Keep Getting redirected when searching Yahoo Google ect.

Discussion in 'Windows - Virus and spyware problems' started by karns, May 26, 2008.

  1. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    Hello
    I keep getting redirected to different sites when I click on links when on any search engine. I can't for the life of me figure out what is wrong.
    Here is the Hijack this file
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:40:51 PM, on 5/26/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\PROGRA~1\AVG\AVG8\avgam.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\Mixer.exe
    C:\PROGRA~1\AVG\AVG8\avgtray.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart
    O4 - .DEFAULT User Startup: AutoTBar.exe (User 'Default user')
    O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll
    O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Zune Bus Enumerator (ZuneBusEnum) - Unknown owner - c:\WINDOWS\system32\ZuneBusEnum.exe (file missing)

    --
    End of file - 2552 bytes

    and the Fixwareout file

    Username "Owner" - 05/26/2008 22:19:26 [Fixwareout edited 9/01/2007]

    ~~~~~ Prerun check

    Successfully flushed the DNS Resolver Cache.
    System was rebooted successfully.

    ~~~~~ Postrun check
    HKLM\SOFTWARE\~\Winlogon\ "System"=""
    ....
    ....
    ~~~~~ Misc files.
    ....
    ~~~~~ Checking for older varients.
    ....

    ~~~~~ Current runs (hklm hkcu "run" Keys Only)
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "C-Media Mixer"="Mixer.exe /startup"
    "AVG8_TRAY"="C:\\PROGRA~1\\AVG\\AVG8\\avgtray.exe"

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "OM2_Monitor"="\"C:\\Program Files\\OLYMPUS\\OLYMPUS Master 2\\MMonitor.exe\" -NoStart"
    ....
    Hosts file was reset, If you use a custom hosts file please replace it...
    ~~~~~ End report ~~~~~

    Any help would be appreciated
     
  2. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    anybody have any ideas what it could be?
     
  3. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hi karns

    As for your problem, I would have pointed out a hosts file problem, but apparently fixwareout has reset the hosts file, so it shouldn't be a problem anymore. But if it still is, perhaps it isn't a hosts file problem. However, I cannot spot any trouble within your hijack this log, and as there are many malware which can redirect sites, there is absolutely no way to immediately pinpoint the problem.

    Can you possibly rule out a DNS/ISP problem? Have you tried with another computer connected to the same DNS/ISP?

    Also, I don't know if you want to take the trouble, but as I wouldn't recommend AVG as a good antivirus, could you download Antivir Free v8 and scan with that? Or, as the case might be, spyware could be the culprit, and possibly A-squared can be useful for that. If you do not want to download these files, it is fine, and we can work around AVG if possible.

    There is a variant of Vundo which avoids hijack this as a process, so I would also recommend changing the name of your hijack this scanner to something like "scannerhjt" or something. Scan with the renamed hijack this file in safe mode, and also do a AVG (or any other scanner) scan in safe mode as well.

    Best Regards :D

    Edit: Also download a rootkit scanner (I recommend GMER) and scan with it. (If you use GMER, scan only for hidden files, registry keys, and processes)
     
    Last edited: May 27, 2008
  4. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    ok so I renamed my Hijack this file and ran it in safe mode and I also used the GMER while in safe mode

    MER 1.0.14.14205 - http://www.gmer.net
    Rootkit scan 2008-05-28 21:21:40
    Windows 5.1.2600 Service Pack 2


    ---- System - GMER 1.0.14 ----

    Code E17B1B5E ZwQueryDirectoryFile
    Code E17B1B5D NtQueryDirectoryFile

    ---- Kernel code sections - GMER 1.0.14 ----

    PAGE ntoskrnl.exe!NtQueryDirectoryFile 80573515 5 Bytes JMP E17B1B62

    ---- User code sections - GMER 1.0.14 ----

    ? C:\WINDOWS\system32\svchost.exe[576] image checksum mismatch; number of sections mismatch; time/date stamp mismatch; unknown module: baserom32.dll
    .text C:\WINDOWS\system32\svchost.exe[576] ntdll.dll!LdrLoadDll 7C9161CA 10 Bytes JMP 00403B1D C:\WINDOWS\system32\svchost.exe (Generic Host Process for Win32 Services/Microsoft Corporation)

    ---- User IAT/EAT - GMER 1.0.14 ----

    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegQueryValueExW] FBFEF5D9
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetSecurityDescriptorDacl] BFE6EFFD
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetEntriesInAclW] E6FCD2BF
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetSecurityDescriptorGroup] E7FCFAF2
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetSecurityDescriptorOwner] E0F2B8E1
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!InitializeSecurityDescriptor] 000000FC
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!GetTokenInformation] ECE0F4F2
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!OpenProcessToken] A6F3F5EA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!OpenThreadToken] 00EEF2EC
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetServiceStatus] 696B6B74
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegisterServiceCtrlHandlerW] 66783268
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegCloseKey] 0000007A
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegOpenKeyExW] F4F8EAC3
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!StartServiceCtrlDispatcherW] ECF8FAE8
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!WideCharToMultiByte] C5C3D9C3
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrlenW] 0000D4CA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LocalFree] F1EAECC1
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentProcess] A4FCE9E3
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentThread] EAE2EEC6
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetProcAddress] 00AAE7FA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LoadLibraryExW] B7B1B1B7
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LCMapStringW] C6DFD5C8
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!FreeLibrary] D9F89489
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrcpyW] D6D5D1CD
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!ExpandEnvironmentStringsW] 908993DA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrcmpiW] A1E9E08F
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!ExitProcess] A7B5A9AC
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCommandLineW] A6ABA1B3
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!InitializeCriticalSection] 83EDF7AE
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetProcessHeap] F294999C
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!SetErrorMode] E6E5FAE6
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!SetUnhandledExceptionFilter] B38EF8EC
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!RegisterWaitForSingleObject] A9B2B8B5
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!InterlockedCompareExchange] DAD8C0AC
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LoadLibraryA] 000000CA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!QueryPerformanceCounter] 898893FA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetTickCount] CFD1F08E
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentThreadId] ADEEEED3
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentProcessId] D39C9489
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetSystemTimeAsFileTime] 000000CA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!TerminateProcess] A3D6C4C7
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!UnhandledExceptionFilter] 000000AB
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LocalAlloc] 62656467
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrcmpW] 613A3B29
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!DelayLoadFailureHook] 7D376F60
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!NtQuerySecurityObject] 4D420E7A
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlFreeHeap] 00000B4E
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!NtOpenKey] 642ECDCD
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!wcscat] 0000667A
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!wcscpy] 5870467F
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlAllocateHeap] 0052455A
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlCompareUnicodeString] FEF5E4E1
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlInitUnicodeString] FAF19AFF
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlInitializeSid] 000000FB
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlLengthRequiredSid] 7A62552B
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlSubAuthoritySid] 48796F7F
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!NtClose] 00006261
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlSubAuthorityCountSid] E1E4F0C7
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlGetDaclSecurityDescriptor] F7DEEBFD
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlQueryInformationAcl] 0000A0F0
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlGetAce] 0A03053C
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlImageNtHeader] 00020700
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!wcslen] 00000000
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlUnhandledExceptionFilter] F7EADCD1
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlCopySid] E6E7E1F8
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerUnregisterIfEx] F2F2F2FA
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcMgmtWaitServerListen] F9CCC2F8
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcMgmtSetServerStackSize] E9E6F6F2
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerUnregisterIf] DAD2E5F9
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerListen] D8C5CFDB
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerUseProtseqEpW] C4C1C1EE
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerRegisterIf] E7DFDDC3
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!I_RpcMapWin32Status] FBEBC2D0
    IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcMgmtStopServerListening] CECFD4D6

    ---- Modules - GMER 1.0.14 ----

    Module \??\globalroot\systemroot\system32\drivers\clbdriver.sys (*** hidden *** ) F896B000-F896E000 (12288 bytes)
    ---- Processes - GMER 1.0.14 ----

    Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\winlogon.exe [212] 0x76FD0000
    Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [456] 0x76FD0000
    Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [540] 0x76FD0000
    Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [608] 0x76FD0000
    Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\Explorer.EXE [1012] 0x76FD0000
    Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\Program Files\Trend Micro\HijackThis\HijackThis.exe [1268] 0x76FD0000

    ---- Services - GMER 1.0.14 ----

    Service C:\WINDOWS\System32\drivers\afd.sys (*** hidden *** ) [SYSTEM] AFD <-- ROOTKIT !!!

    ---- Registry - GMER 1.0.14 ----

    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Type 1
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Start 1
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@ErrorControl 1
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@ImagePath \SystemRoot\System32\drivers\afd.sys
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@DisplayName AFD Networking Support Environment
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Group TDI
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Description AFD Networking Support Environment
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD\Parameters
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD\Security
    Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD\Security@Security 0x01 0x00 0x14 0x80 ...

    ---- Files - GMER 1.0.14 ----

    File C:\WINDOWS\$hf_mig$\KB902400\SP2QFE\clbcatex.dll 110080 bytes
    File C:\WINDOWS\$hf_mig$\KB902400\SP2QFE\clbcatq.dll 498688 bytes
    File C:\WINDOWS\system32\clb.dll 10752 bytes
    File C:\WINDOWS\system32\clbcatex.dll 110080 bytes
    File C:\WINDOWS\system32\clbcatq.dll 498688 bytes
    File C:\WINDOWS\system32\clbdll.dll 45056 bytes
    File C:\WINDOWS\system32\clbinit.dll 1695 bytes
    File C:\WINDOWS\system32\dllcache\clb.dll 10752 bytes
    File C:\WINDOWS\system32\drivers\clbdriver.sys 5632 bytes
    File C:\WINDOWS\$NtServicePackUninstall$\clbcatex.dll 110080 bytes
    File C:\WINDOWS\$NtServicePackUninstall$\clbcatq.dll 499712 bytes
    File C:\WINDOWS\$NtUninstallKB828741$\clbcatex.dll 100864 bytes
    File C:\WINDOWS\$NtUninstallKB828741$\clbcatq.dll 468480 bytes
    File C:\WINDOWS\ServicePackFiles\i386\clbcatex.dll 110080 bytes
    File C:\WINDOWS\ServicePackFiles\i386\clbcatq.dll 501248 bytes
    File C:\WINDOWS\$NtUninstallKB902400$\clbcatex.dll 110080 bytes
    File C:\WINDOWS\$NtUninstallKB902400$\clbcatq.dll 501248 bytes

    ---- EOF - GMER 1.0.14 ----


     
  5. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    and here is the Hijack this report

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:34:44 PM, on 5/28/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Safe mode

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
    O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart
    O4 - .DEFAULT User Startup: AutoTBar.exe (User 'Default user')
    O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll

    --
    End of file - 2112 bytes
     
  6. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    Oh BTW thanks for your help so far
     
  7. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    I'm terribly sorry that I said to run Hijack This in safe mode. I was wrong. You should rename the file(I see that you did not rename it from its original name of "HijackThis.exe"), then run it in normal mode. And no, your GMER log does not show any unusual activity or rootkit. This may require more analysis.

    Have you scanned with scanners such as Spybot, A-squared, and Antivir? If not, I recommend you do so, but with A-squared, do not remove what it detects, but rather, post the log here.

    Best Regards :D
     
  8. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    Thank you very much
    here is the hijack this run in normal mode

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:46:49 PM, on 5/29/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\Program Files\AVG\AVG8\avgrsx.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\Mixer.exe
    C:\PROGRA~1\AVG\AVG8\avgtray.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Trend Micro\HijackThis\xxHijackThisxx.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart
    O4 - .DEFAULT User Startup: AutoTBar.exe (User 'Default user')
    O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll

    --
    End of file - 2324 bytes
     
  9. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    and here is the a-squared report
    this is the deep scan report

    a-squared Anti-Malware - Version 3.5
    Last update: 5/29/2008 9:09:50 PM

    Scan settings:

    Objects: Memory, Traces, Cookies, C:\, D:\
    Scan archives: On
    Heuristics: On
    ADS Scan: On

    Scan start: 5/30/2008 12:18:55 AM

    c:\windows\system32\swrt01.dll detected: Trace.File.AdDestroyer
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> IEProtection detected: Trace.Registry.SpyNoMore
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> ProcProtection detected: Trace.Registry.SpyNoMore
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> RegProtection detected: Trace.Registry.SpyNoMore
    c:\program files\advanceddvdplayer detected: Trace.Directory.AdvancedDVDPlayer
    c:\program files\advanceddvdplayer\~myplaylist~ detected: Trace.File.AdvancedDVDPlayer
    c:\program files\advanceddvdplayer\advanceddvdplayer.exe detected: Trace.File.AdvancedDVDPlayer
    c:\program files\advanceddvdplayer\default playlist.m3u detected: Trace.File.AdvancedDVDPlayer
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> CurrentPath detected: Trace.Registry.AdvancedDVDPlayer
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> TempPath detected: Trace.Registry.AdvancedDVDPlayer
    C:\Documents and Settings\Owner\Cookies\owner@advertising[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@bluestreak[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\betvnft7.default\Cache\EEA4540Ed01 detected: Adware.Win32.Agent.zk
    C:\hp\bin\KillWind.exe detected: Riskware.RiskTool.Win32.PsKill.p
    C:\Program Files\Trend Micro\HijackThis\backups\backup-20080507-200703-537.dll detected: Adware.Win32.E404.an
    C:\Program Files\Updates from HP\137903\Program\BackWeb-137903.exe detected: Adware.BackWeb.a
    C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\SDFix\backups\backups.zip/~.exe detected: Trojan.Win32.SubSys.dr
    C:\SDFix\backups_old\backups.zip/527631.dll detected: Adware.Win32.E404.an
    C:\SDFix\backups_old\backups.zip/zfe1.exe detected: Hoax.Win32.Renos.cdh
    C:\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089273.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089277.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089281.exe detected: Hoax.Win32.Renos.cdh
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP679\A0089713.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090057.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090111.exe detected: Trojan.Win32.SubSys.dr
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090118.exe detected: Trojan.Win32.SubSys.dr
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092892.exe detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092893.EXE detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092894.EXE detected: Trojan.Win32.Agent.duu
    C:\WINDOWS\system32\rtmipr.dll detected: Hoax.Win32.Agent.ct
    C:\WINDOWS\system32\SWRT01.dll detected: Adware.Win32.VirtualBouncer.g

    Scanned

    Files: 223958
    Traces: 406297
    Cookies: 315
    Processes: 21

    Found

    Files: 22
    Traces: 10
    Cookies: 7
    Processes: 0
    Registry keys: 0

    Scan end: 5/30/2008 2:09:07 AM
    Scan time: 1:50:12


    once again thanks a lot for your help so far
     
  10. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hi karns!

    Aha!!! I thought I smelled a rat. Here are some files you can remove within A-squared safely.


    c:\windows\system32\swrt01.dll detected: Trace.File.AdDestroyer
    C:\Documents and Settings\Owner\Cookies\owner@advertising[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@bluestreak[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\betvnft7.default\Cache\EEA4540Ed01 detected: Adware.Win32.Agent.zk
    C:\Program Files\Trend Micro\HijackThis\backups\backup-20080507-200703-537.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089273.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089277.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089281.exe detected: Hoax.Win32.Renos.cdh
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP679\A0089713.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090057.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090111.exe detected: Trojan.Win32.SubSys.dr
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090118.exe detected: Trojan.Win32.SubSys.dr
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092892.exe detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092893.EXE detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092894.EXE detected: Trojan.Win32.Agent.duu
    C:\WINDOWS\system32\rtmipr.dll detected: Hoax.Win32.Agent.ct
    C:\WINDOWS\system32\SWRT01.dll detected: Adware.Win32.VirtualBouncer.g

    Do you recognize Spynomore and Advanced Dvd Player as being installed on your system with your consent? If so, you can ignore these entries. If you do not recognize them as legitimate, you can remove them.

    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> IEProtection detected: Trace.Registry.SpyNoMore
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> ProcProtection detected: Trace.Registry.SpyNoMore
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> RegProtection detected: Trace.Registry.SpyNoMore
    c:\program files\advanceddvdplayer detected: Trace.Directory.AdvancedDVDPlayer
    c:\program files\advanceddvdplayer\~myplaylist~ detected: Trace.File.AdvancedDVDPlayer
    c:\program files\advanceddvdplayer\advanceddvdplayer.exe detected: Trace.File.AdvancedDVDPlayer
    c:\program files\advanceddvdplayer\default playlist.m3u detected: Trace.File.AdvancedDVDPlayer
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> CurrentPath detected: Trace.Registry.AdvancedDVDPlayer
    Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> TempPath detected: Trace.Registry.AdvancedDVDPlayer

    Can you confirm that you have ran SDFIx on your computer, and have files located in C:\SDFix and C:\Documents and Settings\Owner\Desktop\SDFix.exe? If you have ran SDFix and have it located on your desktop, you can ignore these following entries. If not, you can remove these entries.

    C:\Documents and Settings\Owner\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\SDFix\backups\backups.zip/~.exe detected: Trojan.Win32.SubSys.dr
    C:\SDFix\backups_old\backups.zip/527631.dll detected: Adware.Win32.E404.an
    C:\SDFix\backups_old\backups.zip/zfe1.exe detected: Hoax.Win32.Renos.cdh
    C:\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20

    Also, please do not remove these entries as they are part of HP, and are detected as riskware because of their functions.

    C:\hp\bin\KillWind.exe detected: Riskware.RiskTool.Win32.PsKill.p
    C:\Program Files\Updates from HP\137903\Program\BackWeb-137903.exe detected: Adware.BackWeb.a

    Remove all the entries above which I have told you to remove, restart, then scan again. If they are still present in your system or are undeletable, you may have to run it in safe mode.

    Also, running Spybot and Antivir may confirm more malware on your system.

    Best Regards :D
     
    Last edited: May 31, 2008
  11. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    Sorry I was out of town for a couple of days.

    I thought I got it but it still redirects me also I now have no sound on my computer at all so I used this website http://www.kellys-korner-xp.com/xp_tweaks.htm which installed some of the registries.

    anyways here are my new logs

    Hijack this:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:33:23 PM, on 6/4/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Mixer.exe
    C:\Program Files\a-squared Anti-Malware\a2service.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843
    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart
    O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
    O23 - Service: a-squared Anti-Malware Service (a2AntiMalware) - Emsi Software GmbH - C:\Program Files\a-squared Anti-Malware\a2service.exe

    --
    End of file - 2129 bytes

    and A2

    a-squared Anti-Malware - Version 3.5
    Last update: 6/4/2008 7:36:38 PM

    Scan settings:

    Objects: Memory, Traces, Cookies, C:\, D:\
    Scan archives: On
    Heuristics: On
    ADS Scan: On

    Scan start: 6/4/2008 7:37:14 PM

    C:\Documents and Settings\Owner\Cookies\owner@2o7[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@advertising[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@com[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@counter13.sextracker[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@counter6.sextracker[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@findwhat[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@sextracker[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Cookies\owner@specificclick[2].txt detected: Trace.TrackingCookie
    C:\Documents and Settings\Owner\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\hp\bin\KillWind.exe detected: Riskware.RiskTool.Win32.PsKill.p
    C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089273.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089277.dll detected: Adware.Win32.E404.an
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089281.exe detected: Hoax.Win32.Renos.cdh
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP679\A0089713.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090057.exe detected: Riskware.RiskTool.Win32.Processor.20
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090111.exe detected: Trojan.Win32.SubSys.dr
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090118.exe detected: Trojan.Win32.SubSys.dr
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP690\A0091833.sys detected: Rootkit.Win32.Agent.aol
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092892.exe detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092893.EXE detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092894.EXE detected: Trojan.Win32.Agent.duu
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0094943.dll detected: Adware.Win32.VirtualBouncer.g
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0095940.dll detected: Hoax.Win32.Agent.ct
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0095941.exe detected: Adware.BackWeb.a
    C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0095942.dll detected: Adware.Win32.E404.an

    Scanned

    Files: 220100
    Traces: 408349
    Cookies: 353
    Processes: 17

    Found

    Files: 19
    Traces: 0
    Cookies: 10
    Processes: 0
    Registry keys: 0

    Scan end: 6/4/2008 9:48:24 PM
    Scan time: 2:11:10


     
  12. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hey karns.

    I see that your problem came back again. Sounds a whole lot like vundo. Please download both vundofix and virtumundebegone. Run both of them and see how it goes.

    As for your lack of sound, perhaps your sound driver is damaged. You can reinstall your driver by downloading it from your computer's manufacturer site or somewhere else.

    Best Regards :D
     
  13. karns

    karns Member

    Joined:
    Jul 15, 2006
    Messages:
    13
    Likes Received:
    0
    Trophy Points:
    11
    Thanks
    I downloaded the vundofix however it didn't find anything. I ran smitfraudfix and here is the log

    SmitFraudFix v2.323

    Scan done at 23:42:45.75, Mon 06/09/2008
    Run from C:\Documents and Settings\Owner\Desktop\SmitfraudFix\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    »»»»»»»»»»»»»»»»»»»»»»»» VACFix

    VACFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

    S!Ri's WS2Fix: LSP not Found.
    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


    »»»»»»»»»»»»»»»»»»»»»»»» IEDFix

    IEDFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» 404Fix

    404Fix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    Description: NVIDIA nForce MCP Networking Controller - Packet Scheduler Miniport
    DNS Server Search Order: 65.24.7.10
    DNS Server Search Order: 65.24.7.11

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{B8E8917C-11E3-4CF2-915D-D9923917E4F7}: DhcpNameServer=65.24.7.10 65.24.7.11
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{B8E8917C-11E3-4CF2-915D-D9923917E4F7}: DhcpNameServer=65.24.7.10 65.24.7.11
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{B8E8917C-11E3-4CF2-915D-D9923917E4F7}: DhcpNameServer=65.24.7.10 65.24.7.11
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=65.24.7.10 65.24.7.11
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=65.24.7.10 65.24.7.11
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=65.24.7.10 65.24.7.11


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End



    Here is a new Hijackthis scan

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 12:01:47 AM, on 6/10/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16640)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Mixer.exe
    C:\WINDOWS\helloserv.exe
    C:\Program Files\a-squared Anti-Malware\a2service.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart
    O4 - HKCU\..\Run: [helloserv] C:\WINDOWS\helloserv.exe
    O4 - HKUS\S-1-5-18\..\Run: [Firewall auto setup] C:\WINDOWS\TEMP\winlogon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [Firewall auto setup] C:\WINDOWS\TEMP\winlogon.exe (User 'Default user')
    O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
    O23 - Service: a-squared Anti-Malware Service (a2AntiMalware) - Emsi Software GmbH - C:\Program Files\a-squared Anti-Malware\a2service.exe

    --
    End of file - 1463 bytes


    I am still getting redirected however it is now in a popup instead of the window that I am searching on. So when I click a link a popup comes up with something totally irellevant to what I clicked on while the main page stays the same. I also noticed that I have 3 winlogons. 2 of which were created on 2003 and 2004. The third is in my windows temp folder with a create date of June 6, 2008. Could this be something?


    Thanks again for all your help
     
  14. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hey karns.

    Sorry for this bitter and possibly cruel piece of advice, but I would actually suggest a format. The choice is yours, and you are free to decide.

    However, if you decide to fight, I will be here. Firstly, please download Autoruns from Sysinternals, and take a screenshot of everything under the tabs Explorer and Winlogon. Also, using HijackThis Tools, please create a startup list log and post it here.

    Something has changed in your hijackthis log. Do you recognize the file C:\WINDOWS\helloserv.exe? If you do not, and have done nothing to invite any more malware, I suspect a trojan downloader in your case. Those can be hard to take care of, as they download more and more malware. Please look here: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_ZHELATI.BHA&VSect=T for more information on your helloserv.exe file.

    As for your many winlogon problems, HijackThis does not detect a thing. It may be the problem, as there are not supposed to be multiple winlogon files, only one in the C:\Windows\system32. You may quarantine these files by isolating them into another folder on your drive and renaming them and their file extensions. This may also be another sympton of your downloader malware. Also, this can be a reason to promote the idea of formatting, as those hidden settings which downloaders make to be able to download malware may never be reversed, thus never fixing your computer.

    Have you run Virtumundebegone? If not, please download it from here: http://secured2k.home.comcast.net/tools/VirtumundoBeGone.exe

    I may be throwing pebbles at a wall, but Antivir Spybot might be worth a try. It digs deep, and is pretty good at downloaders.

    Best Regards :D

    PS: One more thing. Go to your C:\Windows\system32, and arrange all your files by date. Scroll down to the latest, and look for random-named dll or exe files. Post those files here.
     

Share This Page