 281 255.255.255.255 255.255.255.255 On-link 127.0.0.1 306 255.255.255.255 255.255.255.255 On-link 192.168.1.2 281 =========================================================================== Persistent Routes: None IPv6 Route Table =========================================================================== Active Routes: If Metric Network Destination Gateway 14 58 ::/0 On-link 1 306 ::1/128 On-link 14 58 2001::/32 On-link 14 306 2001:0:5ef5:79fd:38d6:22b3:3f57:fefd/128 On-link 15 281 fe80::/64 On-link 14 306 fe80::/64 On-link 14 306 fe80::38d6:22b3:3f57:fefd/128 On-link 15 281 fe80::a44f:22e1:2480:9e49/128 On-link 1 306 ff00::/8 On-link 14 306 ff00::/8 On-link 15 281 ff00::/8 On-link =========================================================================== Persistent Routes: None I've been out all day, so I don't really know if my computer is acting up, but hoping it's clean heh.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.